Active System Manager Version 8.
Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. Copyright Copyright © 2014 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws.
Contents 1 Overview................................................................................................................. 7 About this document............................................................................................................................ 8 What is New in this Release.................................................................................................................. 8 Accessing Online Help..................................................................
6 Templates............................................................................................................. 31 Manage templates...............................................................................................................................32 Viewing template details............................................................................................................... 33 Creating template......................................................................................
Viewing firmware compliance report........................................................................................... 79 Discovery overview....................................................................................................................... 79 Configuring resources or chassis................................................................................................. 82 Removing resources...........................................................................................
Virtual appliance management.........................................................................................................122 Generating a troubleshooting bundle........................................................................................ 122 Generating and uploading the ssl certificates............................................................................122 Editing DHCP settings.....................................................................................................
Overview 1 Active System Manager (ASM) is Dell’s unified management product that provides a comprehensive infrastructure and workload automation solution for IT administrators and teams. ASM simplifies and automates the management of heterogeneous environments enabling IT to respond more rapidly to dynamic business needs.
– Full lifecycle management of physical and virtual infrastructure and workloads. • Deep virtualization integration — Manage cluster-level and virtual machine (VM) lifecycle. • Resource pooling and dynamic allocation — Optimize capital expenditures by creating and managing physical and virtual IT resource pools.
Other documents you may need In addition to this guide, the following documents available on the Dell Support website at dell.com/ support/manuals provide additional information about the ASM. Go to http://www.dell.com/asmdocs. • Dell Active System Manager version 8.0 Release Notes • Dell Active System Manager version 8.0 Quick Installation Guide • Dell Active System Manager version 8.
Getting started with ASM 8.0 2 When you log in to ASM for the first time, the Getting Started page is displayed. This page provides a recommended guided workflow for getting started with ASM. A check mark indicates that you have completed the step. NOTE: Standard users do not have the privilege to view the Getting Standard page.
Discovering resources Templates Defining or editing existing network Configuring resources or chassis 11
Initial setup 3 The Initial Setup wizard enables you to configure the basic settings required to start using ASM. Before you begin, gather the following information: • The local network share that contains ASM license. • The time zone of the virtual appliance that hosts ASM. • The IP address or host name of at least one Network Time Protocol (NTP) servers. • The IP address or host name, port, and credentials of the proxy server. (Optional) • The networks in your environment for ASM to access.
Uploading license If you are using ASM for the first time, you must upload the license file through the Initial Setup wizard. To upload a subsequent license, click Settings in the left pane, and then click Virtual Appliance Management. In the Virtual Appliance Management page, click Edit in the License Management section. 1. On the Licensing page of the Initial Setup wizard, click Browse, and select a valid license file.
3. In the Port box, enter the port number for the proxy server. 4. If the proxy server requires credentials to log in, select the Use proxy credentials check box, enter the User Name and Password, and then reenter the password to confirm. 5. Click Test Proxy Connection to test the connection to the proxy server. 6. Click Save and Continue. After the initial setup is complete, to change the proxy settings, in the left pane, click Settings in the left pane, and then click Virtual Appliance Management.
Dashboard 4 The Dashboard displays the following information: NOTE: Standard users are allowed only to view the details of the services that they have created or for the services they have permission. • Under Service Overview section, displays a graphical representation of the services based on their state, total number of services deployed, and state icons that represent the service state. The number next to each state icon indicates how many services are in a particular state.
• * Last Week * Last Month * Last 6 Months * Last Year Under Server Overview → Server Health, a pie chart displays the total number of servers available across all the server pools and their state. The state of the servers are categorized based on the following state: – Healthy (green band on the graphic): Indicates that there is no issue with the servers and working as expected. – Critical (red band on the graphic): Indicates critical problems exist with one or more components in the server.
– The trial license expires. • Deploy Service from Recent Templates — Enables you to view the most recent published templates and use it for deployment. Click View All to view all the templates. NOTE: Standard users are allowed only to view the recent templates that they have created. • Recent Activity — Lists the most recent user and system initiated activities. Click View All to view all the activities in the Logs page. Additionally, following information is displayed on the Disover pane.
5 Services A service is a deployment of a published template. NOTE: Standard users are allowed to view only the services that they have created or for which they have permissions. The Services page displays the services that are in following states in both Graphical and Tabular view. • Error Services — Indicates the services for which the deployment process is incomplete due to errors. • Deployed Services — Indicates the services that are deployed successfully.
• Name of the user who deployed the service. • Date and time when the service is deployed. • Displays the name of the reference template used in the service. • Lists the number of resources included in the service for deployment, based on the following component types: – Application – Virtual Machine – Cluster – Server – Storage From the Service page, you can: • Click Deploy New Service to deploy new service.
c. If you want to update the firmware running on the servers that are in the service, select Manage Server Firmware check box, and from the Use Firmware Repository drop-down, select a firmware repository. NOTE: Changing the firmware repository could update the firmware level on servers for this service. Firmware on shared devices will still be maintained by the global default firmware repository. d.
– IP Address. (Click the IP address of a Dell resource to open the Element Manager.) – Hypervisor IP Address (for servers only) – Deployment state • In the Tabular view, under Service Resources, the following information is displayed based on the resource types in the service.
– State — Displays one of the following state based on the deployment status of a service. Service State Icon Description In Progress Indicates service deployment is in progress. Error Indicates service deployment is failed due to some issues. Successful Indicates service deployment is completed successfully. Warning Indicates that the one of more resource that are part of a service is in a state that requires corrective action, but does not affect overall system health.
