Dell™ OpenManage™ Server Administrator Version 5.4 User’s Guide w w w. d e l l . c o m | s u p p o r t . d e l l .
Notes and Notices NOTE: A NOTE indicates important information that helps you make better use of your computer. NOTICE: A NOTICE indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. ____________________ Information in this document is subject to change without notice. © 2007 Dell Inc. All rights reserved. Reproduction in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden.
Contents 1 Introduction . Overview . . . . . . . . . . . . . . . . . . . . . . 11 . . . . . . . . . . . . . . . . . . . . . . . . 11 Integrated Features Installation . . . . . . . . . . . . . . . . . . . 11 . . . . . . . . . . . . . . . . . . . . . 12 Server Administrator Home Page Instrumentation Service . . . . . . . . . 12 . . . . . . . . . . . . . . 13 Remote Access Controller . . . . . . . . . . . . . Logs 13 . . . . . . . . . . . 13 . . . . . . . . . . . . . . . . . . . . . . .
Disabling Guest and Anonymous Accounts in Supported Windows Operating Systems . . . Configuring the SNMP Agent . . . . . 28 . . . . . . . . . . . . . . 28 Configuring the SNMP Agent for Systems Running Supported Windows Operating Systems . . . . . . . . . . . . . . . . . . . . . . . 30 Configuring the SNMP Agent on Systems Running Supported Red Hat Enterprise Linux . . . . . . . . . . . . . . . . . . . . . . . .
Using Server Administrator . . . . . . . . . . Starting Your Server Administrator Session Logging In and Out Single Sign-On . . . . . . 55 . . . . . . . . . . . . . . . . . . . 56 . . . . . . . . . . . . . . . . . . . 56 Systems Running a Supported Microsoft Windows Server 2003 Operating System The Server Administrator Home Page . . . . . 57 . . . . . . . . . 59 . . . . . . . . . . . . . . . 62 . . . . . . . . . . . . . . . . . . . . 62 Global Navigation Bar System Tree Action Window .
Server Administrator Home Page System Tree Objects . . . . . . . . . . . . . . . . Modular Enclosure . . . . . . . 76 . . . . . . . . . . . . . . . . . 77 System/Server Module . . . . . . . . . . . . . . . Managing Preferences: Home Page Configuration Options . . . . . . . . General Settings . . . . . . . . . . 103 . . . . . . . . . . . . . . . . . . 103 Server Administrator 7 . . . . . . . . . . . . . . . . Remote Access Controller Overview . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring DRAC Security Certificate Management 122 . . . . . . . . . . . Accessing and Using a Dell Remote Access Controller . . . . . . . . . . . . . . . . . . 123 . . . . . . Working With the Baseboard Management Controller/Integrated Dell Remote Access Controller . . . . Overview 119 . . . . . . . . . . . . . . Configuring Remote Connect Authentication Options . . . . 8 119 . . . . . . . . . . . . . . . . . . 125 . . . . . . . . . . . . . . . . . . . . . . . .
9 Storage Management Service Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 Hardware Prerequisites . . . . . . . . . . . . . . . . . 138 . . . . . . . . . . . . . 138 Storage Management Service and Array Manager . . . . . . . . . . . . . . . . . . . 139 Storage Management Tree Objects . . . . . . . . 140 . . . . . . . . . . . . 141 Storage Management Tasks Migrating from Array Manager to the Storage Management . . . . . . . .
11 Troubleshooting 155 . . . . . . . . . . . . . . . . . . Setting Alert Actions for Systems Running Supported Red Hat Enterprise Linux and SUSE Linux Enterprise Server Operating Systems . . . . . . . . . . 155 . . 156 . . . . . . 157 . . . . . . . . . . . . . 158 Setting Alert Actions in Microsoft Windows 2000, Windows Server 2003, and Windows Server 2008 .
Contents
Introduction Overview Server Administrator provides a comprehensive, one-to-one systems management solution in two ways: from an integrated, Web browser-based graphical user interface (GUI) and from a command line interface (CLI) through the operating system. Server Administrator is designed for system administrators to manage systems locally and remotely on a network.
Installation You can install Server Administrator using several methods. The Dell™ Systems Management Tools and Documentation DVD provides a setup program to install, upgrade, and uninstall Server Administrator and other managed system software components on your managed system. This DVD also provides a setup program to install, upgrade and uninstall management station software components on your management station.
Instrumentation Service The Instrumentation Service provides rapid access to detailed fault and performance information gathered by industry-standard systems management agents and allows remote administration of monitored systems, including shutdown, startup, and security. Remote Access Controller NOTE: The Remote Access Controller is not available on modular systems. You must directly connect to the Dell Embedded Remote Access/Modular Chassis Controller (ERA/MC) on a modular system.
On supported Microsoft® Windows® operating systems, Storage Management is installed using the Typical Setup. On systems running supported Red Hat® Enterprise Linux® and SUSE® Linux Enterprise Server operating systems, you can either install the Storage Management Service through the Red Hat Package Manager (RPM) or use the srvadmin-install.sh script—a menu driven script that installs the appropriate RPMs based on the options you choose.
Other Documents You Might Need Besides this User's Guide, you can find the following guides either on the Dell Support website at support.dell.com or on the Dell Systems Management Tools and Documentation DVD: • The Dell OpenManage Installation and Security User's Guide provides complete information on installation procedures and step-by-step instructions for installing, upgrading, and uninstalling Server Administrator for each supported operating system.
• The Dell OpenManage Server Administrator Command Line Interface User's Guide documents the complete command line interface for Server Administrator, including an explanation of CLI commands to view system status, access logs, create reports, configure various component parameters, and set critical thresholds. • The Dell Online Diagnostics User's Guide provides complete information on installing and using Online Diagnostics on your system.
• The Dell Update Packages User's Guide provides information about obtaining and using Dell Update Packages as part of your system update strategy. • The Dell OpenManage Server Update Utility User's Guide provides information about obtaining and using the Server Update Utility (SUU) to update your Dell systems or to view the updates available for any systems listed in the Repository.
Introduction
What’s New for Version 5.4 The following features are new in this release of Server Administrator: • The Dell Systems Management Tools and Documentation DVD contains version 5.4 of the Dell OpenManage systems management software kit and version 1.0.3 of the Systems Build and Update Utility. The root of the DVD also contains ISO images of the Dell Systems Build and Update Utility (version 1.0) and the Dell Systems Console and Agent CD (Dell OpenManage software version 5.3.0.1).
What’s New for Version 5.
Setup and Administration Security Management Server Administrator provides security through role-based access control (RBAC), authentication, and encryption for both the Web-based and command line interfaces. Role-Based Access Control RBAC manages security by determining the operations that can be executed by persons in particular roles. Each user is assigned one or more roles, and each role is assigned one or more user privileges that are permitted to users in that role.
Table 3-1. User Privileges User Privileges Access Type Administrator Write User Read X Power User Administrator X X X X X Read access allows viewing of data reported by Server Administrator. Read access does not allow changing or setting values on the managed system. Write access allows values to be changed or set on the managed system. Administrator access also allows shutdown of the managed system.
Authentication The Server Administrator authentication scheme ensures that the correct access types are assigned to the correct user privileges. Additionally, when the command line interface (CLI) is invoked, the Server Administrator authentication scheme validates the context within which the current process is running. This authentication scheme ensures that all Server Administrator functions, whether accessed through the Server Administrator home page or CLI, are properly authenticated.
Assigning User Privileges To ensure critical system component security, assign user privileges to all Dell™ OpenManage™ software users before installing Dell OpenManage software. New users can log into Dell OpenManage software using their operating system user privileges. NOTICE: To protect access to your critical system components, assign a password to every user account that can access Dell OpenManage software.
8 Select the appropriate group and click Add. 9 Click OK, and then click OK again. New users can log into Dell OpenManage software with the user privileges for their assigned group and domain. Creating Server Administrator Users for Supported Red Hat Enterprise Linux and SUSE Linux Enterprise Server Operating Systems Administrator access privileges are assigned to the user logged in as root. To create users with User and Power User privileges, perform the following steps.
Creating Users With Power User Privileges 1 Run the following command from the command line: useradd -d -g root NOTE: You must set root as the primary group. 2 Type passwd and press . 3 When prompted, enter a password for the new user. NOTICE: You must assign a password to every user account that can access Server Administrator to protect access to your critical system components.
Table 3-5 lists the examples for adding the role definition to the omarolemap file. Table 3-5. Examples for adding the role definition in OpenManage Server Administrator Bob Ahost Poweruser +root Bhost Administrator +root Chost Administrator Bob *.aus.amer.com Poweruser Mike 192.168.2.3 Poweruser 3 Save and close the file.
• After the connection services are restarted and the changes do not take effect for /etc/omarolemap file refer to command log for the errors. • When omarolemap file is copied from one machine to another machine, file permissions and the entries of the file needs to be rechecked. • Prefix the Group Name with +. • Server Administrator uses the default operating system user privileges, if there are duplicate entries of user names or user groups along with same .
