Open ZombieBlue opened 3 years ago
[root@gv101 bin]# ./ipmisim 623 /opt/sim_env/venv/lib/python2.7/site-packages/pyghmi/ipmi/private/session.py:31: CryptographyDeprecationWarning: Python 2 is no longer supported by the Python core team. Support for it is now deprecated in cryptography, and will be removed in the next release. from cryptography.hazmat.backends import default_backend 2021-04-09 15:34:08,156 - ipmisim - INFO - IPMI BMC initialized. 2021-04-09 15:34:08,157 - ipmisim - INFO - CloudStack IPMI Sim BMC initialized 2021-04-09 15:34:08,157 - ipmisim - INFO - Started IPMI Server on 0.0.0.0:623
Hi @ZombieBlue - this is just for testing purposes, it's a simulator that works with ipmitool. I'm not sure about ipmipower utility. cc @DaanHoogland
@ZombieBlue can you try installing and running with python3?
thanks @rhtyd @DaanHoogland I will try python3 first .
running with python36 have this issue too .
@ZombieBlue can you try with ipmitool?
@rhtyd ipmitool can get the power status, but ipmipower can not.
[root@localhost venv]# ipmitool -I lanplus -H 192.168.140.128 -U admin -P password chassis power status Chassis Power is off
send cmd 'ipmipower ...' and debug with pycharm
14 == 1110 so 14 & bin(10000000) is 0 indeed. ipmipower is sending a different format it seems. Can you give us the complete data structure? Do you know if we can recognise what tool is doing the request?
we can do the request by using ipmipower which can be installed with 'yum install freeipmi'
and the command could be
ipmipower -h 10.0.41.101 -u admin -p password --stat
the data of request is
b'\x06\x00\xff\x07\x00\x00\x00\x00\x00\x00\x00\x00\x00\t \x18\xc8\x81
8\x0e\x03\xd6'`
it is a pity I don't know how to identify which tool is doing request , but I try with ipmi_sim, it can be operated by both ipmitool and ipmipower.
We're historically only used ipmitool, so any PR is welcome to add support for freeipmi too.
please help to resolve this issue, thanks very much.