Differences between revisions 5 and 14 (spanning 9 versions)
Revision 5 as of 2006-05-30 10:18:56
Size: 5221
Editor: AndreasHaupt
Comment: RAID Controller setup added
Revision 14 as of 2009-05-19 14:36:39
Size: 5723
Comment: 4140
Deletions are marked like this. Additions are marked like this.
Line 3: Line 3:
[[TableOfContents]] <<TableOfContents>>

||<tablestyle="background-color: #E0E0FF;"> <!> This documentation applies to Sun Fire X4500 (so called Thumper) and X4140, too. ||
Line 24: Line 26:
 6. change the password (if you find out how this can be done...)
Line 28: Line 29:
 set pendingipaddress=141.34.42.xyz
 set pendingipnetmask=255.255.255.0
 set pendingipgateway=141.34.42.1
 set pendingipaddress=141.34.73.xyz or 141.34.72.xyz
 set pendingipnetmask=255.255.254.0
 set pendingipgateway=141.34.72.1
Line 37: Line 38:
 See ["Remote Management"]. If you haven't changed the password until now, do this on the SP's Website (User Management -> Select "root" and click "Edit").  See [[Remote_Management]].
Line 39: Line 40:
== MAC Address Retrieval == == Changing the Service Processor Password ==
Line 41: Line 42:
Log in to the Service Processor as root using ssh. Then:

=== Service Processor ===
Run `show SP/network` :
Log in as root with ssh (initial password: ''changeme''). Then:
Line 46: Line 44:
-> show SP/network

  /SP/network
    Targets:

    Properties:
        commitpending = (Cannot show property)
        ipaddress = 141.34.42.159
        ipdiscovery = Static
        ipgateway = 141.34.42.1
        ipnetmask = 255.255.255.0
        macaddress = 00:03:BA:F1:EC:95
        pendingipaddress = 141.34.42.159
        pendingipdiscovery = Static
        pendingipgateway = 141.34.42.1
        pendingipnetmask = 255.255.255.0
 -> set /SP/users/root password
 Changing password for user /SP/users/root/password...
 Enter new password: ********
 Enter new password again: ********
 New password was successfully set for user /SP/users/root
Line 64: Line 51:
=== Onboard Gigabit NICS ===
The system has four onboard interfaces. IN the SP tree, these show up as two dual port controllers
NET0 and NET1. The primary interface (recognized as eth0 under linux, and labelled NET0) is the one with the lowest MAC address shown. Only the lower MAC of each dual port card will show up in the SP output:
Changing the password is also possible on the SP's Website (User Management -> Select "root" and click "Edit").

||<tablestyle="width: 100%; background-color: #FFAAAA;"> <!> Log in with ssh '''without exiting the current session''' to test the new password.<<BR>> There is no known method for a factory reset of the SP.||

== Enabling Passwordless ssh Access ==

This is not foreseen by SUN, but all information needed to do it is publicly available.
Anyway, since SUN may not appreciate public documentation of this little hack, it is documented
in the restricted page [[Host_Initialisation/Sun_x4100/Secrets]].