Deploy service Exporting service details Exporting service details Updating firmware Retry failed service Adding components to existing service deployments Deleting service Deleting resources from service Migrating servers Component deployment states After you deploy a service, ASM assigns one or more states to the components based on the deployment status.
c. If you want to grant permission for Standard users to use this service, under Manage Service Permissions, select the In addition to all Admins, grant Standard Users access to this service check box, and perform one of the following actions: • To grant access to all Standard users for this service, select All Standard Users option. • To grant access only to specific Standard users for this service, select Specific Standard Users option, and perform the following tasks: a.
The Services page is displayed. 2. Select an error service and click View Details in the right pane. The Details page is displayed. 3. In the right pane, under Service Actions, click Retry. Click Yes when a confirmation message appears. View Service Deployment Settings The Service Deployment Settings page displays the settings configured on the resources in a service for deployment.
You can migrate only one server at a time. However, after a successful migration, additional servers can be migrated. During migration, ASM will try to identify an exact match for the hardware. If it is not available in the server pool, a different hardware can be selected. You may encounter some issues during configuration of the new servers. In such scenarios, you can address the issues preventing the proper configuration of the target server, and retry the deployment.
Adding applications to existing service To add applications to an existing service: 1. On the Add Application(s) page, add the applications to the existing service in one of the following ways: • • If you want to clone an existing application settings to the applications that you want to add to the service, next to New Component Settings, click Duplicate, and perform the following steps: 1. From the Resource to Duplicate drop down list, select an application that is part of the service. 2.
1. From the Select a Component drop-down list, select one of the following cluster types: – VMWare Cluster – Hyper-V Cluster 2. Under Associated Resources, to associate the newly added cluster to the existing components in the service, select the components to associate. 3. Click Continue. Based on the component type, specific settings and properties appear automatically that are required and can be edited. For more information specific to component type settings, see Component Types. 2. Click Save.
• • If you want to clone an existing server configuration to the servers that you want to add to the service, next to New Component Settings, click Duplicate, and perform the following steps: 1. From the Resource to Duplicate drop down list, select a server. 2. In the # of Instances box, enter the number of server instances that you want to add to the service. Click Continue. 3. In the Component Name box, enter the name of the corresponding servers. 4.
4. • In the Storage Volume box, enter the volume name in the storage. If you want to add new server component, next to New Component Settings. click New, and perform the following steps: 1. From the Select a Component drop-down list, select one of the following storage components: – Compellent – EqualLogic – NetApp 2. Under Associated Resources, to associate the newly added storage component to the existing components in the service, select the components to associate. 3. Click Continue.
Templates 6 A Template is a collection of components. It defines the end state of your infrastructure that will be configured when a service is generated. A Template may consist of various components that identify the type of resource to be configured. In ASM, each component is specifically categorized as: • Application • Virtual Machine • Cluster • Server • Storage NOTE: The Switch component cannot be configured in ASM currently.
Building and publishing template Importing template About roles Manage templates The Templates page displays the information about the templates in Graphical and Tabular format. To switch between the Graphical and Tabular view, click the Graph icon or Table icon next to View As option on the top of the Templates page. To sort and view the templates based on categories, in the Filter By drop-down list, select a category.
– Click Delete to delete the Template – Click Deploy Service to use the specific template for service deployment. – Click View Details to view the resources that can be configured using the template and connections. – Click Clone Template to use the properties of this template and create a new template. Related Links Sample templates Creating template Editing template Deleting template Cloning template Importing template Deploy service Viewing template details To view more details about a template: 1.
NOTE: Changing the firmware repository could update the firmware level on servers for this service. Firmware on shared devices will still be maintained by the global default firmware repository. 8.
To remove a Standard user from the list, select the Standard user and click Remove User(s). 2. 8. After adding or removing the Standard users, select or clear the check box next to the Standard users to grant or block access to use this template. Click Save. Building template overview The Template Builder page allows you to build a customized template by configuring both physical and virtual components. On the Template Builder page, you can set the component properties.
4. Under Associated Resources, perform one of the following actions: • When you are adding a new component to a template, if you want to associate the component with all the existing components, select Associate All resources option. The new component automatically associated with the existing components.
4. Click Publish Template to make the template ready for deployment From this page, you can: • Click Edit next to the Template Information section title, to edit the template information. • View the following information about the template in the Template Information section: – Category — Displays the template category. – Reference Firmware Repository — Displays the reference firmware repository.
Cloning template The Clone option allows you to copy an existing template into a new template. A cloned template will contain the components that existed in the original template. You can edit it to add more components or modify the cloned components. To clone an existing template, perform the following steps: 1. Click Templates. 2. Select a template, and click Clone. You can also clone an existing template while creating a new template. For more details, refer to the Create a Template topic. 3.
5. In the Schedule Deployment page, perform one of the following actions: • Deploy Now — Select this option to deploy the service immediately. • Schedule Later — Select this option and enter the date and time to deploy the service. Related Links Adding components to existing service deployments Retry failed service Deleting service Decommissioning services provisioned by ASM When a service provisioned by ASM is no longer required, it is important to decommission the resources.
• Switch • Server • Cluster • Virtual Machine • Application NOTE: Currently, ASM does not support Switch configuration. NOTE: It is recommended to add physical devices to the template first, then configure virtual resources, and lastly configure application settings to be deployed on the resources. Related Links Storage Server Cluster Virtual Machine Application Storage A Storage component refers to the physical storage components that can be added to a template.
