I don't think that ipmitool has implemented the ability to set PEF entries and configure PET SNMP alerts.
However, ipmiutil has that capability, and if you specify an alert destination, it automatically configures all of the other parameters to support that. See http://ipmiutil.sf.net, 'ipmiutil lan -e -A <alert ip>' Also, ipmiutil has interpretation for the unique PET 47-byte hex varbind data, so that the SNMP management station receiving it can know what the IPMI event was. Andy -----Original Message----- From: Kaiwang Chen [mailto:kaiwang.c...@gmail.com] Sent: Monday, October 10, 2011 4:42 AM To: ipmitool-devel@lists.sourceforge.net Subject: [Ipmitool-devel] How to manipulate alert policy table with ipmitool? Hello, I wish this maillist is the right place to ask... Sorry I haven't found any user or support maillist related. Actually I was trying to make BMC sending alerts over LAN to a snmptrapd host. According to Figure 17-2, Event Filter, Alert Policy, and Alert Destination, & String Relationships from IPMIv2_0rev1_0.pdf, the related BMC configuration should be those for event filter table, alert policy table, and lan settings. I found the event filter table (pef) was already populated(see ipmitool pef list). Then I configured lan settings by "ipmitool lan alert set <channel> <destination> <param> <value>". Anyway, I failed to find any means to set alert policy, which in my case is empty. That might be the problem, I blindly generated a test event by "ipmitool event 1" and get no packets except ARP ones on snmptrapd host. Any advice? The configuration directives: # ipmitool lan alert set 1 0 ipaddr 1.2.3.4 # snmptrapd host # ipmitool lan alert set 1 0 gateway # configured. and snmptrapd is in the same segment 1.2.3.x # ipmitool lan alert set 1 0 ack on # ipmitool lan alert set 1 0 type pet # ipmitool lan alert set 1 0 time # ipmitool lan alert print Alert Destination : 0 Alert Acknowledge : Unacknowledged Destination Type : PET Trap Retry Interval : 0 Number of Retries : 4 Alert Gateway : Default Alert IP Address : 1.2.3.4 Alert MAC Address : 00:00:00:00:00:00 # ipmitool lan print Set in Progress : Set Complete Auth Type Support : NONE MD2 MD5 PASSWORD Auth Type Enable : Callback : MD2 MD5 : User : MD2 MD5 : Operator : MD2 MD5 : Admin : MD2 MD5 : OEM : IP Address Source : Static Address IP Address : 1.2.3.5 Subnet Mask : 255.255.255.0 MAC Address : xx.xx.xx.xx.xx.xx SNMP Community String : public IP Header : TTL=0x40 Flags=0x40 Precedence=0x00 TOS=0x10 Default Gateway IP : 1.2.3.6 Default Gateway MAC : 00:00:00:00:00:00 Backup Gateway IP : 0.0.0.0 Backup Gateway MAC : 00:00:00:00:00:00 802.1q VLAN ID : Disabled 802.1q VLAN Priority : 0 RMCP+ Cipher Suites : 0,1,2,3,4,5,6,7,8,9,10,11,12,13,14 Cipher Suite Priv Max : aaaaaaaaaaaaaaa : X=Cipher Suite Unused : c=CALLBACK : u=USER : o=OPERATOR : a=ADMIN : O=OEM # ipmitool pef list 1 | active | 0x11 | Fan | Any | Critical | Threshold | (0x01/0x0004),<LC | Alert | 1 2 | active | 0x11 | Fan | Any | OK | OEM | OEM | Alert | 1 3 | active | 0x11 | Battery | Any | Warning | Discrete | Sensor-specific | Alert | 1 4 | active | 0x11 | Battery | Any | OK | OEM | OEM | Alert | 1 5 | active | 0x11 | Battery | Any | Critical | Discrete | Sensor-specific | Alert | 1 6 | active | 0x11 | Battery | Any | OK | OEM | OEM | Alert | 1 7 | active | 0x11 | Voltage | Any | OK | Discrete | (0x03/0x0001),state deasserted | Alert | 1 8 | active | 0x11 | Voltage | Any | Critical | Discrete | (0x03/0x0002),state asserted | Alert | 1 9 | active | 0x11 | Temperature | Any | Warning | Threshold | (0x01/0x0081),<LNC,<UNC | Alert | 1 10 | active | 0x11 | Temperature | Any | OK | OEM | OEM | Alert | 1 11 | active | 0x11 | Temperature | Any | Critical | Threshold | (0x01/0x0204),<LC,<UC | Alert | 1 12 | active | 0x11 | Temperature | Any | OK | OEM | OEM | Alert | 1 13 | active | 0x11 | Chassis Intrusion | Any | Critical | Discrete | Sensor-specific | Alert | 1 14 | active | 0x11 | Chassis Intrusion | Any | OK | OEM | OEM | Alert | 1 15 | active | 0x11 | Any | Any | Warning | Discrete | (0x0b/0x0004),redundancy degraded | Alert | 1 16 | active | 0x11 | Any | Any | Critical | Discrete | (0x0b/0x0002),redundancy lost | Alert | 1 17 | active | 0x11 | Any | Any | OK | Discrete | (0x0b/0x0001),fully redundant | Alert | 1 18 | active | 0x11 | Processor | Any | Warning | Discrete | Sensor-specific | Alert | 1 19 | active | 0x11 | Processor | Any | OK | OEM | OEM | Alert | 1 20 | active | 0x11 | Processor | Any | Critical | Discrete | Sensor-specific | Alert | 1 21 | active | 0x11 | Processor | Any | OK | OEM | OEM | Alert | 1 22 | active | 0x11 | Processor | Any | OK | Discrete | Sensor-specific | Alert | 1 23 | active | 0x11 | Processor | Any | Critical | OEM | OEM | Alert | 1 24 | active | 0x11 | Power supply | Any | Warning | Discrete | Sensor-specific | Alert | 1 25 | active | 0x11 | Power supply | Any | OK | OEM | OEM | Alert | 1 26 | active | 0x11 | Power supply | Any | Critical | Discrete | Sensor-specific | Alert | 1 27 | active | 0x11 | Power supply | Any | OK | OEM | OEM | Alert | 1 28 | active | 0x11 | Power supply | Any | OK | Discrete | Sensor-specific | Alert | 1 29 | active | 0x11 | Power supply | Any | Critical | OEM | OEM | Alert | 1 30 | active | 0x11 | Logging disabled | Any | Critical | Discrete | Sensor-specific | Alert | 1 31 | active | 0x11 | Watchdog 2 | Any | Critical | Discrete | Any | Alert | 1 32 | active | 0x11 | Current | Any | Warning | Threshold | (0x01/0x0081),<LNC,<UNC | Alert | 1 33 | active | 0x11 | Current | Any | OK | OEM | OEM | Alert | 1 34 | active | 0x11 | Current | Any | Critical | Threshold | (0x01/0x0204),<LC,<UC | Alert | 1 35 | active | 0x11 | Current | Any | OK | OEM | OEM | Alert | 1 36 | active | 0x11 | Module/board | Any | Information | OEM | OEM | Alert | 1 37 | active | 0x11 | Module/board | Any | Information | OEM | OEM | Alert | 1 38 | active | 0x11 | Module/board | Any | Critical | OEM | OEM | Alert | 1 39 | active | 0x11 | Module/board | Any | Warning | OEM | OEM | Alert | 1 40 | active | 0x11 | None | Any | Critical | OEM | OEM | Alert | 1 # ipmitool pef policy <it's empty..> # ipmitool -v pef info Discovered local IPMB address 0x20 Version : 0x51 PEF table size : 40 Alert policy table size : 8 System GUID : ....... Alert : supported Power-off : supported Reset : supported Power-cycle : supported OEM-defined : supported Diagnostic-interrupt : unsupported Thanks, Kaiwang ------------------------------------------------------------------------ ------ All the data continuously generated in your IT infrastructure contains a definitive record of customers, application performance, security threats, fraudulent activity and more. Splunk takes this data and makes sense of it. Business sense. IT sense. Common sense. http://p.sf.net/sfu/splunk-d2dcopy1 _______________________________________________ Ipmitool-devel mailing list Ipmitool-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/ipmitool-devel ------------------------------------------------------------------------------ All the data continuously generated in your IT infrastructure contains a definitive record of customers, application performance, security threats, fraudulent activity and more. Splunk takes this data and makes sense of it. Business sense. IT sense. Common sense. http://p.sf.net/sfu/splunk-d2dcopy1 _______________________________________________ Ipmitool-devel mailing list Ipmitool-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/ipmitool-devel