- Rubyipmi
- Projects that use Rubyipmi
- Support
- Using the library in your code
- Testing
- Security
- How the library works
- The following are tools bundled with freeipmi
- To contrast ipmitool has one command with many options
- Auto Detect workarounds
- Troubleshooting
- Contributing to rubyipmi
- Copyright
- Freeipmi Documented Workarounds
This gem is a ruby wrapper for the freeipmi and ipmitool command line tools. It provides a ruby implementation of ipmi commands that will make it simple to connect to BMC devices from ruby.
Rubyipmi was built because I wanted an object oriented way to get data from BMC devices. I also wanted it easy to use and if any IPMI hacks/workarounds were required I wanted to build those into the library to make life easier.
- https://github.com/sensu/sensu-community-plugins/blob/master/plugins/ipmi/check-sensor.rb
- https://github.com/theforeman/smart-proxy (Turns Rubyipmi into a Remote Web API Proxy server)
- https://github.com/logicminds/ipmispec (just started)
Don't see your project listed? Create a PR with your project listed here.
General support is offered via github issues and whenever I have time I will try to resolve any issues. I do offer professional paid support through my company and can be contracted to work directly with your organization on Rubyipmi or other related automation/devops projects that you might have.
At this time I only have one test server (HP DL380 G5) which I used to perform tests against. While I try to keep the code generic in nature there may be newer devices that do not work correctly and its an issue I cannot troubleshoot directly. If you would like to see newer/other devices be part of my test suite and you have extra servers lying around. I would encourage you to donate server equipment so that I can extend my test suite against this newer equipment.
Servers I have never tested against.
- Dell
- IBM
- HP server with ilo3+
- Super Micro
- Cisco
IPMI is designed to support any equipment that implements the standard. But there are always problems with people deviating from the standard. In general this library should work will all servers.
- Install the freeipmi from source (http://www.gnu.org/software/freeipmi/) or ipmitool
gem install rubyipmi
require 'rubyipmi'
conn = Rubyipmi.connect("username", "password", "hostname", "providertype")
Additionally, if your using openipmi and will be using rubyipmi to connect to the 
localhost you can utilize the openipmi driver and not have to pass in any connection parameters. Openipmi works
by installing a driver and makes it available to the host. Freeipmi/Ipmitool will then try to use this driver to
automatically use the openipmi if no host is given. The one caveat here is that you cannot control remote hosts using
openipmi. The rubyipmi code must be executed on the host you want to control. The upside is that you don't need
any credentials. Some commands may require root privileges to run when using openipmi.
Providertype: optional
valid options: 'auto', 'ipmitool', 'freeipmi'
If you don't specify the provider type, Rubyipmi will detect if freeipmi or ipmitool is installed and load the first tool found. If you specify the provider type rubyipmi will only use that specific provider.
You can specify additional options by passing an options hash into the connection method
conn = Rubyipmi.connect("username", "password", "hostname", 'freeipmi', {:privilege =>'USER', :driver => 'lan20'})
Privilege
This option controls the role of the user making the ipmi call.
valid options: 'CALLBACK', 'USER', 'OPERATOR', 'ADMINISTRATOR' -- defaults to nil and uses the freeipmi/ipmitool default
Driver
This option allows you to control which driver to use when making IPMI calls. Selecting auto will choose
either lan15 or lan20 based on your device. The open type is when using openipmi in conjunction with the provider.
valid options: "auto", "lan15", "lan20", "open" -- defaults to lan20
require 'rubyipmi'
conn = Rubyipmi.connect("username", "password", "hostname")
conn.chassis.power.on
conn.chassis.power.off
conn.chassis.power.on?
conn.chassis.power.off?
conn.chassis.power.cycle
require 'rubyipmi'
conn = Rubyipmi.connect("username", "password", "hostname")
conn.chassis.bootpxe(reboot=bool, persistent=bool)
conn.chassis.bootdisk(reboot=bool, persistent=bool)
Examples:
conn.chassis.bootpxe(reboot=true, persistent=false) # reboot immediately, PXE boot once
conn.chassis.bootpxe(reboot=false, persistent=false) # on next reboot PXE boot once
conn.chassis.bootdisk(reboot=true, persistent=false) # reboot immediately, boot off disk once
conn.chassis.bootdisk(reboot=true, persistent=true) # reboot immediately, boot off disk forever
conn.chassis.bootdisk(reboot=false, persistent=true) # reboot off disk forever, starting on next reboot
require 'rubyipmi'
conn = Rubyipmi.connect("username", "password", "hostname")
conn.sensors.names
conn.sensors.list
conn.sensors.<sensor name>
require 'rubyipmi'
conn = Rubyipmi.connect("username", "password", "hostname")
conn.fru.list
conn.fru.serial
conn.fru.manufacturer
conn.fru.product
There are a series of automated rspec tests that test the functionality of this library with the ipmi device. In order to perform use the following steps.
