HPE Ilo 5 Scripting and Command Line Guide

Total Page:16

File Type:pdf, Size:1020Kb

HPE Ilo 5 Scripting and Command Line Guide HPE iLO 5 Scripting and Command Line Guide Abstract This document describes the syntax and tools available for use with the HPE iLO firmware through the command line or a scripted interface. This document is for the person who installs, administers, and troubleshoots servers and storage systems. Hewlett Packard Enterprise assumes you are qualified in the servicing of computer equipment and trained in recognizing hazards in products with hazardous energy levels. Use this guide for HPE iLO ProLiant servers and ProLiant BladeSystem server blades. Part Number: 882043-001 Published: July 2017 Edition: 1 © Copyright 2017, 2017 Hewlett Packard Enterprise Development LP Notices The information contained herein is subject to change without notice. The only warranties for Hewlett Packard Enterprise products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. Confidential computer software. Valid license from Hewlett Packard Enterprise required for possession, use, or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. Links to third-party websites take you outside the Hewlett Packard Enterprise website. Hewlett Packard Enterprise has no control over and is not responsible for information outside the Hewlett Packard Enterprise website. Hewlett Packard Enterprise (HPE) Confidentiality Notice • The information contained in this presentation is proprietary to Hewlett Packard Enterprise and is offered in confidence, subject to the terms and conditions of a Confidential Disclosure Agreement. • HPE makes no warranties regarding the accuracy of this information. HPE does not warrant or represent that it will introduce any product to which the information relates. It is presented for evaluation by the recipient and to assist HPE in defining product direction. Third-party websites Links to third-party websites take you outside the Hewlett Packard Enterprise website. Hewlett Packard Enterprise has no control over and is not responsible for information outside the Hewlett Packard Enterprise website. Acknowledgments Microsoft®, Windows®, and Windows Server® are trademarks of the Microsoft group of companies. Intel®, Itanium®, Pentium®, Intel Inside®, and the Intel Inside logo are trademarks of Intel Corporation in the United States and other countries. Java® and Oracle® are registered trademarks of Oracle and/or its affiliates. Linux® is the registered trademark of Linus Torvalds in the U.S. and other countries. Contents Introduction................................................................................................14 Scripting and command line guide overview..................................................................................... 14 Scripting and command line utilities.................................................................................................. 14 HPQLOCFG Utility..................................................................................................................15 LOCFG.PL Script....................................................................................................................15 HPONCFG Utility....................................................................................................................15 SMASH CLP...........................................................................................................................16 IPMI........................................................................................................................................ 16 HPE Insight Control server deployment............................................................................................ 16 HPQLOCFG usage..................................................................................... 17 Configuring for unauthenticated XML queries................................................................................... 18 Creating a system collection in HPE SIM..........................................................................................19 Launch applications with HPE SIM custom tools.............................................................................. 20 Batch processing using HPQLOCFG................................................................................................ 20 HPQLOCFG command line parameters............................................................................................20 Using quote characters...........................................................................................................21 Command line switches..........................................................................................................21 Using variables and name value pairs with HPQLOCFG............................................ 22 LOCFG.PL usage....................................................................................... 24 LOCFG.PL Utility...............................................................................................................................24 LOCFG.PL command line switches...................................................................................................24 HPONCFG online configuration utility.....................................................26 HPONCFG.........................................................................................................................................26 HPONCFG requirements...................................................................................................................26 Installing HPONCFG......................................................................................................................... 26 Windows server installation.................................................................................................... 26 Linux server installation ......................................................................................................... 26 VMware installation.................................................................................................................27 HPONCFG utility............................................................................................................................... 27 HPONCFG command line parameters................................................................................... 27 Using HPONCFG on Windows servers....................................................................... 29 Using HPONCFG on Linux servers............................................................................. 29 Obtaining the basic configuration........................................................................................... 30 Obtaining a specific configuration...........................................................................................32 Setting a configuration............................................................................................................33 Using variable substitution......................................................................................................33 Capturing and restoring a configuration..................................................................................34 SMASH CLP usage.................................................................................... 35 SMASH CLP .....................................................................................................................................35 Contents 3 IPMI usage.................................................................................................. 36 The IPMI utility...................................................................................................................................36 Basic IPMI tool usage........................................................................................................................36 Advanced IPMI tool usage on Linux..................................................................................................36 Advanced IPMIutil usage on Windows.............................................................................................. 37 SMASH CLP Scripting Language............................................................. 38 SMASH CLP command line overview............................................................................................... 38 SMASH CLP command line access.................................................................................................. 38 Using the command line....................................................................................................................38 Escape commands............................................................................................................................40 Base commands................................................................................................................................40 Using the NIC auto-selection feature......................................................................................43 Specific commands........................................................................................................................... 43 User commands......................................................................................................................43
Recommended publications
  • HPE Reference Architecture for Highly Available Microsoft SQL Server 2017 with Vmware Vsphere on HPE Synergy 620 Compute Modules
    HPE Reference Architecture for highly available Microsoft SQL Server 2017 with VMware vSphere on HPE Synergy 620 Compute Modules Reference Architecture Reference Architecture Contents Executive summary ................................................................................................................................................................................................................................................................................................................................ 3 Introduction ................................................................................................................................................................................................................................................................................................................................................... 3 Solution overview ..................................................................................................................................................................................................................................................................................................................................... 4 Solution components ...........................................................................................................................................................................................................................................................................................................................