Storage settings Field Name Description EqualLogic Chap Storage Settings Target EqualLogic Device Specifies the EqualLogic storage device where the volume is created. Storage Volume Select the volume in Equallogic. To create a new volume, from the Storage Volume drop-down list, select Create New Volume. New volume name Enter the name of the volume in Equallogic. A volume is a logical partition in the EqualLogic storage array. The EqualLogic CHAP users have the access to these storage volumes.
Field Name Description Chap username Specifies the CHAP username. A valid CHAP username must be less than or equal to 63 alphanumeric characters. The access to CHAP username is limited. NOTE: The Chap username and Chap secret fields are displayed only if authentication type is selected as Chap. Chap secret Specifies the CHAP password. A valid CHAP password must be less than or equal to 254 characters. If the password is not specified, then it is generated automatically.
Field Name Description Server Object Folder Specifies the folder for the server. Server WWN Values Specifies a globally unique World Wide Name (WWN) for the requested HBA. Port Type Refers to the transport type for all HBAs being added. This option is required if the manual flag is set. The possible values are FibreChannel and iSCSI. Manual This parameter sets an optional flag to configure the requested HBAs before the HBAs are discovered.
Field Name Description Persistent • In Data ONTAP 7-Mode, the persistent is enabled by default. If it is enabled, modifies the etc/exports file to append the rule for a permanent change. (The new rule still takes effect immediately.) • In Data ONTAP Cluster-Mode, the export entries are always persistent. Persistent is enabled by default. If persistent is not enabled an error occurs. NFS Target IP Specifies the interface IP that is used for NFS traffic in your environment.
Target Boot Device Description Hardware Settings Target Boot Device Specifies the target boot device ( for example: Local Hard Drive or SD card). System Profile Select the system power and performance profile for the server. User Accessible USB Ports Enables or disables the user accessible USB ports. Number of Core Processors Specifies the number of enabled cores per processor.
Target Boot Device Description Language Specifies the language to be displayed in the installed operating system. That is, Windows operating system. Keyboard Specifies the key board language to be used during Windows installation. Domain Name Specifies the domain name to which you want to add the host. For example, aidev FQ Domain Name Specifies the Fully Qualified Domain Name (FQDN) to which you want to add the host. For example, aidev.
Configuring interface on blade servers 1. In the Server Component dialog box, under Fabric Configuration, select Blade Server. 2. To enable the fabrics, select the corresponding check boxes next to Fabric A, Fabric B, and Fabric C. 3. Under Used for FC, select the check boxes next to Fabric B and Fabric C if you want to enable the fabrics for Fibre Channel traffic. 4. From the NIC Type, select one of following NIC types: • 2 Port 5.
• Hyper-V 2. In the # of Instances box, enter the number of cluster instances. 3. Under Related Components, select the components that you want to map with the selected cluster instance. For more information about valid component combinations that can be mapped together in a template, see Component Combinations in Templates 4. Click Continue. 5. Under Cluster Settings, specify the settings that you want to configure on the cluster components and click Add.
Virtual Machine A Virtual Machine is configured on top of a cluster, while building a template. After selecting Virtual Machine on the template builder page, perform the following actions: After selecting Virtual Machine component on the Template Builder page, perform the following actions: 1. In the Virtual Machine Component dialog box, from the Select a Component drop-down list, select one of the following: • vCenter Virtual Machine • Clone vCenter Virtual Machine • Clone Hyper-V Virtual Machine 2.
Virtual Machine Settings (Clone vCenter Virtual Machine) Field Name Description Virtual Machine Settings Number of CPUs Refers to the number of CPUs specified while configuring a Virtual Machine. Virtual Disk Size (GB) Specifies the size to allocate for virtual machine hard disk. Memory in MB Refers to the memory in GB specified while configuring a Virtual Machine. Networks Specifies the networks that will be associated with the virtual machine.
Virtual Machine Settings (Clone vCenter Virtual Machine) Field Name Description Start Action Selects the action to perform automatically when the virtualization server starts. Start Action Selects the action to perform when the virtualization server stops. Application The Application component is configured on top of virtual resources in ASM. However, an application component can be installed on a physical server that has a non-ESXi OS. ASM provisions multiple applications for deployment.
Field Name Description Default and Possible Values DREPLAY_CLT, SNAC_SDT, SDK, LocalDB sapwd Specifies the password for SQL Server SA Account. agtsvcaccount Specifies the account for the SQL Server Agent service. Default value: NT SERVICE \MSSQLSERVER agtsvcpassword Specifies the password for SQL Server Agent service account. Password is not required for NT service accounts. assvcaccount Specifies the account for the Analysis Services service. Default value: NT SERVICE \MSSQLSERVER assvcpasswo
Field Name Description Default and Possible Values SQL Server If the value is True, installs SQL Server component Possible values: True from Citrix installer on the virtual machine to which or False the component is related. Delivery Controller If the value is true, installs Citrix Delivery Controller component from Citrix installer on the virtual machine to which the component is related.
Field Name Description Default and Possible Values Upload Recurse Determines whether or not to upload all contents of the directory on the share. Possible value: True or False Execute File Command Optional. Specifies the command to execute uploaded file. The command must be used with upload file present. Possible value: myfile.
