Many system services require login credentials to gain access to them. The information below is a comprehensive list of system passwords and how to change them.
Contact HPE Cray service in order to obtain the default usernames and passwords for any of these components or services.
Default Keycloak admin user login credentials:
Username: admin
The password can be obtained with the following command:
kubectl get secret -n services keycloak-master-admin-auth \
--template={{.data.password}} | base64 --decode
To update the default password for the admin account, refer to Change the Keycloak Admin Password.
To create new accounts, refer to Create Internal User Accounts in the Keycloak Shasta Realm.
The default Gitea user credentials is crayvcs
. The password is randomly generated at install time
and can be found in the vcs-user-credentials secret.
kubectl get secret -n services vcs-user-credentials \
--template={{.data.vcs_password}} | base64 --decode
For more information on Gitea, including how to change the password, see Version Control Service VCS.
The default username is admin.
NOTE
Contact HPE Cray service in order to obtain the default password for Grafana and Kiali.
Each rack type includes a different set of passwords. During different stages of installation, these passwords are subject to change.
NOTE
Contact HPE Cray service in order to obtain the default passwords.
The tables below include the default login credentials for each rack type. These passwords can be changed by going into the console on a given switch and changing it. However, if the user gets locked out attempting to change the password or the configuration gets corrupted for an individual switch, it can wipe out the entire network configuration for the system.
NOTE
IP addresses can be found from the generated SLS file.
Liquid-Cooled Cabinet:
Name | Role | Switch | Login |
---|---|---|---|
sw-leaf-bmc | Leaf-BMC/Mgmt | Dell S3048-ON | admin |
sw-spine | Spine | Mellanox SN2100 | admin |
sw-leaf-bmc | Leaf-BMC/Mgmt | Aruba 6300 | admin |
sw-spine | Spine | Aruba 8325 | admin |
sw-leaf | Leaf | Aruba 8325 | admin |
Air-Cooled Cabinet:
Name | Role | Switch | Login |
---|---|---|---|
sw-leaf-bmc | Leaf/Mgmt | Dell S3048-ON | admin |
sw-leaf-bmc | Leaf-BMC/Mgmt | Aruba 6300 | admin |
Coolant Distribution Unit (CDU):
Name | Role | Switch | Login |
---|---|---|---|
sw-cdu | CDU/Leaf | Dell S4048T-ON | admin |
sw-cdu | CDU/Leaf | Aruba 8360 | admin |
ClusterStor:
Name | Role | Switch | IP Address | Login |
---|---|---|---|---|
Arista | DCS-7060CX-32S | 172.16.249.10 | admin | |
Sonexion | Entry point to Arista | CS-L300 | 172.30.49.178 | admin |
E1000 | CS-E1000 | admin |
Redfish accounts are only valid with the Redfish API. They do not allow system logins via ssh
or serial console.
Three accounts are created by default:
Root - Administrative account
Operator - Power components on/off, read values, and configure accounts
ReadOnly - Log in, configure self, and read values
NOTE
Contact HPE Cray service in order to obtain the default passwords.
The System Configuration Service (SCSD) is used to set the credentials for Redfish BMCs. Refer to Set BMC Credentials for more information.
The account database is automatically saved to the non-volatile settings partition (/nvram/redfish/redfish-accounts) any time an account or account policy is modified. The file is stored as a redis command dump and is replayed (if it exists) anytime the core Redfish schema is loaded via the init script. If default accounts must be restored, delete the redis command dump and reboot the controller.
List accounts:
Use the following API path to list all accounts:
GET /redfish/v1/AccountService/Accounts
{
"@odata.context": "/redfish/v1/$metadata#ManagerAccountCollection.ManagerAccountCollection",
"@odata.etag": "W/\"1559675674\"",
"@odata.id": "/redfish/v1/AccountService/Accounts",
"@odata.type": "#ManagerAccountCollection.ManagerAccountCollection",
"Description": "Collection for Manager Accounts",
"Members": [
{
"@odata.id": "/redfish/v1/AccountService/Accounts/1"
},
{
"@odata.id": "/redfish/v1/AccountService/Accounts/2"
}
],
"Members@odata.count": 2,
"Name": "Accounts Collection"
}
Use the following API path to list a single account:
GET /redfish/v1/AccountService/Accounts/1
{
"@odata.context": "/redfish/v1/$metadata#ManagerAccount.ManagerAccount(*)",
"@odata.etag": "W/"1559675272"",
"@odata.id": "/redfish/v1/AccountService/Accounts/1",
"@odata.type": "#ManagerAccount.v1_1_1.ManagerAccount",
"Description": "Default Account",
"Enabled": true,
"Id": "1",
"Links": {
"Role": {
"@odata.id": "/redfish/v1/AccountService/Roles/Administrator"
}
},
"Locked": false,
"Name": "Default Account",
"RoleId": "Administrator",
"UserName": "root"
}
Add accounts:
If an account is successfully created, then the account information data structure will be returned. The most important bit returned is the Id because it is part of the URL used for any further manipulation of the account.