    [Show full text]
  • HPE Integrated Lights-Out (Ilo) Overview
    QuickSpecs HPE Integrated Lights-Out (iLO) Overview HPE Integrated Lights-Out (iLO) Integrated Lights-Out (iLO) is an embedded technology that ships in HPE Servers. It is the core foundation for the intelligence of the HPE Servers. This technology is combination of the iLO ASIC that is part of the server-board and the firmware that powers the ASIC. Different generations of ProLiant Servers carry different versions of the iLO ASIC. Sl No ProLiant Generation iLO ASIC version 1 Gen10 and Gen10 Plus iLO 5 2 Gen9 and Gen8 iLO 4 3 Gen7 iLO 3 iLO is key to make the server operational and boot. It helps simplify server set up, engage health monitoring as well as power and thermal control. These capabilities are included with the Server at no extra cost (iLO Standard). No installation needed and minimal setup is required. Industry leading features that enhance server administrator productivity are available through optional licenses. With iLO 5 Firmware version v1.40, the iLO Advanced license will include all licensed features. This new, simplified approach allows customers to have either standard, included features, or upgrade to licensed features that are all available with iLO Advanced. What’s New Currently, when a customer orders a server, the server is shipped with the default iLO password being a randomized string. The randomized string which is the initial password for the iLO is printed on the iLO Default Network Settings Tag. The default password is used for the initial login and is restored when iLO is Reset to Defaults. Using the randomized password is a security best practice.
    [Show full text]
  • HPE Synergy Image Streamer Overview
    QuickSpecs HPE Synergy Image Streamer Overview HPE Synergy Image Streamer HPE Synergy is the first Composable Infrastructure – it empowers IT to create and deliver new value instantly and continuously. This single infrastructure reduces operational complexity for traditional workloads and increases operational velocity for the new breed of applications and services. Through a single interface, HPE Synergy composes compute, storage, and fabric pools into any configuration for any application. It also enables a broad range of applications and operational models such as virtualization, hybrid cloud, and DevOps. With HPE Synergy, IT becomes the internal partner to rapidly launch new businesses. HPE Synergy delivers Composable Infrastructure with: • Fluid pools of resources, where a single infrastructure of Compute, Storage, and Fabric boots up ready for workloads and demonstrates self-assimilating capacity, • Software-defined intelligence, with a single interface that precisely composes logical infrastructures at near-instant speeds; and demonstrates template-driven, frictionless operations, and • Unified API Access, which enables simple line-of-code programming of every infrastructure element; easily automates IT operational processes; and effortlessly automates applications through infrastructure deployment. Managing Composable Infrastructure HPE Synergy Composer provides the enterprise-level mankagement to compose and deploy system resources to your application needs. This management appliance uses software-defined intelligence with embedded HPE OneView to aggregate Compute, Storage and Fabric resources in a manner that scales to your application needs, instead of being restricted to the fixed ratios of traditional resource offerings. HPE Synergy Image Streamer is a new approach to deployment and updates for composable infrastructure. This management appliance works with HPE Synergy Composer for fast software-defined control over physical compute modules with operating system provisioning.
    [Show full text]
  • Synergy Basic Free Download Synergy Business
    synergy basic free download Synergy Business. Licensing for Businesses and Enterprise Organizations. What is a business license? A Synergy Business license allows you to use the software at your place of work or academic institution. Bring all the benefits of Synergy to your organisation with a Synergy Business license. Benefits. Priority Business Support Volume Pricing Account Manager Enterprise Deployment High Grade Security Migration Support. Priority Business Support. We offer priority technical support to all of our business license holders to ensure you can get the support you need. With a dedicated support email address and initial response time within 1 hour, we ensure a timely response. Volume Pricing. We offer volume discounts to institutions who want to purchase Synergy for multiple users or multiple years. Get in touch to learn more about how we can help your business. Account Manager. Enterprise customers get a dedicated account manager to ensure you are getting the most out of Synergy. We love seeing our software in action, if you are doing something really cool we may even come and visit! Enterprise Deployment. If you’d like to deploy Synergy across an enterprise environment then we want to hear about it. We’ll guide you through the process with an account manager and our tech team. Compatibility. Synergy supports Windows, macOS, and Linux, allowing connections to be made across operating systems. High Grade Security. Synergy is SSL/TLS encrypted across the network, so you can use with confidence on any hardware. Migration Support. If you are using an alternative keyboard and mouse sharing product currently then we can support in onboarding to Synergy.