You can configure the SNMP agent to change the community name, enable Set operations, and send traps to a management station. To configure your SNMP agent for proper interaction with management applications such as the Dell OpenManage™ IT Assistant, perform the procedures described in the following sections. NOTE: The default SNMP agent configuration usually includes a SNMP community name such as public. For security reasons, change the SNMP community names from their default values.
Configuring the SNMP Agent for Systems Running Supported Windows Operating Systems Server Administrator uses the SNMP services provided by the Windows SNMP agent. You can configure the SNMP agent to change the community name, enable Set operations, and send traps to a management station. To configure your SNMP agent for proper interaction with management applications such as IT Assistant, perform the procedures described in the following sections.
Changing the SNMP Community Name Configuring the SNMP community names determines which systems are able to manage your system through SNMP. The SNMP community name used by management applications must match an SNMP community name configured on the Server Administrator system so that the management applications can retrieve management information from Server Administrator. 1 Open the Computer Management window. 2 Expand the Computer Management icon in the window, if necessary.
Enabling SNMP Set Operations SNMP Set operations must be enabled on the Server Administrator system to change Server Administrator attributes using IT Assistant. 1 Open the Computer Management window. 2 Expand the Computer Management icon in the window, if necessary. 3 Expand the Services and Applications icon, and then click Services. 4 Scroll down the list of services until you find SNMP Service, right-click SNMP Service, and click Properties. The SNMP Service Properties window appears.
5 Click the Traps tab to add a community for traps or to add a trap destination for a trap community. a To add a community for traps, type the community name in the Community Name box and click Add to list, which is located next to the Community Name box. b To add a trap destination for a trap community, select the community name from the Community Name drop-down box and click Add under the Trap Destinations box. c The SNMP Service Configuration window appears.
Server Administrator SNMP Agent Install Actions If Server Administrator detects the default SNMP configuration during installation, it attempts to modify the SNMP agent configuration to give read-only access to the entire MIB tree for the "public" community. Server Administrator modifies the /etc/snmp/snmpd.conf SNMP agent configuration file in two ways. The first change is to create a view to the entire MIB tree by adding the following line if it does not exist: view all included .
Changing the SNMP Community Name Configuring the SNMP community names determines which systems are able to manage your system through SNMP. The SNMP community name used by management applications must match an SNMP community name configured on the Server Administrator system so that the management applications can retrieve management information from Server Administrator.
Enabling SNMP Set Operations SNMP Set operations must be enabled on the system running Server Administrator in order to change Server Administrator attributes using IT Assistant. To enable SNMP Set operations on the system running Server Administrator, edit the SNMP agent configuration file, /etc/snmp/snmpd.
To configure your system running Server Administrator to send traps to a management station, edit the SNMP agent configuration file, /etc/snmp/snmpd.
Enabling SNMP Access From Remote Hosts The default SNMP agent configuration on SUSE Linux Enterprise Server operating systems gives read-only access to the entire MIB tree for the "public" community from the local host only. This configuration does not allow SNMP management applications such as IT Assistant running on other hosts to discover and manage Server Administrator systems properly.
To enable SNMP access from all remote hosts to a system running Server Administrator, edit the SNMP agent configuration file, /etc/snmpd.conf or /etc/snmp/snmpd.conf, and perform the following steps: 1 Find the line that reads: rocommunity public 127.0.0.1 2 Edit this line by deleting 127.0.0.1. When edited, the new line should read: rocommunity public 3 To enable SNMP configuration changes, restart the SNMP agent by typing: /etc/init.
Enabling SNMP Set Operations SNMP Set operations must be enabled on the system running Server Administrator in order to change Server Administrator attributes using IT Assistant. To enable remote shutdown of a system from IT Assistant, SNMP Set operations must be enabled. NOTE: Rebooting of your system for change management functionality does not require SNMP Set operations. To enable SNMP Set operations on a system running Server Administrator, edit the SNMP agent configuration file, /etc/snmpd.
Firewall Configuration on Systems Running Supported Red Hat Enterprise Linux Operating Systems If you enable firewall security while installing Red Hat Enterprise Linux, the SNMP port on all external network interfaces is closed by default. To enable SNMP management applications such as IT Assistant to discover and retrieve information from Server Administrator, the SNMP port on at least one external network interface must be open.
4 Press to go to Customize and press . The Firewall Configuration - Customize screen appears. 5 Select whether to open an entire network interface or just the SNMP port on all network interfaces. a To open an entire network interface, press to go to one of the Trusted Devices and press the spacebar. An asterisk in the box to the left of the device name indicates that the entire interface will be opened.
Installing Server Administrator Overview You can install Server Administrator using several methods. The Dell™ Systems Management Tools and Documentation DVD provides a setup program to install, upgrade, and uninstall Server Administrator and other managed system software components on your managed system. The Dell Systems Management Tools and Documentation DVD provides a setup program to install, upgrade, and uninstall management station software components on your management station.
Upgrading Server Administrator Dell OpenManage software allows you to upgrade from versions 4.3 or later to version 5.4 using the Dell Systems Management Tools and Documentation DVD. NOTE: Service Pack upgrade is not supported in Dell OpenManage 5.4. NOTE: If you have a version of Dell OpenManage earlier than 4.3, uninstall and then reinstall Dell OpenManage 5.4. For more information see the Dell OpenManage Installation and Security User's Guide. To upgrade from Dell OpenManage 4.
Use the following command in your deployment script to upgrade the MSI engine (if required) and to install/upgrade the systems management software. NOTE: Dell OpenManage systems management and Management Station installers require MSI 3.1 or later. Update the MSI engine if you are using a system running Windows Server® 2003 (without a Service Pack), Windows 2000 Server, or Windows XP operating system.
• Read the Server Administrator Compatibility Guide. This document contains compatibility information about Server Administrator installation and operation on various hardware platforms (or systems) running supported Microsoft Windows, Red Hat Enterprise Linux, and SUSE Linux Enterprise Server operating systems. • Read the Dell OpenManage Install readme file on the Dell Systems Management Tools and Documentation DVD.
• Microsoft Windows Server 2003 family (32-bit x86) (includes Web, Standard, and Enterprise editions with SP2) • Microsoft Windows Server 2003 family (x64) (includes Standard, Enterprise, and DataCenter editions with SP2) • Microsoft Windows Server 2003 family (IA-64) (includes Enterprise editions) • Microsoft Windows SBS 2003 R2 (includes Standard and Premium edition) • Microsoft Windows Server 2003 (32-bit x86) R2 (includes Standard and Enterprise editions with SP2) • Microsoft Windows Server 2
System Requirements Server Administrator must be installed on each system to be managed. You can then manage each system running Server Administrator locally or remotely through a supported Web browser. The Prerequisite Checker (setup.exe) on the Dell Systems Management Tools and Documentation DVD will automatically analyze your system to determine if the system requirements have been met. For more information, see "Prerequisite Checker for Windows.
• The Storage Management Service is installed by default on systems running supported Windows operating systems, by using Typical Setup. NOTE: On Red Hat Enterprise Linux and SUSE Linux Enterprise Server systems, you can either install the Storage Management Service through the Red Hat Package Manager (RPM) or use the srvadmin-install.sh script—a menu driven script that installs the appropriate RPMs based on the options you choose.
Management Protocol (SNMP). On supported Red Hat Enterprise Linux and SUSE Linux Enterprise Server operating systems, Server Administrator supports the SNMP systems management standard. NOTE: For information about installing a supported systems management protocol standard on your managed system, see your operating system documentation. Table 4-1 shows the availability of the systems management standards for each supported operating system. Table 4-1.
Installing Server Administrator with Citrix If you want to install Server Administrator with Citrix, you must perform the installation in the following order: 1 Install the operating system using the Dell Systems Build and Update Utility on the bootable Dell Systems Management Tools and Documentation DVD. NOTE: Do not install Server Administrator or other system management software, until you have installed the Citrix software.
PERC Console and FAST Compatibility Issues When Installing the Storage Management Service Installing Storage Management on a system that has FAST or the PERC Console installed is an unsupported configuration. In particular, you may find that the Storage Management Service or the FAST features are disabled at run time when using the Storage Management Service on a system that also has FAST installed.
runtime, check your application log files for notifications on outdated firmware versions. See the Storage Management readme (readme_sm.txt) for a complete listing of supported controller firmware and driver versions. Filesystem Hierarchy Standard v2.3 Support File Hierarchy System (FHS) is a component of the larger Linux Standards Base definition. In this release, Server Administrator supports the relocation of files.
Installing Server Administrator
Using Server Administrator Starting Your Server Administrator Session To start a Server Administrator session in a local system, click the Dell™ OpenManage™ Server Administrator icon on your desktop.
Logging In and Out To log in to Server Administrator, type your preassigned Username and Password in the appropriate fields on the Systems Management Log in window. See "Single Sign-On" for information on how you can bypass the login page and access the Server Administrator Web application by clicking on the Dell OpenManage Server Administrator icon on your desktop. NOTE: You must have preassigned user rights to log in to Server Administrator.
To launch Server Administrator using Single Sign-On authentication against Microsoft Active Directory, the following parameters must also be passed in: authType=ntlm&application=[plugin name] Where plugin name = omsa, ita, etc.
