Chassis Management Controller Version 1.
Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. © 2013 Dell Inc.
Contents 1 Overview.....................................................................................................................................13 Key Features........................................................................................................................................................... 14 Management Features..................................................................................................................................... 14 Security Features.............
Interfaces and Protocols to Access CMC.............................................................................................................. 32 Launching CMC Using Other Systems Management Tools............................................................................. 34 Downloading and Updating CMC Firmware........................................................................................................... 34 Setting Chassis Physical Location and Chassis Name...............................
Updating Chassis Infrastructure Firmware Using CMC Web Interface...........................................................47 Updating Chassis Infrastructure Firmware Using RACADM............................................................................48 Updating Server iDRAC Firmware.......................................................................................................................... 48 Updating Server iDRAC Firmware Using RACADM.......................................................
Enabling the CMC Network Interface.............................................................................................................. 64 Enabling or Disabling DHCP for the CMC Network Interface Address............................................................65 Enabling or Disabling DHCP for DNS IP Addresses.........................................................................................65 Setting Static DNS IP addresses...................................................................
Setting First Boot Device For Individual Server Using CMC Web Interface.................................................... 84 Setting First Boot Device Using RACADM....................................................................................................... 85 Configuring Server FlexAddress.............................................................................................................................85 Configuring Remote File Share.....................................................
System Requirements...........................................................................................................................................119 Client Systems................................................................................................................................................119 CMC................................................................................................................................................................
Wake-On-LAN with FlexAddress................................................................................................................... 138 Configuring FlexAddress for Chassis-Level Fabric and Slots........................................................................ 139 Viewing World Wide Name/Media Access Control (WWN/MAC) IDs.......................................................... 140 Command Messages............................................................................................
Remote Logging..............................................................................................................................................154 External Power Management........................................................................................................................ 154 Configuring Power Budget and Redundancy Using CMC Web Interface......................................................155 Configuring Power Budget and Redundancy Using RACADM.............................
First Steps to Troubleshoot a Remote System......................................................................................................170 Power Troubleshooting..................................................................................................................................170 Troubleshooting Alerts......................................................................................................................................... 172 Viewing Event Logs..........................
Overview 1 The Dell Chassis Management Controller (CMC) for Dell PowerEdge VRTX is a Systems Management hardware and software solution for managing the PowerEdge VRTX chassis. The CMC has its own microprocessor and memory and is powered by the modular chassis into which it is plugged.
– Storage components. – PCIe slots. You can configure CMC to send email alerts or SNMP trap alerts for warnings or errors such as temperature, hardware misconfiguration, power outage, fan speed, and blowers. Key Features The CMC features are grouped into management and security features. Management Features CMC provides the following management features: 14 • Redundant CMC environment. • Dynamic Domain Name System (DDNS) registration for IPv4 and IPv6.
• Configure storage components on the chassis. • Map PCIe slots to the servers and their identification. Security Features The CMC provides the following security features: • Password-level security management — Prevents unauthorized access to a remote system. • Centralized user authentication through: – Active Directory using Standard Schema or an Extended Schema (optional). – Hardware-stored user IDs and passwords.
Item Indicator, Button, or Connector 3 CMC connector ports (2) 4 Power indicator (CMC 2) 5 Status/identification indicator (CMC 2) A Back Panel view of the chassis is given here with a table that lists the parts and devices available in the CMC.
Item Indicator, Button, or Connector 10 PSU 1 11 PSU 2 A Front Panel view of the chassis is given here with a table that lists the parts and devices available in the CMC. Figure 1. Front-Panel Features And Indicators—3.5 Inch Hard Disk Drive Chassis Item Indicator, Button, or Connector Description 1 USB connectors (2) Allows a keyboard and mouse to be connected to the system.
Item Indicator, Button, or Connector Description 3.5 inch hard drive enclosure Up to twelve 3.5 inch hot-swappable hard disk drives. 7 Information tag A slide-out label panel which allows you to record system information such as Service Tag, NIC, MAC address, the system's electrical rating, and Worldwide Regulatory Agency marks. 8 Optical drive (optional) One optional SATA DVD-ROM drive or DVD+/-RW drive. 9 Vents Vents for the temperature sensor.
Supported Web Browsers For the latest information about supported web browsers, see the Dell Chassis Management Controller (CMC) Version 1.00 for Dell PowerEdge VRTX Release Notes located at dell.com/support/manuals. Managing Licenses The CMC features are available based on the license (CMC Express or CMC Enterprise) purchased. Only licensed features are available in the interfaces that allow you to configure or use CMC. For example, CMC Web interface, RACADM, WS-MAN, and so on.
• An evaluation license may be replaced with an upgraded evaluation license or with a purchased license. • A purchased license may be replaced with an updated license or with an upgraded license. • Learn More — Learn more about an installed license, or the licenses available for a component installed in the server. NOTE: For the Learn More option to display the correct page, make sure that *.dell.com is added to the list of Trusted Sites in the Security Settings.
CMC Serial Port Yes Yes Active Directory and LDAP No Yes Slot and Function Assignment (PCIe and Virtual Adapters) No Yes RACADM (SSH, Local, and Remote) Yes Yes WS-MAN Yes Yes SNMP Yes Yes Telnet Yes Yes SSH Yes Yes Web-based Interface Yes Yes Email Alerts Yes Yes LCD Deployment Yes Yes Extended iDRAC Management Yes Yes Enclosure Restore and Backup No Yes Server Module Firmware Update No Yes Remote Syslog No Yes Directory Services No* Yes iDRAC Single Sign-On
Virtual Adapter to Slot Mapping No* Yes Virtual Adapter to Slot UnMapping Yes Yes Server cloning No Yes One-to-many Server Firware Update No Yes One-to-many configuration for iDRAC No Yes *For non-default mapping of Virtual Adapters, only Default mapping is allowed with an Express license. Restore Default will change virtual adapter mapping to factory default.
• Dell systems management application documentation provides information about installing and using the systems management software. The following system documents provide more information about the system in which VRTX CMC is installed: • The safety instructions that came with your system provide important safety and regulatory information. For additional regulatory information, see the Regulatory Compliance home page at www.dell.com/ regulatory_compliance.
NOTE: You can also directly access the documents using the following links: 24 • For Enterprise System Management documents — dell.com/openmanagemanuals • For Remote Enterprise System Management documents — dell.com/esmmanuals • For Serviceability Tools documents — dell.com/serviceabilitytools • For Client System Management documents — dell.com/OMConnectionsClient • For OpenManage Connections Enterprise systems management documents — dell.
Installing and Setting Up CMC 2 This section provides information about how to install your CMC hardware, establish access to CMC, configure your management environment to use CMC, and guides you through the tasks for configuring a CMC: • Set up initial access to CMC. • Access CMC through a network. • Add and configure CMC users. • Update CMC firmware. For more information about installing and setting up redundant CMC environments, see Understanding Redundant CMC Environment.
NOTE: iDRAC LAN interface on some servers are disabled by default. This information can be found on the CMC web interface under Server Overview → Setup. This might be an advanced license option; in which case you must use the SetUp feature for each server). 9. Provide the IO module with an IP address in the CMC web interface. You can get the IP address by clicking I/O Module Overview, and then clicking Setup. 10. Connect to each iDRAC through the Web browser and provide final configuration of iDRAC.
NOTE: When using the RACADM remote capability, you must have the 'write' permission on the folders where you are using the RACADM subcommands, involving the file operations. For example, racadm getconfig -f . Uninstalling RACADM From a Linux Management Station 1. Log in as root to the system where you want to uninstall the management station features. 2. Run the following rpm query command to determine which version of the DRAC tools is installed: rpm -qa | grep mgmtst-racadm 3.
Mozilla FireFox To edit the exception list in Mozilla Firefox version 19.0: 1. Start Mozilla Firefox. 2. Click Tools → Options (for systems running on Windows), or click Edit → Preferences (for systems running on Linux). 3. Click Advanced, and then click the Network tab. 4. Click Settings. 5. Select Manual Proxy Configuration. 6. In the No Proxy for field, type the addresses for CMCs and iDRACs on the management network to the commaseparated list.
