Home

Dell Lifecycle Controller 1.4 White Paper

image

Contents

1. 12
2. wsman encoding utf 8 a basic file SetAttribute xml The input file SetAttribute xml containing the parameters for the SetAttribute method is shown below lt p SetAttribute INPUT xmlns p http schemas dmtf org wbem wscim 1 cim schema 2 root dcim DCIM LCService gt lt p AttributeName gt Provisioning Server lt p AttributeName gt lt p AttributeValue gt PS IP ADDRESS lt p AttributeValue gt lt p SetAttribute INPUT gt Reinitiating auto discovery You may choose to set the provisioning server during reinitiating auto discovery Use the following WSMAN command to reinitialize auto discovery EXAMPLE winrm i ReInitiateDHS cimv2 root dcim DCIM LCService SystemCreationClassName DCIM ComputerSystem CreationClassName DCIM LCService SystemName DCIM ComputerSystem Name DCIM LCService u USERNAME p PASSWORD r https IPADDRESS wsman encoding utf 8 a basic file ReInitiateDHS xml The input file RelnitiateDHS xml containing the parameters for the RelnitiateDHS method is shown below lt p ReInitiateDHS INPUT xmlns p http schemas dmtf org wbem wscim 1 cim schema 2 root dcim DCIM LCService gt lt p ProvisioningServer gt PS IP ADDRESS lt p ProvisioningServer gt lt p ResetToFactoryDefaults gt TRUE lt p ResetToFactoryDefaults gt lt p PerformAutoDiscovery gt 3 lt p PerformAutoDiscovery gt lt p ReInitiateDHS INPUT gt The PerformAutoDiscovery att
3. ComputerSystem u USER p PASSWORD wsman 443 SkipCNCheck SkipCACheck encoding utf 8 a basic file DownloadServerPublicKey xml The input file DownloadServerPublicKey xml is shown below lt p DownloadServerPubli xmlns p http schema schema 2 root dcim DCI lt p KeyContent gt BEGIN CERTIFICATE MIIEOjCCA6ugAwIBAgIBAD CzAJBgNVBAgTA1RYMROwEg GvoMCKtogLnCBByj H2vyN cKey INPUT s dmtf org wbem wscim 1 cim M LCService gt ANBgkqhkiG9w0BAQOFADCBzTELMAkGA1UEBhMCVVMx YDVOOHEwtNYWluIFN0cmV1dDEVMBMGA1UEChMMSm91 7Fe zMKXD5pO06XwYddGfA66w3HGUaR0 fIKD40NDi9 DKFEMxbRxZysUUzuKZ9c RA1ZUiLrgzemfX3fnlYp7kO05KU9VvHY END CERTIFICATE lt p DownloadServerPubl lt p KeyContent gt icKey INPUT gt Installing client CA certificate and CA private key The following WSMAN method wil generate a new key pair on the iDRAC and then sign it using the provided CA certificate and CA private key EXAMPLE winrm i DownloadClient Certs http schemas dmtf org wbem wscim 1 cim schema 2 root dcim DCIM LCService CreationClassName DCIM ICService Name DCIM LCService SystemCreationClassName DCIM ComputerSystem SystemName DCIM Compu u USER p PASSWORD r https IPADDRESS encoding utf 8 a bas terSystem wsman 443 SkipCNCheck SkipCACheck ic file DownloadClientCerts xml The input file DownloadClientCerts xml is
4. Discovery Network Setup Specification on the Dell Enterprise Technology Center at www delltechcenter com page Lifecycle Controller Auto discovery reinitialize workflow Reinitializing auto discovery involves resetting the iDRAC configuration to factory default settings for auto discovery Once the server is in this mode it will perform the exact same auto discovery operation as would a factory ordered server that had been set up with auto discovery enabled Reinitializing auto discovery is a two step process First the user must configure any custom certificates on the iDRAC or if the default certificate will be used delete any custom certificates that might already be on the iDRAC Then the user must send the reinitialize request optionally specifying the new provisioning server and setting the run time either to time now or to the next boot of the iDRAC remove and reapply power The figure below shows the high level sequence Reinitiate Auto discovery Figure 1 Reinitialize auto discovery network diagram eid amp Old Provisioning DHCP Server DNS Server New Provisioning Server Server DHCP DNS Query Discover Re Init Get Auto Discovery Credentials Server Reinitiate Auto discovery Figure 2 Reinitialize auto discovery sequence diagram Old Prov Server IDRAC DHCP Set Certificate gt OK Re Init Auto Discovery OK Kososossosssusan Time Now o