== Host Information Retrieval ==

The information is retrieved by the use of ipmitool. Here's the script that's called ipmi (it has to be called on a host where ipmitool is available, e.g. a):
Line 68: Line 66:
-> show /SYS/MB/NET0 #!/bin/bash
host=$1
shift
Line 70: Line 70:
  /SYS/MB/NET0
    Targets:
ipmitool -I lan -H sp-$host -U root -P <password> $*
}}}
Line 73: Line 73:
    Properties:
        SEEPROM =
          Product Information:
          manufacturer name = INTEL
          product name = DUAL PORT GIGABIT ETHERNET CONTROLLER (COPPER)
          version = (no information)
          serial number = 00:14:4F:01:A9:9C
          part number = 82546EB
=== System serial number ===
Line 82: Line 75:
    Commands:
        cd
        show
{{{
for i in galaxy{25..30}; do
  serial=`ipmi $i fru | grep 'Product Serial' | head -n 2 | tail -n 1 | awk -F : '{print $2}' | sed 's| ||'`
  vamos_cmd -m host $i host.serial_number=$serial
done
}}}
Line 86: Line 82:
-> show /SYS/MB/NET1 === SP mac address ===
Line 88: Line 84:
  /SYS/MB/NET1
    Targets:
{{{
for i in galaxy{25..30}; do
  mac=`ipmi $i fru | grep 'Product Serial' | head -n 1 | awk -F ' : ' '{print $2}'`
  vamos_cmd -m host sp-$i interface.ether=$mac
done
}}}
Line 91: Line 91:
    Properties:
        SEEPROM =
          Product Information:
          manufacturer name = INTEL
          product name = DUAL PORT GIGABIT ETHERNET CONTROLLER (COPPER)
          version = (no information)
          serial number = 00:14:4F:01:A9:9A
          part number = 82546EB
=== System mac address (first nic) ===
Line 100: Line 93:
    Commands:
        cd
        show
{{{
for i in galaxy{25..30}; do
  mac=`ipmi $i fru | grep 'Product Serial' | head -n 4 | tail -n 1 | awk -F ' : ' '{print $2}'`
  vamos_cmd -m host $i interface.ether=$mac
done
Line 104: Line 99:
The primary interface in this example is ...:9A. The others are :9B (not shown), :9C (shown) and 9D (not shown).
== Setting up SNMP traps ==

A passwordless root access to the SP helps a lot here...

* 4100
{{{
ssh -l root sp-<host> << EOF
cd /SP/alert/rules/1
set destination=141.34.32.57
set level=information
exit
EOF
}}}
* 4140
{{{
ssh -l root sp-<host> << EOF
cd /SP/alertmgmt/rules/1
set destination=141.34.32.57
set level=minor
set destination_port=162
set community_or_username=bellona
exit
EOF
}}}
Line 116: Line 135:
 * '''Legacy USB''' (default: enabled)[[BR]]  * '''Legacy USB''' (default: enabled)<<BR>>
Line 121: Line 140:
 * '''AC power loss recovery''' (This BIOS option does not exist)[[BR]]
 The 'Power Restore Policy' is set to 'always-off' anyway
 * '''Chipset -> South``Bridge Configuration -> Restore on AC/Power Loss'''<<BR>>
 Make sure it's set to ''Power Off''. <!> Default was changed to ''Last State'' in Firmware 1.1
Line 124: Line 143:
 * '''Advanced -> Remote Access Configuration''' (default: 9600 baud on ttys0)[[BR]]  * '''Advanced -> Remote Access Configuration''' (default: 9600 baud on ttys0)<<BR>>

<!> This documentation applies to Sun Fire X4500 (so called Thumper) and X4140, too.

Documentation

There's almost no documentation coming with the system, it's all available online only:

http://www.sun.com/products-n-solutions/hardware/docs/Servers/Workgroup_Servers/x4100/index.html

Getting the ILOM going is described in the Servers Setup Guide which is coming in printed form, though.

ILOM (Service Processor) Setup

To get the IP interface going without having dynamic DHCP for it available, use the serial port:

  1. find a notebook or a system nearby with a 9-pin SUB-D serial port
  2. attach the adaptor coming with the server to this port
  3. use an RJ45 cable (a normal patch cable works) to connect the adaptor to the serial management port of the server

  4. fire up the terminal emulation software (linux: minicom) and configure the port correctly:
    • 9600,8N1 (on a notebook, the port ist /dev/ttyS0, on a server it may be ttyS1)
    • no flow control, neither hardware nor software

  5. you should now be able to log in as root (password: changeme)
  6. set the IP interface to a static address as described in the Servers Setup Guide:

     cd /SP/network
     set pendingipaddress=141.34.73.xyz    or  141.34.72.xyz
     set pendingipnetmask=255.255.254.0
     set pendingipgateway=141.34.72.1
     set pendingipdiscovery=static
     set commitpending=true
    The last step takes a couple of seconds and produces some error messages. Don't panic. Verify if it worked by pinging the service processor afterwards. You should now be able to log in with ssh or https. All other steps can be done from your desktop.