Enabling Animations In Internet Explorer When transferring files to and from the web interface, a file transfer icon spins to show transfer activity. While using Internet explorer, you have to configure the browser to play animations. To configure Internet Explorer to play animations: 1. Start Internet Explorer. 2. Click Tools → Internet Options → Advanced . 3. Go to the Multimedia section, and then select the Play animations in web pages option.
CMC supports both IPv4 and IPv6 addressing modes. The configuration settings for IPv4 and IPv6 are independent of each other. Configuring CMC Network Using LCD Panel Interface Configuring CMC Using Quick Setup (DHCP) NOTE: You can customize the orientation of an LCD display (for rack or tower mode) by keeping the up-down buttons pressed for two seconds. Alternately, you can also use the right-left buttons. For more information about the buttons available on a CMC LCD panel, see LCD Navigation.
NOTE: The network speed and duplex mode settings are not available if Auto Negotiation is set to On, or if 1000MB (1Gbps) is selected. If auto negotiation is turned on for one device but not the other, the device that is using auto negotiation can determine the network speed of the other device, but not the duplex mode. In this case, half duplex is selected as the duplex mode during auto negotiation. Such a duplex mismatch results in a slow network connection. 6.
e. When you have confirmed the accuracy of the settings you entered, go to step 10. 14. Select Enable or Disable to indicate whether or not you want to enable IPMI over LAN. Press the center button to continue. 15. On the iDRAC Configuration panel, the following message is displayed. Apply settings to installed servers? To apply all iDRAC network settings to the installed servers, select Yes , and then press the center button.
Interface Description • Chassis LCD Panel Use the LCD on the front panel to: • • • Telnet managed system and uses the HTTPs channel. The –r option runs the RACADM command over a network. Firmware RACADM is accessible by logging in to CMC using SSH or Telnet. You can run the firmware RACADM commands without specifying the CMC IP, user name, or password. After you enter the RACADM prompt, you can directly run the commands without the racadm prefix.
Interface Description For client connection using Microsoft WinRM, the minimum required version is 2.0. For more information, refer to the Microsoft article, . NOTE: The default values of CMC user name and password are root and calvin respectively. Launching CMC Using Other Systems Management Tools You can also launch CMC from the Dell Server Administrator or Dell OpenManage Essentials.
Setting Date and Time on CMC Using CMC Web Interface To set the date and time on CMC: 1. In the left pane, click Chassis Overview → Setup → Date/Time . 2. To synchronize the date and time with a Network Time Protocol (NTP) server, on the Date/Time page, select Enable NTP and specify up to three NTP servers. To manually set the date and time, clear the Enable NTP option, and then edit the Date and Time fields. 3. Select the Time Zone from the drop-down menu, and then click Apply.
• server-n where n = 1-4 • switch-1 • cmc-active and specifies whether or not the LED should blink. Configuration options: • 0 — not blinking (default) • 1 — blinking racadm raid , where the operation value is blink or unblink, and the FQDD is for the component's physical disk drive and virtual disk.
CMC Failsafe Mode Similar to the failover protection offered by the redundant CMC, the PowerEdge VRTX enclosure enables the fail-safe mode to protect the servers and I/O module from not functioning. The fail-safe mode is enabled when a CMC is not in control of the chassis. During the CMC failover period, or during a single CMC management loss: • You cannot turn on the newly installed servers. • You cannot remotely access existing servers.
Configuring Power Button To configure the chassis power button: 1. In the left pane, click Chassis Overview → Front Panel → Setup. 2. On the Front Panel Configuration page, under the Power Button Configuration section, select the Disable Chassis Power Button option, and then click Apply. The chassis power button is disabled. Configuring LCD 1. In the left pane, clickChassis Overview → Front Panel → Setup . 2.
Mapping a Server to a DVD Drive To map the server to the chassis DVD drive: 1. In the left pane, click Chassis Overview → Front Panel → Setup . 2. On the Front Panel Configuration page, under the DVD Drive Configuration section: From the DVD Mapped drop-down menu, select one of the servers. Select the servers for which chassis DVD drive access is required. 3. Click Apply.
Logging in to CMC 3 You can log in to CMC as a CMC local user, as a Microsoft Active Directory user, or as an LDAP user. The default user name and password is root and calvin respectively. You can also log in using Single Sign-On or a Smart Card. Accessing CMC Web Interface Before you log in to CMC using the web interface, make sure that you have configured a supported web browser (Internet Explorer or Firefox) and the user account is created with the required privileges.
– CMC user name: – Active Directory user name: \, / or @. – LDAP user name: NOTE: This field is case-sensitive. 2. In the Password field, type the user password. NOTE: For Active Directory user, the Username field is case-sensitive. 3. Optionally, select a session timeout. This is the duration for which you can stay logged in with no activity before you are automatically logged out.
Logging Into CMC Using Single Sign-on When Single Sign-On (SSO) is enabled, you can log in to CMC without providing your domain user authentication credentials, such as user name and password. To use this feature, you must have an Enterprise License. NOTE: You cannot use the IP address to log in to the SSO. Kerberos validates your credentials against the Fully Qualified Domain Name (FQDN).
• Firmware RACADM — Allows you to log in to the CMC using Telnet, SSH, or a serial connection. With firmware RACADM, you can the RACADM implementation that is part of the CMC firmware. You can use remote RACADM commands in scripts to configure multiple CMCs. You cannot run the scripts directly on the CMC web interface, because CMC does not support it. For more information about RACADM, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide.
Updating Firmware 4 You can update firmware for: • CMC — active and standby • Chassis infrastructure • I/O Module • iDRAC7 You can update firmware for the following server components: • iDRAC • BIOS • Lifecycle Controller • 32–bit diagnostics • Operating System Drivers Pack • Network Interface Controllers • RAID controllers Downloading CMC Firmware Before beginning the firmware update, download the latest firmware version from support.dell.com, and save it to your local system.
Viewing Currently Installed Firmware Versions Using RACADM To view the IP information for iDRAC and CMC, and the CMC service- or asset tag using RACADM, run the racadm getsysinfo sub-command. For more information about other RACADM commands, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide. Updating the CMC Firmware You can update the CMC firmware using web interface or RACADM. The firmware update, by default, retains the current CMC settings.
Updating CMC Firmware Using Web Interface NOTE: Before you update the CMC firmware, make sure that you turn on the chassis, but turn off all the servers in the chassis. To update the CMC firmware using the CMC web interface: 1. In the left pane, go to any of the following pages: – Chassis Overview → Update – Chassis Overview → Chassis Controller → Update 2.
– Chassis Overview → Chassis Controller → Update . 2. On the Firmware Update page, in the Chassis Infrastructure Firmware section, in the Update Targets column, select the option, and then click Apply Chassis Infrastructure Firmware. 3. On the Firmware Update page, click Browse, and then select the appropriate chassis infrastructure firmware. 4. Click Begin Firmware Update, and then click Yes. The Firmware Update Progress section provides firmware update status information.
NOTE: You can also update server iDRAC firmware using Chassis Overview → Server Overview → Update . For more information, see Updating Server Component Firmware. 2. To update the iDRAC7 firmware, in the iDRAC7 Firmware section, click the Update link of the server for which you want to update the firmware. The Server Component Update page is displayed. To continue, see Updating Server Component Firmware. 3.
You can also install Lifecycle Controller firmware through an appropriate installation package executed on the server OS. For more information, see the Dell Lifecycle Controller User’s Guide. If Lifecycle Controller service is disabled on the server, the Component/Device Firmware Inventory section displays Lifecycle Controller may not be enabled.
• If the BIOS filter is selected, only the BIOS inventory of all the servers is displayed. If the set of servers consists of a number of server models, and a server is selected for BIOS update, the automatic filtering logic automatically removes all the other servers that do not match with the model of the selected server. This makes sure that the selection of the BIOS firmware update image (DUP) is compatible with the correct model of the server.
NOTE: To use this feature, you must have an Enterprise License. Viewing Firmware Inventory Using CMC Web Interface To view the firmware inventory: 1. In the left pane, click Server Overview, and then click Update . 2. On the Server Component Update page, view the firmware inventory details in the Component/Device Firmware Inventory section. On this page, you can view the following information: – Servers that currently do not support the Lifecycle Controller service are listed as Not Supported.
