I don't think that ipmitool has implemented the ability to set PEF
entries and configure PET SNMP alerts.

However, ipmiutil has that capability, and if you specify an alert
destination, it automatically configures all of the other parameters to
support that.
See http://ipmiutil.sf.net, 'ipmiutil lan -e -A <alert ip>' 
Also, ipmiutil has interpretation for the unique PET 47-byte hex varbind
data, so that the SNMP management station receiving it can know what the
IPMI event was.  

Andy

-----Original Message-----
From: Kaiwang Chen [mailto:kaiwang.c...@gmail.com] 
Sent: Monday, October 10, 2011 4:42 AM
To: ipmitool-devel@lists.sourceforge.net
Subject: [Ipmitool-devel] How to manipulate alert policy table with
ipmitool?

Hello,

I wish this maillist is the right place to ask... Sorry I haven't
found any user or support maillist related.

Actually I was trying to make BMC sending alerts over LAN to a
snmptrapd host. According to Figure 17-2, Event Filter, Alert Policy,
and Alert Destination, & String Relationships from IPMIv2_0rev1_0.pdf,
the related BMC configuration should be those for event filter table,
alert policy table, and lan settings.

I found the event filter table (pef) was already populated(see
ipmitool pef list). Then I configured lan settings by "ipmitool lan
alert set <channel> <destination> <param> <value>". Anyway, I failed
to find any means to set alert policy, which in my case is empty. That
might be the problem, I blindly generated a test event by "ipmitool
event 1" and get no packets except ARP ones on snmptrapd host.

Any advice?

The configuration directives:

# ipmitool lan alert set 1 0 ipaddr 1.2.3.4 # snmptrapd host
# ipmitool lan alert set 1 0 gateway  # configured. and snmptrapd is
in the same segment 1.2.3.x
# ipmitool lan alert set 1 0 ack on
# ipmitool lan alert set 1 0 type pet
# ipmitool lan alert set 1 0 time

# ipmitool lan alert print
Alert Destination       : 0
Alert Acknowledge       : Unacknowledged
Destination Type        : PET Trap
Retry Interval          : 0
Number of Retries       : 4
Alert Gateway           : Default
Alert IP Address        : 1.2.3.4
Alert MAC Address       : 00:00:00:00:00:00

#  ipmitool lan print
Set in Progress         : Set Complete
Auth Type Support       : NONE MD2 MD5 PASSWORD
Auth Type Enable        : Callback : MD2 MD5
                       : User     : MD2 MD5
                       : Operator : MD2 MD5
                       : Admin    : MD2 MD5
                       : OEM      :
IP Address Source       : Static Address
IP Address              : 1.2.3.5
Subnet Mask             : 255.255.255.0
MAC Address             : xx.xx.xx.xx.xx.xx
SNMP Community String   : public
IP Header               : TTL=0x40 Flags=0x40 Precedence=0x00 TOS=0x10
Default Gateway IP      : 1.2.3.6
Default Gateway MAC     : 00:00:00:00:00:00
Backup Gateway IP       : 0.0.0.0
Backup Gateway MAC      : 00:00:00:00:00:00
802.1q VLAN ID          : Disabled
802.1q VLAN Priority    : 0
RMCP+ Cipher Suites     : 0,1,2,3,4,5,6,7,8,9,10,11,12,13,14
Cipher Suite Priv Max   : aaaaaaaaaaaaaaa
                       :     X=Cipher Suite Unused
                       :     c=CALLBACK
                       :     u=USER
                       :     o=OPERATOR
                       :     a=ADMIN
                       :     O=OEM