DO NOT PERFORM THESE TEST ON ANY PRODUCTION SYSTEM. THESE TESTS WILL TURN OFF THE DEVICE!
- Install gem via source
- bundle install
- rake (runs unit tests, does not require a ipmi device)
- rake integration ipmiuser=ipmiuser ipmipass=ipmiuserpass ipmihost=192.168.1.22 ipmiprovider=freeipmi (fill in your your details)
- report any failures with your make/model/firmware revision to corey@logicminds.biz
The only security used throughout the library is the use of temporary password files that store the password while the command is being executed. This password file is created and deleted on the fly with every library call. The password will not be shown in any logs or process lists due to this enhancement. The filename is a long random string as is the folder name so it would be difficult to guess the password file. If for some reason a command takes a long time to run anyone could get the location of the file but the file is 0600 so it should not be readable by anyone outside of the process.
Since this library is based off of running a suite of command line tools I have created a base class called baseCommand that performs the actual execution of the command. The baseCommand only executes the command with the supplied arguments and options and returns the exit status. Additionally the result of the executed command is stored in the result variable should we need to retrieve the output of the command. To further extend the baseCommand class.
Creating a new command is actually quite simple. Follow these steps to wrap a freeipmi or ipmitool command.
-
Create a new subclass of BaseCommand
-
define the initialize function like so, and pass in the name of the command line tool to the super constructor.
def initialize(opts = {}) @options = opts super("bmc-info", opts) end
def initialize(opts = {}) @options = opts super("ipmitool", opts) end
-
Thats it. The rest of the class is related to running the command and interperting the results
The freeipmi command line tools have two different ways to run the commands.
ipmipower --hostname=host --password=pass --username=user --off
(single action, multiple arguments)ipmi-chassis --hostname=host --password=pass --username=user --chassis-identify=FORCE
(multiple arguments, one main action with different qualifers)
Because of the varying ways to run a command I have simplified them so it makes it easy to call the command line tools.
- Each subclassed baseCommand class inherits runcmd, result, cmd, and runcmd_with_args.
- The cmd executable gets set when instantiating a baseCommand class, where the class also finds the path of the executable.
- The options variable gets set when instantiating a subclass of the baseCommand class.
- To run the cmd, just call
runcmd
(which will automatically set all the options specified in the options hash) - To run the cmd, with arguments and options call
runcmd([])
and pass in a array of the arguments. (Arguments are actions only and look like --off, --on, --action) - To run the cmd, with just arguments
runcmd_with_args([])
and pass in a array of the arguments. (Example: 192.168.1.1)
The options hash can be considered a global hash that is passed in through the connection object. Most of the options will be set at the connection level. However, most commands require additional options that should be set at the subclassed BaseCommand level. You must not forget to unset the option after calling the runcmd command. Failure to do so will add previous options to subsequent run options.
Example:
def ledlight(status=false, delay=300)
if status
if delay <= 0
options["chassis-identify"] = "FORCE"
else
options["chassis-identify"] = delay
end
else
options["chassis-identify"] = "TURN-OFF"
end
# Run the command
run
# unset the option by deleting from hash
options.delete("chassis-identify")
end
After running a command it may be desirable to get the results for further processing. Note that there are two kinds of results.
- the text returned from the shell command, this is stored in @results
- the status value returned from the shell command (true or false only) this is returned from runcmd.
To get the results:
Example:
def status
value = command("--stat")
if value == true
@result.split(":").last.chomp.trim
end
end
def command(opt)
status = run([opt])
return status
end
def on?
status == "on"
end
Although its not necessary to implement the command function it may be desirable if your code starts to repeat itself. In this example the command function is just a wrapper command that calls run. Your implementation will vary, but be sure to always call it the "command" function, so its easily identified. Additionally, should this gem ever become out of date one could call the command function and pass in any arguments that have not already been implemented in the rest of the class.
def command(opt)
status = runcmd([opt])
return status
end
def on
command("--on")
end
- ipmi-chassis
- ipmi-oem
- ipmi-chassis-config
- ipmiping
- ipmiconsole
- ipmipower
- ipmidetect
- ipmi-raw
- ipmi-fru
- ipmi-sel
- ipmi-locate
- ipmi-sensors
- ipmimonitoring
- ipmi-sensors-config
- bmc-config
- bmc-device
- bmc-info
- ipmitool
IPMI is great for a vendor neutral management interface. However, not all servers are 100% compatible with the specifications. In order to overcome ipmi non-compliance there will be some workarounds built into this library
Rubyipmi has a built in logging system for debugging purposes. By default logging is disabled. The logger is a class instance variable and will stay in memory for as long as your program or interpreter is loaded. In order to enable logging you need to do the following.
require 'rubyipmi'
require 'logger'
Rubyipmi.log_level = Logger::DEBUG
This will create a log file in /tmp/rubyipmi.log which you can use to trace the commands Rubyipmi generates and runs.