Field Description Current Version Displays the current version of component or device on the server. Rollback Version Displays the rollback version of component or device on the server. Job Status Displays the job status of any operations that are scheduled on the server. The job status is continuously updated dynamically.
proper completion. After an operation has been submitted for scheduling, ensure that the confirmation message indicating that the operation has been successfully scheduled is acknowledged. Reinstalling Server Component Firmware You can reinstall the firmware image of the currently installed firmware for selected components or devices across one or more servers. The firmware image is available within the Lifecycle Controller.
NOTE: For iDRAC and Operating System Driver packs firmware update, make sure the Extended Storage feature is enabled. It is recommended to clear the job queue before initializing a server component firmware update. A list of all jobs on the servers is available on the Lifecycle Controller Jobs page. This page enables deletion of single or multiple jobs or purging of all jobs on the server. BIOS updates are specific to the model of the server.
NOTE: This task is not valid for Lifecycle Controller and 32–bit Diagnostics firmware update. A server restart operation is performed immediately for these devices. 6. Click Update. The firmware version is updated for the selected component or device. Deleting Scheduled Server Component Firmware Jobs NOTE: To use this feature, you must have an Enterprise License. You can delete jobs scheduled for the selected components and/or devices across one or more servers.
Viewing Chassis Information and Monitoring Chassis and Component Health 5 You can view information and monitor the health of the following: • Active and standby CMCs • All severs and individual servers • IO Module • Fans • Power Supply Units (PSUs) • Temperature sensors • Hard disk drives • LCD assembly • Storage controllers • PCIe devices Viewing Chassis and Component Summaries When you log in to the CMC web interface, the Chassis Health page displays the health of the chassis and its
Chassis Graphics The chassis is represented by the front and back views (the upper and lower images respectively). Servers, DVDs, HDDs, KVMs, and LCD are shown in the front view and the remaining components are shown in the back view. Component selection is indicated by a blue cast and is controlled by clicking the image of the required component.
• Health and Performance, and Properties — Displays the active, critical, and non-critical events as displayed by the hardware logs and the performance data that vary with time. • Properties — Displays the component properties that do not vary with time, or that change only infrequently. • Quick Links — Provides links to navigate to the most frequently accessed pages, and also the most frequently performed actions. Only links applicable to the selected component are displayed in this section.
Viewing Information and Health Status of Fans CMC controls the speed of the chassis fan by increasing or decreasing the fan speed on the basis of system events. You can run the fan in three modes such as Low, Medium, and High. For more information about configuring a fan, see the Online Help. To set up the properties of fans by using RACADM commands, type the following command at the CLI interface.
Using the Medium Fan Offset setting for example, increases the speed of fans 1–6 by 50% of its maximum speed. The increase is above the speed already set by the system for cooling on the basis of installed hardware configuration. With any of the Fan Offset options enabled, the power consumption will be increased. The system will be louder with the Low offset, noticeably louder with the Medium offset, and significantly louder with the High offset.
KVM sub-graphic and a corresponding text hint or screen tip is displayed. The text hint provides additional information about the KVM. Click the KVM sub-graphic to view the KVM information in the right pane. 2. Alternatively, click Chassis Overview → Front Panel. On the Status page, under the KVM Properties section, you can view the status and properties of a KVM associated with the chassis. For more information, see the Online Help.
Configuring CMC 6 Chassis Management Controller enables you to configure properties, set up users, and alerts to perform remote management tasks. Before you begin configuring the CMC, you must first configure the CMC network settings to allow CMC to be managed remotely. This initial configuration assigns the TCP/IP networking parameters that enable access to the CMC. For more information, see Setting Up Initial Access to CMC. You can configure CMC using Web interface or RACADM.
NOTE: You must have Chassis Configuration Administrator privilege to set up CMC network settings. Viewing and Modifying CMC Network LAN Settings Using CMC Web Interface To view and modify the CMC LAN network settings using CMC Web interface: 1. In the left pane, click Chassis Overview, and then click Network. The Network Configuration page displays the current network settings. 2. Modify the general, IPv4, or IPv6 settings as required. For more information, see the Online Help. 3.
By default, for IPv4, the CMC requests and automatically obtains a CMC IP address from the Dynamic Host Configuration Protocol (DHCP) server. You can disable the DHCP feature and specify static CMC IP address, gateway, and subnet mask.
For IPv6, to set the preferred and secondary DNS IP Server addresses, type: racadm config -g cfgIPv6LanNetworking -o cfgIPv6DNSServer1 racadm config -g cfgIPv6LanNetworking -o cfgIPv6DNSServer2 Configuring DNS Settings (IPv4 and IPv6) • CMC Registration — To register the CMC on the DNS server, type: racadm config -g cfgLanNetworking -o cfgDNSRegisterRac 1 NOTE: Some DNS servers only register names of 31 characters or fewer.
NOTE: IPv6 requires a minimum MTU of 1280. If IPv6 is enabled, and cfgNetTuningMtu is set to a lower value, the CMC uses an MTU of 1280. Configuring Network Security Settings You can configure the network security settings for IPv4 only. Configuring Network Security Settings Using CMC Web Interface NOTE: To perform the following tasks, you must have the Chassis Configuration Administrator privilege. To configure the network security settings using CMC Web interface: 1.
3. Then, specify the VLAN priority for the external chassis management network: racadm config -g cfgLanNetworking -o cfgNicVLanPriority The valid values for are 0–7. Default value is 0. For example: racadm config -g cfgLanNetworking -o cfgNicVLanPriority 7 You can also specify both the VLAN ID and the VLAN priority with a single command: racadm setniccfg -v For example: racadm setniccfg -v 1 7 4.
(Server ID), and is responsible for accepting and responding to secure HTTP requests from clients. This service is required by the web interface and remote RACADM CLI tool for communicating with CMC. If the web server resets, wait at least one minute for the services to become available again. A web server reset usually happens as a result of any of the following events: • Network configuration or network security properties are changed through the CMC web user interface or RACADM.
For example: $ racadm getconfig -g cfgSessionManagement -m server-1 # cfgSsnMgtWebServerMaxSessions=N/A # cfgSsnMgtWebServerActiveSessions=N/A # cfgSsnMgtWebServerTimeout=N/A # cfgSsnMgtSSHMaxSessions=N/A # cfgSsnMgtSSHActiveSessions=N/A # cfgSsnMgtSSHTimeout=N/A # cfgSsnMgtTelnetMaxSessions=N/A # cfgSsnMgtTelnetActiveSessions=N/A # cfgSsnMgtTelnetTimeout=N/A Configuring CMC Extended Storage Card You can enable or repair the optional Removable Flash Media for use as an extended non-volatile storage.
3. On the Chassis Group page, under Role, select Leader. A field to add the group name is displayed. 4. Type the group name in the Group Name field, and then click Apply. NOTE: The same rules that apply for a domain name apply to the group name. When the chassis group is created, the GUI automatically switches to the Chassis Group page. The left pane indicates the group by the group name and the lead chassis, and the unpopulated member chassis appear in the left pane.
3. Click Setup → Group Administration. 4. In the Chassis Group page, under Role, select None, and then click Apply. The lead chassis then communicates to all the members that they have been removed from the group. The lead chassis can be assigned as a leader or member of a new group. If a network issue prevents contact between the leader and the member, the member chassis may not receive the message. In this case, disable the member from the member chassis to complete the removal process.
Table 6. Configuration Service Properties Property Navigation SNMP configuration In the left pane, click Chassis Overview → Network → Services → SNMP. Chassis remote logging In the left pane, click Chassis Overview → Network → Services → Remote Syslog. User authentication using LDAP and Active Directory services In the left pane, click Chassis Overview → User Authentication → Directory Services . Chassis alerts In the left pane, click Chassis Overview, and then click Alerts.
The following table lists the specific data fields and specific requirements for fields to be reported for each server: Table 7. Server Module Inventory Field Descriptions Data Field Example Chassis Name Data Center Chassis Leader Chassis IP Address 192.168.0.1 Slot Location 1 Slot Name SLOT-01 Host Name Corporate Webserver NOTE: Requires a Server Administrator agent running on the Server; otherwise shown as blank.
