MAAS 2.3.5 (6511-gf466fdb-0ubuntu1) - iLO 4 (moonshot issue)

So, a little more information.

I’ve tried to use the ipmitool on the command line from both the region and the rack controller.
The results are the same. I ran the tool in debug more so you can see the packet dump, however I’ve no clue about the protocol it’s using, so hopefully it’ll make more sense to you !

I’ve not specified - -B <cartridge_channel> -T <node_address> -b <local_chan> -t <local_address> as this is a standalone server, not a chassis.

ubuntu maas-region-01:~$ ssh maas 10.0.0.24
maas 10.0.0.24’s password:

ubuntucmaas-region-01:~$ ssh maas 10.0.0.24
maas 10.0.0.24’s password:
User:maas logged-in to ILO---------z.(10.0.0.24 / FE80::9EB6:54FF:FE81:E88E)

iLO Advanced 2.61 at Jul 27 2018
Server Name: host is unnamed
Server Power: Off

</>hpiLO->

So, ssh seems fine. We have connectivity.

Here’s the command I used for ipmitool…

ipmitool -v -v -v -v -v -v -v -H 10.0.0.24 -U maas -P 8Uw3InTqA9 -I lanplus power status

And the output (sorry, there’s a fair bit)

Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x8e 0x04

BUILDING A v1.5 COMMAND
added list entry seq=0x00 cmd=0x38

IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
sending packet (23 bytes)
06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18
c8 81 00 38 8e 04 b5
removed list entry seq=0x00 cmd=0x38

Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x8e 0x04

BUILDING A v1.5 COMMAND
added list entry seq=0x00 cmd=0x38

IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
sending packet (23 bytes)
06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18
c8 81 00 38 8e 04 b5
removed list entry seq=0x00 cmd=0x38

Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x8e 0x04

BUILDING A v1.5 COMMAND
added list entry seq=0x00 cmd=0x38

IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
sending packet (23 bytes)
06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18
c8 81 00 38 8e 04 b5
removed list entry seq=0x00 cmd=0x38

Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x8e 0x04

BUILDING A v1.5 COMMAND
added list entry seq=0x00 cmd=0x38

IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
sending packet (23 bytes)
06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18
c8 81 00 38 8e 04 b5
removed list entry seq=0x00 cmd=0x38

Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x0e 0x04

BUILDING A v1.5 COMMAND
added list entry seq=0x00 cmd=0x38

IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
sending packet (23 bytes)
06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18
c8 81 00 38 0e 04 35
removed list entry seq=0x00 cmd=0x38

Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x0e 0x04

BUILDING A v1.5 COMMAND
added list entry seq=0x00 cmd=0x38

IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
sending packet (23 bytes)
06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18
c8 81 00 38 0e 04 35
removed list entry seq=0x00 cmd=0x38

Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x0e 0x04

BUILDING A v1.5 COMMAND
added list entry seq=0x00 cmd=0x38

IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
sending packet (23 bytes)
06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18
c8 81 00 38 0e 04 35
removed list entry seq=0x00 cmd=0x38

Sending IPMI command payload
netfn : 0x06
command : 0x38
data : 0x0e 0x04

BUILDING A v1.5 COMMAND
added list entry seq=0x00 cmd=0x38

IPMI Request Session Header
Authtype : NONE
Sequence : 0x00000000
Session ID : 0x00000000
IPMI Request Message Header
Rs Addr : 20
NetFn : 06
Rs LUN : 0
Rq Addr : 81
Rq Seq : 00
Rq Lun : 0
Command : 38
sending packet (23 bytes)
06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18
c8 81 00 38 0e 04 35
removed list entry seq=0x00 cmd=0x38
Get Auth Capabilities error
Error issuing Get Channel Authentication Capabilities request
Error: Unable to establish IPMI v2 / RMCP+ session