If you want to setup a custom logger (not required) you can also pass in a logger instance as well.
require 'rubyipmi'
require 'logger'
custom_logger = Logger.new('/var/log/rubyipmi_custom.log')
custom_logger.progname = 'Rubyipmi'
custom_logger.level = Logger::DEBUG
Rubyipmi.logger = custom_logger
Running IPMI commands can be frustrating sometimes and with the addition of this library you are bound to find edge cases. If you do find an edge case there is a easy function that will generate a diagnostics file that you can review and optionally create an issue with us to work with. Without this information its really hard to help because every server is different. The following code will generate a file in /tmp/rubyipmi_diag_data.txt that we can use as test cases. Please look over the file for any sensitive data you don't want to share like ip/mac address.
require 'rubyipmi'
Rubyipmi.get_diag(user, pass, host)
You can couple this with the logger and also generate a log file of all the commands get_diag uses as well.
require 'rubyipmi'
require 'logger'
Rubyipmi.log_level = Logger::DEBUG
Rubyipmi.get_diag(user, pass, host)
If you need to test if the bmc device and run a basic call there is now a function that retruns boolean true when the connection attempt was successful.
require 'rubyipmi'
conn = Rubyipmi.connect(user, pass, host)
conn.connection_works? => true|false
- Check out the latest code to make sure the feature hasn't been implemented or the bug hasn't been fixed yet.
- Check out the issue tracker to make sure someone already hasn't requested it and/or contributed it.
- Fork the project.
- Start a feature/bugfix branch.
- Commit and push until you are happy with your contribution.
- Make sure to add tests for it. This is important so I don't break it in a future version unintentionally.
- Please try not to mess with the Rakefile, version, or history. If you want to have your own version, or is otherwise necessary, that is fine, but please isolate to its own commit so I can cherry-pick around it.
Copyright (c) 2015 Corey Osman. See LICENSE.txt for further details.
One of my design goals is to raise exceptions and have the library try workarounds before ultimately failing since there is a whole list of workarounds that can be attempted.However, it would be nice to know the make and model of the server up front to decrease workaround attempts.
So essentially I need to figure out how to save a command call and then retry if it doesn't work.
With so many different vendors implementing their own IPMI solutions, different vendors may implement their IPMI protocols incorrectly. The following describes a number of workarounds currently available to handle discovered compliance issues. When possible, workarounds have been implemented so they will be transparent to the user. However, some will require the user to specify a workaround be used via the -W option. The hardware listed below may only indicate the hardware that a problem was discovered on. Newer versions of hardware may fix the problems indicated below. Similar machines from vendors may or may not exhibit the same problems. Different vendors may license their firmware from the same IPMI firmware developer, so it may be worthwhile to try workarounds listed below even if your motherboard is not listed.
If you believe your hardware has an additional compliance issue that needs a workaround to be implemented, please contact the FreeIPMI maintainers on freeipmi-users@gnu.org or freeipmi-devel@gnu.org.
assumeio - This workaround flag will assume inband interfaces communicate with system I/O rather than being memory-mapped. This will work around systems that report invalid base addresses. Those hitting this issue may see "device not supported" or "could not find inband device" errors. Issue observed on HP ProLiant DL145 G1.
spinpoll - This workaround flag will inform some inband drivers (most notably the KCS driver) to spin while polling rather than putting the process to sleep. This may significantly improve the wall clock running time of tools because an operating system scheduler's granularity may be much larger than the time it takes to perform a single IPMI message transaction. However, by spinning, your system may be performing less useful work by not contexting out the tool for a more useful task.
authcap - This workaround flag will skip early checks for username capabilities, authentication capabilities, and K_g support and allow IPMI authentication to succeed. It works around multiple issues in which the remote system does not properly report username capabilities, authentication capabilities, or K_g status. Those hitting this issue may see "username invalid", "authentication type unavailable for attempted privilege level", or "k_g invalid" errors. Issue observed on Asus P5M2/P5MT-R/RS162-E4/RX4, Intel SR1520ML/X38ML, and Sun Fire 2200/4150/4450 with ELOM.