Internet Explorer 1 Start your browser. 2 Click Tools→Internet Options→Security. 3 Click the Trusted Sites icon. 4 Click Sites. 5 Copy the Web address used to access the remote managed system from the browser’s address bar and paste it onto the Add this Web Site to the Zone field. 6 Click Custom Level. For Windows 2000: – Under Miscellaneous, select the Allow Meta Refresh radio button. – Under Active Scripting, select the Enable radio button.
7 Under User Authentication, select the Automatic Logon with current username and password radio button. 8 Click OK to save the new settings. 9 Close the browser. 10 Log in to Server Administrator. Mozilla 1 Start your browser. 2 Click Edit→Preferences. 3 Click Advanced→Scripts and Plugins. 4 Ensure that the Navigator check box is selected under Enable JavaScript for. 5 Click OK to save the new settings. 6 Close the browser. 7 Log in to Server Administrator.
Additionally, when logged in to the Server Administrator home page, the system model, the assigned name of the system, and the current user's user name and user privileges are displayed in the top-right corner of the window. Table 5-1 lists the GUI field names and the applicable system, when Server Administrator is installed on the system. Table 5-1.
Figure 5-2 shows a sample Server Administrator home page layout for a user logged in with administrator privileges on a modular system. Figure 5-2. system tree Sample Server Administrator Home Page — Modular System action tab action tab subcategories global navigation bar action window Clicking an object in the system tree opens a corresponding action window for that object.
Global Navigation Bar The global navigation bar and its links are available to all user levels in the program. • Clicking Preferences opens the Preferences home page. See "Using the Preferences Home Page." • Clicking Support connects you to the Dell Support website. • Clicking Help opens the context-sensitive online help window. See "Using the Online Help." • Clicking About displays Server Administrator version and copyright information.
Data Area The data area is located below the action tabs on the right side of the home page. The data area is where you perform tasks or view details about system components. The content of the window depends on the system tree object and action tab that are currently selected. For example, when you select BIOS from the system tree, the Properties tab is selected by default and the version information for the system BIOS appears in the data area.
Task Buttons Most windows opened from the Server Administrator home page contain at least four task buttons: Print, Export, Email, and Refresh. Other task buttons are included on specific Server Administrator windows. Log windows, for example, also contain Save As and Clear Log task buttons. For specific information about individual task buttons, click Help on any Server Administrator home page window to view detailed information about the specific window you are viewing.
Figure 5-3. Gauge Indicator Using the Online Help Context-sensitive online help is available for every window of the Server Administrator home page. Clicking Help on the global navigation bar opens an independent help window that contains detailed information about the specific window you are viewing. The online help is designed to help guide you through the specific actions required to perform all aspects of the Server Administrator services.
Like the Server Administrator home page, the Preferences home page has three main areas: • The global navigation bar provides links to general services. – Clicking Back to Server Administrator returns you to the Server Administrator home page. • The left pane of the Preferences home page (where the system tree is displayed on the Server Administrator home page) displays the preference categories for the managed system.
components of interest, such as fan RPMs. With additional scripting, the CLI can be used to capture data during periods of high system usage to compare with the same measurements at times of low system usage. Command results can be routed to a file for later analysis. The reports can help administrators to gain information that can be used to adjust usage patterns, to justify purchasing new system resources, or to focus on the health of a problem component.
Perform the following steps to set up your secure port system preferences: 1 Click Preferences on the global navigation bar. The Preferences home page appears. 2 Click General Settings, and the Web Server tab. 3 In the Server Preferences window, set options as necessary. • The Session Timeout feature can set a limit on the amount of time that a Server Administrator session can remain active.
• The Support Link field specifies the URL for the business entity that provides support for your managed system. • The Custom Delimiter field specifies the character used to separate the data fields in the files created using the Export button. The ; character is the default delimiter. Other options are !, @, #, $, %, ^, *, ~, ?, :,|, and ,. • The SSL Encryption field specifies the encryption levels for the secured HTTPS sessions.
X.509 Certificate Management Web certificates are necessary to ensure the identity of a remote system and ensure that information exchanged with the remote system cannot be viewed or changed by others. To ensure system security, it is strongly recommended that you generate a new X.509 certificate, reuse an existing X.509 certificate, or import a root certificate or certificate chain from a Certification Authority (CA).
Supported Red Hat Enterprise Linux and SUSE Linux Enterprise Server Operating Systems To start Server Administrator on systems running a supported Red Hat Enterprise Linux or SUSE Linux Enterprise Server operating system, run the following command from the command line: dsm_om_connsvc start Stopping Server Administrator Supported Microsoft Windows Operating Systems To stop Server Administrator, perform the following steps: 1 Open the Services window. 2 Right-click the DSM SA Connection Service icon.
Supported Red Hat Enterprise Linux and SUSE Linux Enterprise Server Operating Systems To restart Server Administrator on systems running a supported Red Hat Enterprise Linux or SUSE Linux Enterprise Server operating system, run the following command from the command line: dsm_om_connsvc restart 72 Using Server Administrator
Instrumentation Service Overview The Server Administrator Instrumentation Service monitors the health of a system and provides rapid access to detailed fault and performance information gathered by industry standard systems management agents. The reporting and viewing features allow retrieval of overall health status for each chassis that comprises your system. At the subsystem level, you can view information about the voltages, temperatures, fan rpm, and memory function at key points in the system.
Managing Your System The Server Administrator home page defaults to the System object of the system tree view. The default for the System object opens the Health components under the Properties tab. Table 6-1 lists the GUI field names and the applicable system, when Server Administrator is installed on the system. Table 6-1.
Figure 6-2. Sample Server Administrator Home Page — Modular System action tab action tab subcategories global navigation bar system tree action window NOTE: Context-sensitive online help is available for every window of the Server Administrator home page. Clicking Help on the global navigation bar opens an independent help window that contains detailed information about the specific window you are viewing.
Managing System/Server Module Tree Objects The Server Administrator system/server module tree displays all visible system objects based on the software and hardware groups that Server Administrator discovers on the managed system and on the user's access privileges. The system components are categorized by component type.
Modular Enclosure NOTE: For the purposes of Server Administrator, "modular enclosure" refers to a system that may contain one or more modular systems that appear as a separate Server Module in the system tree. Like a stand-alone Server Module, a Modular Enclosure contains all of the essential components of a system. The only difference is that there are slots for at least two Server Modules within a larger container, and each of them is as complete a system as a Server Module.
NOTE: Update functionality is supported on Server Administrator version 2.0 or lower. The Dell™ Server Update Utility and Dell Update Packages can be downloaded from the Dell Support website at support.dell.com. These are supported on Microsoft Windows®, Red Hat® Enterprise Linux®, and SUSE® Linux Enterprise Server operating systems. NOTE: The Dell Server Update Utility or Dell Update Packages must be launched from the system you want to update.
Shutdown Subtabs: Remote Shutdown | Thermal Shutdown | Web Server Shutdown Under the Shutdown tab, you can: • • Configure the operating system shutdown and remote shutdown options. Set the thermal shutdown severity level to shut down your system in the event that a temperature sensor returns a warning or failure value. NOTE: A thermal shutdown occurs only when the temperature reported by the sensor goes above the temperature threshold.
• View the Alert log for a list of all events generated by the Server Administrator Instrumentation Service in response to changes in the status of sensors and other monitored parameters. NOTE: See the Server Administrator Messages Reference Guide for a complete explanation of each alert event ID's corresponding description, severity level, and cause. • View the Command log for a list of each command executed from either the Server Administrator home page or from its command line interface.
Session Management Subtabs: Session Under the Session Management tab, you can: • View session information for current users that have logged in to Server Administrator. • Terminate user sessions. NOTE: Only users with administrative privileges can view the Session Management page and terminate session(s) of logged-in users. Main System Chassis/Main System Click the Main System Chassis/Main System object to manage your system's essential hardware and software components.
– Slots – Temperatures – Voltages NOTE: AC Switch is supported on limited systems. NOTE: Batteries is supported only on Dell PowerEdge x9xx and Dell xx0x systems. NOTE: Hardware Performance is supported only on Dell xx0x systems. NOTE: Power Supplies is not available on Dell PowerEdge 1900 system. NOTE: Power Monitoring is supported on limited Dell xx0x systems. The system/server module may contain one main system chassis or several chassis.
– Power Monitoring – Power Supplies – Processors – Temperatures – Voltages NOTE: AC Switch is supported on limited systems. NOTE: Batteries is supported only on Dell PowerEdge x9xx and Dell xx0x systems. NOTE: Power Supplies is not available on Dell PowerEdge 1900 system. NOTE: Power Monitoring is supported on limited Dell xx0x systems. • View information about the main system chassis attributes.
Batteries Click the Batteries object to view information about your system’s installed batteries. Batteries maintain the time and date when your system is turned off. The battery saves the system’s BIOS setup configuration, which allows the system to reboot efficiently. The Batteries object action window can have the following tabs, depending on the user’s group privileges: Properties and Alert Management.
