HP XC System Software Administration Guide Version 3.0

This service assigns IP addresses for all devices on the internal network based on the DHCP server
node's Machine Access Control (MAC) address.
Power daemon service
The power subsystem daemon enables you to turn on, turn off, cycle, and reset power on individual
nodes, and also report whether a node's power is on or off.
This daemon is automatically assigned to the head node.
For additional information on nodes and services, see the
HP XC System Software Installation Guide
.
Administrator Passwords
An administrator for an HP XC system needs to assign the following passwords during installation and to
use for system administration. Ensure that each one of these passwords is unique.
Root password
Used to access the superuser account, to perform system administration, and to invoke management
tools.
Database administrator password
Used for changes to the configuration and management database.
Administrator password for ProCurve switches
Used for configuration of system administration switches. One password should be set for all ProCurve
switches in the system. This password should have been set when the hardware was prepared before
installation.
Console port devices password and user name
Used to communicate with the console ports of the nodes in the system: Integrated Lights Out (iLO), MP
(Management Processor), or Intelligent Platform Management Interface (IPMI).
All user names and passwords for all consoles on all nodes must be the same.
Nagios configuration password
Used to access the Nagios system and network monitoring application.
Switch monitor password
Used to access the Quadrics® or InfiniBand® switch monitor.
Secure Shell (ssh)
Secure Shell (ssh) is the preferred method for accessing the HP XC system. Typically, a user accesses the
HP XC system using ssh to get a login shell or to execute commands.
The ssh service also enables file transfer using the scp or sftp commands over the same port as ssh. The
typical r* UNIX® commands (rsh, rcp, rlogin) are not on an HP XC system by default because of their
inherent insecurity. The ssh command transfers all login and password information in an encrypted form
instead of in the plain text form used by the r* UNIX telnet and ftp commands.
For security purposes, use the ssh command instead of these other, much less secure alternatives.
To use ssh without password prompting with a user account, you must set up ssh authentication keys. For
details, see Configuring the ssh Keys for a User (page 99).
Understanding the HP XC Command Environment
This section describes the HP XC command environment. The HP XC system commands were developed to
supplement the Linux command set and other Open Source commands.
HP XC Command Set
Table 1-1. lists the commands alphabetically and provides a brief description. For more information on an
individual command, see the corresponding manpage.
Administrator Passwords 25