book.book Page 1 Monday, July 7, 2008 2:59 PM Dell™ OpenManage™ Server Administrator Version 5.5 User’s Guide w w w. d e l l . c o m | s u p p o r t . d e l l .
book.book Page 2 Monday, July 7, 2008 2:59 PM Notes and Notices NOTE: A NOTE indicates important information that helps you make better use of your computer. NOTICE: A NOTICE indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. ____________________ Information in this document is subject to change without notice. © 2008 Dell Inc. All rights reserved. Reproduction in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden.
book.book Page 3 Monday, July 7, 2008 2:59 PM Contents 1 Introduction . Overview . . . . . . . . . . . . . . . . . . . . . . 11 . . . . . . . . . . . . . . . . . . . . . . . . 11 Integrated Features Installation . . . . . . . . . . . . . . . . . . . 11 . . . . . . . . . . . . . . . . . . . . . 12 Server Administrator Home Page Instrumentation Service . . . . . . . . . 12 . . . . . . . . . . . . . . 13 Remote Access Controller . . . . . . . . . . . . . Logs 13 . . . . . . . . . . . . .
book.book Page 4 Monday, July 7, 2008 2:59 PM Assigning User Privileges . . . . . . . . . . . . . . . . Creating Server Administrator Users for Supported Red Hat Enterprise Linux and SUSE Linux Enterprise Server Operating Systems . . . . 25 . . . . . 28 . . . . . . . . . . . . . . 28 Disabling Guest and Anonymous Accounts in Supported Windows Operating Systems . . . Configuring the SNMP Agent Configuring the SNMP Agent for Systems Running Supported Windows Operating Systems . . . . . . . . . . .
book.book Page 5 Monday, July 7, 2008 2:59 PM Installation Procedures . . . . . . . . . . . . . . . . . Using Dell OpenManage with Citrix XenServer Dell Edition . . . . . . . . . . . . . . . Considerations Before Installing Storage Management Service . . . . . . . . . . . . . . . Using Server Administrator Single Sign-On . . . . . . . . . . 51 . . . . . . 51 . . . . . . . . . . . . . . . . . . . 52 . . . . . . . . . . . . . . . . . . .
book.book Page 6 Monday, July 7, 2008 2:59 PM 6 Remote Access Controller Overview . . . . . . . . . . . . 69 . . . . . . . . . . . . . . . . . . . . . . . . 69 Hardware Prerequisites . . . . . . . . . . . . . . . . . 71 Software Prerequisites . . . . . . . . . . . . . . . . . 72 Adding and Configuring DRAC Users Configuring an Existing DRAC User . . . . . . . . . . 72 . . . . . . . . . . . 74 Configuring the DRAC Network Properties Configuring the DRAC Alert Properties . . . . . . .
book.book Page 7 Monday, July 7, 2008 2:59 PM 7 Instrumentation Service Managing Your System . . . . . . . . . . . . . 89 . . . . . . . . . . . . . . . . . 90 . . . . 92 . . . . . . . 92 . . . . . . . . . . . . . . . . . 93 Managing System/Server Module Tree Objects Server Administrator Home Page System Tree Objects . . . . . . . . . . . . . . . . Modular Enclosure System/Server Module . Managing Preferences: Home Page Configuration Options . . . . . . . . General Settings . . . . . . . . .
book.book Page 8 Monday, July 7, 2008 2:59 PM Configuring the BMC/iDRAC to use a LAN Connection . . . . . . . . . . . . . . . . . . . . . . . . Accessing and Using a Integrated Dell Remote Access Controller . . . . . . . . . . . . . . . . 9 Storage Management Service Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133 133 . . . . . . . . . . . . . . . . . 134 Hardware Prerequisites . . . . . . . . . . . . . . . . . 134 . . . . . . . . . . . . .
book.book Page 9 Monday, July 7, 2008 2:59 PM 11 Setting Alert Actions . . . . . . . . . . . . . . . Setting Alert Actions for Systems Running Supported Red Hat Enterprise Linux and SUSE Linux Enterprise Server Operating Systems . . . . 154 . . . . . . 155 . . . . . . . . . . . . . 156 BMC Platform Events Filter Alert Messages A Troubleshooting 153 . . . . Setting Alert Actions in Microsoft Windows 2000, Windows Server 2003, and Windows Server 2008 . Understanding Service Names 153 . . . .
book.
book.book Page 11 Monday, July 7, 2008 2:59 PM Introduction Overview Server Administrator provides a comprehensive, one-to-one systems management solution in two ways: from an integrated, Web browser-based graphical user interface (GUI) and from a command line interface (CLI) through the operating system. Server Administrator is designed for system administrators to manage systems locally and remotely on a network.
book.book Page 12 Monday, July 7, 2008 2:59 PM Installation You can install Server Administrator using several methods. The Dell™ Systems Management Tools and Documentation DVD provides a setup program to install, upgrade, and uninstall Server Administrator and other managed system software components on your managed system. This DVD also provides a setup program to install, upgrade and uninstall management station software components on your management station.
book.book Page 13 Monday, July 7, 2008 2:59 PM Instrumentation Service The Instrumentation Service provides rapid access to detailed fault and performance information gathered by industry-standard systems management agents and allows remote administration of monitored systems, including shutdown, startup, and security. Remote Access Controller NOTE: The Remote Access Controller is not available on modular systems.
book.book Page 14 Monday, July 7, 2008 2:59 PM On supported Microsoft® Windows® operating systems, Storage Management is installed using the Typical Setup. On systems running supported Red Hat® Enterprise Linux® and SUSE® Linux Enterprise Server operating systems, you can either install the Storage Management Service through the Red Hat Package Manager (RPM) or use the srvadmin-install.sh script—a menu driven script that installs the appropriate RPMs based on the options you choose.
book.book Page 15 Monday, July 7, 2008 2:59 PM Other Documents You Might Need Besides this User's Guide, you can find the following guides either on the Dell Support website at support.dell.com or on the Dell Systems Management Tools and Documentation DVD: • The Dell Systems Software Support Matrix provides information about the various Dell systems, the operating systems supported by these systems, and the Dell OpenManage components that can be installed on these systems.
book.book Page 16 Monday, July 7, 2008 2:59 PM 16 • The Dell OpenManage Server Administrator Command Line Interface User's Guide documents the complete command line interface for Server Administrator, including an explanation of CLI commands to view system status, access logs, create reports, configure various component parameters, and set critical thresholds. • The Dell Integrated Remote Access Contoller User’s Guide provides detailed information on configuring and using the iDRAC.
book.book Page 17 Monday, July 7, 2008 2:59 PM • The Dell OpenManage Remote Install User's Guide provides information about unattended, simultaneous provisioning and configuration solutions over the network by leveraging image-based technology. • The Dell Update Packages User's Guide provides information about obtaining and using Dell Update Packages as part of your system update strategy.
book.
book.book Page 19 Monday, July 7, 2008 2:59 PM What’s New for Version 5.
book.book Page 20 Monday, July 7, 2008 2:59 PM However, if you need version 1.0.7 of the Dell Systems Build and Update Utility (to support x6xx and x7xx Dell systems and Windows Server 2008 operating systems), you can download the ISO image from the Dell Support site at support.dell.com. You can also download Web packages of versions 5.5 of the Dell OpenManage Server Administrator and Dell OpenManage Management Station software from the Dell Support site at support.dell.com.
book.book Page 21 Monday, July 7, 2008 2:59 PM Setup and Administration Security Management Server Administrator provides security through role-based access control (RBAC), authentication, and encryption for both the Web-based and command line interfaces. Role-Based Access Control RBAC manages security by determining the operations that can be executed by persons in particular roles.