5. Reinitiate Auto discovery Lee Ballard Sylvia Tien Reinitiate Auto discovery This document is for informational purposes only and may contain typographical errors and technical inaccuracies The content is provided as is without express or implied warranties of any kind 2011 12 Dell Inc All rights reserved Dell and its affiliates cannot be responsible for errors or omissions in typography or photography Dell the Dell logo PowerConnect and PowerVault are trademarks of Dell Inc Symantec and the SYMANTEC logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the US and other countries Microsoft Windows Windows Server and Active Directory are either trademarks or registered trademarks of Microsoft Corporation in the United States and or other countries Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products Dell disclaims proprietary interest in the marks and names of others August 2012 Rev 1 1 Reinitiate Auto discovery Contents Introduction sasinen sanana maa ASENN END KAA AN NAARAAN SE SES I KISAN TEKIN ANITE KIEN AEAEE EN 4 Environment TEguiren Ents i assasmaaaasa aie Maea k KELA KK re SEKA EEN SSE snake aie sana sean KAHTENA NKI EKAN NES a KN S AIE Ka 4 Auto discovery reinitialize WOTKFlOW s susiisssia saas sas aa aan ads AAA NNN ENAA NA Na Naa NNN NA AS NN NN KAA A NAK aan kee ie 4 Setting updat
6. XAMPLES winrm i DeleteAutoDiscoveryServerPublicKey http schemas dmtf org wbem wscim 1 cim schema 2 root dcim DCIM LCService SystemCreationClassName DCIM ComputerSystem CreationClassName DCIM LCService SystemName DCIM ComputerSystem Name DCIM LCService u SUSERNAMES p SPASSWORDS r https IPADDRESS wsman encoding utf 8 a basic SkipCACheck SkipCNCheck skiprevocationcheck winrm i DeleteAutoDiscoveryClientCerts http schemas dmtf org wbem wscim 1 cim schema 2 root dcim DCIM LCService SystemCreationClassName DCIM ComputerSystem CreationClassName DCIM LCService SystemName DCIM ComputerSystem Name DCIM LCService u SUSERNAME S p PASSWORD r https IPADDRESS wsman encoding utf 8 a basic SkipCACheck SkipCNCheck skiprevocationcheck Specifying the provisioning server There are two steps in auto discovery see Figure 2 In the first step the iDRAC discovers the provisioning server In the second step the provisioning server learns there is a new server that needs to be configured the iDRAC receives its initial credentials and the secure SSL handshake takes place Reinitiate Auto discovery The iDRAC discovers the provisioning server in one of three ways DHCP vendor options DNS SRV lookup or default DNS entry There is also a fourth option manually configuring the provisioning server Configuring the provisioning server address in the reinitialize reguest will
7. bypass the discovery step and the iDRAC will proceed directly to handshake Setting the provisioning server is very useful if there are multiple provisioning servers in the network and the user wants to move a server from the control of one provisioning server to another It can also be used in situation where the user does not have control of the DHCP or DNS services Figure 3 Auto discovery process flow 1 Power Applied D amp H start 4 Discovery start 5 PS Discovered DHCP Yes 2 Prov Serv Set No ji No v x 10 6 3 PS Discovered Yes i Retry after 30 sec Discover y Until 24 hr timeout DNS SRV N Yes success kN i 7 9 NS Fail Use Default PS Handshake a ore hostname success N 8 Ne Continue 11 a End S There are two ways to set the provisioning server setting the provisioning server attribute or reinitiating auto discovery You may choose either one to set the value of the provisioning server Setting the provisioning server attribute The following WSMAN command will set the IP address or host name of the provisioning server on the iDRAC EXAMPLE winrm i SetAttribute cimv2 root dcim DCIM LCService Reinitiate Auto discovery SystemCreationClassName DCIM ComputerSystem CreationClassName DCIM LCService SystemName DCIM ComputerSystem Name DCIM LCService u USERNAME p PASSWORD r https IPADDRESS
8. eaning next iDRAC boot not server boot would be the best option Be aware that if you select time now the reinitialize process will begin immediately This means all login credentials on the iDRAC will be disabled until auto discovery completes so no remote access ssh web wsman or remote RACADM will be possible until auto discovery is complete If you are moving a server from one provisioning server to another and you use time now you should either specify the new provisioning server to the iDRAC or tell the old provisioning server to ignore credential requests from the service tag associated with the server to prevent it from discovering the old provisioning server and then disabling auto discovery If auto discovery is not working the reason for the failure can be determined on the server LCD menu under View gt iDRAC IP gt Auto Discovery If the 24 hour timeout has occurred removing and reapplying power will restart the auto discovery process If you want to abort the auto discovery process and regain remote access to the iDRAC reboot the server and press lt Ctrl E gt or Press F2 on a 12G server after the BIOS splash screen to configure the iDRAC and set the admin user name and password You may choose to set the provisioning server when reinitiating auto discovery Use the following WSMAN command to reinitiate auto discovery EXAMPLE winrm i ReInitiateDHS cimv2 root dcim DCIM LCService SystemCreationClassName DCIM ComputerSy