Template – deploy physical server and virtual machine Template – deploy virtual machines to cluster Template – install ESXi to SD card with Fibre Channel storage Template – install ESXi to SD card with iSCSI storage Template – deploy Hyper-V host with iSCSI storage Template – deploy Hyper-V cluster with iSCSI storage Template – deploy Hyper-V cluster with Fibre Channel storage to SCVMM Template – deploy VMware cluster with NetApp storage Template – boot from Fibre Channel SAN Template – boot from iSCSI SAN
NOTE: It is critical to update the password within this template. The value in the template is masked, but the actual password is not set. If this password is not set, you cannot log in to the deployed server. 2. Retain the ESXi value as default in the OS Image Type drop-down list. 3. From the OS Image drop-down list, select an OS for a hypervisor (Example: ESXi 5.1 or ESX 5.5) that are configured and to be deployed within your ASM managed environment. d. 5. 6. 7.
4. In the Template Builder, click the server component, click Edit in the dialog box that is displayed, and then configure the following settings in the Server Component dialog box. 5. In the Component Name box, type the component name. (Optional) 6. Under Hardware Settings, perform the following: 7. a. From the Target Boot Device drop-down list, select the corresponding target boot device. b. From the Server Pool drop-down list, select the corresponding server pool.
c. From OS Image drop-down list, select an OS for a hypervisor (Example: ESXi 5.1) which is configured to be deployed within your ASM managed environment. 5. Under Network Settings section, update the network settings accordingly for the hypervisor you are deploying and for the configured networks in your environment. 6. In the Template Builder, select the cluster component, click Edit in the box that is displayed, and then configure the .following settings in the Cluster Component dialog box. 7.
5. 1. From the Target Hypervisor drop-down list, select the target vCenter. 2. In the Data Center Name and Cluster Name boxes, type the corresponding names. In the Template Builder, select the virtual machine component, click Edit in the box that is displayed, and then configure the following settings in the Virtual Machine Component dialog box. Repeat this step for each virtual machine in the cluster. a. Under Virtual Machine OS Settings, perform the following: 1.
7. 5. Retain the values of Port Type, Manual, Force Map, Map Read Only, and Single Path Map as defaults. In the Template Builder, select the server component, click Edit in the box that is displayed, and then configure the following settings in the Server Component dialog box. Repeat this step for each server component. a. In the Component Name box, type the component name. (Optional) b. Under Hardware Settings section, configure the following: c. 1.
7. b. In the Storage Volume Name text box, type a unique name. c. In the Storage Pool, Storage Size, Thin Provisioning, Snapshot Reserve %, Thin Min Reserve %, Thin growth Warning %, Thin growth Maximum %, Thin warning on threshold %, Multi-Host access of volume text boxes, update the values. d. From the Authentication drop-down list, select authentication type as CHAP. e. In the Chap Username and Chap Secret text boxes, type the CHAP user name and CHAP secret for the volume access.
To deploy Hyper-V host with iSCSI storage using this template, perform the following steps: 1. On the Templates page, select the Deploy Hyper-V Host with iSCSI Storage template, and click Clone. 2. In the Create Template dialog box, enter a name and description for the template, and click Save. 3. In the Template Builder, select a storage component, click Edit in the dialog box that is displayed, and then configure the following settings in the Storage Component dialog box. a.
This template is now ready to be deployed. Template – deploy Hyper-V cluster with iSCSI storage The Deploy Hyper-V Cluster with iSCSI Storage template deploys two iSCSI storage volumes and installs Hyper-V on a physical host. To deploy Hyper-V host with iSCSI storage using this template, perform the following steps: 1. On the Templates page, select the Deploy Hyper-V Cluster with iSCSI Storage template, and click Clone. 2.
NOTE: It is critical to update the password within this template. There is a masked value present in the template, but there is no actual password set. If you do not set this password, you will not be able to log in to the deployed server. 5. 6. 7. Select the OS Image configured for Hyper-V to deploy within your ASM managed environment. 8. Retain the default selection of Hyper-V for OS Image Type. d.
To deploy Hyper-V Cluster with Fibre Channel Storage to SCVMM using this template, perform the following steps: 1. On the Templates page, select the Deploy Hyper-V Cluster with Fibre Channel Storage to SCVMM template, and click Clone in the right pane. 2. In the Create Template dialog box, enter a name, category, and description for the template, and click Save. 3.
Hypervisor Management Network, Hypervisor Migration Network, Hypervisor Cluster Private Network, and an optional Public network for virtual machines. 6. Click Save. 7. On the Template Builder page, click the Hyper-V Cluster component, click Edit in the dialog box that is displayed, and then configure the following settings in the Cluster Component dialog box: a. From the Hypervisor Management Software drop-down list, make sure that you select your target SCVMM. b.
f. Select the Timezone and enter the IP address of the NTP Server for time synchronization. g. Select the Language and Keyboard inputs if you want to change the default values. h. Enter the Domain Name and FQ Domain Name to which you want to add the Hyper-V host. i. Enter the Domain Admin Username and Domain Admin Password to add the Hyper-V host to the domain. Enter the domain admin password again to confirm. NOTE: It is critical to update the password within this template.
c. From the Storage Volume Name list, select Create New Volume, and in the New Volume Name, enter a new unique volume name. d. From the Operating System Name, select the desired operating system. That is, if using Linux, select ESXi. 4. Click Save. 5. On the Template Builder page, click the server components, click Edit in the dialog box that is displayed, and then configure the following settings for the server in the Server Component dialog box: a.
NOTE: Only single function (not partitioned) mode is allowed for boot from SAN. 6. NOTE: Only a single VLAN per port is allowed, and this network will be configured as untagged on the server facing port of the switch. Click Save. 7. Click Publish Template. This template is now ready to be deployed.