book.book Page 22 Monday, July 7, 2008 2:59 PM Table 3-1. User Privileges User Privileges Access Type Administrator Write User Read X Power User Administrator X X X X X Read access allows viewing of data reported by Server Administrator. Read access does not allow changing or setting values on the managed system. Write access allows values to be changed or set on the managed system. Administrator access also allows shutdown of the managed system.
book.book Page 23 Monday, July 7, 2008 2:59 PM Authentication The Server Administrator authentication scheme ensures that the correct access types are assigned to the correct user privileges. Additionally, when the command line interface (CLI) is invoked, the Server Administrator authentication scheme validates the context within which the current process is running.
book.book Page 24 Monday, July 7, 2008 2:59 PM Assigning User Privileges To ensure critical system component security, assign user privileges to all Dell™ OpenManage™ software users before installing Dell OpenManage software. New users can log into Dell OpenManage software using their operating system user privileges. NOTICE: To protect access to your critical system components, assign a password to every user account that can access Dell OpenManage software.
book.book Page 25 Monday, July 7, 2008 2:59 PM 8 Select the appropriate group and click Add. 9 Click OK, and then click OK again. New users can log into Dell OpenManage software with the user privileges for their assigned group and domain. Creating Server Administrator Users for Supported Red Hat Enterprise Linux and SUSE Linux Enterprise Server Operating Systems Administrator access privileges are assigned to the user logged in as root.
book.book Page 26 Monday, July 7, 2008 2:59 PM Creating Users With Power User Privileges 1 Run the following command from the command line: useradd -d -g root NOTE: You must set root as the primary group. 2 Type passwd and press . 3 When prompted, enter a password for the new user. NOTICE: You must assign a password to every user account that can access Server Administrator to protect access to your critical system components.
book.book Page 27 Monday, July 7, 2008 2:59 PM Table 3-5 lists the examples for adding the role definition to the omarolemap file. Table 3-5. Examples for adding the role definition in OpenManage Server Administrator Bob Ahost Poweruser +root Bhost Administrator +root Chost Administrator Bob *.aus.amer.com Poweruser Mike 192.168.2.3 Poweruser 3 Save and close the file.
book.book Page 28 Monday, July 7, 2008 2:59 PM • After the connection services are restarted and the changes do not take effect for /etc/omarolemap file refer to command log for the errors. • When omarolemap file is copied from one machine to another machine, file permissions and the entries of the file needs to be rechecked. • Prefix the Group Name with +.
book.book Page 29 Monday, July 7, 2008 2:59 PM You can configure the SNMP agent to change the community name, enable Set operations, and send traps to a management station. To configure your SNMP agent for proper interaction with management applications such as the Dell OpenManage™ IT Assistant, perform the procedures described in the following sections. NOTE: The default SNMP agent configuration usually includes a SNMP community name such as public.
book.book Page 30 Monday, July 7, 2008 2:59 PM Configuring the SNMP Agent for Systems Running Supported Windows Operating Systems Server Administrator uses the SNMP services provided by the Windows SNMP agent. You can configure the SNMP agent to change the community name, enable Set operations, and send traps to a management station. To configure your SNMP agent for proper interaction with management applications such as IT Assistant, perform the procedures described in the following sections.
book.book Page 31 Monday, July 7, 2008 2:59 PM Changing the SNMP Community Name Configuring the SNMP community names determines which systems are able to manage your system through SNMP. The SNMP community name used by management applications must match an SNMP community name configured on the Server Administrator system so that the management applications can retrieve management information from Server Administrator. 1 Open the Computer Management window.
book.book Page 32 Monday, July 7, 2008 2:59 PM Enabling SNMP Set Operations SNMP Set operations must be enabled on the Server Administrator system to change Server Administrator attributes using IT Assistant. 1 Open the Computer Management window. 2 Expand the Computer Management icon in the window, if necessary. 3 Expand the Services and Applications icon, and then click Services. 4 Scroll down the list of services until you find SNMP Service, right-click SNMP Service, and click Properties.
book.book Page 33 Monday, July 7, 2008 2:59 PM 5 Click the Traps tab to add a community for traps or to add a trap destination for a trap community. a To add a community for traps, type the community name in the Community Name box and click Add to list, which is located next to the Community Name box. b To add a trap destination for a trap community, select the community name from the Community Name drop-down box and click Add under the Trap Destinations box.
book.book Page 34 Monday, July 7, 2008 2:59 PM Server Administrator SNMP Agent Install Actions If Server Administrator detects the default SNMP configuration during installation, it attempts to modify the SNMP agent configuration to give read-only access to the entire MIB tree for the "public" community. Server Administrator modifies the /etc/snmp/snmpd.conf SNMP agent configuration file in two ways.
book.book Page 35 Monday, July 7, 2008 2:59 PM Changing the SNMP Community Name Configuring the SNMP community names determines which systems are able to manage your system through SNMP. The SNMP community name used by management applications must match an SNMP community name configured on the Server Administrator system so that the management applications can retrieve management information from Server Administrator.
book.book Page 36 Monday, July 7, 2008 2:59 PM Enabling SNMP Set Operations SNMP Set operations must be enabled on the system running Server Administrator in order to change Server Administrator attributes using IT Assistant. To enable SNMP Set operations on the system running Server Administrator, edit the SNMP agent configuration file, /etc/snmp/snmpd.
book.book Page 37 Monday, July 7, 2008 2:59 PM To configure your system running Server Administrator to send traps to a management station, edit the SNMP agent configuration file, /etc/snmp/snmpd.
book.book Page 38 Monday, July 7, 2008 2:59 PM Enabling SNMP Access From Remote Hosts The default SNMP agent configuration on SUSE Linux Enterprise Server operating systems gives read-only access to the entire MIB tree for the "public" community from the local host only. This configuration does not allow SNMP management applications such as IT Assistant running on other hosts to discover and manage Server Administrator systems properly.
book.book Page 39 Monday, July 7, 2008 2:59 PM To enable SNMP access from all remote hosts to a system running Server Administrator, edit the SNMP agent configuration file, /etc/snmpd.conf or /etc/snmp/snmpd.conf, and perform the following steps: 1 Find the line that reads: rocommunity public 127.0.0.1 2 Edit this line by deleting 127.0.0.1. When edited, the new line should read: rocommunity public 3 To enable SNMP configuration changes, restart the SNMP agent by typing: /etc/init.
book.book Page 40 Monday, July 7, 2008 2:59 PM Enabling SNMP Set Operations SNMP Set operations must be enabled on the system running Server Administrator in order to change Server Administrator attributes using IT Assistant. To enable remote shutdown of a system from IT Assistant, SNMP Set operations must be enabled. NOTE: Rebooting of your system for change management functionality does not require SNMP Set operations.
book.book Page 41 Monday, July 7, 2008 2:59 PM Firewall Configuration on Systems Running Supported Red Hat Enterprise Linux Operating Systems If you enable firewall security while installing Red Hat Enterprise Linux, the SNMP port on all external network interfaces is closed by default. To enable SNMP management applications such as IT Assistant to discover and retrieve information from Server Administrator, the SNMP port on at least one external network interface must be open.
book.book Page 42 Monday, July 7, 2008 2:59 PM 4 Press to go to Customize and press . The Firewall Configuration - Customize screen appears. 5 Select whether to open an entire network interface or just the SNMP port on all network interfaces. a To open an entire network interface, press to go to one of the Trusted Devices and press the spacebar. An asterisk in the box to the left of the device name indicates that the entire interface will be opened.
book.book Page 43 Monday, July 7, 2008 2:59 PM Installing Server Administrator Overview You can install Server Administrator using several methods. The Dell™ Systems Management Tools and Documentation DVD provides a setup program to install, upgrade, and uninstall Server Administrator and other managed system software components on your managed system.