9. floW uuuusua nona non no a a aa aa naa aa aa aan ana aa nananana aN 9 Reinitiate Auto discovery Introduction The auto discovery feature of Lifecycle Controller allows newly installed servers to automatically discover the remote management console that hosts the provisioning server This also has the effect of notifying the management console there is a new server in the network that needs to be provisioned The easiest way to implement this feature is to reguest that auto discovery be enabled when you order your servers from Dell Then provided your console supports Lifecycle Controller auto discovery plugins are available for vCenter SCCM and others the discovered server will automatically be added to the management console when the server is powered on However what if a server was not ordered from the factory with auto discovery enabled or you need to repurpose a machine to a different network or put it under the control of a different management station This paper shows you how to remotely return a server to factory auto discovery default settings and discusses in detail the options which are available to you when reinitializing auto discovery e Setting updating or deleting custom auto discovery certificates e Reinitializing now or when the system is plugged in e Specifying the provisioning server Environment requirements For information on the requirements needed to support Auto discovery see Lifecycle Controller Auto
10. ing or deleting custom auto discovery Certificates sssssssossssssssossssssssossssse 6 USE CUSTOM Certificates uiuessaevassaa ana saa saa maan aa ai via a alea aan AKAA ae ajaa SA alaa ia alaisia 6 Use default Certificate s sousovuosaa seins sine eaa mene en basins vesa vinnie ea taseen NEEN Kaa aceite arene etna A ALA ve ia eae 8 Specifying the Provisioning server a sas vessaa assa aeaa een aava nana ana ans seis aa ajaa ae ana na 8 Setting the provisioning server attribute s oouoon non non nananana aa aan ana a aa a aan aa naan a naa aaa nanna 9 Reinitiatino auto discovery samassa ids vakaa nee cia AKA eter MUNA LAKE INN N EM ort VEAAAN EUn EKA HANA OK KA AES N EAA 10 Getting the Provisioning serve smasaivasaesa seassa am aa aN UE KA SAKI ANA SEN MILKA EA AERES AEE DEAE 10 Clearing the provisioning serve ssa avaus ase ka s aa ka cena AKKA ANSA MOKA SAAN AA NAAKKA KNN NOA MIS Ne ANA 11 Reinitializing now or when the system is plugged in sssssssssessossssesesoosessssessosssseseoossssssseo 11 SUMIUMANY somsentsoamse n saas se atsoaNe aN Ea NN oe taa NNi a aN ENO se Atsa Kuten Sa aNie kN aa KNleja aN Ajaa Rua M mja Neia aa T 12 Figures Figure 1 Reinitialize auto discovery network diagram ccce cece eee e eee eeeeeeceeeeeeeseeeeeeeseeeseees 5 Figure 2 Reinitialize auto discovery sequence diagram s essssssesoossssesesoossesesososssssesesossses 6 Figure 3 Auto discovery process
11. r Power reapplied DHCP Reguest IP IP Lease DHCP Reguest Prov Serv gt DNS SRV Lookup Default Hostname Lookup Response SSL SOAP GetCredentials Setting updating or deleting custom auto discovery certificates Reinitializing auto discovery will undo all iDRAC custom configuration settings and set the iDRAC back to auto discovery factory defaults with the exception of auto discovery certificates used for handshake and provisioning server If the new network provisioning server uses custom certificates those must be set on the server before auto discovery is reinitialized If the new network provisioning server uses Username password DNS New Prov Server gt gt Console will now configure the server default certificates any custom certificates should be deleted Use custom certificates Install provisioning server s CA certificate The following WSMAN method sets the CA certificate on the iDRAC that it uses to validate the provisioning server This must be the same CA that signed the provisioning server s certificate EXAMPLE Reinitiate Auto discovery winrm i DownloadServerPublicKey h schema 2 root dcim DCI CreationClassName DCI Name DCIM LCService r https IPADDRESS ttp schemas dmtf org wbem wscim 1 cim M ICService M ICService SystemCreationClassName DCIM ComputerSystem SystemName DCIM
