Also, I've noticed in the BIOS that I have the option to use a "POST
Watchdog timer", should I opt-in for this or just leave it off? I've looked
into it a bit, but really not sure why anyone would leave it off.  What
does everyone else usually do?

On Wed, Oct 31, 2012 at 1:18 PM, Josh Bowling <[email protected]> wrote:

> Alright, I jumped into the BIOS, found the settings, and got everything
> working.
> I was successful at remotely powering off and on one of the nodes.
>
> Now comes the question of adding it to Pacemaker.
> I've found a few sites here and there, but as I'm not really in such a big
> hurry, I thought I'd double check before setting it up.
>
> I know my particular device is ipmilan and have looked at the variables I
> need to pass to pacemaker so it can implement STONITH - hostname, login,
> password, etc.  I know I need to add this info as a resource in the
> Pacemaker config, but I'm not quite sure of the format.  Maybe something
> like this:
>
> (on carbon)
> # crm configure
> # crm(live) configure: st_ipmilan_carbon \
> # params hostname="carbon.domain.com" ipaddr=192.168.10.151 \
> # login="admin" password="secret"
>
> The only thing is that I will need to set this up for both machines in the
> cluster.  How does Pacemaker know which one to use?  Does it check the
> ipaddr/hostname?  And I believe once I get this setup correctly, I need to
> change stonith-enabled from false to true.  Are there any other settings
> that I should be aware for any kind of improvements?
>
> Thanks again
>
> On Wed, Oct 31, 2012 at 1:01 AM, Digimer <[email protected]> wrote:
>
>> Different vendors handle IPMI differently... It's likely that you don't
>> have the right username/password combo, but you would need to refer to
>> your server's manual for details on how to manage users. Most systems
>> have a BIOS and Web UI for this.
>>
>> digimer
>>
>> On 10/30/2012 12:26 AM, Josh Bowling wrote:
>> > Also, not sure if it's necessary or not, but here's my ouput when taking
>> > a look at the available IPMI users:
>> >
>> > # ipmitool user list 1
>> > ID  Name             Callin  Link Auth  IPMI Msg   Channel Priv Limit
>> > 2   admin            true    false      true       ADMINISTRATOR
>> >
>> > I've manually set the password to "secret" for testing, but still can't
>> > login:
>> > # ipmitool user *set* password 2 secret
>> >
>> > And here's my current lan1 output:
>> > # ipmitool lan print 1
>> > Set in Progress         : Set Complete
>> > Auth Type Support       : NONE MD2 MD5 PASSWORD
>> > Auth Type Enable        : Callback :
>> >                         : User     : MD2 MD5 PASSWORD
>> >                         : Operator : MD2 MD5 PASSWORD
>> >                         : Admin    : MD2 MD5 PASSWORD
>> >                         : OEM      :
>> > IP Address Source       : Static Address
>> > IP Address              : 192.168.10.151
>> > Subnet Mask             : 255.255.255.0
>> > MAC Address             : 5c:f3:fc:f2:35:95
>> > SNMP Community String   : public
>> > IP Header               : TTL=0x40 Flags=0x40 Precedence=0x00 TOS=0x10
>> > BMC ARP Control         : ARP Responses Enabled, Gratuitous ARP Disabled
>> > Gratituous ARP Intrvl   : 2.0 seconds
>> > Default Gateway IP      : 192.168.10.10
>> > Default Gateway MAC     : 00:00:00:00:00:00
>> > Backup Gateway IP       : 0.0.0.0
>> > Backup Gateway MAC      : 00:00:00:00:00:00
>> > 802.1q VLAN ID          : Disabled
>> > 802.1q VLAN Priority    : 0
>> > RMCP+ Cipher Suites     : 0,1,2,3,4
>> > Cipher Suite Priv Max   : uaaaaXXXXXXXXXX
>> >                         :     X=Cipher Suite Unused
>> >                         :     c=CALLBACK
>> >                         :     u=USER
>> >                         :     o=OPERATOR
>> >                         :     a=ADMIN
>> >                         :     O=OEM
>>
>>
>> --
>> Digimer
>> Papers and Projects: https://alteeve.ca/w/
>> What if the cure for cancer is trapped in the mind of a person without
>> access to education?
>>
>
>
_______________________________________________
Linux-HA mailing list
[email protected]
http://lists.linux-ha.org/mailman/listinfo/linux-ha
See also: http://linux-ha.org/ReportingProblems

Reply via email to