LC Integration Best Practices Specification
7
15 Record Log Profile Use Cases .......................................................................... 98
15.1 Discovery of Record Log profile support ............................................................. 98
15.2 List Lifecycle record logs ............................................................................... 99
15.3 List Lifecycle record log capabilities ................................................................. 99
15.4 List Lifecycle log entries .............................................................................. 100
15.5 Set and get comment in Lifecycle log entries ..................................................... 100
15.6 List system event record logs ........................................................................ 101
15.7 List system event record log capabilities .......................................................... 101
15.8 List system event log entries ......................................................................... 101
16 Role Based Authorization Profile (RBAP) use cases ............................................... 102
16.1 Discovery of RBAP profile support ................................................................... 102
16.2 Discovery of users with assigned LAN privileges .................................................. 103
16.3 Discovery of users with assigned serial over LAN privileges .................................... 103
16.4 Discovery of users with assigned CLP privileges .................................................. 103
17 Service Processor Profile Use Cases ................................................................. 104
17.1 Discovery of Service Processor profile support .................................................... 104
18 Simple NIC Profile Use Cases ......................................................................... 105
18.1 Discovery of Simple NIC profile support ............................................................ 105
18.2 Inventory of NICs in system ........................................................................... 105
18.3 Get the first NIC’s information ....................................................................... 106
18.4 List all NIC attributes .................................................................................. 106
18.5 Delete pending NIC values ............................................................................ 106
18.6 Discovery of NIC capabilities ......................................................................... 107
19 Software Update Profile use cases .................................................................. 108
19.1 Discovery of Software Update profile support .................................................... 108
20 Job Control Profile Use Cases ........................................................................ 109
20.1 Discovery of Job Control profile support ........................................................... 109
20.2 List all jobs in job store ............................................................................... 109
20.3 Get one job’s information ............................................................................ 110
20.4 Delete all jobs from job store (job queue) using “JID_CLEARALL” ............................ 110
20.5 Delete one job from job store ....................................................................... 111
21 Memory Profile Use Cases ............................................................................. 111
21.1 Discovery of Memory profile support ................................................................ 111
21.2 Inventory of memory in system ...................................................................... 112
21.3 Get the first memory’s information ................................................................. 112
Kommentare zu diesen Handbüchern