book.book Page 44 Monday, July 7, 2008 2:59 PM To upgrade from Dell OpenManage 4.3 or later to Dell OpenManage 5.5 use setup.exe or type: msiexec /i SysMgmt.msi /qn (for fresh installs or major upgrades. For example, upgrading from Dell OpenManage version 4.3 to version 5.5.) For minor upgrades, for example, upgrading from Dell OpenManage version 4.3 to version 4.4, type msiexec /i SysMgmt.
book.book Page 45 Monday, July 7, 2008 2:59 PM See the Dell OpenManage Installation and Security User's Guide for information on installation procedures and step-by-step instructions for installing, upgrading, and uninstalling Server Administrator in each supported operating system. Before You Begin • Read the Dell Systems Software Support Matrix. • Read and follow the applicable instructions in "Setup and Administration.
book.book Page 46 Monday, July 7, 2008 2:59 PM Installation Requirements The following sections describe the Server Administrator general requirements. Operating system–specific installation prerequisites are listed as part of the installation procedures.
book.book Page 47 Monday, July 7, 2008 2:59 PM • One of the supported systems management protocol standards. • A mouse, keyboard, and monitor to manage a system locally. The monitor requires a minimum screen resolution of 800 x 600. The recommended screen resolution setting is 1024 x 768. • The Server Administrator Remote Access Controller requires a Dell Remote Access Controller (DRAC) to be installed on the system to be managed.
book.book Page 48 Monday, July 7, 2008 2:59 PM Management Instrumentation (CIM/WMI) and Simple Network Management Protocol (SNMP). On supported Red Hat Enterprise Linux and SUSE Linux Enterprise Server operating systems, Server Administrator supports the SNMP systems management standard. NOTE: For information about installing a supported systems management protocol standard on your managed system, see your operating system documentation.
book.book Page 49 Monday, July 7, 2008 2:59 PM Using Dell OpenManage with Citrix XenServer Dell Edition Dell OpenManage Server Administrator is pre-installed in Citrix® XenServer Dell Edition™, hence no installation steps are required. See the Citrix XenServer Dell Edition Solution Guide at http://support.dell.com/support/edocs/software/Citrix/ for details on using Dell OpenManage with Citrix XenServer Dell Edition.
book.book Page 50 Monday, July 7, 2008 2:59 PM Storage Management Service. The Storage Management Service replaces the storage management features provided by these utilities.
book.book Page 51 Monday, July 7, 2008 2:59 PM Using Server Administrator Starting Your Server Administrator Session To start a Server Administrator session in a local system, click the Dell™ OpenManage™ Server Administrator icon on your desktop.
book.book Page 52 Monday, July 7, 2008 2:59 PM Logging In and Out To log in to Server Administrator, type your preassigned Username and Password in the appropriate fields on the Systems Management Log in window. See "Single Sign-On" for information on how you can bypass the login page and access the Server Administrator Web application by clicking on the Dell OpenManage Server Administrator icon on your desktop. NOTE: You must have preassigned user rights to log in to Server Administrator.
book.book Page 53 Monday, July 7, 2008 2:59 PM To launch Server Administrator using Single Sign-On authentication against Microsoft Active Directory, the following parameters must also be passed in: authType=ntlm&application=[plugin name] Where plugin name = omsa, ita, etc.
book.book Page 54 Monday, July 7, 2008 2:59 PM Internet Explorer 1 Start your browser. 2 Click Tools→Internet Options→Security. 3 Click the Trusted Sites icon. 4 Click Sites. 5 Copy the Web address used to access the remote managed system from the browser’s address bar and paste it onto the Add this Web Site to the Zone field. 6 Click Custom Level. For Windows 2000: – Under Miscellaneous, select the Allow Meta Refresh radio button. – Under Active Scripting, select the Enable radio button.
book.book Page 55 Monday, July 7, 2008 2:59 PM 7 Under User Authentication, select the Automatic Logon with current username and password radio button. 8 Click OK to save the new settings. 9 Close the browser. 10 Log in to Server Administrator. Mozilla 1 Start your browser. 2 Click Edit→Preferences. 3 Click Advanced→Scripts and Plugins. 4 Ensure that the Navigator check box is selected under Enable JavaScript for. 5 Click OK to save the new settings. 6 Close the browser. 7 Log in to Server Administrator.
book.book Page 56 Monday, July 7, 2008 2:59 PM Additionally, when logged in to the Server Administrator home page, the system model, the assigned name of the system, and the current user's user name and user privileges are displayed in the top-right corner of the window. Table 5-1 lists the GUI field names and the applicable system, when Server Administrator is installed on the system. Table 5-1.
book.book Page 57 Monday, July 7, 2008 2:59 PM Figure 5-2 shows a sample Server Administrator home page layout for a user logged in with administrator privileges on a modular system. Figure 5-2. system tree Sample Server Administrator Home Page — Modular System action tab action tab subcategories global navigation bar action window Clicking an object in the system tree opens a corresponding action window for that object.
book.book Page 58 Monday, July 7, 2008 2:59 PM Global Navigation Bar The global navigation bar and its links are available to all user levels in the program. • Clicking Preferences opens the Preferences home page. See "Using the Preferences Home Page." • Clicking Support connects you to the Dell Support website. • Clicking Help opens the context-sensitive online help window. See "Using the Online Help." • Clicking About displays Server Administrator version and copyright information.
book.book Page 59 Monday, July 7, 2008 2:59 PM Data Area The data area is located below the action tabs on the right side of the home page. The data area is where you perform tasks or view details about system components. The content of the window depends on the system tree object and action tab that are currently selected. For example, when you select BIOS from the system tree, the Properties tab is selected by default and the version information for the system BIOS appears in the data area.
book.book Page 60 Monday, July 7, 2008 2:59 PM Task Buttons Most windows opened from the Server Administrator home page contain at least four task buttons: Print, Export, Email, and Refresh. Other task buttons are included on specific Server Administrator windows. Log windows, for example, also contain Save As and Clear Log task buttons.
book.book Page 61 Monday, July 7, 2008 2:59 PM Figure 5-3. Gauge Indicator Using the Online Help Context-sensitive online help is available for every window of the Server Administrator home page. Clicking Help on the global navigation bar opens an independent help window that contains detailed information about the specific window you are viewing. The online help is designed to help guide you through the specific actions required to perform all aspects of the Server Administrator services.
book.book Page 62 Monday, July 7, 2008 2:59 PM Like the Server Administrator home page, the Preferences home page has three main areas: • The global navigation bar provides links to general services. – Clicking Back to Server Administrator returns you to the Server Administrator home page. • The left pane of the Preferences home page (where the system tree is displayed on the Server Administrator home page) displays the preference categories for the managed system.
book.book Page 63 Monday, July 7, 2008 2:59 PM components of interest, such as fan RPMs. With additional scripting, the CLI can be used to capture data during periods of high system usage to compare with the same measurements at times of low system usage. Command results can be routed to a file for later analysis. The reports can help administrators to gain information that can be used to adjust usage patterns, to justify purchasing new system resources, or to focus on the health of a problem component.
book.book Page 64 Monday, July 7, 2008 2:59 PM Perform the following steps to set up your secure port system preferences: 1 Click Preferences on the global navigation bar. The Preferences home page appears. 2 Click General Settings, and the Web Server tab. 3 In the Server Preferences window, set options as necessary. • The Session Timeout feature can set a limit on the amount of time that a Server Administrator session can remain active.