    [Show full text]
  • Synergy MQTT/TLS Google Cloud Connectivity Solution
    Application Note Renesas Synergy™ Platform Synergy MQTT/TLS Google Cloud Connectivity Solution Introduction This application note describes the IoT Cloud connectivity solution in general and introduces you briefly to the IoT Cloud provider, Google Cloud. It covers the Synergy MQTT/TLS module, its features, and operational flow sequence (Initialization/Data flow). The application example provided in the package uses Google Cloud IoT Core. The detailed steps in this document show first-time Google Cloud IoT Core users how to configure the Google Cloud IoT Core platform to run this application example demonstration. This application note enables you to effectively use the Synergy MQTT/TLS modules in your own design. Upon completion of this guide, you will be able to add the MQTT/TLS module to your own design, configure it correctly for the target application, and write code using the included application example code as a reference and efficient starting point. References to more detailed API descriptions, and other application projects that demonstrate more advanced uses of the module, are in the Synergy Software Package (SSP) User’s Manual (see Next Steps section) and serve as valuable resources in creating more complex designs. Currently, the Synergy MQTT/TLS Connectivity solution is implemented and tested using Google Cloud IoT Core on AE-CLOUD1 and AE-CLOUD2 kit. Support for other Synergy kits and IoT Cloud providers will be provided in upcoming releases. Required Resources To build and run the MQTT/TLS application example, you need:
    [Show full text]
  • Cruz Operations Center Installation Guide
    Cruz Operations Center v8 CruzOC Installation Guide Notes and Cautions A NOTE indicates important information that helps you make better use of your computer. A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. ____________________ © 2019 Dorado Software, Inc. Dorado and Cruz Operations Center are trademarks of Dorado Software, Inc. Dorado Software, Inc. disclaims any proprietary interest in trademarks and trade names other than its own. 2019-2 Rev. A01 2 CruzOC v8 Installation Guide Contents 9 1 Introduction . 9 In This Guide . 10 Intended Audience. 10 Installation Overview . 11 Related Documents . 11 13 2 Preparing for Installation . 13 Preparing for Installation. 14 Preparing for Upgrade. 14 Verifying System Requirements. 15 Software Requirements . 15 Hardware Requirements . 16 Recommended Linux Install Preparation . 17 Recommended Windows Install Preparation . 19 Understanding Installation Types . 19 Distributed Model . 20 High Availability and Clustering Model . 20 Db High Availability Model . 21 Clustered Mediation Servers................................................................ 22 Web Portal Installation ..................................................................... 23 Application Server Installation .............................................................. 24 Mediation Server Subnets .................................................................. 24 Routing Behavior ........................................................................... 24 Compatibility
    [Show full text]
  • HPE Ilo 5 1.30 User Guide
    HPE iLO 5 1.30 User Guide Abstract This guide provides information about configuring, updating, and operating HPE ProLiant Gen10 servers and HPE Synergy compute modules by using the HPE iLO 5 firmware. This document is intended for system administrators, Hewlett Packard Enterprise representatives, and Hewlett Packard Enterprise Authorized Channel Partners who are involved in configuring and using Hewlett Packard Enterprise servers that include iLO 5. Part Number: 880740-004 Published: June 2018 Edition: 1 © Copyright 2012-2018 Hewlett Packard Enterprise Development LP Notices The information contained herein is subject to change without notice. The only warranties for Hewlett Packard Enterprise products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. Confidential computer software. Valid license from Hewlett Packard Enterprise required for possession, use, or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. Links to third-party websites take you outside the Hewlett Packard Enterprise website. Hewlett Packard Enterprise has no control over and is not responsible for information outside the Hewlett Packard Enterprise website. Acknowledgments Microsoft® and Windows® are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Java® and Oracle® are registered trademarks of Oracle and/or its affiliates. Google™ is a trademark of Google Inc.
    [Show full text]
  • Direct Keyboard Input to Computers
    Direct Keyboard Input To Computers Unpoisoned and bibliographic Dyson municipalise some cramp so subversively! Bibulous Sydney kibble apodeictically. Contrived and crinkled Darius raids his Delius tines microminiaturized ritualistically. Pages with a major components of keys for common type spaces. Braille Access for Inputting to a Computer. Storing the computer system so why they do the back or similar mouse, most strongly associated letter! The tribute is based on process the key bond on the keyboard. Selections and are seek very cramp and method of interacting with your device. Unit 45 Input into Machine Language Coursera. Programs are the sets of instructions that answer the computer. Computers so common usually inside a KVM switch to prefer the IO devices keyboard. 10 ways we'll move after the keyboard Computerworld. National academy of direct keyboard, direct selection or rejection from this switching among input devices, you need to reduce stress disorders, may imply an exploration involves conversion from. Keyboard and mouse basics nidirect. To do something needs to be edited and eisa slot into sleep spell checker with music. Input devices include typewriter-like keyboards handheld devices such newspaper the. ShareMouse sends the mousekeyboard input once the networked computers. Cpu is difficult to position to reduce symptoms in narrowly construed domains to secure wireless range and gestural because of laser on screen in its lower. As directed to model takes particular care to automatically as. Direct entry input device The Virtues Tour. Controlling a computer with a keyboard only ADG. Inputoutput Devices and Interaction Techniques Department. Device is constructed with a USB port for direct connection to a MIDI keyboard.
    [Show full text]