Skip to main content

How to Configure HP ILO from ESXi host

Configuration of HP ILO can be done using reboot of your HP server and Press <F8> to configure the ILO settings but you need a down time to your ESXi host and all the virtual machines running on it if it is a standalone host and no option to vMotion to other host. It is really a tough task to get downtime for your virtuali machines just for your ILO configurations like Reset ILO configuration, Reconfigure ILO IP address and reset ILO administrative password.
Now ILO configuration of ESXi host can easily be done without need of host restart using HP ESXi utilities.
HP ESXi Utilities Offline bundle for VMware ESXi 5 will be available as part of HP customized ESXi installer image but if it is not a HP customized ESXi image then you may need to download and install  HP ESXi Utilities Offline bundle for VMware ESXi 5. It downloads the HP ESXi Utilities Offline bundle Zip file.This ZIp file contains 3 different utilities HPONCFG , HPBOOTCFG and HPACUCLI utilities for remote online configuration of servers.
HPONCFG can be used to set up and reconfigure the iLO (Integrated Lights-Out) management controller of a server.
HPBOOTCFG can be used to set up the boot configuration for the server.
HPACUCLI can be used in the configuration of HP Smart Array controllers and attached storage
You can directly download  HPONCFG and  Upload the VIB file into your ESXi host and execute the below command to install the HPONCFG utility.
esxcli software vib install -f -v /tmp/hponcfg-04-00.10.vib
Once it is installed. Browse towards the directory /opt/hp/tools and execute  the below commands to perform the below operations. Below are the available help options for HPONCFG utility

Reset the ILO from ESXi host

Browse to /opt/hp/tools and execute the below command to reset the HP ILO configuration.
./hponcfg -r 

Export the ILO configuration of your ESXi host into file

Browse to /opt/hp/tools and execute the below command to export the ILO configuration into text file.
/opt/hp/tools # ./hponcfg -w /tmp/ilo-conf.txt

Configuring IP address for HP ILO from ESXi host

Edit the exported config file /tmp/ilo-conf.txt from above step and change the following IP address variables
vi ilo-conf.txt 
    <IP_ADDRESS VALUE = “192.168.0.55″/>
    <SUBNET_MASK VALUE = “255.255.255.0″/>
    <GATEWAY_IP_ADDRESS VALUE = “192.168.0.1″/>
    <DNS_NAME VALUE = “ESXi5-ILO”/>
    <PRIM_DNS_SERVER value = “192.168.0.20″/>
    <DHCP_ENABLE VALUE = “N”/>
Commit the updated IP address configuration from the file (ilo-conf.txt) to the ILO cofig  using th below command
./hponcfg -f /tmp/ilo-conf.txt
Thats it .You should be able to reach the ILO of the server using the IP address 192.168.0.55 now.

Reset the ILO administrator password from ESXi host

Create a file named reset_admin_pw.xml with the below info and add the new password in the password section:
<ribcl VERSION=”2.0″>
<login USER_LOGIN=”Administrator” PASSWORD=”YOUR-NEW-PASSWORD“>
<user_INFO MODE=”write”>
<mod_USER USER_LOGIN=”Administrator”>
<password value=”newpass”/>
</mod_USER>
</user_INFO>
</login>
</ribcl>
Commit the Updated administrator password information from the file (reset_admin_pw.xml) to ILO using the below command  ./hponcfg -f reset_admin_pw.xml
That’s it you should be able to login to ILO of your ESXi host using the password specified in the above xml file. I hope this is informative for you. Thanks for Reading !!!!

Comments

Popular posts from this blog

  Issue with Aria Automation Custom form Multi Value Picker and Data Grid https://knowledge.broadcom.com/external/article?articleNumber=345960 Products VMware Aria Suite Issue/Introduction Symptoms: Getting  error " Expected Type String but was Object ", w hen trying to use Complex Types in MultiValue Picker on the Aria for Automation Custom Form. Environment VMware vRealize Automation 8.x Cause This issue has been identified where the problem appears when a single column Multi Value Picker or Data Grid is used. Resolution This is a known issue. There is a workaround.  Workaround: As a workaround, try adding one empty column in the Multivalue picker without filling the options. So we can add one more column without filling the value which will be hidden(there is a button in the designer page that will hide the column). This way the end user will receive the same view.  

57 Tips Every Admin Should Know

Active Directory 1. To quickly list all the groups in your domain, with members, run this command: dsquery group -limit 0 | dsget group -members –expand 2. To find all users whose accounts are set to have a non-expiring password, run this command: dsquery * domainroot -filter “(&(objectcategory=person)(objectclass=user)(lockoutTime=*))” -limit 0 3. To list all the FSMO role holders in your forest, run this command: netdom query fsmo 4. To refresh group policy settings, run this command: gpupdate 5. To check Active Directory replication on a domain controller, run this command: repadmin /replsummary 6. To force replication from a domain controller without having to go through to Active Directory Sites and Services, run this command: repadmin /syncall 7. To see what server authenticated you (or if you logged on with cached credentials) you can run either of these commands: set l echo %logonserver% 8. To see what account you are logged on as, run this command: ...
  The Guardrails of Automation VMware Cloud Foundation (VCF) 9.0 has redefined private cloud automation. With full-stack automation powered by Ansible and orchestrated through vRealize Orchestrator (vRO), and version-controlled deployments driven by GitOps and CI/CD pipelines, teams can build infrastructure faster than ever. But automation without guardrails is a recipe for risk Enter RBAC and policy enforcement. This third and final installment in our automation series focuses on how to secure and govern multi-tenant environments in VCF 9.0 with role-based access control (RBAC) and layered identity management. VCF’s IAM Foundation VCF 9.x integrates tightly with enterprise identity providers, enabling organizations to define and assign roles using existing Active Directory (AD) groups. With its persona-based access model, administrators can enforce strict boundaries across compute, storage, and networking resources: Personas : Global Admin, Tenant Admin, Contributor, Viewer Projec...