NOTE: Template cloning will not work if vCenter virtual machine template or virtual machine is not configured according to the Active System Manage Quick Installation Guide. To deploy a VMWare virtual machine clone using this template, perform the following steps: 1. On the Templates page, select the Deploy Virtual Machine Template Clone on VMWare Cluster template, and click Clone in the right pane. 2.
To configure ASM virtual appliance: 1. Log in to ASM virtual appliance as delladmin. The default delladmin credentials are delladmin/ delladmin. 2. You must copy Microsoft SQL Server 2012 ISO to the /var/lib/razor/repo-store/ directory. 3. Unpack Microsoft SQL Server 2012 ISO into CIFs share on the virtual appliance. To perform this task, run the following commands: cd /var/lib/razor/repo-store mount -o loop .iso/mntrsync a /mnt/ /var/lib/razor/repo-store/ SQL2012umount /mntrm SQL2012.iso 4.
d. Enter the Product Key for corresponding OS Image Version. e. Select the Workload networks to access this VM. f. Click Save. 10. On the Template Builder page, click one of the application components, click Edit in the box that is displayed, and then configure the following settings in the Application Component dialog box: a. Under Application Settings, in the Media Location box, enter the directory location where the SQL 2012 ISO was unpacked. b.
Specification Prerequisite • Create both physical and logical ports of the Compellent array. • Make sure active zone set is configured on the Brocade SAN switches. Compellent Storage Configuration Must be configured Resource Discovery Make sure the following resources are discovered in ASM.
• Creates the storage volume and server objects that contain the WWPNs on Compellent storage. ASM creates the storage volume and server objects with the names specified in the template. • If Configure SAN Switch parameter is set to true, ASM performs the following actions: – Identifies the fault domain of the Compellent storage created on the Brocade switches. – Configures the Brocade switch by creating a zone for the server including the WWPN of the FC adapters and the Compellent storage.
Resources 7 The Chassis, servers, switches, storage groups, VMware vCenters, and Microsoft virtualization environments that you can manage using ASM are called resources. The Resources page displays detailed information about all the resources and the server pools that ASM has discovered and inventoried, and allows you to perform various operations from the All Resources and Server Pools tabs.
• Switches • Storage • VM Manager To filter resources based on the resource status, from the Health drop-down list, select one of the following resource types: • All Resources • Healthy • Warning • Critical • Unknown From this page, you can: • Click Discover to discover new resources. • Click Remove to remove the resource from ASM. • Select one or more resources, click Manage or Unmanage to allow ASM to manage or unmanage the resources.
Icon Health Status Description Healthy Indicates that there is no issue with the resource and working as expected. Warnin g Indicates that the resource is in a state that requires corrective action, but does not affect overall system health. For example, the firmware running on the resource is not at the required level or not compliant. Critical Indicates that there is an issue persist in one of the following hardware or software components in the device. Needs immediate attention.
• Updating firmware. • Removing resource from ASM inventory. Error Service deployment is failed. Reserved Resource is reserved by a service prior to a pending deployment. Unmanaged Resource is not managed by ASM. Resource firmware compliance status Based on the resource firmware compliance with the default repository catalog set, ASM assigns one of the following firmware status to the resources.
ASM will apply the firmware updates at a selected date and time and then reboot to all servers within this service. For servers belonging to a VMware vSphere cluster, servers will be updated one at a time by putting it first into maintenance mode, then performing the firmware update and rebooting the server, and finally bringing the server out of maintenance mode before moving on to the next server. 2. Click Save. Viewing firmware compliance report To view the compliance report of any resource: 1. 2.
Before you begin discovering the resources, gather the IP addresses and credentials associated with the resources, and ensure that: • The resources are connected to the network. • ASM virtual appliance is connected to the network. NOTE: For Dell resources (chassis, servers, and I/O modules), use the default root-level user name root, and password calvin for discovery. However, the default root-level credentials are not supported for Dell Compellent Storage Center and Dell EqualLogic Storage.
b. • Storage • Switch • vCenter • SCVMM • Chassis Enter the Starting IP Address and Ending IP Address range of the resources of same type to discover. NOTE: You need to use management IP address to discover the NetApp storage resources. c. d. From the Manage in ASM drop-down list, select one of the following options: • Managed — Select this option if you want manage the resources in ASM. • Unmanaged — Select this option if you do not want to manage the resources in ASM.
NOTE: This option is valid only for servers that have been previously configured and deployed inside or outside of ASM. Do not choose this option for new chassis. c. • Assign IP address via DHCP — Use DHCP to automatically allocate an IP address. This option is not valid for chassis. • Assign static IP address from the network — Assign a static IP address from the pool of IP addresses in a management network. To add a network, click New and complete the Define Network page.
• Enables you to on board or reconfigure one or more chassis and servers and I/O modules within the chassis. Before you begin, it is recommended to gather the following information: • User names and passwords of accounts that can access the resources. • Optionally, SMTP server and email address for an account to receive alerts. • Optionally, NTP server IP addresses • (Optional) Chassis Management Controller (CMC) and Integrated Dell Remote Access Controller (iDRAC) VLAN IDs. 1.
Configuring unique chassis settings Configuring unique I/O module settings Configuring uplink ports Completing the chassis configuration Removing discovered resources The Discovered Resources page list the resources discovered in ASM. On this page, you can select one or more resource that you do not want to be in ASM environment, and click Remove Resource from ASM.