book.book Page 65 Monday, July 7, 2008 2:59 PM • The Support Link field specifies the URL for the business entity that provides support for your managed system. • The Custom Delimiter field specifies the character used to separate the data fields in the files created using the Export button. The ; character is the default delimiter. Other options are !, @, #, $, %, ^, *, ~, ?, :,|, and ,. • The SSL Encryption field specifies the encryption levels for the secured HTTPS sessions.
book.book Page 66 Monday, July 7, 2008 2:59 PM X.509 Certificate Management Web certificates are necessary to ensure the identity of a remote system and ensure that information exchanged with the remote system cannot be viewed or changed by others. To ensure system security, it is strongly recommended that: • You generate a new X.509 certificate, reuse an existing X.509 certificate, or import a root certificate or certificate chain from a Certification Authority (CA).
book.book Page 67 Monday, July 7, 2008 2:59 PM Starting Server Administrator Supported Microsoft Windows Operating Systems To start Server Administrator on systems running a supported Microsoft Windows operating system, perform the following steps: 1 Open the Services window. 2 Right-click the Dell Systems Management Server Administration (DSM SA) Connection Service icon. 3 Click Start.
book.book Page 68 Monday, July 7, 2008 2:59 PM Restarting Server Administrator Supported Microsoft Windows Operating Systems To restart Server Administrator, perform the following steps: 1 Open the Services window. 2 Right-click the DSM SA Connection Service icon. 3 Click Restart.
book.book Page 69 Monday, July 7, 2008 2:59 PM Remote Access Controller Overview The Server Administrator Remote Access Controller provides a complete remote system management solution for SNMP- and CIM-instrumented systems equipped with a Dell™ Remote Access Card (DRAC) III, a DRAC III/XT, an Embedded Remote Access (ERA) controller, or an ERA Option (ERA/O) card. These hardware and software solutions are collectively known as Dell Remote Access Controllers (DRACs).
book.book Page 70 Monday, July 7, 2008 2:59 PM The DRAC 4 and DRAC 5 have their own microprocessor and memory, and are powered by the system in which they are installed. The DRAC 4 and DRAC 5 may be preinstalled on your system, or available separately in a kit. NOTE: The information contained in this section pertains to the previous generation of DRACs.
book.book Page 71 Monday, July 7, 2008 2:59 PM NOTE: See the Dell Remote Access Controller Installation and Setup Guide for complete information about installing and configuring a DRAC III, a DRAC III/XT, ERA, or an ERA/O controller, and using a DRAC to remotely access an inoperable system.
book.book Page 72 Monday, July 7, 2008 2:59 PM Software Prerequisites The managed system must have the DRAC software installed. See the Dell Remote Access Controller Installation and Setup Guide or the Dell Embedded Remote Access/MC Controller User's Guide for a complete list of software installation prerequisites.
book.book Page 73 Monday, July 7, 2008 2:59 PM 4 Type a new password in the New Password field. 5 Type the new password again in the Confirm Password field. 6 Configure numeric paging (for DRAC III users only): a Click the check box next to Enable Numeric Paging and enter a pager number in the Pager Number field. b Enter the numeric message in the Numeric Message field that you want the DRAC to send when it receives certain events.
book.book Page 74 Monday, July 7, 2008 2:59 PM 10 Click Apply Changes and then click OK to save the alert, paging, and user configuration to the Server Administrator data repository. Server Administrator returns to the Users tab. The user you just created and configured is displayed in the User Name list. Configuring an Existing DRAC User NOTE: You must have Administrator privileges in Server Administrator to use the Remote Access Controller.
book.book Page 75 Monday, July 7, 2008 2:59 PM 6 Configure alphanumeric paging (for DRAC III users only): a Select the check box next to Enable Alpha-Numeric Paging and enter a pager number in the Pager Number field. b Select the alphanumeric protocol used by the pager's service provider, 7E0 or 8N1. c Select the pager's baud rate, 300 or 1200. d Enter the message in the Custom Message field that you want the DRAC to send when it receives certain events.
book.book Page 76 Monday, July 7, 2008 2:59 PM Configuring the DRAC Network Properties NOTE: You must have Administrator privileges in Server Administrator to use the Remote Access Controller. Your DRAC contains an integrated 10BASE-T/100BASE-T Ethernet NIC and supports TCP/IP. The NIC has a default address of 192.168.20.1 and a default gateway of 192.168.20.1. NOTE: If your DRAC is configured to the same IP address as another NIC on the same network, an IP address conflict occurs.
book.book Page 77 Monday, July 7, 2008 2:59 PM c Specify the Dial-In Authentication settings that dial-in connections require: • Any — Allows the connection to use any type of encryption, including no encryption • Encrypted — Requires the connection to use some type of encryption • CHAP — Requires the connection to use the CHAP 5 To enable SMTP server address control, click the check box next to Enable SMTP, and type the SMTP server address in the SMTP (Email) Server Address field.
book.book Page 78 Monday, July 7, 2008 2:59 PM Configuring the SNMP Alert Properties NOTE: You must have Administrator privileges in Server Administrator to use the Remote Access Controller. To configure the Remote Access Controller alert properties, perform the following steps: 1 Click Modular Enclosure→System/Server Module→Main System Chassis/Main System→Remote Access and then click the Configuration tab. 2 Click SNMP.
book.book Page 79 Monday, July 7, 2008 2:59 PM Configuring DRAC III Dial-in (PPP) Users and Modem Settings Dial-in (PPP) users and modem features are currently only available for the DRAC III. Adding and Configuring a DRAC III Dial-In (PPP) User NOTE: You must have Administrator privileges in Server Administrator to use the Remote Access Controller. This subsection describes how to add and configure a dial-in (PPP) user.
book.book Page 80 Monday, July 7, 2008 2:59 PM 7 Select a setting from the Callback Type drop-down menu: • None — When called, the Remote Access Controller does not disconnect and call back; the connection remains active. • Preset — When called, the Remote Access Controller disconnects and calls the number specified in the Callback Number field; this setting activates the callback number control. • User Specified — When called, the Remote Access Controller asks the user for the callback number.
book.book Page 81 Monday, July 7, 2008 2:59 PM 5 Enter the phone number used by the system's modem in the Phone Number field. 6 Enter the user name for the demand dial-out user in the User Name field. 7 Enter the password for the demand dial-out user in the Password field.
book.book Page 82 Monday, July 7, 2008 2:59 PM Configuring the DRAC Remote Features Properties NOTE: You must have Administrator privileges in Server Administrator to use the Remote Access Controller. If the local boot image on the managed system has been corrupted, a DRAC has the ability to boot its host server using a diskette boot image that it downloads from a Trivial File Transfer Protocol (TFTP) server. This feature is called remote floppy boot.
book.book Page 83 Monday, July 7, 2008 2:59 PM 5 Configure the DRAC's firmware update parameters: a Select the check box next to Enable Remote Firmware Update. b Type the TFTP server's IP address in the Remote Firmware TFTP Address field. c Type the firmware image filename in the Remote Firmware Update Path field. The path must be relative to the root directory of the TFTP server. 6 Click Apply Changes and click OK to save your changes.
book.book Page 84 Monday, July 7, 2008 2:59 PM A CSR is a digital request to a CA for a secure server certificate. Secure server certificates ensure the identity of a remote system and ensure that information exchanged with the remote system cannot be viewed or changed by others. To ensure the security for your DRAC, it is strongly recommended that you generate a CSR, submit the CSR to a CA, and upload the certificate returned from the CA.
book.book Page 85 Monday, July 7, 2008 2:59 PM 1 From the Certificate Management window, select the Upload certificate option and click Next. The Upload Certificate window appears. 2 Select the certificate type from the drop-down menu. The selections are Server Certificate and CA Certificate. 3 Type the exact path and filename of the certificate to be uploaded. NOTE: When you have a fully qualified path or filename that contains spaces, you must place double quotation marks around the string.
