snIPL (simple network IPL) V.2.2.0

Back to snIPL Overview

2011-06-30 snIPL V.2.2.0 (Development stream)

This snIPL V.2.2.0 introduces support for SMAPI request servers for controlling z/VM guest virtual machines.

If you download any software from this web site please be aware of the Warranty Disclaimer and Limitation of Liabilities.

snipl-0.2.2.0.tar.gz MD5 recommended (2011-06-30)

This version supersedes all previous snIPL versions.

This version contains the following snIPL changes compared to snIPL V.2.1.9:

  • snIPL can now access the z/VM systems management API through a SMAPI request server.
    Access through a VMSERVE service machine continues to be supported.
  • The new --getstatus option returns the status of the specified LPARs or z/VM guest virtual machines.

snIPL - simple network IPL is a command line tool which serves as remote linux image control using basic Support Element (SE) functions or basic z/VM system management functions on one or more images. In particular, you can use snIPL to activate and deactivate virtual System z hardware with Linux instances.

  • With snIPL in LPAR mode you can load (IPL) an LPAR from a disk device, send commands to the operating system and retrieve operating system messages; or reset, activate, or deactivate an LPAR for I/O fencing purposes.
    snIPL uses the management application programming interfaces (APIs) provided by the HMC or SE. To communicate with the HMC/SE, snIPL establishes an SNMP network connection to send and retrieve data. The HMC or SE has to be configured to allow the the Linux instance where snIPL run to access the API. If your network is firewall-controlled, udp-port 161 and tcp-port 3161 have to be opened between snIPL-invoking Linux system and HMC/SE. In this mode snIPL can be used to boot Linux on System z in LPAR mode, to send and retrieve operating system messages, or to reset, activate or deactivate an LPAR for I/O fencing purposes.

    To compile and run snIPL in LPAR mode, snIPL must be linked to the management library hwmcaapi (which can be downloaded from IBM Resource Link http://www.ibm.com/servers/resourcelink/). For further details please refer to System z Application Programming Interfaces (SB10-7030).

  • With snIPL in z/VM mode you can log on, reset, or log off a z/VM guest virtual machine.
    snIPL can access the systems management API through a z/VM SMAPI request server available as of z/VM 5.3.
    For z/VM 4.4 to z/VM 5.4 snIPL can access the systems management API through a VSMSERVE service machine on your z/VM system.
    For setup information see README.snipl.

    For further details see z/VM Systems Management Application Programming (SC24-6234) or z/VM V5R4.0 Systems Management Application Programming (SC24-6122-02) (or equivalent documentation from the z/VM website: http://www.vm.ibm.com)

  • snIPL for STONITH provides a STONITH plug-in. The STONITH implementation is part of the Heartbeat framework of the High Availability Project. STONITH is usually used as part of this framework but can also be used independently.
    For a general description of the STONITH technique see: http://linux-ha.org/wiki/STONITH
    The latest STONITH release can be downloaded from http://linux-ha.org/wiki/Downloads.
    With snIPL for STONITH you can activate, deactivate, and reset Linux instances in LPAR mode or running as z/VM guests.
    snIPL for Stonith supports the remote image operations activate, deactivate, and reset, exploiting basic System z Hardware Management Console (HMC) and Support Element (SE) functions for Linux running in an LPAR and of basic z/VM System Management Functions for Linux running under control of z/VM.


    To compile and use the STONITH plugin lic_vps, the Linux-HA packages Heartbeat, Cluster Glue, and Resource Agents have to be downloaded from http://linux-ha.org/wiki/Downloads and installed.

Note: As of version 2.1.3, snIPL supports STONITH version 2 only. Older snIPL versions support STONITH version 1 only.

Please refer to the README and manpage in the tarball for further information and restrictions.