ProLiant Servers (ML,DL,SL)

Another Redfish question

 
BradV
Respected Contributor

Another Redfish question

Trying to figure out how to set the iLO HTML5 Hot Keys through redfish.  I have for reading them:

for SERVER in server-r{1..3}-n{1..23}-ilo; do
   UUID=$(curl --insecure --header "X-API-Version: ${currentVersion}" --header "auth: ${sessionID}" --silent \
      --request GET ${OneView}/rest/sever-hardware?filter=%22%27name%27%20=%20%27${SERVER}%27%22 | jq -r 'members[] | .uuid')
   read iLOSSO iLOAuth <<< $(curl --silent --insecure --header "X-API-Version: ${currentVersion}" --header "auth: ${sessionID}" \
      --request GET ${OneView}/rest/sever-hardware/${UUID}/remoteConsoleUrl | \
         jq -r '.remoteConsoleUrl' | sed -e 's|hplocons|https|' -e 's|addr=||' \
         -e 's|^\(.*\)&sessionkey=\(.*\)$|\1 \2|')
   STATE=$(curl --silent --insecure --header "X-Auth-Token: ${iLOAuth}" \
      --request GET ${iloSSO}/redfish/v1/Manager/1/ | jq -r '.Oem.Hpe.IntegratedRemoteConsole.HotKeys')
   echo "${SERVER}, ${STATE}" | tee -a iLO_HotKeys
done

but I don't think that is the correct way and certainly will not allow be to set the hotkeys.  Does anyone know how to do this?

2 REPLIES 2
Suman_1978
HPE Pro

Re: Another Redfish question

Hi,

I am no expert on Redfish Scripting, but here is some information.

HPE Lights-Out XML Scripting Sample for Windows
https://support.hpe.com/hpesc/public/swd/detail?swItemId=MTX_4a0badcbdd5b4c7c8cc5303878

Check the "Get_Hotkey_Config.xml" - Retrieve the Remote Console hotkeys.
Configure "Hotkey_Config.xml" - Change the values for Remote Console hotkeys.

Additionally, check this non-hpe site for similar info.
https://github.com/HewlettPackard/python-redfish-utility/blob/master/examples/Windows/Get_Hotkey_Config.bat

Thank You!
https://support.hpe.com/hpesc/public/home


I work for HPE

Accept or Kudo

BradV
Respected Contributor

Re: Another Redfish question

Well, that is using hponcfg.  However, at this point that might be the path of least resistance.  I'll take a look.

Thanks!