book.book Page 86 Monday, July 7, 2008 2:59 PM Configuring Remote Connect Authentication Options Use the Remote Connect Authentication Options window to set DRAC user login authentication options. You can configure the DRAC to only allow login by users created through the Remote Access Controller (RAC users), or to allow DRAC login by users created both through the Remote Access Controller and through the local operating system.
book.book Page 87 Monday, July 7, 2008 2:59 PM Accessing and Using a Dell Remote Access Controller To link to the Remote Access Controller DRAC Log in window from the Server Administrator home page, click the Main System Chassis/Main System object, click the Remote Access Controller object, click the Remote Connect tab, and then click Launch the Remote Connect Interface. The DRAC Log in window appears.
book.
book.book Page 89 Monday, July 7, 2008 2:59 PM Instrumentation Service Overview The Server Administrator Instrumentation Service monitors the health of a system and provides rapid access to detailed fault and performance information gathered by industry standard systems management agents. The reporting and viewing features allow retrieval of overall health status for each chassis that comprises your system.
book.book Page 90 Monday, July 7, 2008 2:59 PM Managing Your System The Server Administrator home page defaults to the System object of the system tree view. The default for the System object opens the Health components under the Properties tab. Table 7-1 lists the GUI field names and the applicable system, when Server Administrator is installed on the system. Table 7-1.
book.book Page 91 Monday, July 7, 2008 2:59 PM Figure 7-2. Sample Server Administrator Home Page — Modular System action tab action tab subcategories global navigation bar system tree action window NOTE: Context-sensitive online help is available for every window of the Server Administrator home page. Clicking Help on the global navigation bar opens an independent help window that contains detailed information about the specific window you are viewing.
book.book Page 92 Monday, July 7, 2008 2:59 PM Managing System/Server Module Tree Objects The Server Administrator system/server module tree displays all visible system objects based on the software and hardware groups that Server Administrator discovers on the managed system and on the user's access privileges. The system components are categorized by component type.
book.book Page 93 Monday, July 7, 2008 2:59 PM Modular Enclosure NOTE: For the purposes of Server Administrator, "modular enclosure" refers to a system that may contain one or more modular systems that appear as a separate Server Module in the system tree. Like a stand-alone Server Module, a Modular Enclosure contains all of the essential components of a system.
book.book Page 94 Monday, July 7, 2008 2:59 PM NOTE: Update functionality is supported on Server Administrator version 2.0 or lower. The Dell™ Server Update Utility and Dell Update Packages can be downloaded from the Dell Support website at support.dell.com. These are supported on Microsoft Windows®, Red Hat® Enterprise Linux®, and SUSE® Linux Enterprise Server operating systems. NOTE: The Dell Server Update Utility or Dell Update Packages must be launched from the system you want to update.
book.book Page 95 Monday, July 7, 2008 2:59 PM Shutdown Subtabs: Remote Shutdown | Thermal Shutdown | Web Server Shutdown Under the Shutdown tab, you can: • • Configure the operating system shutdown and remote shutdown options. Set the thermal shutdown severity level to shut down your system in the event that a temperature sensor returns a warning or failure value. NOTE: A thermal shutdown occurs only when the temperature reported by the sensor goes above the temperature threshold.
book.book Page 96 Monday, July 7, 2008 2:59 PM • View the Alert log for a list of all events generated by the Server Administrator Instrumentation Service in response to changes in the status of sensors and other monitored parameters. NOTE: See the Server Administrator Messages Reference Guide for a complete explanation of each alert event ID's corresponding description, severity level, and cause.
book.book Page 97 Monday, July 7, 2008 2:59 PM Session Management Subtabs: Session Under the Session Management tab, you can: • View session information for current users that have logged in to Server Administrator. • Terminate user sessions. NOTE: Only users with administrative privileges can view the Session Management page and terminate session(s) of logged-in users.
book.book Page 98 Monday, July 7, 2008 2:59 PM – Slots – Temperatures – Voltages NOTE: AC Switch is supported on limited systems. NOTE: Batteries is supported only on Dell PowerEdge x9xx and Dell xx0x systems. NOTE: Hardware Performance is supported only on Dell xx0x systems. NOTE: Power Supplies is not available on Dell PowerEdge 1900 system. NOTE: Power Monitoring is supported on limited Dell xx0x systems. The system/server module may contain one main system chassis or several chassis.
book.book Page 99 Monday, July 7, 2008 2:59 PM – Power Monitoring – Power Supplies – Processors – Temperatures – Voltages NOTE: AC Switch is supported on limited systems. NOTE: Batteries is supported only on Dell PowerEdge x9xx and Dell xx0x systems. NOTE: Power Supplies is not available on Dell PowerEdge 1900 system. NOTE: Power Monitoring is supported on limited Dell xx0x systems. • View information about the main system chassis attributes.
book.book Page 100 Monday, July 7, 2008 2:59 PM Batteries Click the Batteries object to view information about your system’s installed batteries. Batteries maintain the time and date when your system is turned off. The battery saves the system’s BIOS setup configuration, which allows the system to reboot efficiently. The Batteries object action window can have the following tabs, depending on the user’s group privileges: Properties and Alert Management.
book.book Page 101 Monday, July 7, 2008 2:59 PM You can modify the state of many BIOS setup features including but not limited to the Serial Port, Network Interface Controller cards, Boot Sequence, User Accessible USB Ports, CPU Virtualization Technology, CPU HyperThreading, AC Power Recovery Mode, Embedded SATA Controller, Console Redirection, and Console Redirection Failsafe Baud Rate.
book.book Page 102 Monday, July 7, 2008 2:59 PM Properties Subtabs: Fan Probes | Fan Control Under the Properties tab, you can: • View the current readings for your system's fan probes and configure minimum and maximum values for fan probe warning threshold. NOTE: Some fan probe fields differ according to the type of firmware your system has: BMC or ESM. Some threshold values are not editable on BMC-based systems. • Select fan control options.
book.book Page 103 Monday, July 7, 2008 2:59 PM Table 7-2 lists the possible values for status and cause of a probe: Table 7-2. Possible Values for Status and Cause of a Probe Status Values Cause Values Degraded User Configuration Insufficient Power Capacity Unknown Reason Normal [N/A] Properties Subtab: Information Under the Properties tab, you can view the details of system’s performance degradation. Intrusion Click the Intrusion object to manage your system's chassis intrusion status.
book.book Page 104 Monday, July 7, 2008 2:59 PM • View current SNMP trap alert thresholds and set the alert threshold levels for the intrusion sensor. The selected traps will be triggered if the system generates a corresponding event at the selected severity level. Memory Click the Memory object to manage your system's memory devices. Server Administrator monitors the memory device status for each memory module present in the monitored system.
book.book Page 105 Monday, July 7, 2008 2:59 PM Network Click the Network object to manage your system's NICs. Server Administrator monitors the status of each NIC present in your system to ensure continuous remote connection. The Network object action window can have the following tab, depending on the user's group privileges: Properties. Properties Subtab: Information Under the Properties tab, you can view information about the NICs installed in your system.
book.book Page 106 Monday, July 7, 2008 2:59 PM Alert Management Subtabs: Alert Actions | SNMP Traps Under the Alert Management tab, you can: • View current alert actions settings and set the alert actions that you want to be performed in the event that a system power returns a warning or failure value. • View current SNMP trap alert thresholds and set the alert threshold levels for system power watts.
book.book Page 107 Monday, July 7, 2008 2:59 PM Processors Click the Processors object to manage your system's microprocessor(s). A processor is the primary computational chip inside a system that controls the interpretation and execution of arithmetic and logic functions. The Processors object action window can have the following tabs, depending on the user's group privileges: Properties and Alert Management.