NOTE: Some configuration files contain unique CMC information (such as the static IP address) that must be modified before you export the file to other CMCs. 1. Use RACADM to query the target CMC that contains the desired configuration. NOTE: The generated configuration file is myfile.cfg. You can rename the file. The .cfg file does not contain user passwords. When the .cfg file is uploaded to the new CMC, you must re-add all passwords. 2.
The parser reads in all of the indexes from the CMC for that group. Any objects within that group are modifications when the CMC is configured. If a modified object represents a new index, the index is created on the CMC during configuration. • You cannot specify a desired index in a .cfg file. Indexes may be created and deleted. Over time, the group may become fragmented with used and unused indexes. If an index is present, it is modified. If an index is not present, the first available index is used.
Any character to the right of the = (for example, a second =, a #, [, ], and so on) is taken as-is. These characters are valid modem chat script characters. [cfgLanNetworking] -{group name} cfgNicIpAddress=143.154.133.121 {object value} • The .cfg parser ignores an index object entry. You cannot specify which index is used. If the index already exists, it is either used or the new entry is created in the first available index for that group. The racadm getconfig -f .
This file is updated as follows: # # Object Group "cfgLanNetworking" # [cfgLanNetworking] cfgNicIpAddress=10.35.9.143 # comment, the rest of this line is ignored cfgNicGateway=10.35.9.1 The command racadm config -f .cfg parses the file and identifies any errors by line number. A correct file updates the proper entries. Additionally, you can use the same getconfig command from the previous example to confirm the update.
Configuring Servers 7 You can configure the following settings of a server: • Slot Names • iDRAC Network Settings • DRAC VLAN Tag Settings • First Boot Device • Server FlexAddress • Remote File Share • BIOS Settings Using Server Clone Configuring Slot Names Slot names are used to identify individual servers. When choosing slot names, the following rules apply: • Names may contain a maximum of 15 non-extended ASCII characters (ASCII codes 32 through 126).
3. To use a server’s host name as slot name, select the Use Host Name for the Slot name option. This overrides the static slot names with the server’s Host Name (or system name), if available. This requires the OMSA agent to be installed on the server. For more information about the OMSA agent, see the Dell OpenManage Server Administrator User's Guide available at dell.com/support/manuals. 4. To save the settings, click Apply.
Setting Description Enable iDRAC IPMI over LAN Enables or disables the IPMI over LAN channel for each iDRAC present in the chassis. By default, this option is selected. Enable iDRAC IPv4 DHCP Enables or disables DHCP for each iDRAC present in the chassis. If this option is enabled, the fields QuickDeploy IP, QuickDeploy Subnet Mask, and QuickDeploy Gateway are disabled, and cannot be modified since DHCP is used to automatically assign these settings for each iDRAC.
to allow or not allow the password change. If there are network configuration settings that differ from the current iDRAC settings, the user is prompted to either accept or reject the changes. NOTE: If there is a LAN or IPMI over LAN difference, the user is prompted to accept the QuickDeploy IP address setting. If the difference is the DHCP setting, the user is prompted to accept the DHCP QuickDeploy setting.
For more information about the property default values and ranges, see the RACADM Command Line Reference Guide for iDRAC7 and CMC available at dell.com/support/manuals. Configuring iDRAC VLAN Tag Settings VLANs are used to allow multiple virtual LANs to co-exist on the same physical network cable and to segregate the network traffic for security or load management purposes. When you enable the VLAN functionality, each network packet is assigned a VLAN tag. VLAN tags are chassis properties.
the first boot device in the BIOS boot order, until it is changed again either from the CMC web interface or from the BIOS boot sequence. NOTE: The first boot device setting in CMC web Interface overrides the system BIOS boot settings. The boot device that you specify must exist and contain a bootable media. You can set the following devices for first boot. Table 9. Boot Devices Boot Device Description PXE Boot from a Preboot Execution Environment (PXE) protocol on the Network Interface Card.
To set the first boot device for individual servers: 1. In the left pane, click Server Overview, and then click the server for which you want to set the first boot device. 2. Go to Setup → First Boot Device. The First Boot Device page is displayed. 3. From the First Boot Device drop-down menu, select the boot device you want to use for each server. 4. If you want the server to boot from the selected device every time it boots, clear the Boot Once option for the server.
Configuring BIOS Settings Using Server Clone The server cloning feature allows you to apply all BIOS settings from a specified server to one or more servers. Only the BIOS settings that can be modified and intended to be replicated across servers can cloned. To use this feature, you must have an Enterprise License. The server cloning feature supports iDRAC7 Servers. Earlier generation RAC servers are listed, but are greyed out on the main page, and are not enabled to use this feature.
1. In the left pane, click Chassis Overview → Server Overview → Setup → Profiles. 2. On the BIOS Profiles page, in the Apply Profile section, click Manage Profiles. The Manage BIOS Profiles page is displayed. • To edit a profile, click Edit. • To view BIOS settings, click View. • To delete a profile, click Delete. For more information about the field descriptions, see the Online Help.
Completion Status And Troubleshooting To check the completion status of an applied BIOS profile: 1. In the left pane, click Chassis Overview → Server Overview → Setup → Profiles. 2. On the BIOS Profiles page, note down the Job ID (JID) of the submitted job from the Recent Profile Log section. 3. In the left pane, click Server Overview → Troubleshooting → Lifecycle Controller Jobs. Search for the same JID in the Jobs table.
Launching iDRAC from Servers Status Page To launch the iDRAC management console from the Servers Status page: 1. In the left pane, click Server Overview. 2. On the Servers Status page, click Launch iDRAC for the server you want to launch the iDRAC Web interface. Launching Remote Console You can launch a Keyboard-Video-Mouse (KVM) session directly on the server. The remote console feature is supported only when all of the following conditions are met: • The chassis power is on.
Configuring CMC To Send Alerts 8 You can set alerts and actions for certain events that occur on the chassis. An event occurs when the status of a system component is greater than the pre-defined condition. If an event matches an event filter and you have configured this filter to generate an alert message (email alert or SNMP trap), then an alert is sent to one or more configured destinations such as email address, IP address, or an external server. To configure CMC to send alerts: 1.
NOTE: To apply chassis events configuration changes, you must have the Alert Configuration privilege. 1. In the left pane, click Chassis Overview → Alerts. 2. On the Chassis Events page, under the Alerts Filter section, select one or more of the following categories: 3. – System Health – Storage – Configuration – Audit – Updates Select one or more of the following severity levels: 4. – Critical – Warning – Informational Click Apply.
management stations. The community string on the Chassis Overview → Network → Services page is the community string that management stations use to query the SNMP daemon on CMC. – 3. 4. Under Enabled , select the option corresponding to the destination IP to enable the IP address to receive the traps. You can specify up to four IP addresses. Click Apply to save the settings. To test whether the IP address is receiving the SNMP traps, click Send in the Test SNMP Trap column.
7. To test an event trap for an alert destination, type: racadm testtrap -i where is a value between 1–4 representing the alert destination you want to test. If you are not sure about the index number, run the following command: racadm getconfig -g cfgTraps -i Configuring E-Mail Alert Settings When CMC detects a chassis event, such as an environmental warning or a component failure, it can be configured to send an e-mail alert to one or more e-mail addresses.
where is a value between 1–4. CMC uses the index number to distinguish up to four destination email addresses that can be configured. 5. Specify a destination email address to receive the email alerts: racadm config -g cfgEmailAlert -o cfgEmailAlertAddress -i where is a valid email address, and is the index value you specified in step 4. 6.
Configuring User Accounts and Privileges 9 You can setup user accounts with specific privileges (role-based authority) to manage your system with CMC and maintain system security. By default, CMC is configured with a local administrator account. The default user name is rootand the password is calvin. As an administrator, you can set up user accounts to allow other users to access the CMC.
Privilege Description themselves. For this reason, slot names and slot priorities can be added or changed whether or not servers are present in the slots. When a server is moved to a different chassis, it inherits the slot name and priority assigned to the slot it occupies in the new chassis. The previous slot name and priority remain with the previous chassis. NOTE: CMC users with the Chassis Configuration Administrator privilege can configure power settings.