You can modify the state of many BIOS setup features including but not limited to the Serial Port, Network Interface Controller cards, Boot Sequence, User Accessible USB Ports, CPU Virtualization Technology, CPU HyperThreading, AC Power Recovery Mode, Embedded SATA Controller, Console Redirection, and Console Redirection Failsafe Baud Rate.
Properties Subtabs: Fan Probes | Fan Control Under the Properties tab, you can: • View the current readings for your system's fan probes and configure minimum and maximum values for fan probe warning threshold. NOTE: Some fan probe fields differ according to the type of firmware your system has: BMC or ESM. Some threshold values are not editable on BMCbased systems. • Select fan control options.
Table 6-2 lists the possible values for status and cause of a probe: Table 6-2. Possible Values for Status and Cause of a Probe Status Values Cause Values Degraded User Configuration Insufficient Power Capacity Unknown Reason Normal [N/A] Properties Subtab: Information Under the Properties tab, you can view the details of system’s performance degradation. Intrusion Click the Intrusion object to manage your system's chassis intrusion status.
• View current SNMP trap alert thresholds and set the alert threshold levels for the intrusion sensor. The selected traps will be triggered if the system generates a corresponding event at the selected severity level. Memory Click the Memory object to manage your system's memory devices. Server Administrator monitors the memory device status for each memory module present in the monitored system. Memory device prefailure sensors monitor memory modules by counting the number of ECC memory corrections.
Network Click the Network object to manage your system's NICs. Server Administrator monitors the status of each NIC present in your system to ensure continuous remote connection. The Network object action window can have the following tab, depending on the user's group privileges: Properties. Properties Subtab: Information Under the Properties tab, you can view information about the NICs installed in your system. Ports Click the Ports object to manage your system's external ports.
Alert Management Subtabs: Alert Actions | SNMP Traps Under the Alert Management tab, you can: • View current alert actions settings and set the alert actions that you want to be performed in the event that a system power returns a warning or failure value. • View current SNMP trap alert thresholds and set the alert threshold levels for system power watts. The selected traps will be triggered if the system generates a corresponding event at the selected severity level.
Processors Click the Processors object to manage your system's microprocessor(s). A processor is the primary computational chip inside a system that controls the interpretation and execution of arithmetic and logic functions. The Processors object action window can have the following tabs, depending on the user's group privileges: Properties and Alert Management.
Selecting DRAC allows you to access your system's remote system management capabilities. The Server Administrator DRAC provides remote access to inoperable systems, alert notification when a system is down, and the ability to restart a system. The Remote Access object action window can have the following tabs, depending on the user's group privileges: Properties, Configuration, and Users. Properties Subtab: Information Under the Properties tab, you can view general BMC/iDRAC or DRAC information.
Users Subtab: Users Under the Users tab, you can modify the remote access user configuration. You can add, configure, and view information about Remote Access Controller users. NOTE: On the Dell PowerEdge x9xx systems: • Ten user IDs are displayed. If a DRAC card is installed, sixteen user IDs are displayed. • Serial Over LAN Payload column is displayed. Slots Click the Slots object to manage the connectors or sockets on your system board that accept printed circuit boards, such as expansion cards.
Alert Management Subtabs: Alert Actions | SNMP Traps Under the Alert Management tab, you can: • View current alert actions settings and set the alert actions that you want to be performed in the event that a temperature probe returns a warning or failure value. • View current SNMP trap alert thresholds and set the alert threshold levels for temperature probes. The selected traps will be triggered if the system generates a corresponding event at the selected severity level.
Alert Management Subtabs: Alert Actions | SNMP Traps Under the Alert Management tab, you can: • View current alert actions settings and set the alert actions that you want to be performed in the event that a system voltage sensor returns a warning or failure value. • View current SNMP trap alert thresholds and set the alert threshold levels for voltage sensors. The selected traps will be triggered if the system generates a corresponding event at the selected severity level.
Storage Server Administrator provides the Storage Management Service: The Storage Management Service provides features for configuring storage devices. In most cases, the Storage Management Service is installed using Typical Setup. The Storage Management Service is available on Microsoft Windows, Red Hat Enterprise Linux, and SUSE® Linux Enterprise Server operating systems.
• Temperatures • Virtual Disks • Firmware/Driver Versions The Storage object action window can have the following tabs, depending on the user’s group privileges: Properties. Properties Subtab: Health In the Health window of the Properties tab, you can view the storage dashboard information. Storage dashboard lists all the controllers available on the system. You can configure the controllers using the Available Tasks drop down menu.
Connector Click the Connector object to view information about the connector and the enclosure or backplane attached to the connector. The Connector object action window can have the following tabs, depending on the user’s group privileges: Health and Configuration/Information. Health Under the Health tab, you can view the current status of the connector and the enclosure or backplane attached to the connector. The status is visually indicated with the icons described in "Storage Component Severity.
Physical Disks Click the Physical Disks object to view information about the physical disks attached to the enclosure or backplane. The Physical Disks object action window can have the following tab, depending on the user’s group privileges: Configuration/Information. Configuration/Information Under the Configuration/Information tab, you can view the current status and property information of the physical disks attached to the enclosure or backplane.
Power Supplies Click the Power Supplies object to view information about the enclosure power supplies. The Power Supplies object action window can have the following tab, depending on the user’s group privileges: Configuration/Information. Configuration/Information Under the Configuration/Information tab, you can view the current status and property information of the enclosure power supplies. The status is visually indicated with the icons described in "Storage Component Severity.
Firmware/Driver Versions Click the Firmware/Driver Version object to view information about the version of the driver and firmware that are currently installed on the controller. The firmware and driver properties can vary depending on the model of the controller. Firmware and driver properties may include: • Firmware Version • Minimum Required Firmware Version • Driver Version • Minimum Required Driver Version Storage Component Severity The status of a component is graded for degrees of severity.
Table 6-3. Severity Levels and Component Status (continued) Severity Level Component Status Critical/Failure/Error. The component has either failed or failure is imminent. The component requires immediate attention and may need to be replaced. Data loss may have occurred. Setting Storage Event Alerts You can use the Server Administrator Instrumentation Service to configure the most relevant Storage features, such as Storage Event alert action parameters. 1 Click the System object.
• Enclosure Failure • Storage Controller Battery Warning • Storage Controller Battery Failure NOTE: Storage Controller Battery Warning and Storage Controller Battery Failure events are not available on modular systems. 5 Choose the storage event for which you want generate alerts for selected actions. 6 Click Apply Changes. 7 Click Go Back to Alert Action Page to go back to the Alert Action Information window.
Web Server Subtabs: Properties | X.509 Certificate Under the Web Server tab, you can: • Set DSM SA Connection Service preferences. See "Dell Systems Management Server Administration Connection Service and Security Setup" for instructions on configuring your server preferences. • Perform X.509 certificate management by generating a new X.509 certificate, reusing an existing X.509 certificate, or importing a root certificate or certificate chain from a Certification Authority (CA).
Remote Access Controller Overview The Server Administrator Remote Access Controller provides a complete remote system management solution for SNMP- and CIM-instrumented systems equipped with a Dell™ Remote Access Card (DRAC) III, a DRAC III/XT, an Embedded Remote Access (ERA) controller, or an ERA Option (ERA/O) card. These hardware and software solutions are collectively known as Dell Remote Access Controllers (DRACs).
The DRAC 4 and DRAC 5 have their own microprocessor and memory, and are powered by the system in which they are installed. The DRAC 4 and DRAC 5 may be preinstalled on your system, or available separately in a kit. NOTE: The information contained in this section pertains to the previous generation of DRACs. See the Dell Remote Access Controller 4 User’s Guide for more information on using DRAC 4 or Dell Remote Access Controller 5 User’s Guide for more information on using DRAC 5.
NOTE: See the Dell Remote Access Controller Installation and Setup Guide for complete information about installing and configuring a DRAC III, a DRAC III/XT, ERA, or an ERA/O controller, and using a DRAC to remotely access an inoperable system. See the Dell Embedded Remote Access/MC Controller User's Guide for complete information about configuring and using an ERA/MC controller to remotely manage and monitor your modular system and its shared resources through a network.
Software Prerequisites The managed system must have the DRAC software installed. See the Dell Remote Access Controller Installation and Setup Guide or the Dell Embedded Remote Access/MC Controller User's Guide for a complete list of software installation prerequisites.
4 Type a new password in the New Password field. 5 Type the new password again in the Confirm Password field. 6 Configure numeric paging (for DRAC III users only): a Click the check box next to Enable Numeric Paging and enter a pager number in the Pager Number field. b Enter the numeric message in the Numeric Message field that you want the DRAC to send when it receives certain events.
10 Click Apply Changes and then click OK to save the alert, paging, and user configuration to the Server Administrator data repository. Server Administrator returns to the Users tab. The user you just created and configured is displayed in the User Name list. Configuring an Existing DRAC User NOTE: You must have Administrator privileges in Server Administrator to use the Remote Access Controller.