Use the following API path to add accounts:
POST /redfish/v1/AccountService/Accounts
Content-Type: application/json
{
"Name": "Test Account",
"RoleId": "Administrator",
"UserName": "test",
"Password": "test123",
"Locked": false,
"Enabled": true
}
Response:
{
"@odata.context": "/redfish/v1/$metadataAccountService/Members/Accounts",
"@odata.etag": "W/"1559679136"",
"@odata.id": "/redfish/v1/AccountService/Accounts",
"@odata.type": "#ManagerAccount.v1_1_1.ManagerAccount",
"Description": "Collection of Account Details",
"Id": "5", **<<-- Note this value**
"Links": {
"Role": {
"@odata.id": "/redfish/v1/AccountService/Roles/Administrator"
}
},
"Enabled": true,
"Locked": false,
"Name": "Test",
"RoleId": "Administrator",
"UserName": "test"
}
Delete accounts:
Delete an account with the curl
command:
# curl -u root:xxx -X DELETE https://x0c0s0b0/redfish/v1/AccountService/Accounts/ACCOUNT_ID
Update passwords:
Update the password for an account with the curl
command:
WARNING: Changing Redfish credentials outside of Cray System Management (CSM) services may cause the Redfish device to be no longer manageable under CSM. If the credentials for other devices need to be changed, refer to the following device-specific credential changing procedures:
- To change liquid-cooled BMC credentials, refer to Change Cray EX Liquid-Cooled Cabinet Global Default Password.
- To change air-cooled node BMC credentials, refer to Change Air-Cooled Node BMC Credentials.
- To change Slingshot switch BMC credentials, refer to “Change Rosetta Login and Redfish API Credentials” in the Slingshot Operations Guide (> 1.6.0).
# curl -u root:xxx -X PATCH \
-H 'Content-Type: application/json' \
-d '{"Name": "Test"}' \
https://x0c0s0b0/redfish/v1/AccountService/Accounts/ACCOUNT_ID
For SSH access, the system controllers have the following default credentials:
Node controller (nC)
Chassis controller (cC)
Switch controller (sC)
sC minimal recovery firmware image (rec)
NOTE
Contact HPE Cray service in order to obtain the default passwords.
Passwords for nC, cC, and sC controllers are all managed with the following process. The cfgsh tool is a configuration shell that can be used interactively or scripted. Interactively, it may be used as follows after logging in as root via ssh
:
config
x0c1(conf)# CURRENT_PASSWORD root NEW_PASSWORD
x0c1(conf)# exit
copy running-config startup-config
exit
It may be used non-interactively as well. This is useful for separating out several of the commands used for the initial setup. The shell utility returns non-zero on error.
# cfgsh --config CURRENT_PASSWORD root NEW_PASSWORD
# cfgsh copy running-config startup-config
In both cases, a running-config
must be saved out to non-volatile storage in a startup configuration file. If it is not, the password will revert to default on the next boot. This is the exact same behavior as standard managed Ethernet switches.
To adjust the SNMP credentials, perform the following tasks:
Update the default credentials specified in the customizations.yaml file.
Update the credentials actively being used for existing leaf switches.
Change the global default credential on HPE Cray EX liquid-cooled cabinet embedded controllers (BMCs). The chassis management module (CMM) controller (cC), node controller (nC), and Slingshot switch controller (sC) are generically referred to as “BMCs” in these procedures.
Provision a Glibc compatible SHA-512 administrative password hash to a cabinet environmental controller (CEC). This password becomes the Redfish default global credential to access the CMM controllers and node controllers (BMCs).
Change the credential for HPE Cray EX liquid-cooled cabinet chassis controllers and node controller (BMCs) used by CSM services after the CECs have been set to a new global default credential.
The default username is admin.
NOTE
Contact HPE Cray service in order to obtain the default password for Gigabyte.
Refer to the following product stream documentation for detailed procedures about updating passwords for compute nodes and User Access Nodes (UANs).
Cray Operating System (COS): To update the root password for compute nodes, refer to “Set Root Password for Compute Nodes” in the COS product stream documentation for more information.
User Access Node (UAN): Refer to “Create UAN Boot Images” in the UAN product stream documentation for the steps required to change the password on UANs. The “uan_shadow” header in the “UAN Ansible Roles” section includes more context on setting the root password on UANS.