idzero - This workaround flag will allow empty session IDs to be accepted by the client. It works around IPMI sessions that report empty session IDs to the client. Those hitting this issue may see "session timeout" errors. Issue observed on Tyan S2882 with M3289 BMC.
unexpectedauth - This workaround flag will allow unexpected non-null authcodes to be checked as though they were expected. It works around an issue when packets contain non-null authentication data when they should be null due to disabled per-message authentication. Those hitting this issue may see "session timeout" errors. Issue observed on Dell PowerEdge 2850,SC1425. Confirmed fixed on newer firmware.
forcepermsg - This workaround flag will force per-message authentication to be used no matter what is advertised by the remote system. It works around an issue when per-message authentication is advertised as disabled on the remote system, but it is actually required for the protocol. Those hitting this issue may see "session timeout" errors. Issue observed on IBM eServer 325.
endianseq - This workaround flag will flip the endian of the session sequence numbers to allow the session to continue properly. It works around IPMI 1.5 session sequence numbers that are the wrong endian. Those hitting this issue may see "session timeout" errors. Issue observed on some Sun ILOM 1.0/2.0 (depends on service processor endian).
intel20 - This workaround flag will work around several Intel IPMI 2.0 authentication issues. The issues covered include padding of usernames, and password truncation if the authentication algorithm is HMAC-MD5-128. Those hitting this issue may see "username invalid", "password invalid", or "k_g invalid" errors. Issue observed on Intel SE7520AF2 with Intel Server Management Module (Professional Edition).
supermicro20 - This workaround flag will work around several Supermicro IPMI 2.0 authentication issues on motherboards w/ Peppercon IPMI firmware. The issues covered include handling invalid length authentication codes. Those hitting this issue may see "password invalid" errors. Issue observed on Supermicro H8QME with SIMSO daughter card. Confirmed fixed on newerver firmware.
sun20 - This workaround flag will work work around several Sun IPMI 2.0 authentication issues. The issues covered include invalid lengthed hash keys, improperly hashed keys, and invalid cipher suite records. Those hitting this issue may see "password invalid" or "bmc error" errors. Issue observed on Sun Fire 4100/4200/4500 with ILOM. This workaround automatically includes the "opensesspriv" workaround.
opensesspriv - This workaround flag will slightly alter FreeIPMI's IPMI 2.0 connection protocol to workaround an invalid hashing algorithm used by the remote system. The privilege level sent during the Open Session stage of an IPMI 2.0 connection is used for hashing keys instead of the privilege level sent during the RAKP1 connection stage. Those hitting this issue may see "password invalid", "k_g invalid", or "bad rmcpplus status code" errors. Issue observed on Sun Fire 4100/4200/4500 with ILOM, Inventec 5441/Dell Xanadu II, Supermicro X8DTH, Supermicro X8DTG, Intel S5500WBV/Penguin Relion 700, Intel S2600JF/Appro 512X, and Quanta QSSC-S4R//Appro GB812X-CN. This workaround is automatically triggered with the "sun20" workaround.
integritycheckvalue - This workaround flag will work around an invalid integrity check value during an IPMI 2.0 session establishment when using Cipher Suite ID 0. The integrity check value should be 0 length, however the remote motherboard responds with a non-empty field. Those hitting this issue may see "k_g invalid" errors. Issue observed on Supermicro X8DTG, Supermicro X8DTU, and Intel S5500WBV/Penguin Relion 700, and Intel S2600JF/Appro 512X.
No IPMI 1.5 Support - Some motherboards that support IPMI 2.0 have been found to not support IPMI 1.5. Those hitting this issue may see "ipmi 2.0 unavailable" or "connection timeout" errors. This issue can be worked around by using IPMI 2.0 instead of IPMI 1.5 by specifying --driver-address=LAN_2_0. Issue observed on HP Proliant DL 145.
slowcommit - This workaround will slow down commits to the BMC by sleeping one second between the commit of sections. It works around motherboards that have BMCs that can be overwhelmed by commits. Those hitting this issue may see commit errors or commits not being written to the BMC. Issue observed on Supermicro H8QME.
veryslowcommit - This workaround will slow down commits to the BMC by sleeping one second between the commit of every key. It works around motherboards that have BMCs that can be overwhelmed by commits. Those hitting this issue may see commit errors or commits not being written to the BMC. Issue observed on Quanta S99Q/Dell FS12-TY.