To edit a user account, select a CMC user from the list, and click Edit. To delete a user account, select the user accounts from the list, and click Delete. b. 4. To add new Integrated Dell Remote Access Controller (iDRAC) user, under iDRAC Users, click Create. For more information, see Adding Or Editing An Integrated Dell Remote Access Controller (iDRAC) User. Under Global Settings, in the Monitoring section, configure the following settings: a.
c. 7. 8. Optionally, select Enable Dynamic Power Supply Engagement check box to allow the chassis controller to put underutilized PSUs into standby mode based on the redundancy policy and system power requirements. Under Global Settings, in the Networking section: a. Optionally, select Register Chassis Controller on DNS check box to enable users to access the Chassis Management Controller (CMC) with a user-friendly name, instead of an IP address. b.
• Service Tag — Displays the service tag for the server. The service tag is a unique identifier provided by the manufacturer for support and maintenance. If the server is absent, this field is empty. • Slot — Identifies the server location. • Management IP — Displays the management IP address of the server. 2. If you want to modify the iDRAC DNS Name of the server, in the iDRAC DNS Name column, enter an iDRAC DNS name for the server. 3. Click Next to configure the IO modules within the chassis.
Defining uplinks 1. On the Uplink Port Configuration page of the Configure Chassis wizard, in the Configure Uplinks area, click Define Uplinks. 2. In the Define Uplinks dialog box, click Add Uplink, and enter the following: a. Enter the name for the uplink. b. From the Port Channel drop-down list, select the port channel that you want to create on the switch. c. From the Network Type drop-down list, select one or more networks that you want to assign to the uplink.
• Select the Configure the uplinks on each I/O Module Independently check box to configure different ports as uplink ports in each I/O module. The table lists ports that are available in each I/O module in separate columns. • Clear the Configure the uplinks on each I/O Module Independently check box to configure the same ports as uplink ports across all I/O modules. The table displays the following information: – IO modules (Model Name) that is present in each fabric.
• 4. No Access To enable this user account, select Enable User check box. Clear the Enable User check box to add the user in a disabled state. Removing resources NOTE: On the user with Administrator role can remove the resource from ASM. To remove any particular resource from ASM, perform the following steps: 1. In the left pane, click Resources. 2. On the Resources page, click the All Resources tab. 3. From the list of resources, select one or more resources, and click Remove. 4.
Viewing resource details NOTE: Standard users can only view the details of the resources that are part of server pools from which they have permissions. To view the details about a resource, perform the following steps: 1. In the left pane, click Resources. 2. In the Resources page, select the All Resources tab. 3. From the list of resources, click a resource for which you want to view the details.
Viewing blade or rack server details 1. In the left pane, click Resources. The Resources page is displayed. 2. In the All Resources tab, click a blade server or rack server from the resources list to view the details The Details pane in the right displays the basic information about the blade servers, such as Power State, Management IP, Host name, Service Tag, OS, DNS DRAC Name, Processors, and Memory. 3. In the Details pane, click View Details.
Viewing storage group details 1. In the left pane, click Resources. The Resources page is displayed. 2. In the All Resources tab, click a storage group from the resources list to view the details. The Details pane in the right displays the basic information about the storage group, such as System Status, Management IP, Storage Center Name, Group Members, Volumes, Replay Profile, Free Group Space. For NetApp storage type, displays the Storage Name, Available Storage, Aggregates, Volumes, and Disks. 3.
Understanding server pools In ASM, a Server Pool is a set of servers grouped for specific use-cases such as business units or workload purposes. An administrator can also specify a set of users who can access these server pools. The Server Pools tab lists the existing server pools and enables you to perform the following actions: NOTE: Standard users can view only the details of the server pools for which they have permissions.
3. To add or remove servers from the server pool, in the left pane, click Add Servers. Click Save. 4. To add or remove the access rights to the server pool, in the left pane, click Assign Users. Click Save. Related Links Creating server pool Editing server pool Application logs Users Repositories About roles Scheduled jobs Virtual appliance management Deleting server pool 1. In the Server Pools tab, select one or more server pools, and click Delete. 2.
Settings 8 On the Settings page, you can: NOTE: A user with Administrator role can only configure the following settings. For more information about roles and permission, see About Roles • Configure automatically scheduled and manual backup and restore jobs. • Create the credentials that ASM will use to access chassis, server, switch, VMware vCenter, and storage resources. • Access the Getting Started page. • Access application logs. • Manage OS image and firmware repositories.
• Backup directory path to an NFS or a CIFS share, including an optional user name required to access the share, if required • Backup Directory User Name Additionally, the Backup and Restore page displays information about the status of automatically scheduled backups (Enabled or Disabled).
• CIFS – \\host\share\ If username and password are required to access the network share, in the Backup Directory User Name and Backup Directory Password boxes, you can type a user name and a password. 4. To open the backup file, in the Encryption Password box type a password. Verify the encryption password by typing the password in the Confirm Encryption Password box. NOTE: The password can include any alphanumeric characters such as !@#$%* 5. Click Save.
Restore now Restoring ASM virtual appliance returns user-created data to an earlier configuration that is saved in a backup file. CAUTION: Restoring an earlier configuration restarts ASM virtual appliance and deletes data created after the backup file to which you are restoring. NOTE: It is recommended to perform frequent backups to prevent data loss and corruption.