6 Configure alphanumeric paging (for DRAC III users only): a Select the check box next to Enable Alpha-Numeric Paging and enter a pager number in the Pager Number field. b Select the alphanumeric protocol used by the pager's service provider, 7E0 or 8N1. c Select the pager's baud rate, 300 or 1200. d Enter the message in the Custom Message field that you want the DRAC to send when it receives certain events.
Configuring the DRAC Network Properties NOTE: You must have Administrator privileges in Server Administrator to use the Remote Access Controller. Your DRAC contains an integrated 10BASE-T/100BASE-T Ethernet NIC and supports TCP/IP. The NIC has a default address of 192.168.20.1 and a default gateway of 192.168.20.1. NOTE: If your DRAC is configured to the same IP address as another NIC on the same network, an IP address conflict occurs.
c Specify the Dial-In Authentication settings that dial-in connections require: • Any — Allows the connection to use any type of encryption, including no encryption • Encrypted — Requires the connection to use some type of encryption • CHAP — Requires the connection to use the CHAP 5 To enable SMTP server address control, click the check box next to Enable SMTP, and type the SMTP server address in the SMTP (Email) Server Address field. 6 Click Apply Changes and click OK to save your changes.
Configuring the SNMP Alert Properties NOTE: You must have Administrator privileges in Server Administrator to use the Remote Access Controller. To configure the Remote Access Controller alert properties, perform the following steps: 1 Click Modular Enclosure→System/Server Module→Main System Chassis/Main System→Remote Access and then click the Configuration tab. 2 Click SNMP. 3 Click Add or click the Destination IP Address to edit existing SNMP alert properties.
Configuring DRAC III Dial-in (PPP) Users and Modem Settings Dial-in (PPP) users and modem features are currently only available for the DRAC III. Adding and Configuring a DRAC III Dial-In (PPP) User NOTE: You must have Administrator privileges in Server Administrator to use the Remote Access Controller. This subsection describes how to add and configure a dial-in (PPP) user.
7 Select a setting from the Callback Type drop-down menu: • None — When called, the Remote Access Controller does not disconnect and call back; the connection remains active. • Preset — When called, the Remote Access Controller disconnects and calls the number specified in the Callback Number field; this setting activates the callback number control. • User Specified — When called, the Remote Access Controller asks the user for the callback number.
5 Enter the phone number used by the system's modem in the Phone Number field. 6 Enter the user name for the demand dial-out user in the User Name field. 7 Enter the password for the demand dial-out user in the Password field.
Configuring the DRAC Remote Features Properties NOTE: You must have Administrator privileges in Server Administrator to use the Remote Access Controller. If the local boot image on the managed system has been corrupted, a DRAC has the ability to boot its host server using a diskette boot image that it downloads from a Trivial File Transfer Protocol (TFTP) server. This feature is called remote floppy boot. A DRAC can also update its firmware using a firmware image located on a TFTP server.
5 Configure the DRAC's firmware update parameters: a Select the check box next to Enable Remote Firmware Update. b Type the TFTP server's IP address in the Remote Firmware TFTP Address field. c Type the firmware image filename in the Remote Firmware Update Path field. The path must be relative to the root directory of the TFTP server. 6 Click Apply Changes and click OK to save your changes.
A CSR is a digital request to a CA for a secure server certificate. Secure server certificates ensure the identity of a remote system and ensure that information exchanged with the remote system cannot be viewed or changed by others. To ensure the security for your DRAC, it is strongly recommended that you generate a CSR, submit the CSR to a CA, and upload the certificate returned from the CA.
1 From the Certificate Management window, select the Upload certificate option and click Next. The Upload Certificate window appears. 2 Select the certificate type from the drop-down menu. The selections are Server Certificate and CA Certificate. 3 Type the exact path and filename of the certificate to be uploaded. NOTE: When you have a fully qualified path or filename that contains spaces, you must place double quotation marks around the string. For example, if your file is contained in c:\security files\c
Configuring Remote Connect Authentication Options Use the Remote Connect Authentication Options window to set DRAC user login authentication options. You can configure the DRAC to only allow login by users created through the Remote Access Controller (RAC users), or to allow DRAC login by users created both through the Remote Access Controller and through the local operating system. 1 Click Modular Enclosure→System/Server Module→Main System Chassis/ Main System→Remote Access and then click the Security tab.
Accessing and Using a Dell Remote Access Controller To link to the Remote Access Controller DRAC Log in window from the Server Administrator home page, click the Main System Chassis/Main System object, click the Remote Access Controller object, click the Remote Connect tab, and then click Launch the Remote Connect Interface. The DRAC Log in window appears.
Remote Access Controller
Working With the Baseboard Management Controller/Integrated Dell Remote Access Controller NOTE: Baseboard Management Controller (BMC) is supported in Dell™ PowerEdge™ x8xx and x9xx systems and Integrated Dell Remote Access Controller (iDRAC) is supported in Dell xx0x systems only.
Administrator graphical user interface by clicking the Remote Access object, which is a subcomponent of the Main System Chassis/Main System group.
Viewing Basic BMC Information You can view the basic information about the BMC and also reset the BMC settings to their default values. NOTE: You must be logged in with Administrator privileges to reset the BMC settings. 1 Click the Modular Enclosure→System/Server Module→Main System Chassis/Main System→Remote Access object.
3 Click User ID to configure a new or existing BMC/iDRAC user. The Remote Access User Configuration window allows you to configure a specific BMC/iDRAC user. 4 Specify the following general information: • Select Enable User to enable the user. • Enter the name for the user in the User Name field. • Select the Change Password check box. • Enter a new password in the New Password field. • Re-enter the new password in the Confirm New Password field.
3 Click Platform Events. The Platform Events window allows you to take individual action on specific platform events. You can select those events for which you want to take shutdown actions and generate alerts for selected actions. You can also send alerts to specific IP address destinations of your choice. NOTE: You must be logged in with Administrator privileges to configure the BMC Platform Event Filter Alerts.
NOTE: System Power Probe Warning and System Power Probe Failure are not supported on Dell systems without PMBus support though OMSA allows you to configure. NOTE: On Dell PowerEdge 1900 systems, the PS/VRM/D2D Warning, PS/VRM/D2D Failure, and Power Supply Absent Platform Event Filters are not supported even though Server Administrator allows you to configure these Event Filters.
Setting Platform Event Alert Destinations You can also use the Platform Event Filters window to select a destination where an alert for a platform event is to be sent. Depending on the number of destinations that are displayed, you can configure a separate IP address for each destination address. A platform event alert will be sent to each destination IP address that you configure. 1 Click Configure Destinations in the Platform Event Filters window.
4 Configure the following details: • Enable Serial Over LAN • Baud Rate • Minimum Privilege Required 5 Click Apply Changes. 6 Click Advanced Settings to further configure BMC. 7 In the Serial Over LAN Configuration Advanced Settings window, you may configure the following information: • Character Accumulate Interval • Character Send Threshold 8 Click Apply Changes. 9 Click Go Back to Serial Over LAN Configuration to return to the Serial Over LAN Configuration window.
6 Click Terminal Mode Settings. In the Terminal Mode Settings window, you can configure terminal mode settings for the serial port. Terminal mode is used for Intelligent Platform Interface Management (IPMI) messaging over the serial port using printable ASCII characters. Terminal mode also supports a limited number of text commands to support legacy, text-based environments. This environment is designed so that a simple terminal or terminal emulator can be used.
3 Click LAN. The LAN Configuration window appears. NOTE: BMC/iDRAC management traffic will not function properly if the LAN on motherboard (LOM) is teamed with any network adapter add-in-cards. 4 Configure the following NIC configuration details: • Enable NIC (This option is available on Dell PowerEdge x9xx systems and when DRAC is installed. Select this option for NIC teaming. In Dell PowerEdge x9xx systems, you can team NICs for added redundancy.
Accessing and Using a Integrated Dell Remote Access Controller To link to the Remote Access Controller iDRAC Log in window from the Server Administrator home page, click the Main System Chassis/Main System object, click the Remote Access Controller object, click the Remote Connect tab, and then click Launch the iDRAC Web Interface. The iDRAC Log in window appears.
Working with BMC/iDRAC
Storage Management Service Overview The Storage Management Service provides RAID and non-RAID storage management that is integrated with Server Administrator. On Microsoft® Windows®, Red Hat® Enterprise Linux®, and SUSE® Linux Enterprise Server, the Storage Management Service is installed using Typical or Custom Setup. The Storage Management Service provides storage management information in an integrated graphical view.
NOTE: For complete documentation on Storage Management, see the Storage Management online help and the Dell™ OpenManage™ Server Administrator Storage Management User's Guide. NOTE: The Storage Management Service is available on systems running Microsoft Windows, Red Hat Enterprise Linux, and SUSE Linux Enterprise Server operating systems. When using the Storage Management, you can click Help on the global navigation bar for more detailed information about the specific window you are viewing.
The Storage Management Service provides advanced features for configuring a system's locally attached RAID and non-RAID disk storage. Storage Management enables you to perform controller and enclosure functions for all supported RAID and non-RAID controllers and PowerVault™ 2xxS and PowerVault MD1000 enclosures from the Server Administrator graphical interface without requiring use of the controller BIOS utilities.