Privilege Description chassis user does not have the Server Administrative privilege on the chassis. Server Configuration Administrator: • • • • Set IP address Set gateway Set subnet mask Set first boot device Configure Users: • • Set iDRAC root password iDRAC reset Server Control Administrator: • • • • • Power on Power off Power cycle Graceful shutdown Server Reboot Test Alert User User can send test alert messages. Debug Command Administrator User can execute system diagnostic commands.
User Group Privileges Granted Power User • Fabric A Administrator • • • • • • Login Clear Logs Administrator Chassis Control Administrator (Power commands) Server Administrator Test Alert User Fabric A Administrator Guest User Login Custom Select any combination of the following permissions: • • • • • • • • • None CMC Login User Chassis Configuration Administrator User Configuration Administrator Clear Logs Administrator Chassis Control Administrator (Power commands) Server Administrator Test Al
Modifying Root User Administrator Account Settings For added security, it is strongly recommended that you change the default password of the root (User 1) account. The root account is the default administrative account that is shipped with CMC. To change the default password for the root account: 1. In the left pane, click Chassis Overview, and then click User Authentication. 2. On the Users page, in the User ID column, click 1.
To verify if a user exists, open a Telnet/SSH text console to the CMC, log in, and then type the following command once for each index of 1–16: racadm getconfig -g cfgUserAdmin -i NOTE: You can also type racadm getconfig -f and view or edit the myfile.cfg file, which includes all the CMC configuration parameters. Several parameters and object IDs are displayed with their current values.
Disabling CMC User When using RACADM, users must be disabled manually on an individual-basis. Users cannot be deleted using a configuration file. To delete a CMC user, the command syntax is: racadm config -g cfgUserAdmin -o cfgUserAdminUserName -i "" racadm config -g cfgUserAdmin -i 2 -o cfgUserAdminPrivilege 0x0 A null string of double quotation marks ("") instructs CMC to remove the user configuration at the specified index, and then reset the user configuration to the factory default values.
Standard Schema Active Directory Overview As shown in the following figure, using standard schema for Active Directory integration requires configuration on both Active Directory and CMC. In Active Directory, a standard group object is used as a role group. A user who has CMC access is a member of the role group. To give this user access to a specific CMC card, the role group name and its domain name need to be configured on the specific CMC card.
Configuring Standard Schema Active Directory To configure CMC for an Active Directory login access: 1. On an Active Directory server (domain controller), open Active Directory Users and Computers Snap-in. 2. Using the CMC Web interface or RACADM: a) Create a group or select an existing group. b) Configure the role privileges. 3. Add the Active Directory user as a member of the Active Directory group to access CMC.
Configuring Active Directory With Standard Schema Using RACADM At the RACADM command prompt, run the following commands: – Using config command: racadm config -g cfgActiveDirectory -o cfgADEnable 1 racadm config -g cfgActiveDirectory -o cfgADType 2 racadm config -g cfgStandardSchema -i -o cfgSSADRoleGroupName racadm config -g cfgStandardSchema -i -o cfgSSADRoleGroupDomain racadm config -g cfgStandardSchema -i -o cfgSSADRo
NOTE: If certificate validation is enabled, specify the Domain Controller Server addresses and the Global Catalog FQDN. Make sure that DNS is correctly configured. Extended Schema Active Directory Overview Using the extended schema solution requires the Active Directory schema extension. Active Directory Schema Extensions The Active Directory data is a distributed database of attributes and classes.
Additionally, you can configure Active Directory objects in a single domain or in multiple domains. For example, you have two CMCs (RAC1 and RAC2) and three existing Active Directory users (user1, user2, and user3). You want to give user1 and user2 an administrator privilege to both CMCs and give user3 a login privilege to the RAC2 card. When adding Universal Groups from separate domains, create an Association Object with Universal Scope.
• LDIF script file If you use the LDIF script file, the Dell organizational unit is not added to the schema. The LDIF files and Dell Schema Extender are located on your Dell Systems Management Tools and Documentation DVD in the following respective directories: • DVDdrive:\SYSMGMT\ManagementStation\support\OMActiveDirectory_Tools\Remote_Management_Advanced \LDIF_Files • :\SYSMGMT\ManagementStation\support\OMActiveDirector y_Tools \Remote_Management_Advanced\Schema Extender To use the LDIF fi
OID 1.2.840.113556.1.8000.1280.1.7.1.1 Attributes dellSchemaVersion dellRacType Table 16. delliDRACAssociationObject Class OID 1.2.840.113556.1.8000.1280.1.7.1.2 Description Represents the Dell Association Object. The Association Object provides the connection between the users and the devices. Class Type Structural Class SuperClasses Group Attributes dellProductMembers dellPrivilegeMember Table 17. dellRAC4Privileges Class OID 1.2.840.113556.1.8000.1280.1.1.1.
Table 19. dellProduct Class OID 1.2.840.113556.1.8000.1280.1.1.1.5 Description The main class from which all Dell products are derived. Class Type Structural Class SuperClasses Computer Attributes dellAssociationMembers Table 20. List of Attributes Added to the Active Directory Schema Assigned OID/Syntax Object Identifier Single Valued Attribute: dellPrivilegeMember FALSE Description: List of dellPrivilege objects that belong to this attribute. OID: 1.2.840.113556.1.8000.1280.1.1.2.
Assigned OID/Syntax Object Identifier Single Valued Attribute: dellIsServerResetUser TRUE Description: TRUE if the user has Server Reset rights on the device. OID: 1.2.840.113556.1.8000.1280.1.1.2.7 Boolean (LDAPTYPE_BOOLEAN 1.3.6.1.4.1.1466.115.121.1.7) Attribute: dellIsTestAlertUser TRUE Description: TRUE if the user has Test Alert User rights on the device. OID: 1.2.840.113556.1.8000.1280.1.1.2.10 Boolean (LDAPTYPE_BOOLEAN 1.3.6.1.4.1.1466.115.121.1.
When you install your systems management software using the Dell Systems Management Tools and Documentation DVD, you can extend the Snap-in by selecting the Active Directory Users and Computers Snap-in option during the installation procedure. See the Dell OpenManage Software Quick Installation Guide for additional instructions about installing systems management software. For 64-bit Windows Operating Systems, the Snap-in installer is located at :\SYSMGMT\ManagementStation\support\OMActiveDirect o
Adding Objects To Association Object Using the Association Object Properties window, you can associate users or user groups, privilege objects, and RAC devices or RAC device groups. If your system is running on Microsoft Windows 2000 operating system or later version, use Universal Groups to span domains with your user or RAC objects. You can add groups of Users and RAC devices. Adding Users Or User Groups To add users or user groups: 1. Right-click the Association Object and select Properties. 2.
4. Click Apply to save the settings. NOTE: You must apply the settings before continuing. If you do not apply the settings, the settings are lost when you navigate to the next page. 5. In the Extended Schema Settings section, type the CMC device name and the domain name. 6. If you have enabled certificate validation, you must upload the domain forest root certificate authority-signed certificate to CMC.
NOTE: In this case, you do not have to upload a CA certificate. To enforce the certificate validation during SSL handshake (optional): racadm config -g cfgActiveDirectory -o cfgADCertValidationEnable 1 In this case, you must upload a CA certificate: racadm sslcertupload -t 0x2 -f < ADS root CA certificate > NOTE: If certificate validation is enabled, specify the Domain Controller Server addresses and the FQDN. Make sure that DNS is configured correctly under.
Authorization Of LDAP Users To authorize a user: 1. Search each configured group for the user's domain name within the member or uniqueMember attributes. An administrator can configure a user domain. 2. For every user group that the user belongs to, give the user appropriate user access rights and privileges. Configuring Generic LDAP Directory Service Using CMC Web Interface To configure the generic LDAP directory service: NOTE: You must have the Chassis Configuration Administrator privilege. 1.
Configuring Generic LDAP Directory Service Using RACADM To configure the LDAP directory service, use the objects in cfgLdap and cfgLdapRoleGroup RACADM groups. There are many options to configure LDAP logins. In most of the cases, some options can be used with their default settings. NOTE: It is highly recommended to use the racadm testfeature -f LDAP command to test the LDAP settings for first time setups. This feature supports both IPv4 and IPv6.
Configuring CMC For Single Sign-On Or Smart Card Login 10 This section provides information to configure CMC for Smart Card login and Single Sign-On (SSO) login for Active Directory users. SSO uses Kerberos as an authentication method allowing users, who have signed in as an automatic- or single sign-on to subsequent applications such as Exchange.