book.book Page 108 Monday, July 7, 2008 2:59 PM Selecting DRAC allows you to access your system's remote system management capabilities. The Server Administrator DRAC provides remote access to inoperable systems, alert notification when a system is down, and the ability to restart a system. The Remote Access object action window can have the following tabs, depending on the user's group privileges: Properties, Configuration, and Users.
book.book Page 109 Monday, July 7, 2008 2:59 PM Users Subtab: Users Under the Users tab, you can modify the remote access user configuration. You can add, configure, and view information about Remote Access Controller users. NOTE: On the Dell PowerEdge x9xx systems: • Ten user IDs are displayed. If a DRAC card is installed, sixteen user IDs are displayed. • Serial Over LAN Payload column is displayed.
book.book Page 110 Monday, July 7, 2008 2:59 PM Alert Management Subtabs: Alert Actions | SNMP Traps Under the Alert Management tab, you can: • View current alert actions settings and set the alert actions that you want to be performed in the event that a temperature probe returns a warning or failure value. • View current SNMP trap alert thresholds and set the alert threshold levels for temperature probes.
book.book Page 111 Monday, July 7, 2008 2:59 PM Alert Management Subtabs: Alert Actions | SNMP Traps Under the Alert Management tab, you can: • View current alert actions settings and set the alert actions that you want to be performed in the event that a system voltage sensor returns a warning or failure value. • View current SNMP trap alert thresholds and set the alert threshold levels for voltage sensors.
book.book Page 112 Monday, July 7, 2008 2:59 PM When the Storage Management Service is installed, click the Storage object to view the status and settings for various attached array storage devices, system disks, and so on. In the case of Storage Management Service, the Storage object action window has the following tab, depending on the user's group privileges: Properties.
book.book Page 113 Monday, July 7, 2008 2:59 PM Properties Subtab: Health In the Health window of the Properties tab, you can view the storage dashboard information. Storage dashboard lists all the controllers available on the system. You can configure the controllers using the Available Tasks drop down menu. In the storage dashboard page, you can also view the virtual disk details and health status of the controllers.
book.book Page 114 Monday, July 7, 2008 2:59 PM Health Under the Health tab, you can view the current status of the connector and the enclosure or backplane attached to the connector. The status is visually indicated with the icons described in "Storage Component Severity." Configuration/Information Under the Configuration/Information tab, you can view the property information of the connector and the enclosure or backplane attached to the connector. You can also execute connector tasks in this tab.
book.book Page 115 Monday, July 7, 2008 2:59 PM Configuration/Information Under the Configuration/Information tab, you can view the current status and property information of the physical disks attached to the enclosure or backplane. The status is visually indicated with the icons described in "Storage Component Severity." Property information includes name, state, capacity, used and available disk space, and other information. You can also execute physical disk tasks in this tab.
book.book Page 116 Monday, July 7, 2008 2:59 PM Configuration/Information Under the Configuration/Information tab, you can view the current status and property information of the enclosure power supplies. The status is visually indicated with the icons described in "Storage Component Severity." Property information includes name, state, and part number. Temperatures Click the Temperatures object to view information about the enclosure temperature probes.
book.book Page 117 Monday, July 7, 2008 2:59 PM Firmware and driver properties may include: • Firmware Version • Minimum Required Firmware Version • Driver Version • Minimum Required Driver Version Storage Component Severity The status of a component is graded for degrees of severity. Each level of severity requires you to take different actions in response. For example, you must take immediate reparative action in response to a Warning or Critical/Failure status to avoid any data loss.
book.book Page 118 Monday, July 7, 2008 2:59 PM Setting Storage Event Alerts You can use the Server Administrator Instrumentation Service to configure the most relevant Storage features, such as Storage Event alert action parameters. 1 Click the System object. 2 Click the Alert Management tab. 3 Click Alert Action. 4 Click Storage Event. The Storage Event window allows you to take individual action on specific storage event.
book.book Page 119 Monday, July 7, 2008 2:59 PM Managing Preferences: Home Page Configuration Options The left pane of the Preferences home page (where the system tree is displayed on the Server Administrator home page) displays all available configuration options in the system tree window. The options displayed are based on the systems management software installed on the managed system. See Table 7-4 for available Preferences home page configuration options. Table 7-4.
book.book Page 120 Monday, July 7, 2008 2:59 PM Server Administrator Click the Server Administrator object to enable or disable access to users with User or Power User privileges and to configure the SNMP root password. The Server Administrator object action window can have the following tab, depending on the user's group privileges: Preferences.
book.book Page 121 Monday, July 7, 2008 2:59 PM Working With the Baseboard Management Controller/Integrated Dell Remote Access Controller NOTE: Baseboard Management Controller (BMC) is supported in Dell™ PowerEdge™ x8xx and x9xx systems and Integrated Dell Remote Access Controller (iDRAC) is supported in Dell xx0x systems only.
book.book Page 122 Monday, July 7, 2008 2:59 PM Administrator graphical user interface by clicking the Remote Access object, which is a subcomponent of the Main System Chassis/Main System group.
book.book Page 123 Monday, July 7, 2008 2:59 PM Viewing Basic BMC Information You can view the basic information about the BMC and also reset the BMC settings to their default values. NOTE: You must be logged in with Administrator privileges to reset the BMC settings. 1 Click the Modular Enclosure→System/Server Module→Main System Chassis/Main System→Remote Access object.
book.book Page 124 Monday, July 7, 2008 2:59 PM 3 Click User ID to configure a new or existing BMC/iDRAC user. The Remote Access User Configuration window allows you to configure a specific BMC/iDRAC user. 4 Specify the following general information: • Select Enable User to enable the user. • Enter the name for the user in the User Name field. • Select the Change Password check box. • Enter a new password in the New Password field. • Re-enter the new password in the Confirm New Password field.
book.book Page 125 Monday, July 7, 2008 2:59 PM 3 Click Platform Events. The Platform Events window allows you to take individual action on specific platform events. You can select those events for which you want to take shutdown actions and generate alerts for selected actions. You can also send alerts to specific IP address destinations of your choice. NOTE: You must be logged in with Administrator privileges to configure the BMC Platform Event Filter Alerts.
book.book Page 126 Monday, July 7, 2008 2:59 PM NOTE: System Power Probe Warning and System Power Probe Failure are not supported on Dell systems without PMBus support though OMSA allows you to configure. NOTE: On Dell PowerEdge 1900 systems, the PS/VRM/D2D Warning, PS/VRM/D2D Failure, and Power Supply Absent Platform Event Filters are not supported even though Server Administrator allows you to configure these Event Filters.
book.book Page 127 Monday, July 7, 2008 2:59 PM Setting Platform Event Alert Destinations You can also use the Platform Event Filters window to select a destination where an alert for a platform event is to be sent. Depending on the number of destinations that are displayed, you can configure a separate IP address for each destination address. A platform event alert will be sent to each destination IP address that you configure. 1 Click Configure Destinations in the Platform Event Filters window.
book.book Page 128 Monday, July 7, 2008 2:59 PM 4 Configure the following details: • Enable Serial Over LAN • Baud Rate • Minimum Privilege Required 5 Click Apply Changes. 6 Click Advanced Settings to further configure BMC. 7 In the Serial Over LAN Configuration Advanced Settings window, you may configure the following information: • Character Accumulate Interval • Character Send Threshold 8 Click Apply Changes.
book.book Page 129 Monday, July 7, 2008 2:59 PM 6 Click Terminal Mode Settings. In the Terminal Mode Settings window, you can configure terminal mode settings for the serial port. Terminal mode is used for Intelligent Platform Interface Management (IPMI) messaging over the serial port using printable ASCII characters. Terminal mode also supports a limited number of text commands to support legacy, text-based environments.