• Date and time that the credential was created and last modified. On the Credentials Management page, you can: • Create New Credentials • Edit Existing Credentials • Delete Existing Credentials Related Links Creating credentials Editing credentials Deleting credentials Creating credentials To create new credentials: 1. In the left pane, click Settings, and then click Credentials Management. 2. On the Credentials Management page, click Create. 3.
Editing credentials To edit a credential: 1. In the left pane, click Settings, and then click Credentials Management. 2. On the Credential Management page, click a credential that you want to edit, and then click Edit. 3. Modify the credential information in the Edit Credentials dialog box. 4. Click Save. Deleting credentials To delete a credential: 1. In the left pane, click Settings, and then click Credentials Management. 2.
• Category – Security — Indicates the authentication failures, operations on ASM users, operations on credentials – Appliance Configuration — Indicates the initial setup, appliance settings, backup and restore – Template Configuration — Indicates the operations on Service Templates – Network Configuration — Indicates the operations on networks, pools for MAC/IQN/WWPN/ WWNN – Infrastructure or Hardware Configuration — Indicates the hardware discovery, inventory – Infrastructure or Hardware Monitoring — Indi
CAUTION: If you do not select a date, then ALL entries with the selected severity level(s) are deleted. 4. To delete entries by severity level, select Information, Warning, and Critical. CAUTION: If you do not select a severity level, then ALL entries older than the selected date are deleted. 5. Click Apply. NOTE: You must select either a date or at least one severity level.
Additionally, you can click a network to see the following details in the Summary tab: • Name of the user who created and modified the network. • Date and time that the network was created and last modified. NOTE: To sort the column by network names, click the arrow next the column header. You can also refresh the information on the page.
NOTE: ASM uses the VLAN ID specifically to configure I/O modules to enable network traffic to flow from the server to configured networks during deployment. NOTE: The VLAN ID can be edited only if the network is not currently referenced by a template. 7. Select Configure static IP address ranges check box, and then do the following: NOTE: Currently, stating IP addressing is not supported for SAN [FCoE] network types.
• Hardware Management— Used for out-of-band management of hardware infrastructure. • FIP Snooping— Fibre Channel over Ethernet (FCoE) Initialization Protocol (FIP) snooping provides security mechanism that prevents unauthorized access and data transmission to a Fibre Channel (FC) network. The FIP VLAN Request is multicast to the destination MAC Address of ALL-FCF-MACs. The Source Address for the VLAN Request is the ENode MAC and it is important to note that the frame is transmitted without an 802.
– Pending — Indicates that the OS image repository download process is in progress. – Error — Indicates that there is an issue downloading the OS image repository. • Repository — Display the name of the repository. • Image Type — Displays the operating system type. • Source Path — Displays the share path of the repository in a file share. From this page, you can: • Click Add to add a new repository. • Select a repository from the list and click Remove to remove a repository.
• Services Affected — Displays the services in which the firmware catalog is used. From this page, you can: • Add new repository • Select the repository from the list, and click Remove to remove a repository. NOTE: If you remove a repository, the repository is deleted from the appliance not from the file share.
• Date — Displays the date when the firmware update package was downloaded. • Size — Displays the size of the firmware update package. Scheduled jobs NOTE: User with Administrator role can only view and cancel the jobs. Currently, Standard users are not allowed to cancel the jobs that they have scheduled.
• Role • Last Name • First Name • State (Enabled or Disabled) On this page, you can: • Click refresh icon on the top left of the Users tab to retrieve the newly added users. • Edit or delete an existing user. • Create local user. • Enable or disable a user account. • Import Active Directory Users.
Importing users Deleting a user The Delete option allows you to remove an existing ASM user. Perform the following tasks to delete a user: 1. In the left pane, click Settings and then click Users. 2. On the Users page, select one or more user accounts to delete. 3. Click Delete. Click Yes in the warning message to delete the account(s). Editing a user The Edit option allows you to edit an ASM user profile. Perform the following tasks to edit a user profile: 1.
• Edit a Directory Service. Directory services The Directory Services option allows you to add, edit or delete an Active Directory using the Directory Services functionality. ASM can access these active directories to import users. NOTE: An Active Directory user is authenticated against the specific Active Directory Domain that a user belongs to.
Attribute settings matrix Connection settings matrix Field Name Description Type Of Directory Service Refers to the type of directory service (currently available, Microsoft Active Directory). Name Refers to the Active Directory (AD) configuration name as added in ASM. For example: mydomain User Name Refers to the AD account that has privileges to search for users. The account name must be entered using the User Principle Name format. For example: administrator@mydomain.
Field Name Description For example: CN=Users,DC=mydomain,Dc=com Filter Refers to the filters that enable you to define search criteria. For example: objectClass=* User Name Attribute Refers to the Active Directory record attribute that represents the User Name attribute. This attribute is mapped to ASM User Name attribute. For example: sAMAccountName First Name Attribute Refers to the Active Directory record attribute that represents First Name. This attribute is mapped to ASM First Name attribute.
Deleting a directory service The Delete option allows you to delete a directory service. Perform the following steps to delete a directory service: 1. In the left pane, click Settings, and then click Users. 2. In the Directory Services tab, select a single or multiple directory services to be deleted, by checking the required service directory check boxes. 3. Click OK in the warning message window to delete the selected directory services.
About roles Every ASM user account can be assigned to any one of the following roles: • Administrator — Users with Administrator role has the privilege to view all the pages and to perform all operations in ASM and grant permission to Standard user to perform certain operations. • Standard — Users with Standard role can view certain pages and perform certain operations based on the permission granted by Administrator.