CMC • Each CMC must have an Active Directory account. • CMC must be a part of the Active Directory domain and Kerberos Realm. Prerequisites For Single Sign-On Or Smart Card Login The pre-requisites to configure SSO or Smart Card logins are: • Setup the kerberos realm and Key Distribution Center (KDC) for Active Directory (ksetup). • A robust NTP and DNS infrastructure to avoid issues with clock drift and reverse lookup.
For information about configuring CMC for Extended Schema Active Directory, see Extended Schema Active Directory Overview. Configuring Browser For SSO Login Single Sign-On (SSO) is supported on Internet Explorer versions 6.0 and later, and Firefox versions 3.0 and later. NOTE: The following instructions are applicable only if CMC uses Single Sign-On with Kerberos authentication. Internet Explorer To configure Internet Explorer for Single Sign-On: 1.
NOTE: For information about the options, see the Online Help. 1. While configuring Active Directory to setup a user account, perform the following additional steps: – Upload the keytab file. – To enable SSO, select the Enable Single Sign-On option. – To enable smart card login, select the Enable Smart-Card Login option. NOTE: If these two options are selected, all command line out-of-band interfaces, including secure shell (SSH), Telnet, Serial, and remote RACADM remain unchanged . 2. Click Apply.
11 Configuring CMC to Use Command Line Consoles This section provides information about the CMC command line console (or serial/Telnet/Secure Shell console) features, and explains how to set up the system so that you can perform systems management actions through the console. For information about using the RACADM commands in CMC through the command line console, see Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide.
If your management station is running Microsoft Windows XP or Microsoft Windows Server 2003, you may experience an issue with the characters in a CMC Telnet session. This issue may occur as a frozen login where the return key does not respond and the password prompt does not appear. To fix this issue, download hotfix 824810 from support.microsoft.com. For more information, you can also see Microsoft Knowledge Base article 824810.
Scheme Type Message Integrity Authentication Scheme • ARCFOUR-128 • • • • HMAC-SHA1-160 HMAC-SHA1-96 HMAC-MD5-128 HMAC-MD5-96 Password Configure Public Key Authentication Over SSH You can configure up to six public keys that can be used with the service username over an SSH interface. Before adding or deleting public keys, make sure to use the view command to see what keys are already set up, so that a key is not accidentally overwritten or deleted.
3. Click Generate and move the mouse in the window as directed. After the key is created, you can modify the key comment field. You can also enter a passphrase to make the key secure. Ensure that you save the private key. 4. You have two options for using the public key: – Save the public key to a file to upload later. – Copy and paste the text from the Public key for pasting window when adding the account using the text option.
To delete all public keys, run the following command: racadm sshpkauth –i svcacct –k all –d Configuring Terminal Emulation Software CMC supports a serial text console from a management station running one of the following types of terminal emulation software: • Linux Minicom. • Hilgraeve’s HyperTerminal Private Edition (version 6.3). Complete the tasks in the following subsections to configure the required type of terminal software.
Table 23. Minicom Settings Setting Description Required Setting Bps/Par/Bits 115200 8N1 Hardware flow control Yes Software flow control No Terminal emulation ANSI Modem dialing and parameter settings Clear the init, reset, connect, and hangup settings so that they are blank Connecting to Servers or I/O Module Using Connect Command CMC can establish a connection to redirect the serial console of a server or I/O module.
communication is assumed and the escape character is disabled. If the iDRAC is not available, the No route to host error message is displayed. The connect server-n command enables the user to access the server's serial port. After this connection is established, the user can view the server's console redirection through CMC's serial port that includes both the BIOS serial console and the operating system serial console.
Edit the /etc/grub.conf file as follows: 1. Locate the general setting sections in the file and type the following two new lines: serial --unit=1 --speed=57600 terminal --timeout=10 serial 2. Append two options to the kernel line: kernel console=ttyS1,57600 3. If the /etc/grub.conf contains a splashimage directive, comment it out. The following example shows the changes described in this procedure. # grub.
The following example shows the file with the new line. # # inittab This file describes how the INIT process # should set up the system in a certain # run-level. # # Author: Miquel van Smoorenburg # Modified for RHS Linux by Marc Ewing and # Donnie Barnes # # Default runlevel.
Add a new line, with the name of the serial tty for COM2: ttyS1 The following example shows a sample file with the new line.
Using FlexAddress and FlexAdress Plus Cards 12 This section provides information about FlexAddress, FlexAddress Plus Cards, and configuring and using these the cards. NOTE: The FlexAddress feature is licensed, and you must an Enterprise License to use this. About FlexAddress The FlexAddress feature is an optional upgrade that allows server modules to replace the factory-assigned World Wide Name and Media Access Control (WWN/MAC) network IDs with WWN/MAC IDs provided by the chassis.
chassis to assign World Wide Name/Media Access Control (WWN/MAC) addresses to Fibre Channel and Ethernet devices. Chassis assigned WWN/MAC addresses are globally unique and specific to a server slot. Activating FlexAddress FlexAddress is delivered on a Secure Digital (SD) card that must be inserted into CMC to activate the feature. To activate a FlexAddress feature, software updates may be required. If you are not activating FlexAddress, these updates are not required.
about making a redundant CMC active, see the Chassis Management Controller (CMC) Secure Digital (SD) Card Technical Specification document. When CMC restarts, verify the activation process. For more information about activating FlexAddress, see Verifying Flexddress Activation. Activating FlexAddress Plus FlexAddress Plus is delivered on the FlexAddress Plus Secure Digital (SD) card along with the FlexAddress feature.
The command returns the following status message: Feature = FlexAddress Date Activated = 8 April 2008 - 10:39:40 Feature installed from SD-card SN = 01122334455 If there are no active features on the chassis, the command returns a message: racadm feature -s No features active on the chassis Dell Feature Cards may contain more than one feature.
Viewing FlexAddress Information For Chassis FlexAddress status information can be displayed for the entire chassis. The status information includes whether the feature is active and an overview of the FlexAddress status for each server. To view the chassis FlexAddress status using the CMC web interface, click Chassis Overview → Setup . The General Chassis Settings page is displayed. The FlexAddress has a value Active or Not Active.
Viewing FlexAddress Information for Individual Servers To view FlexAddress information for a particular server using the CMC Web interface: 1. In the left pane, expand Server Overview. All the servers inserted in the chassis are listed. 2. Click the server you want to view. The Server Status page is displayed. 3. Click the Setup tab, and then click FlexAddress. The FlexAddress page is displayed that provides the WWN configuration and MAC addresses for the selected server.
Configuring FlexAddress for Chassis-Level Fabric and Slots At the chassis level, you can enable or disable the FlexAddress feature for fabrics and slots. FlexAddress is enabled on a per-fabric–basis and then slots are selected for participation in the feature. Both fabrics and slots must be enabled to successfully configure FlexAddress.
Viewing World Wide Name/Media Access Control (WWN/MAC) IDs The WWN/MAC Summary page allows you to view the WWN configuration and MAC address of a slot in the chassis. Fabric Configuration The Fabric Configuration section displays the type of Input/Output fabric that is installed for Fabric A. A green check mark indicates that the fabric is enabled for FlexAddress.
Situation Command Output Changing the slot/fabric FlexAddress settings while the server modules are powered ON. $racadm setflexaddr -i 1 1 ERROR: Unable to perform the set operation because it affects a powered ON server Changing the Flexaddress settings of slot or fabric, when the CMC Enterprise License is not installed. $racadm setflexaddr i ERROR: SWC0242 : A required license is missing or expired.
Dell warrants that the Software disks is free from defects in materials and workmanship under normal use for ninety (90) days from the date you receive them. This warranty is limited to you and is not transferable. Any implied warranties are limited to ninety (90) days from the date you receive the Software. Some jurisdictions do not allow limits on the duration of an implied warranty, so this limitation may not apply to you.
Managing Fabrics 13 The chassis supports a fabric type, which is Fabric A. Fabric A is used by the single I/O Module, and is always connected to the on-board Ethernet adapters of the servers. The chassis has only one I/O module (IOM), where the IOM is a pass-through or switch module. The I/O Module is classified as group A. Chassis IOM uses a discrete data path called Fabric, and it is named A. The Fabric A supports only Ethernet.