book.book Page 130 Monday, July 7, 2008 2:59 PM 3 Click LAN. The LAN Configuration window appears. NOTE: BMC/iDRAC management traffic will not function properly if the LAN on motherboard (LOM) is teamed with any network adapter add-in-cards. 4 Configure the following NIC configuration details: • Enable NIC (This option is available on Dell PowerEdge x9xx systems and when DRAC is installed. Select this option for NIC teaming. In Dell PowerEdge x9xx systems, you can team NICs for added redundancy.
book.book Page 131 Monday, July 7, 2008 2:59 PM Accessing and Using a Integrated Dell Remote Access Controller To link to the Remote Access Controller iDRAC Log in window from the Server Administrator home page, click the Main System Chassis/Main System object, click the Remote Access Controller object, click the Remote Connect tab, and then click Launch the iDRAC Web Interface. The iDRAC Log in window appears.
book.
book.book Page 133 Monday, July 7, 2008 2:59 PM Storage Management Service Overview The Storage Management Service provides RAID and non-RAID storage management that is integrated with Server Administrator. On Microsoft® Windows®, Red Hat® Enterprise Linux®, and SUSE® Linux Enterprise Server, the Storage Management Service is installed using Typical or Custom Setup. The Storage Management Service provides storage management information in an integrated graphical view.
book.book Page 134 Monday, July 7, 2008 2:59 PM NOTE: For complete documentation on Storage Management, see the Storage Management online help or the Dell™ OpenManage™ Server Administrator Storage Management User's Guide. NOTE: The Storage Management Service is available on systems running Microsoft Windows, Red Hat Enterprise Linux, and SUSE Linux Enterprise Server operating systems.
book.book Page 135 Monday, July 7, 2008 2:59 PM The Storage Management Service provides advanced features for configuring a system's locally attached RAID and non-RAID disk storage. Storage Management enables you to perform controller and enclosure functions for all supported RAID and non-RAID controllers, PowerVault™ 2xxS, PowerVault MD1120 and PowerVault MD1000 enclosures from the Server Administrator graphical interface without requiring use of the controller BIOS utilities.
book.book Page 136 Monday, July 7, 2008 2:59 PM Storage Management Tree Objects When installed, the Storage Management Service is accessible by selecting the Storage tree object on the Server Administrator graphical user interface. The Storage object expands to display tree objects for the supported controllers attached to the system. The controller object expands to display the storage attached to the controller.
book.book Page 137 Monday, July 7, 2008 2:59 PM Information/Configuration Tab The Information/Configuration tab displays the property information for the selected tree object. When using the Storage Management Service, the Information/Configuration tabs also have drop-down menus and buttons for executing storage tasks and launching wizards. Storage Management Tasks The Storage Management Service has drop-down menus and wizards for executing storage management and configuration tasks.
book.book Page 138 Monday, July 7, 2008 2:59 PM Reconfigure Virtual Disk Wizard The Reconfigure Virtual Disk Wizard enables you to change the virtual disk configuration. Using this task, you can change the RAID level or increase the virtual disk size by adding physical disks. To launch the Reconfigure Virtual Disk Wizard: 1 Expand the Storage tree object to display the controller objects. 2 Expand a controller object. 3 Select the Virtual Disks object.
book.book Page 139 Monday, July 7, 2008 2:59 PM You can change the hot spare assignment by unassigning a disk and choosing another disk as needed. You can also assign more than one physical disk as a global hot spare. Global hot spares must be assigned and unassigned manually. They are not assigned to specific virtual disks.
book.book Page 140 Monday, July 7, 2008 2:59 PM Rebuild a Failed Physical Disk If the failed physical disk is part of a redundant virtual disk, then the physical disk failure should not result in data loss if replaced immediately. The rebuild task is available when the Physical Disks object is selected. See the Storage Management online help for more information. Global Tasks The following global tasks are available when the Storage object is selected.
book.book Page 141 Monday, July 7, 2008 2:59 PM • Export Log File: This task exports the controller log to a text file. • Import Foreign Configuration: This task imports virtual disks that reside on physical disks that have been moved from another controller. • Clear Foreign Configuration: Use the clear foreign configuration task to clear or erase the virtual disk information from the newly attached physical disks.
book.book Page 142 Monday, July 7, 2008 2:59 PM • Load Balance: This task provides the ability to automatically use both controller ports or connectors connected to the same enclosure to route I/O requests. It is available only on PERC 6 controllers with firmware version 6.1 and later.
book.book Page 143 Monday, July 7, 2008 2:59 PM Enclosure Tasks The following enclosure tasks are available when the Enclosure object is selected. See the Storage Management online help for more information. • Enable and Disable Alarm: Use these tasks to manage the enclosure alarm. When enabled, the alarm sounds when the enclosure encounters an error condition. • Set Asset Data: Use this task to change the enclosure's asset tag and asset name.
book.book Page 144 Monday, July 7, 2008 2:59 PM • Assign and Unassign Global Hot Spare: See "Assign and Unassign Global Hot Spare." • Prepare to Remove: Use this task before removing a disk from an enclosure. NOTICE: To prevent data loss, make sure to perform this task. • Online and Offline: Use the Offline task to deactivate a disk before removing it. Use the Online task to reactivate an offline disk.
book.book Page 145 Monday, July 7, 2008 2:59 PM • Assign and Unassign Dedicated Hot Spare: See "Assign and Unassign Global Hot Spare." • Check Consistency, Cancel Check Consistency, Pause Check Consistency, and Resume Check Consistency: See "Maintain Integrity of Redundant Virtual Disks." • Blink and Unblink: The Blink and Unblink tasks blink or unblink the lights on the physical disks included in the virtual disk. • Rename: Use this task to rename a virtual disk.
book.book Page 146 Monday, July 7, 2008 2:59 PM created with Array Manager. Whether or not Array Manager is uninstalled, Storage Management will be able to identify and manage the virtual disks created with Array Manager. • SNMP Traps: The architecture for handling the SNMP traps and the Management Information Base (MIB) is different in Storage Management than Array Manager. You may need to modify applications that have been customized to receive SNMP traps from Array Manager.
book.book Page 147 Monday, July 7, 2008 2:59 PM • Gives detailed, step-by-step instructions on the tasks that you can perform in the graphical user interface • Describes the available CLI commands and their subcommands The Storage Management online help is available in two formats: • Context-sensitive Help: To access the context-sensitive online help, click Help on the global navigation bar.
book.
book.book Page 149 Monday, July 7, 2008 2:59 PM Server Administrator Logs Overview Server Administrator allows you view and manage hardware, alert, and command logs. All users can access logs and print reports from either the Server Administrator home page or from its command line interface. Users must be logged in with Administrator privileges to clear logs or must be logged in with Administrator or Power User privileges to e-mail logs to their designated service contact.
book.book Page 150 Monday, July 7, 2008 2:59 PM • Click Clear Log to erase all events from the log. • Click Save As to save the log content in a .zip file. • Click Refresh to reload the log content in the action window data area. See "Task Buttons" for additional information about using the task buttons.
book.book Page 151 Monday, July 7, 2008 2:59 PM Maintaining the Hardware Log The status indicator icon next to the log name on the Server Administrator homepage will change from normal status ( ) to noncritical status ( ) when the log file reaches 80 percent capacity. Be sure to clear the hardware log when it reaches 80 percent capacity. If the log is allowed to reach 100 percent capacity, the latest events are discarded from the log.