Storage Management Tree Objects When installed, the Storage Management Service is accessible by selecting the Storage tree object on the Server Administrator graphical user interface. The Storage object expands to display tree objects for the supported controllers attached to the system. The controller object expands to display the storage attached to the controller.
Information/Configuration Tab The Information/Configuration tab displays the property information for the selected tree object. When using the Storage Management Service, the Information/Configuration tabs also have drop-down menus and buttons for executing storage tasks and launching wizards. Storage Management Tasks The Storage Management Service has drop-down menus and wizards for executing storage management and configuration tasks.
Reconfigure Virtual Disk Wizard The Reconfigure Virtual Disk Wizard enables you to change the virtual disk configuration. Using this task, you can change the RAID level or increase the virtual disk size by adding physical disks. To launch the Reconfigure Virtual Disk Wizard: 1 Expand the Storage tree object to display the controller objects. 2 Expand a controller object. 3 Select the Virtual Disks object. 4 Select Reconfigure from the Available Tasks drop-down menu. 5 Click Execute.
You can change the hot spare assignment by unassigning a disk and choosing another disk as needed. You can also assign more than one physical disk as a global hot spare. Global hot spares must be assigned and unassigned manually. They are not assigned to specific virtual disks. If you want to assign a hot spare to a virtual disk (it will replace any physical disk that fails in the virtual disk) then use the instructions to assign and unassign dedicated hot spare.
Rebuild a Failed Physical Disk If the failed physical disk is part of a redundant virtual disk, then the physical disk failure should not result in data loss if replaced immediately. The rebuild task is available when the Physical Disks object is selected. See the Storage Management online help for more information. Global Tasks The following global tasks are available when the Storage object is selected. See the Storage Management online help for more information.
• Export Log File: This task exports the controller log to a text file. • Import Foreign Configuration: This task imports virtual disks that reside on physical disks that have been moved from another controller. • Clear Foreign Configuration: Use the clear foreign configuration task to clear or erase the virtual disk information from the newly attached physical disks.
Connector Tasks The following connector tasks are available when the Connector object is selected. See the Storage Management online help for more information. • Rescan Connector: This task rescans the controller connectors to verify the currently connected devices or to recognize new devices that have been added to the connectors. Performing a rescan on a connector is similar to performing a rescan on the controller.
Physical Disk Tasks The following physical disk tasks are available when the Physical Disks object is selected. See the Storage Management online help for more information. • Blink and Unblink: The Blink task allows you to find a disk within an enclosure by blinking one of the light-emitting diodes (LEDs) on the disk. The Unblink task cancels the Blink task. • Remove Dead Segments: In certain circumstances, this task enables you to recover disk space that is currently unusable.
• Format and Initialize; Slow and Fast Initialize: Use the Format or Initialize; Slow and Fast Initialize task to erase files and remove the file systems on a virtual disk. • Cancel Background Initialization: On some controllers, background initialization of redundant virtual disks begins automatically after the virtual disk is created. Use this task if you need to cancel the background initialization.
Migrating from Array Manager to the Storage Management If you replace an existing Array Manager installation with Storage Management, the following migration considerations apply: • Virtual Disk Preservation: You can preserve the virtual disk names when migrating from Array Manager to Storage Management. To do so, however, you must not uninstall Array Manager prior to installing Storage Management.
The Storage Management provides additional online help. This help is available when the Storage or a lower-level tree object is selected.
Server Administrator Logs Overview Server Administrator allows you view and manage hardware, alert, and command logs. All users can access logs and print reports from either the Server Administrator home page or from its command line interface. Users must be logged in with Administrator privileges to clear logs or must be logged in with Administrator or Power User privileges to e-mail logs to their designated service contact.
• Click Clear Log to erase all events from the log. • Click Save As to save the log content in a .zip file. • Click Refresh to reload the log content in the action window data area. See "Task Buttons" for additional information about using the task buttons. Server Administrator Logs Server Administrator provides the following logs: • "Hardware Log" • "Alert Log" • "Command Log" Hardware Log Use the hardware log to look for potential problems with your system's hardware components.
Maintaining the Hardware Log The status indicator icon next to the log name on the Server Administrator homepage will change from normal status ( ) to noncritical status ( ) when the log file reaches 80 percent capacity. Be sure to clear the hardware log when it reaches 80 percent capacity. If the log is allowed to reach 100 percent capacity, the latest events are discarded from the log.
Command Log NOTE: If the Command log displays invalid XML data (for example, when XML data generated for the selection is not well formed), click Clear Log and then redisplay the log information. Use the Command log to monitor all of the commands issued by Server Administrator users. The Command log tracks logins, logouts, systems management software initialization, and shutdowns initiated by systems management software, and records the last time the log was cleared.
Troubleshooting Setting Alert Actions for Systems Running Supported Red Hat Enterprise Linux and SUSE Linux Enterprise Server Operating Systems When you set Alert Actions for an event, you can specify the action to Display an alert on the server. To perform this action, Server Administrator writes a message to /dev/console. If the Server Administrator system is running an X Window System, you will not see that message by default.
• Redirect stdout and stderr to a file when specifying the application so that you can see any output or error messages. • If you want to execute multiple applications (or commands) for an alert, create a script to do that and put the full path to the script in the Absolute path to the application box. Example 1: ps -ef >/tmp/psout.txt 2>&1 The command in Example 1 executes the application ps, redirects stdout to the file /tmp/psout.txt, and redirects stderr to the same file as stdout.
Do not set a path to an interactive application (an application that has a Graphical User Interface or which requires user input) in the Absolute path to the application field. The interactive application may not work as expected on some operating systems. NOTE: Microsoft Windows Server 2008 is scheduled to be available in the first half of 2008. For latest information, see http://www.microsoft.com/windowsserver2008/default.mspx. NOTE: The full path to both the cmd.
Table A-1. BMC PEF Alert Events (continued) Event Description PPS/VRM/DCtoDC Warning The power supply, voltage regulator module, or DC to DC converter is pending a failure condition. Power Supply/VRM/D2D The power supply, voltage regulator module, or DC to DC Failure converter has failed. Hardware log is full or emptied Either an empty or a full hardware log requires administrator attention.
Fixing a Faulty Server Administrator Installation on Supported Windows Operating Systems You can fix a faulty installation by forcing a reinstall and then performing an uninstall of Server Administrator. To force a reinstall: 1 Find out the version of Server Administrator that was previously installed. 2 Download the installation package for that version from the Dell™ Support website at support.dell.com. 3 Locate SysMgmt.msi from the srvadmin\windows\SystemsManagement directory.
Troubleshooting
Glossary The following list defines or identifies technical terms, abbreviations, and acronyms used in your system documents. A Abbreviation for ampere(s). AC Abbreviation for alternating current. AC power switch A switch with two AC power inputs that provides AC power redundancy by failing over to a standby AC input in the event of a failure to the primary AC input. access Refers to the actions a user can take on a variable value. Examples include read-only and read-write.
ASCII Acronym for American Standard Code for Information Interchange. A text file containing only characters from the ASCII character set (usually created with a text editor, such as Notepad in Microsoft® Windows®), is called an ASCII file. ASIC Acronym for application-specific integrated circuit. ASPI Acronym for advanced SCSI programming interface. asset tag code An individual code assigned to a system, usually by a system administrator, for security or tracking purposes.
backup A copy of a program or data file. As a precaution, you should back up your system's hard drive on a regular basis. Before making a change to the configuration of your system, you should back up important start-up files from your operating system. baud rate A measurement of data transmission speed. For example, modems are designed to transmit data at one or more specified baud rate(s) through the COM (serial) port of a system.
boot routine When you start your system, it clears all memory, initializes devices, and loads the operating system. Unless the operating system fails to respond, you can reboot (also called warm boot) your system by pressing ; otherwise, you must perform a cold boot by pressing the reset button or by turning the system off and then back on. bootable diskette You can start your system from a diskette.
cache A fast storage area that keeps a copy of data or instructions for quicker data retrieval. For example, your system's BIOS may cache ROM code in faster RAM. Or, a disk-cache utility may reserve RAM in which to store frequently accessed information from your system's disk drives; when a program makes a request to a disk drive for data that is in the cache, the disk-cache utility can retrieve the data from RAM faster than from the disk drive.
CIM Acronym for Common Information Model, which is a model for describing management information from the DMTF. CIM is implementation independent, allowing different management applications to collect the required data from a variety of sources. CIM includes schemas for systems, networks, applications and devices, and new schemas will be added. It provides mapping techniques for interchange of CIM data with MIB data from SNMP agents. CIMOM Acronym for common information model object manager.
ConsoleOne Novell ConsoleOne is a Java-based foundation for graphical utilities that manage and administer network resources from different locations and platforms. ConsoleOne provides a single point of control for all Novell and external products. controller A chip that controls the transfer of data between the microprocessor and memory or between the microprocessor and a peripheral device such as a disk drive or the keyboard.