Service Details Templates View Y Y* Y *Standard users are allowed only to view only the details of the services that they have created or have permissions. Open Resource Console Y Y* N *Standard users are allowed only to view only the details of the resources that are part of the pool for with they have permissions. Edit Service Informati on Y Y* N *Standard users are allowed only to edit only the service that they have created.
Template Edit Resources 118 Create new template Y N N Edit template Y N N Delete template Y N N View template details Y Y* Y Clone template Y N N View Y N N Edit Y name/ category/ descriptio n N N Publish template Y N N Delete template Y N N View All Settings Y N N Import template Y N N View Y *Y Y Discover Y resources N N Remove Y resources N N *Standard user are allowed only to view the details of the template for which they have permission.
Manage Y or unmanag e resources N N Run inventory Y *Y N *Standard users are allowed only to run the inventory on the resources that are part of the service pool for which they have permission. View resource details Y *Y Y *Standard users are allowed only to view only the details of the resources that are part of the service pool for which they have permission.
Credential Management Getting Started Edit Backup Settings Y N N View Y N Y Create Y N N Edit Y N N Delete Y N N View Y N Y Initial Y Setup Defin e Netw orks Disco ver Resou rces Confi gure Resou rces View Templ ates N N • • • • • Networks Users 120 View Y N Y Define Y N N Edit Y N N Delete Y N N View Y N Y Create Y N N Edit Y N N Disable/ Enable Y N N Delete Y N N
Directory Services Virtual Appliance Management Virtual Identity Pools Import Y N N View Y N Y Create Y N N Edit Y N N Delete Y N N View Y N Y Generate Troubles hooting Bundle Y N N Edit Time Y Zone and NTP Settings N N Edit Proxy Settings Y N N SSL Certificat es Y N N Generate Y Certificat e Request N N Upload Certificat e Y N N Edit License Y N N View Y N Y Create Y N N Export Y N N 121
Delete Y N N Related Links Creating a user Editing a user Deleting a user Enabling or disabling users Importing users Virtual appliance management Virtual Appliance Management allows you to: • Generate a troubleshooting bundle • Edit NTP settings • Edit DHCP Settings • Edit proxy server settings • Generate and download a Certificate Signing Request (CSR) and upload the resulting SSL certificate • Upload an ASM license Related Links Generating a troubleshooting bundle Editing default time zo
To upload an SSL certificate: 1. Generate a Certificate Signing Request (CSR). 2. Download the CSR. 3. Submit the CSR to a Certificate Authority (CA). The CA provides a valid SSL certificate. 4. Upload the SSL certificate to ASM.
Uploading an SSL certificate Before you upload an SSL certificate, generate and download a certificate signing request (CSR). To receive a valid SSL certificate, submit the CSR to a certificate authority. Save the certificate to a local network share. 1. In the left pane, click Settings, and then click Virtual Appliance Management. 2. On the Virtual Appliance Management page, under the SSLCertificates section, click Upload Certificate. 3. Click Browse, and select an SSL certificate. 4.
The valid license type supported is Standard license. Standard license is a full-access license type. After uploading an initial license, you can upload subsequent licenses on the Virtual Appliance Management page. Subsequent uploads will replace the existing license. 1. In the left pane, click Settings, and then click Virtual Appliance Management. 2. On the Virtual Appliance Management page, under the License Management section, click Edit. 3.
The Virtual Identity Pools page displays the following information about the virtual identity pools that are configured in ASM: • Name — Displays the name of the virtual identity pool. • Description — Displays the description to identify the virtual identity pool. • Created By — Displays the name of the user who created the virtual identity pool. • Created Date — Displays the time that the virtual identity pool was created and last modified.
Adding virtual MAC identities Adding virtual IQN identities Adding virtual WWPN identities Adding virtual WWNN identities Adding virtual MAC identities 1. On the Virtual MAC page of the Create Virtual Identity Pool wizard, in the Number of Virtual MAC Identities box, type the total number of virtual MAC identities that you want to add (any whole number between 1 and 1,024). 2. From the MAC Address Prefix list, type the MAC address prefix to be added to the beginning of the MAC addresses. 3.
Adding virtual WWNN identities At a time, you can add as few as one and as many as 1,024 virtual WWNN identities. The maximum number of virtual WWNN identities that ASM can manage is 16,000. 1. On the Virtual WWNN page of the Create Virtual Identity Pool wizard, in Number of Virtual WWNN Identities type the total number of virtual WWNN identities that you want to add (any whole number between 1 and 1,024). 2.
Troubleshooting 9 This chapter includes details for resolving common issues encountered in ASM 8.0. For additional support information, go to http://support.dell.com/support/topics/topic.aspx/global/ shared/support/prosupport/en/prosupport-software-contacts?c=us&l=en&s=biz. LC operation times out while deploying server profile to a server While updating the server configuration using config XML, the LC job remains in the RUNNING state and eventually gets timed out.
Unable to deploy a service using the template with two Equallogic CHAP components Unable to deploy a service using the template with two EqualLogic CHAP components. In ASM 8.0 release, you cannot create a template with two EqualLogic CHAP components and deploy a service that includes ESXi hosts attached to storage. Currently, ESXi deployments support a single EqualLogic component.
In the above example: • 3000: Indicates Native PXE VLAN • 20,30,40: Indicates Management or vMotion or ISCSI In case of production environments with large networks, routers may be configured with IP Helper Addresses to point to a DHCP on another network.