# ipmitool pef list
 1 | active | 0x11 | Fan | Any | Critical | Threshold |
(0x01/0x0004),<LC | Alert | 1
 2 | active | 0x11 | Fan | Any | OK | OEM | OEM | Alert | 1
 3 | active | 0x11 | Battery | Any | Warning | Discrete |
Sensor-specific | Alert | 1
 4 | active | 0x11 | Battery | Any | OK | OEM | OEM | Alert | 1
 5 | active | 0x11 | Battery | Any | Critical | Discrete |
Sensor-specific | Alert | 1
 6 | active | 0x11 | Battery | Any | OK | OEM | OEM | Alert | 1
 7 | active | 0x11 | Voltage | Any | OK | Discrete |
(0x03/0x0001),state deasserted | Alert | 1
 8 | active | 0x11 | Voltage | Any | Critical | Discrete |
(0x03/0x0002),state asserted | Alert | 1
 9 | active | 0x11 | Temperature | Any | Warning | Threshold |
(0x01/0x0081),<LNC,<UNC | Alert | 1
 10 | active | 0x11 | Temperature | Any | OK | OEM | OEM | Alert | 1
 11 | active | 0x11 | Temperature | Any | Critical | Threshold |
(0x01/0x0204),<LC,<UC | Alert | 1
 12 | active | 0x11 | Temperature | Any | OK | OEM | OEM | Alert | 1
 13 | active | 0x11 | Chassis Intrusion | Any | Critical | Discrete |
Sensor-specific | Alert | 1
 14 | active | 0x11 | Chassis Intrusion | Any | OK | OEM | OEM | Alert |
1
 15 | active | 0x11 | Any | Any | Warning | Discrete |
(0x0b/0x0004),redundancy degraded | Alert | 1
 16 | active | 0x11 | Any | Any | Critical | Discrete |
(0x0b/0x0002),redundancy lost | Alert | 1
 17 | active | 0x11 | Any | Any | OK | Discrete | (0x0b/0x0001),fully
redundant | Alert | 1
 18 | active | 0x11 | Processor | Any | Warning | Discrete |
Sensor-specific | Alert | 1
 19 | active | 0x11 | Processor | Any | OK | OEM | OEM | Alert | 1
 20 | active | 0x11 | Processor | Any | Critical | Discrete |
Sensor-specific | Alert | 1
 21 | active | 0x11 | Processor | Any | OK | OEM | OEM | Alert | 1
 22 | active | 0x11 | Processor | Any | OK | Discrete |
Sensor-specific | Alert | 1
 23 | active | 0x11 | Processor | Any | Critical | OEM | OEM | Alert | 1
 24 | active | 0x11 | Power supply | Any | Warning | Discrete |
Sensor-specific | Alert | 1
 25 | active | 0x11 | Power supply | Any | OK | OEM | OEM | Alert | 1
 26 | active | 0x11 | Power supply | Any | Critical | Discrete |
Sensor-specific | Alert | 1
 27 | active | 0x11 | Power supply | Any | OK | OEM | OEM | Alert | 1
 28 | active | 0x11 | Power supply | Any | OK | Discrete |
Sensor-specific | Alert | 1
 29 | active | 0x11 | Power supply | Any | Critical | OEM | OEM | Alert
| 1
 30 | active | 0x11 | Logging disabled | Any | Critical | Discrete |
Sensor-specific | Alert | 1
 31 | active | 0x11 | Watchdog 2 | Any | Critical | Discrete | Any |
Alert | 1
 32 | active | 0x11 | Current | Any | Warning | Threshold |
(0x01/0x0081),<LNC,<UNC | Alert | 1
 33 | active | 0x11 | Current | Any | OK | OEM | OEM | Alert | 1
 34 | active | 0x11 | Current | Any | Critical | Threshold |
(0x01/0x0204),<LC,<UC | Alert | 1
 35 | active | 0x11 | Current | Any | OK | OEM | OEM | Alert | 1
 36 | active | 0x11 | Module/board | Any | Information | OEM | OEM |
Alert | 1
 37 | active | 0x11 | Module/board | Any | Information | OEM | OEM |
Alert | 1
 38 | active | 0x11 | Module/board | Any | Critical | OEM | OEM | Alert
| 1
 39 | active | 0x11 | Module/board | Any | Warning | OEM | OEM | Alert |
1
 40 | active | 0x11 | None | Any | Critical | OEM | OEM | Alert | 1

# ipmitool pef policy
<it's empty..>

# ipmitool -v pef info
Discovered local IPMB address 0x20
Version                  : 0x51
PEF table size           : 40
Alert policy table size  : 8
System GUID              : .......
Alert                    : supported
Power-off                : supported
Reset                    : supported
Power-cycle              : supported
OEM-defined              : supported
Diagnostic-interrupt     : unsupported


Thanks,
Kaiwang

------------------------------------------------------------------------
------
All the data continuously generated in your IT infrastructure contains a
definitive record of customers, application performance, security
threats, fraudulent activity and more. Splunk takes this data and makes
sense of it. Business sense. IT sense. Common sense.
http://p.sf.net/sfu/splunk-d2dcopy1
_______________________________________________
Ipmitool-devel mailing list
Ipmitool-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/ipmitool-devel

------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure contains a
definitive record of customers, application performance, security
threats, fraudulent activity and more. Splunk takes this data and makes
sense of it. Business sense. IT sense. Common sense.
http://p.sf.net/sfu/splunk-d2dcopy1
_______________________________________________
Ipmitool-devel mailing list
Ipmitool-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/ipmitool-devel

Reply via email to