CRC Abbreviation for cyclic redundancy code, which is a number derived from, and stored or transmitted with, a block of data in order to detect corruption. By recalculating the CRC and comparing it to the value originally transmitted, the receiver can detect some types of transmission errors. CSR Abbreviation for certificate signing request. cursor A marker, such as a block, underscore, or pointer that represents the position at which the next keyboard or mouse action will occur.
DHCP Abbreviation for Dynamic Host Configuration Protocol, a protocol that provides a means to dynamically allocate IP addresses to computers on a LAN. DIMM Acronym for dual in-line memory module. A small circuit board containing DRAM chips that connects to the system board. DIN Acronym for Deutsche Industrie Norm which is the standards-setting organization for Germany. A DIN connector is a connector that conforms to one of the many standards defined by DIN.
dpi Abbreviation for dots per inch. DPMS Abbreviation for Display Power Management Signaling. A standard developed by the Video Electronics Standards Association (VESA®) that defines the hardware signals sent by a video controller to activate power management states in a monitor. A monitor is said to be DPMS-compliant when it is designed to enter a power management state after receiving the appropriate signal from a system's video controller. DRAC 4 Acronym for Dell™ Remote Access Controller 4.
DSM SA Connection Service Acronym for Dell Systems Management Server Administration. An application that makes Web pages available for viewing by Web browsers using the HTTPS protocol. See "Web server". DTE Abbreviation for data terminal equipment. Any device, such as a computer system, that can send data in digital form by means of a cable or communications line. The DTE is connected to the cable or communications line through a data communications equipment (DCE) device, such as a modem.
EISA Acronym for Extended Industry-Standard Architecture, a 32-bit expansion-bus design. The expansion-card connectors in an EISA system are also compatible with 8- or 16-bit ISA expansion cards. To avoid a configuration conflict when installing an EISA expansion card, you must use the EISA Configuration Utility. This utility allows you to specify which expansion slot contains the card and obtains information about the card's required system resources from a corresponding EISA configuration file.
ERA/O Abbreviation for embedded remote access option. ESD Abbreviation for electrostatic discharge. ESM Abbreviation for embedded systems management. expanded memory A technique for accessing RAM above 1 MB. To enable expanded memory on your system, you must use an EMM. You should configure your system to support expanded memory only if you run application programs that can use (or require) expanded memory.
FAT Acronym for file allocation table. FAT and FAT32 are file systems that are defined as follows: • FAT — A file system used by MS-DOS, Windows 3.x, Windows 95, and Windows 98. Windows NT® and Windows 2000 also can use the FAT file system. The operating system maintains a table to keep track of the status of various segments of disk space used for file storage. • FAT32 — A derivative of the FAT file system.
format To prepare a hard drive or diskette for storing files. An unconditional format deletes all data stored on the disk. FPBGA Abbreviation for field programmable gate array, a programmable logic chip (PLD) with a high density of gates. FRU Abbreviation for field replaceable unit. ft Abbreviation for feet. FTP Abbreviation for file transfer protocol. g Abbreviation for gram(s). G Abbreviation for gravities. GB Abbreviation for gigabyte(s). A gigabyte equals 1024 megabytes or 1,073,741,824 bytes.
h Abbreviation for hexadecimal. A base-16 numbering system, often used in programming to identify addresses in the system's RAM and I/O memory addresses for devices. The sequence of decimal numbers from 0 through 16, for example, is expressed in hexadecimal notation as: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F, 10. In text, hexadecimal numbers are often followed by h. HBA Abbreviation for host bus adapter.
HTTPS Abbreviation for HyperText Transmission Protocol, Secure. HTTPS is a variant of HTTP used by Web browsers for handling secure transactions. HTTPS is a unique protocol that is simply SSL underneath HTTP. You need to use "https://" for HTTP URLs with SSL, whereas you continue to use "http://" for HTTP URLs without SSL. Hz Abbreviation for hertz. ICES Abbreviation for Interference Causing Equipment Standard (in Canada). ICMP Abbreviation for Internet Control Message Protocol.
interlacing A technique for increasing video resolution by only updating alternate horizontal lines on the screen. Because interlacing can result in noticeable screen flicker, most users prefer noninterlaced video adapter resolutions. internal microprocessor cache An instruction and data cache built in to the microprocessor. The Intel Pentium microprocessor includes a 16-KB internal cache, which is set up as an 8-KB read-only instruction cache and an 8-KB read/write data cache.
iSCSI Acronym for Internet SCSI. An IP based storage networking standard for linking data storage facilities. By carrying SCSI commands over IP networks, iSCSI is used to facilitate data transfers over intranets and to manage storage over long distances. ISV Abbreviation for independent software vendor. ITE Abbreviation for information technology equipment. Java A cross-platform programming language developed by Sun Microsystems. JSSE Abbreviation for Java Secure Socket Extension.
Kerberos A network authentication protocol. It is designed to provide strong authentication for client/server applications by using secret-key cryptography. key combination A command requiring you to press multiple keys at the same time. For example, you can reboot your system by pressing the key combination. kg Abbreviation for kilogram(s), 1000 grams. kHz Abbreviation for kilohertz, 1000 hertz. LAN Acronym for local area network.
local bus On a system with local-bus expansion capability, certain peripheral devices (such as the video adapter circuitry) can be designed to run much faster than they would with a traditional expansion bus. Some local-bus designs allow peripherals to run at the same speed and with the same width data path as the system's microprocessor. LOM Acronym for LAN on Motherboard LPTn The device names for the first through third parallel printer ports on your system are LPT1, LPT2, and LPT3.
MB/sec Abbreviation for megabytes per second. Mbps Abbreviation for megabits per second. MBR Abbreviation for master boot record. MCA Abbreviation for Micro Channel Architecture, which is designed for multiprocessing. MCA eliminates potential conflicts that arise when installing new peripheral devices. MCA is not compatible with either EISA or XT bus architecture, so older cards cannot be used with it. memory A system can contain several different forms of memory, such as RAM, ROM, and video memory.
microprocessor The primary computational chip inside the system that controls the interpretation and execution of arithmetic and logic functions. Software written for one microprocessor must usually be revised to run on another microprocessor. CPU is a synonym for microprocessor. MIDI Acronym for musical instrument digital interface. mm Abbreviation for millimeter(s). modem A device that allows your system to communicate with other systems over telephone lines.
MTBF Abbreviation for mean time between failures. multifrequency monitor A monitor that supports several video standards. A multifrequency monitor can adjust to the frequency range of the signal from a variety of video adapters. mV Abbreviation for millivolt(s). name The name of an object or variable is the exact string that identifies it in an SNMP Management Information Base (MIB) file or in a CIM Management Object File (MOF). NDIS Abbreviation for Network Driver Interface Specification.
NTFS Abbreviation for the Windows NT File System option in the Windows NT operating system. NTFS is an advanced file system designed for use specifically within the Windows NT operating system. It supports file system recovery, extremely large storage media, and long file names. It also supports object-oriented applications by treating all files as objects with user-defined and system-defined attributes. See also FAT and FAT32. NTLM Abbreviation for Windows NT LAN Manager.
parallel port An I/O port used most often to connect a parallel printer to your system. You can usually identify a parallel port on your system by its 25-hole connector. parameter A value or option that you specify to a program. A parameter is sometimes called a switch or an argument. partition You can divide a hard drive into multiple physical sections called partitions with the fdisk command. Each partition can contain multiple logical drives.
physical memory array The physical memory array is the entire physical memory of a system. Variables for physical memory array include maximum size, total number of memory slots on the motherboard, and total number of slots in use. physical memory array mapped The physical memory array mapped refers to the way physical memory is divided. For example, one mapped area may have 640 KB and the other mapped area may have between 1 MB and 127 MB. PIC Acronym for programmable interrupt controller.
POST Acronym for power-on self-test. Before the operating system loads when you turn on your system, the POST tests various system components such as RAM, the disk drives, and the keyboard. power supply An electrical system that converts AC current from the wall outlet into the DC currents required by the system circuitry. The power supply in a personal computer typically generates multiple voltages. power unit A set of power supplies in a system chassis. ppm Abbreviation for pages per minute.
provider A provider is an extension of a CIM schema that communicates with managed objects and accesses data and event notifications from a variety of sources. Providers forward this information to the CIM Object Manager for integration and interpretation. PS Abbreviation for power supply. PS/2 Abbreviation for Personal System/2. PXE Abbreviation for Pre-boot eXecution Environment. QFP Abbreviation for quad flat pack. RAC Acronym for remote access controller.
RBAC Abbreviation for role-based access control. RDRAM Acronym for Rambus DRAM. A dynamic RAM chip technology from Rambus, Inc. Direct RDRAMs are used in systems. Direct RDRAM chips are housed in RIMM modules, which are similar to DIMMs but have different pin settings. The chips can be built with dual channels, doubling the transfer rate to 3.2 GB/sec. read-only file A read-only file is one that you are prohibited from editing or deleting.
remote management system A remote management system is any system that accesses the Server Administrator home page on a managed system from a remote location using a supported Web browser. See managed system. RFI Abbreviation for radio frequency interference. RGB Abbreviation for red/green/blue. RIMM Acronym for Rambus In-line Memory Module, which is the Rambus equivalent of a DIMM module. RMI Acronym for Remote Method Invocation.