12. ribute can have the following values 1 off disables auto discovery 2 Now enables and initiates auto discovery immediately 3 NextBoot delay reconfiguration amp auto discovery until next power cycle Getting the provisioning server The following WSMAN command will display the provisioning server on the iDRAC EXAMPLES 10 Reinitiate Auto discovery winrm g http schemas dell com wbem wscim 1 cim schema 2 DCIM LCString InstanceID LifecycleController Embedded 1 LCAttr ibutes lfProvisioningServer cimnamespace root dcim u USERNAME p PASSWORD r https IPADDRESS wsman encoding utf 8 a basic SkipCNcheck SkipCAcheck Clearing the provisioning server The following WSMAN command will clear the provisioning server on the iDRAC winrm i ClearProvisioningServer cimv2 root dcim DCIM LCService SystemCreationClassName DCIM ComputerSystem CreationClassName DCIM LCService SystemName DCIM ComputerSystem Name DCIM LCService u USERNAME p PASSWORD r https IPADDRESS wsman encoding utf 8 a basic Reinitializing now or when the system is plugged in The last thing to consider when reinitializing auto discovery is when will the operation occur If the system is being reallocated to a different provisioning server on the same network time now would be appropriate If the system will be unplugged moved and powered on in a different location selecting next boot m
13. shown below lt p DownloadClientCerts INPUT xmlns p http schema s dmtf org wbem wscim 1 cim schema 2 root dcim DCIM LCService gt lt p KeyContent gt BI Proc Type 4 ENCRYPTED DEK Info DES EDE3 CBC ulG9hRgOlTkoJJkMBk95Zi8 EGIN RSA PRIVATE KEY O9FD6D6131DFA5A86 H5KnZkNUnPnqPHO1Nco9WzKyINR1FbcIIAU9ITOUJOM SnSS1A8fRBtJXZZVBA KAt 341v0 FEAijSOZKMW1nA CUuZCFM7t3P 3kmD o6a Reinitiate Auto discovery DfcwLlvaburBpa0mj 5SHIBvGCLzcWEz5iTuzclAiU09dacT8 Uyr08KAVp5zu0b8bP BGUObNBUgJKSCPTKnNNSNaDb j0soOYB66B 9yZtaLPfdWkvob930UUwj CxTlxLGge END RSA PRIVATE KEY lt p KeyContent gt lt p Password gt PASSWORD HERE lt p Password gt lt PpsCAContent gt lt lt lt BEGIN CERTIFICATE MIIE2zCCA80gAwIBAgIBADANBgkghkiG9wOBAOO0FADCBgTELMAKGA1UEBhMCVVMx CzZAJBgNVBAgTAIRYMROWEJYDVOOHEwtNYWluIFN0cmVl1dDEVMBMGA1UEChMMSm91 T 805kZK8xCaS09U0KdAHSzZ6sltUasj8DYk6pXndgWIVSWc9JfsN3 dratX31rpoPJPhk N1hTdXHYiDjLwSg79yIkIJP1gZ5gdaeJljUYJBehRDO X7HxWN2VNk Z1NvYyZc END CERTIFICATE lt p CAContent gt lt p DownloadClientCerts INPUT gt Use default certificate Deleting custom auto discovery keys The following WSMAN methods will delete any custom auto discovery keys that may exist on the iDRAC Once the custom keys are deleted the iDRAC will return to using factory signed keys E
14. stem CreationClassName DCIM LCService SystemName DCIM ComputerSystem Name DCIM LCService u USERNAME p PASSWORD r https IPADDRESS wsman encoding utf 8 a basic file ReInitiateDHS xml 11 Reinitiate Auto discovery The input file RelnitiateDHS xml containing the parameters for the RelnitiateDHS method is shown below lt p ReInitiateDHS INPUT xmlns p http schemas dmtf org wbem wscim 1 cim schema 2 root dcim DCIM LCService gt lt p ProvisioningServer gt PS IP ADDRESS lt p ProvisioningServer gt lt p ResetToFactoryDefaults gt TRUE lt p ResetToFactoryDefaults gt lt p PerformAutoDiscovery gt 3 lt p PerformAutoDiscovery gt lt p ReInitiateDHS INPUT gt The PerformAutoDiscovery attribute can have the following values 1 off disables auto discovery 2 Now enables and initiates auto discovery immediately 3 NextBoot delay reconfiguration amp auto discovery until next power cycle Summary This whitepaper has provided an overview of the auto discovery reinitialize process and demonstrated how it can be used to reinitiate or repurpose a Dell Power Edge Server For more information please refer to the following documents on the Dell Tech Center website and other Dell websites Lifecycle Controller 1 5 Web Services Interface Guide for Windows Lifecycle Controller 1 5 Web Services Interface Guide for Linux Dell Auto Discovery Network Setup Specification What is a White Paper

Download Pdf Manuals

image

Related Search

Related Contents

User Manual for Online Enrollment / Student Registration System  Texte intégral PDF (810 ko)  SERIE CB  取扱説明書 - Agilent Technologies  iConverter™    AVAYA T3 Classic  PARK AVENUEMD - Napoleon® Products    Scarica PDF  

Copyright © All rights reserved.
Failed to retrieve file