Configuring Network Settings for IOM You can specify the network settings for the interface used to manage the IOM. For Ethernet switches, the out-of-band management port (IP address) is configured. The in-band management port (that is, VLAN1) is not configured using this interface. Before configuring the network settings for the IOM, make sure the IOM is turned on. To configure the network setting of IOM in Group A, you must have the Fabric A Administrator privileges.
Managing and Monitoring Power 14 The Dell PowerEdge VRTX chassis is the most power-efficient modular server enclosure. It is designed to include highlyefficient power supplies and fans, has an optimized layout for the air to flow more easily through the system, and contains power-optimized components throughout the enclosure.
AC Redundancy Policy The purpose of the AC redundancy policy is to enable a modular enclosure system to operate in a mode in which it can tolerate AC power failures. These failures may originate in the AC power grid, the cabling and delivery, or a PSU itself. When you configure a system for AC redundancy, the PSUs are divided into grids: PSUs in slots 1 and 2 are in the first grid while PSUs in slots 3 and 4 are in the second grid.
To operate remaining PSUs at their maximum efficiency, use the following power redundancy modes: • PSU Redundancy mode with DPSE provides power efficiency. At least two supplies are online, with one PSU required to power the configuration, and one to provide redundancy in case of a PSU failure. PSU Redundancy mode offers protection against the failure of any one PSU, but offers no protection in the event of an AC grid loss.
CAUTION: In AC redundancy mode, you must have balanced sets of PSUs (at least one PSU in each grid). If this condition is not met, AC redundancy is not possible. Power Supply Redundancy When power supply redundancy is enabled, a PSU in the chassis is kept as a spare, ensuring that the failure of any one PSU does not cause the servers or chassis to turn off. Power supply redundancy mode requires minimum two PSUs.
priority servers may get less power than priority-one servers based on System Input Max Power Capacity, and the userconfigured setting of System Input Power Cap. Configuration changes, such as an additional server, shared HDDs, or PCIe cards in the chassis, may require the System Input Power Cap to be increased. Power needs in a modular enclosure also increase when thermal conditions change and the fans are required to run at higher speed, which causes them to consume additional power.
Assigning Priority Levels To Servers Using CMC Web Interface To assign priority levels: 1. In the left pane, click Server Overview → Power → Priority . The Server Priority page lists all the servers in the chassis. 2. From the Priority drop-down menu, select a priority level (1–9, where 1 is the highest priority) for one, multiple, or all servers. The default value is 1. You can assign the same priority level to multiple servers. 3. Click Apply to save your changes.
Viewing Power Budget Status Using RACADM Open a serial/Telnet/SSH text console to CMC, log in, and type: racadm getpbinfo For more information about getpbinfo, including output details, see the getpbinfo command section in the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide. Redundancy Status and Overall Power Health The redundancy status is a factor in determining the overall power health.
This occurs if the administrator had configured power limit for the chassis lower than the full power allocation to the servers or if insufficient power is available to servers requiring high power. The following table provides the actions taken by CMC, when a new server is powered on in the scenario described earlier. Table 29.
AC input received The power input for power supply is lost. AC input lost The power input for power supply has been restored. DC output produced Power supply is operating normally. DC output lost Power supply failed. Events related to changes in the power redundancy status that record entries in the SEL are redundancy loss and redundancy regain for the modular enclosure that is configured for either an AC Redundancy power policy or Power Supply Redundancy power policy.
Maximum Power Conservation Mode This is enabled only when AC redundancy is selected. CMC performs maximum power conservation when: • Maximum conservation mode is enabled • An automated command line script, issued by a UPS device, enables maximum conservation mode. In maximum power conservation mode, all servers start functioning at their minimum power levels, and all subsequent server power allocation requests are denied. In this mode, the performance of powered on servers may be degraded.
• Redundancy policy • Remote power logging • Server performance over power redundancy • Dynamic power supply engagement • Server power of 11th generation and earlier servers OPMC then manages prioritization and power of 12th generation server nodes in the chassis from the budget available after allocation of power to chassis infrastructure and prior generation server nodes. Remote power logging is unaffected by external power management.
To enable and set the redundancy policy: 1. Open a serial/Telnet/SSH text console to CMC and log in. 2. Set properties as needed: – To select a redundancy policy, type: racadm config -g cfgChassisPower -o cfgChassisRedundancyPolicy where is 0 (AC Redundancy), and 1 (Power Supply Redundancy). The default value is 0.
– To enable remote power management by Open Manage Power Center (OPMC), type: racadm config -g cfgChassisPower -o cfgChassisServerBasedPowerMgmtMode 1 – To restore CMC power management, type: racadm config -g cfgChassisPower -o cfgChassisServerBasedPowerMgmtMode 0 For information about RACADM commands for chassis power, see the config, getconfig, getpbinfo, and cfgChassisPower sections in the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide.
Executing Power Control Operations on a Server You can remotely perform power management actions for multiple servers at a time or an individual server in the chassis. NOTE: To perform power management actions, you must have the Chassis Configuration Administrator privilege. Executing Power Control Operations for Multiple Servers Using CMC Web Interface To execute power control operation for multiple servers using the Web interface: 1. In the left pane, click Server Overview → Power.
Executing Power Control Operations on the IOM Using RACADM To execute power control operations on the IOM using RACADM, open a serial/Telnet/SSH text console to CMC, log in, and type: racadm chassisaction -m switch where indicates the operation you want to execute: power cycle.
Managing Chassis Storage 15 On the Dell PowerEdge VRTX, you can perform the following operations: • View the status of physical disks drives and storage controllers. • View the properties of controllers, physical disk drives, virtual disks, and enclosures. • Set up controllers, physical disk drives, and virtual disks. • Assign virtual adapters. • Troubleshoot controller, physical disk drives, and virtual disks. • Update storage components.
• Virtual disks are created and they are assigned as Virtual Adapter 1, Virtual Adapter 2, Virtual Adapter 3, or Virtual Adapter 4. For more information, see Applying Virtual Adapter Access Policy to Virtual Disks. NOTE: You can map only one virtual adapter to one server at a time. Without an appropriate license, you can map the VA to the default server, or unmap a VA–server assignment. The default mapping is VA1–Server Slot 1, VA2– Server Slot 2, VA3–Server Slot 3, and VA4–Server Slot 4.
– Under the Basic Physical Disks Filter option , from the Group By drop-down menu, select Virtual Disk, Controller, or Enclosure, and then click Apply. – Click Advanced Filter, select the values for various attributes, and then click Apply.
Viewing Virtual Disk Properties Using RACADM To view virtual disk properties using RACADM, run the command racadm raid get vdisks -o For more information, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide. Creating Virtual Disk Using CMC Web Interface Make sure that the physical disk is installed in the chassis. NOTE: Deleting a virtual disk removes the virtual disk from the controller's configuration. To create a virtual disk: 1.
NOTE: If you select Delete, the following message is shown indicating that deleting a virtual disk will permanently delete data available in that virtual disk. Deleting the virtual disk removes the virtual disk from the controller's configuration. Initializing the virtual disk permanently erases data from the virtual disk.
Managing PCIe Slots 16 By default, all slots are unmapped. You can do the following: • View the status of all PCIe Slots in the chassis. • Assign or unassign a PCIe slot to the servers. Consider the following before assigning a PCIe slot to a server: • An empty PCIe slot cannot be assigned to a server that is turned on. • A PCIe slot with an adapter assigned to a server cannot be assigned to another server if the currently-assigned server (source) is turned on.
Managing PCIe Slots Using RACADM You can assign or unassign a PCIe slot to a server by using the RACADM commands. Some of the commands are given here. For more information about the RACADM commands, see the Chassis Management Controller for PowerEdge VRTX RACADM Command Line Reference Guide available at dell.com/support/Manuals.
Troubleshooting and Recovery 17 This section explains how to perform tasks related to recovering and troubleshooting problems on the remote system using the CMC web interface. • Viewing chassis information. • Viewing the event logs. • Gathering configuration information, error status, and error logs. • Using the diagnostic console. • Managing power on a remote system. • Managing Lifecycle Controller jobs on a remote system. • Reset components.