    See Remote_Management.

Changing the Service Processor Password

Log in as root with ssh (initial password: changeme). Then:

 -> set /SP/users/root password 
 Changing password for user /SP/users/root/password...
 Enter new password: ********
 Enter new password again: ********
 New password was successfully set for user /SP/users/root

Changing the password is also possible on the SP's Website (User Management -> Select "root" and click "Edit").

<!> Log in with ssh without exiting the current session to test the new password.
There is no known method for a factory reset of the SP.

Enabling Passwordless ssh Access

This is not foreseen by SUN, but all information needed to do it is publicly available. Anyway, since SUN may not appreciate public documentation of this little hack, it is documented in the restricted page Host_Initialisation/Sun_x4100/Secrets.

Host Information Retrieval

The information is retrieved by the use of ipmitool. Here's the script that's called ipmi (it has to be called on a host where ipmitool is available, e.g. a):

host=$1
shift

ipmitool -I lan -H sp-$host -U root -P <password> $*

System serial number

for i in galaxy{25..30}; do
  serial=`ipmi $i fru | grep 'Product Serial' | head -n 2 | tail -n 1 | awk -F : '{print $2}' | sed 's| ||'`
  vamos_cmd -m host $i host.serial_number=$serial
done

SP mac address

for i in galaxy{25..30}; do
  mac=`ipmi $i fru | grep 'Product Serial' | head -n 1 | awk -F ' : ' '{print $2}'`
  vamos_cmd -m host sp-$i interface.ether=$mac
done

System mac address (first nic)

for i in galaxy{25..30}; do
  mac=`ipmi $i fru | grep 'Product Serial' | head -n 4 | tail -n 1 | awk -F ' : ' '{print $2}'`
  vamos_cmd -m host $i interface.ether=$mac
done

Setting up SNMP traps

A passwordless root access to the SP helps a lot here...

* 4100

ssh -l root sp-<host> << EOF
cd /SP/alert/rules/1
set destination=141.34.32.57 
set level=information 
exit
EOF

* 4140

ssh -l root sp-<host> << EOF
cd /SP/alertmgmt/rules/1
set destination=141.34.32.57 
set level=minor 
set destination_port=162
set community_or_username=bellona
exit
EOF

RAID Controller Setup

During the boot hit Ctrl-C when the LSI RAID controller is initializing. Select the first (and only) adapter, then choose Create IS Volume. If you don't need the data on the disks you can ignore the warning. Change RAID disk for both disks to YES to create a RAID 0 stripe. Commit with C. After that leave the controller setup.

BIOS

This server's BIOS has very many options, and most have not been explored or even understood yet.

Some that matter:

  • Legacy USB (default: enabled)
    Can be a problem under Linux if enabled (instability). If off, the keyboard (USB only, no PS/2 ports) will work in the BIOS, but not in the bootloader. This should probably be set to auto.

  • Chipset -> SouthBridge Configuration -> Restore on AC/Power Loss
    Make sure it's set to Power Off. <!> Default was changed to Last State in Firmware 1.1

  • Advanced -> Remote Access Configuration (default: 9600 baud on ttys0)
    Make sure that serial redirection is enabled, and all the speed settings match (by default, all are 9600, which works but is slow):

    • serial redirection
    • service processor serial port speed (external and internal)
    • operating system parameters: grub and agetty
      • CF_CONMGR_TTY=ttyS0

      • CF_ConMgr_BaudRate=9600

System Serial Number Retrieval

Log into the SP as root, and run

-> show SYS/MB

Or use dmidecode. Or the web interface or ...

Host_Initialisation/Sun_x4100 (last edited 2009-05-19 14:36:39 by WaltrautNiepraschk)