SAS Acronym for Secure Authentication Services or Serial-attached SCSI. When referring to security protocols or authentication, SAS is Secure Authentication Services. When referring to computer peripheral devices that employ a serial (one bit at a time) means of digital data transfer over thin cables, SAS is Serial-attached SCSI. SCA Abbreviation for single connector attachment. schema A collection of class definitions that describes managed objects in a particular environment.
settings Settings are conditions of a manageable object help to determine what happens when a certain value is detected in a component. For example, a user can set the upper critical threshold of a temperature probe to 75 degrees Celsius. If the probe reaches that temperature, the setting results in an alert being sent to the management system so that user intervention can be taken. Some settings, when reached, can trigger a system shutdown or other response that can prevent damage to the system.
SKU Acronym for stock keeping unit. SMART Acronym for Self-Monitoring Analysis and Reporting Technology. A technology that allows hard drives to report errors and failures to the system BIOS, which then displays an error message on the screen. To take advantage of this technology, you must have a SMART-compliant hard drive and the proper support in the system BIOS. SMBIOS Acronym for system management BIOS. SMD Abbreviation for surface mount device. SMTP Abbreviation for Simple Mail Transfer Protocol.
SRAM Abbreviation for static random-access memory. Because SRAM chips do not require continual refreshing, they are substantially faster than DRAM chips. SSL Abbreviation for secure socket layer. state Refers to the condition of an object that can have more than one condition. For example, an object may be in the "not ready" state. status Refers to the health or functioning of an object. For example, a temperature probe can have the status normal if the probe is measuring acceptable temperatures.
system board As the main circuit board, the system board usually contains most of your system's integral components, such as the following: • Microprocessor • RAM • Controllers for standard peripheral devices, such as the keyboard • Various ROM chips Frequently used synonyms for system board are motherboard and logic board. system configuration information Data stored in memory that tells a system what hardware is installed and how the system should be configured for operation.
TCP/IP Abbreviation for Transmission Control Protocol/Internet Protocol. A system for transferring information over a computer network containing dissimilar systems, such as systems running Windows and UNIX. termination Some devices (such as the last device at each end of a SCSI cable) must be terminated to prevent reflections and spurious signals in the cable.
time-out A specified period of system inactivity that must occur before an energy conservation feature is activated. tpi Abbreviation for tracks per inch. TPM Acronym for Trusted Platform Module TQFP Abbreviation for thin quad flat pack. TSOP Abbreviation for thin small outline package. A very thin, plastic, rectangular surface mount chip package with gull-wing pins on its two short sides. TSR Abbreviation for terminate-and-stay-resident. A TSR program runs "in the background.
unicode A fixed width, 16-bit world wide character encoding, developed and maintained by the Unicode Consortium. upper memory area The 384 KB of RAM located between 640 KB and 1 MB. If the system has an Intel386 or higher microprocessor, a utility called a memory manager can create UMBs in the upper memory area, in which you can load device drivers and memory-resident programs. UPS Abbreviation for uninterruptible power supply.
VAC Abbreviation for volt(s) alternating current. varbind An algorithm used to assign an object identifier (OID). The varbind gives rules for arriving at the decimal prefix that uniquely identifies an enterprise, as well as the formula for specifying a unique identifier for the objects defined in that enterprise's MIB. variable A component of a managed object.
video adapter The logical circuitry that provides—in combination with the monitor—your system's video capabilities. A video adapter may support more or fewer features than a specific monitor offers. Typically, a video adapter comes with video drivers for displaying popular application programs and operating systems in a variety of video modes. On some systems, a video adapter is integrated into the system board. Also available are many video adapter cards that plug into an expansion-card connector.
virtual memory A method for increasing addressable RAM by using the hard drive. For example, in a system with 16 MB of RAM and 16 MB of virtual memory set up on the hard drive, the operating system would manage the system as though it had 32 MB of physical RAM. virus A self-starting program designed to inconvenience you. Virus programs have been known to corrupt the files stored on a hard drive or to replicate themselves until a computer system or network runs out of memory.
Wakeup on LAN The ability for the power in a client station to be turned on by the network. Remote wake-up enables software upgrading and other management tasks to be performed on users' machines after the work day is over. It also enables remote users to gain access to machines that have been turned off. Intel calls remote wake-up "Wake-on-LAN." Web server An application that makes Web pages available for viewing by Web browsers using the HTTP protocol. WH Abbreviation for watt-hour(s).
write-protected Read-only files are said to be write-protected. You can write-protect a 3.5-inch diskette by sliding its write-protect tab to the open position or by setting the write-protect feature in the System Setup program. WMI Acronym for Windows Management Instrumentation. WMI provides CIM Object Manager services. X.509 Certificate An X.509 certificate binds a public encryption key to the identity or other attribute of its principal.
Index A about remote access service, 105 server, 11, 43 AC switch, 83 action window, of home page, 62 administer, Server Administrator, 21 alert, 80-88, 90-91, 94-95 alert actions, Red Hat Enterprise Linux, 155 BMC, 91, 125 about, 125 alert messages, 157 configuring users, 127 filter alerts, 128 Serial Over LAN (SOL), 131 serial port connection, 132 viewing basic details, 127 virtual LAN connection, 133 working with, 125 BMC, manage, 91 browser setting, Windows, 58-59 alert messages, BMC, 157 alert proper
components of home page action window, 62 data area, 63-64 navigation bar, 62 system tree, 62 configuring serial port, BMC, 132 configuring SNMP Agent, 28 for Red Hat Enterprise Linux, 33, 35-36 for Windows, 30-32 disabling users, for Windows, 28 documentation, related, 15 DRAC dial-in users, 115 modem settings, 115 DRAC III adding dial-in users, 115 adding dial-out entries, 116 configuring dial-in users, 115 configuring dial-out entries, 116 modem settings, 117 configuring, BMC users, 127 configuring, fi
F failure, virtual disk, 144 home page, Server Administrator, 59 fans, manage, 85 firewalls, configuring for Red Hat Enterprise Linux, 41 firmware, manage, 86 G gauge indicator, home page, 64 generating CSR, 120 H help, using, 65 home page components, 62-64 gauge indicator, 64 preferences, 65 server, 12 status indicator, 63 system tree objects, 76 task button, 64 underlined item, 64 home page, managing configuration options, 103 general settings, 103 Server Administrator, preferences, 104 user preferenc
logs, 79 about, 151-152 alert log, 153 command log, 154 features, 151 hardware log, 152 server, 14 N navigation bar, of home page, 62 network properties, RAC, 112 network, managing, 89 O online help, using, 65 M manage current, 85 intrusion, 87 memory devices, 88 ports, 89 power supplies, 90 processors, 91 system, 74 temperatures, 93 management alert, 80-88, 90-91, 94-95 certificate, X.509, 70, 104 security, 21 storage, 13 storage, enhanced, 96 using install CD, 43 X.
privileges, types of for Red Hat Enterprise Linux, 25-26 procedure installing server, 50 installing server, with Citrix, 51 processors, manage, 91 protocol, systems management, 49 remote access, 13 server, 13 remote access controller, managing, 91 remote access service about, 105 hardware prerequisites, 107 software prerequisites, 108 remote features, RAC, 118 remote shutdown, 79 R RAC users adding, 108 configuring, 108 configuring existing user, 110 RAC, alert properties, 113 RAC, certificate management,
server about, 43 features, 11 home page, 12 install, 12, 43 instrumentation, 13 logs, 14 Server Administrator, 11 about, 11 adding users, 24 authentication, 23 controlling, 70 disabling users, Windows, 28 encryption, 23 features, integrated, 43 logs, 151 restarting, 71 security, 21 uses, 11 what’s new?, 19 Server Administrator, stopping, 71 on Red Hat Enterprise Linux, 71 on Windows, 71 Server Administrator, using, 55 server features, integrated, 11 home page, 12 installation, 12 instrumentation, 13 logs,
Sever Administrator, home page, 59 components, 62-64 preferences, 65 shutdown, 79 single sign-on, 56 Windows, 57 slots, manage, 93 SNMP agent configuration, 34 SNMP Agent, configuring, 28, 30-33, 35-36 SNMP alert properties, RAC, 114 SNMP community name, changing, 31 SNMP community name, for Red Hat Enterprise Linux, 35 SNMP set operations, enabling, 32 SNMP set operations, Red Hat Enterprise Linux, 36 SNMP tables reference guide content, 29 SNMP traps, configuring for Red Hat Enterprise Linux, 36 for Windo
system, managing, 74 V systems management, protocols, 49 viewing certificate, RAC, 121 viewing, BMC basic details, 127 virtual disk, backup, 142 T task button, home page, 64 tasks, enhanced storage management, 144-147 virtual disk, enhanced storage management, 141-142 virtual disk, failure, 144 virtual disk, spare, 142 temperature, manage, 93 virtual LAN, BMC, 133 thermal, shutdown, 79 voltage, manage, 94 tree objects, home page, 76 W U Web browsers, supported, 49 unattended install, 43 Web se