Subsystem RACADM Command General System/RAC information getsysinfo Session information getssninfo Sensor information getsensorinfo Switches information (IO Module) getioinfo Mezzanine card information (Daughter card) getdcinfo All modules information getmodinfo Power budget information getpbinfo KVM information getkvminfo NIC information (CMC module) getniccfg Redundancy information getredundancymode Trace log information gettracelog RAC event log getraclog System event log getsel
chassis to maintain AC redundancy. (For full AC Redundancy operation, make sure that a full PSU configuration of four power supplies is available.) – • • • • Problem: The PSU state is displayed as Failed (No AC), even when an AC cord is connected and the power distribution unit is producing good AC output. – Resolution A: Check and replace the AC cord. Check and confirm that the power distribution unit providing power to the power supply is operating as expected.
• Problem: Overall server performance decreases when the ambient temperature increases in the data center. – Resolution: This can occur if the System Input Power Cap has been configured to a value that results in an increased power need by fans having to be made up by reduction in the power allocation to the servers. User can increase the System Input Power Cap to a higher value that allow for additional power allocation to the fans without an impact on server performance.
NOTE: CMC creates a new log entry indicating that the log was cleared. NOTE: To clear the hardware log, you must have the Clear Logs Administrator privilege. Viewing Hardware Logs Using RACADM To view the hardware log using RACADM, open a serial/Telnet/SSH text console to CMC, log in, and type: racadm getsel To clear the hardware log, type: racadm clrsel Viewing Chassis Log CMC generates a log of the chassis-related events.
Resetting Components You can reset the active CMC, or to virtually reset servers making them to behave as if they were removed and reinserted. If the chassis has a standby CMC, resetting the active CMC causes a failover and the standby CMC becomes active. NOTE: To reset components, you must have Debug Command Administrator privilege. To reset the components using the CMC Web interface, 1. In the left pane, click Chassis Overview → Troubleshooting → Reset Components. The Reset Components page is displayed.
You can also check the ntpd status by typing the following racadm command: racadm getractime –n If the ‘*’ is not displayed for one of the configured servers, the settings may not be configured correctly. The output of this command contains detailed NTP statistics that may be useful in debugging the problem. If you attempt to configure a Windows-based NTP server, it may help to increase the MaxDist parameter for ntpd.
Component Server IOM (Common) IOM (Pass through) Blower 176 LED Color, Blinking Pattern Status Blue, glowing steadily Active Blue, blinking User-enabled module identifier Amber, glowing steadily Not used Amber, blinking Fault Blue, dark Standby Green, glowing steadily Turned on Green, blinking Firmware is being uploaded Green, dark Turned off Blue, glowing steadily Normal Blue, blinking User-enabled module identifier Amber, glowing steadily Not used Amber, blinking Fault Blue
Component PSU LED Color, Blinking Pattern Status Amber, glowing steadily Fan type not recognized, update the CMC firmware Amber, blinking Fan fault; tachometer out of range Amber, dark Not used (Oval) Green, glowing steadily AC OK (Oval) Green, blinking Not used (Oval) Green, dark AC Not OK Amber, glowing steadily Not used Amber, blinking Fault Amber, dark No fault (Circle) Green, glowing steadily DC OK (Circle) Green, dark DC Not OK Troubleshooting Non-responsive CMC If you cannot
To obtain recovery information: 1. Install a NULL modem cable between a CMC system and a client system. 2. Open a terminal emulator of your choice (such as HyperTerminal or Minicom). Enter the following specification when prompted: 8 bits, no parity, no flow control, baud rate 115200. A core memory failure displays an error message every 5 seconds. 3. Press the key. If a recovery prompt appears, additional information is available. The prompt indicates the CMC slot number and failure type.
The trace log may also contain CMC firmware-specific error codes that are related to the internal CMC firmware, not the managed system’s operating system. Troubleshooting Controller To troubleshoot a controller: 1. In the left pane, click Chassis Overview → Storage → Controllers → Troubleshooting. 2. On the Controller Troubleshooting page, from the Actions drop-down list for the respective controller, select any one of the following, and then click Apply.
18 Using LCD Panel Interface You can use the LCD panel on the chassis to perform configuration and diagnostics, and to obtain status information about the chassis and its contents. The following figure illustrates the LCD panel. The LCD screen displays menus, icons, pictures, and messages. Figure 2. LCD Display 1. LCD screen 2. Selection ("check") button 3.
Accept/Yes — Highlight and press the center button to accept a change and return to the previous screen. Skip/Next — Highlight and press the center button to skip any changes and go to the next screen. No — Highlight and press the center button to answer "No" to a question and go to the next screen. Component Identify — Blinks the blue LED on a component. NOTE: There is a blinking blue rectangle around this icon when Component Identify is enabled.
NOTE: The DVD Mapping feature is displayed on the LCD Main Menu screen only if you have a DVD drive installed. Enclosure Menu From this screen, you can navigate to the following screens: • Front Status • Rear • Side • Enclosure Status Use the navigation buttons to highlight the desired item (highlight the Back icon to return to the Main Menu), and then press the center button. The selected screen is displayed.
Use the up and down arrow buttons to highlight an item in the menu, or highlight the Back icon if you want to return to the Main Menu screen. To activate your selection, press the center button. LCD Language The LCD Language screen allows you to select the language used for LCD panel messages. The currently active language is highlighted with a light blue background. 1. Use the up, down, left, and right arrow buttons to highlight the desired language. 2. Press the center button.
Status information on the LCD includes descriptive information about the modules in the chassis. The tables in this section describe the information that is displayed for each component. LCD Module and Server Status Information The tables in this section describe status items that are displayed on the front panel LCD for each type of component in the chassis. Table 34. CMC Status Item Description Example: CMC1, CMC2 Name/Location.
Table 36. Fan Status Item Description Name/Location Example: Fan1, Fan2, and so on. Error Messages If no error then "No Errors" is shown; otherwise error messages are listed, critical errors first, then warnings. RPM Current fan speed in RPM. Table 37. PSU Status Item Description Name/Location Example: PSU1, PSU2, and so on. Error Messages If no error then "No Errors" is shown; otherwise error messages are listed, critical errors first, then warnings. Status Offline, Online, or Standby.
Item Description Name Name of the server, which the user can set through Dell OpenManage. The name is displayed only if iDRAC has finished booting, and the server supports this feature, else iDRAC booting messages are displayed. Model Number Displays if iDRAC finished booting. Service Tag Displays if iDRAC finished booting. BIOS Version Server BIOS firmware version. Last POST Code Displays the last server BIOS POST code messages string. iDRAC Firmware Version Displays if iDRAC finished booting.
Frequently Asked Questions 19 This section lists the frequently asked questions about the following: • RACADM • Managing and Recovering a Remote System • Active Directory • FlexAddress and FlexAddressPlus • iKVM RACADM After performing a CMC reset (using the RACADM racreset subcommand), when a command is entered, the following message is displayed: racadm Transport: ERROR: (RC=-1) What does this message mean? Another command must be issued only after CMC completes the reset.
CMC includes a default CMC server certificate to ensure network security for the web interface and remote RACADM features. When this certificate is used, the web browser displays a security warning because the default certificate is issued to CMC default certificate which does not match the host name of CMC (for example, the IP address). To address this security concern, upload a CMC server certificate issued to the IP address of CMC.
Active Directory Does Active Directory support CMC login across multiple trees? Yes. The CMC’s Active Directory querying algorithm supports multiple trees in a single forest. Does the login to CMC using Active Directory work in mixed mode (that is, the domain controllers in the forest run different operating systems, such as Microsoft Windows 2000 or Windows Server 2003)? Yes.
No activation or modifications to the card should occur. The card is ignored by CMC.
If the CMC subsequently becomes active, with the FlexAddressPlus feature card still in the card slot, the FlexAddressPlus feature gets reactivated, and slot or fabric flexaddress configuration changes can resume. IOM After a configuration change, sometimes CMC displays the IP address as 0.0.0.0. Click the Refresh icon to see if the IP address is set correctly on the switch. If an error is made in setting the IP/mask/ gateway, the switch does not set the IP address and returns a 0.0.0.0 in all fields.