book.book Page 152 Monday, July 7, 2008 2:59 PM Command Log NOTE: If the Command log displays invalid XML data (for example, when XML data generated for the selection is not well formed), click Clear Log and then redisplay the log information. Use the Command log to monitor all of the commands issued by Server Administrator users.
book.book Page 153 Monday, July 7, 2008 2:59 PM Setting Alert Actions Setting Alert Actions for Systems Running Supported Red Hat Enterprise Linux and SUSE Linux Enterprise Server Operating Systems When you set Alert Actions for an event, you can specify the action to Display an alert on the server. To perform this action, Server Administrator writes a message to /dev/console. If the Server Administrator system is running an X Window System, you will not see that message by default.
book.book Page 154 Monday, July 7, 2008 2:59 PM • Redirect stdout and stderr to a file when specifying the application so that you can see any output or error messages. • If you want to execute multiple applications (or commands) for an alert, create a script to do that and put the full path to the script in the Absolute path to the application box. Example 1: ps -ef >/tmp/psout.txt 2>&1 The command in Example 1 executes the application ps, redirects stdout to the file /tmp/psout.
book.book Page 155 Monday, July 7, 2008 2:59 PM Do not set a path to an interactive application (an application that has a Graphical User Interface or which requires user input) in the Absolute path to the application field. The interactive application may not work as expected on some operating systems. NOTE: The full path to both the cmd.exe file and your script file should be specified.
book.book Page 156 Monday, July 7, 2008 2:59 PM Table 11-1. BMC PEF Alert Events (continued) Event Description Hardware log is full or emptied Either an empty or a full hardware log requires administrator attention. Automatic System Recovery The system is hung or is not responding and is taking an action configured by Automatic System Recovery. Understanding Service Names The service executable and display names of the following services have changed: Table 11-2.
book.book Page 157 Monday, July 7, 2008 2:59 PM Troubleshooting Fixing a Faulty Server Administrator Installation on Supported Windows Operating Systems You can fix a faulty installation by forcing a reinstall and then performing an uninstall of Server Administrator. To force a reinstall: 1 Find out the version of Server Administrator that was previously installed. 2 Download the installation package for that version from the Dell™ Support website at support.dell.com. 3 Locate SysMgmt.
book.book Page 158 Monday, July 7, 2008 2:59 PM OpenManage Server Administrator Services This table lists the services used by OMSA to provide systems management information and the impact of these services failing. Table A-1. Service Name Description Impact of failure Windows: DSM Provides SA remote/local access to Connection OMSA from Service any systems Linux: with a dsm_om_conns supported Web vc browser and network connection.
book.book Page 159 Monday, July 7, 2008 2:59 PM Table A-1. Service Name Description Impact of failure Recovery Mechanism Severity Windows: DSM Monitors the SA Data system, Manager provides rapid access to Linux: dsm_sa_datam detailed fault and gr32d performance (hosted under information dataeng service) and allows remote administration of monitored systems, including shutdown, startup, and security.
book.book Page 160 Monday, July 7, 2008 2:59 PM Table A-1. Service Name Description Impact of failure Recovery Mechanism Severity Storage Management Service Windows: mr2kserv The Storage Management Service provides storage management information and advanced features for configuring a local or remote storage attached to a system. User will not be able Restart Service Critical to perform storage functions for all supported RAID & non-RAID controllers.
book.book Page 161 Monday, July 7, 2008 2:59 PM Table A-1. Service Name Description Impact of failure Linux: Establishes a Point to Point (PPP) connection to the RAC card. The console cannot be Restart Service Critical redirected. The firmware on RAC card cannot be upgraded using racadm utility. racser Recovery Mechanism Severity However, an upgrade can be done using Remote racadm utility or a floppy disk.
book.
book.book Page 163 Monday, July 7, 2008 2:59 PM Glossary The following list defines or identifies technical terms, abbreviations, and acronyms used in your system documents. ACL Abbreviation for access control list. ACL files are text files that contain lists that define who can access resources stored on a Novell® Web server. adapter card An expansion card that plugs into an expansion-card connector on the system's system board.
book.book Page 164 Monday, July 7, 2008 2:59 PM authentication The Server Administrator remote access controller has two methods of authenticating user access: RAC authentication and local operating system authentication. RAC authentication is always enabled. Administrators can set up specific user accounts and passwords that allow access to the RAC. Operating systems also require administrators to define different levels of users and user accounts; each user level has different privileges.
book.book Page 165 Monday, July 7, 2008 2:59 PM bootable diskette You can start your system from a diskette. To make a bootable diskette, insert a diskette in the diskette drive, type sys a: at the command line prompt, and press . Use this bootable diskette if your system will not boot from the hard drive. bpi Abbreviation for bits per inch. bps Abbreviation for bits per second. BTU Abbreviation for British thermal unit. bus An information pathway between the components of a system.
book.book Page 166 Monday, July 7, 2008 2:59 PM CHAP Acronym for Challenge-Handshake Authentication Protocol, an authentication scheme used by PPP servers to validate the identity of the originator of the connection upon connection or any time later. CIM Acronym for Common Information Model, which is a model for describing management information from the DMTF. CIM is implementation independent, allowing different management applications to collect the required data from a variety of sources.
book.book Page 167 Monday, July 7, 2008 2:59 PM ConsoleOne Novell ConsoleOne is a Java-based foundation for graphical utilities that manage and administer network resources from different locations and platforms. ConsoleOne provides a single point of control for all Novell and external products. controller A chip that controls the transfer of data between the microprocessor and memory or between the microprocessor and a peripheral device such as a disk drive or the keyboard.
book.book Page 168 Monday, July 7, 2008 2:59 PM CSR Abbreviation for certificate signing request. DAT Acronym for digital audio tape. dB Abbreviation for decibel(s). dBA Abbreviation for adjusted decibel(s). DBS Abbreviation for Demand Based Switching. DBS is power management performed by switching to a low power state (frequency and voltage) when the processor utilization is low. It maintains application performance while lowering the average system power.
book.book Page 169 Monday, July 7, 2008 2:59 PM DIP Acronym for dual in-line package. A circuit board, such as a system board or expansion card, may contain DIP switches for configuring the circuit board. DIP switches are always toggle switches, with an on position and an off position. directory Directories help keep related files organized on a disk in a hierarchical, "inverted tree" structure. Each disk has a "root" directory; for example, a C:\> prompt normally indicates that you are at the root direc
book.book Page 170 Monday, July 7, 2008 2:59 PM DRAC 5 Acronym for Dell Remote Access Controller 5. DRAC II Acronym for Dell OpenManage™ Remote Assistant Card II. DRAC III Acronym for Dell Remote Access Card III. DRAC III/XT Acronym for Dell Remote Access Card III/XT. DRAM Acronym for dynamic random-access memory. A system's RAM is usually made up entirely of DRAM chips. Because DRAM chips cannot store an electrical charge indefinitely, your system continually refreshes each DRAM chip in the system.
book.book Page 171 Monday, July 7, 2008 2:59 PM EDO Acronym for extended data output dynamic random access memory which is a type of DRAM that is faster than conventional DRAM. EDO RAM can start fetching the next block of memory at the same time that it sends the previous block to the microprocessor. EEPROM Acronym for electrically erasable programmable read-only memory. EIDE Abbreviation for enhanced integrated drive electronics.
book.book Page 172 Monday, July 7, 2008 2:59 PM EMS Abbreviation for Expanded Memory Specification. EPP Abbreviation for Enhanced Parallel Port which provides improved bidirectional data transmission. Many devices are designed to take advantage of the EPP standard, especially devices, such as network or SCSI adapters that connect to the parallel port of a portable computer. EPROM Acronym for erasable programmable read-only memory. ERA Abbreviation for embedded remote access.
book.book Page 173 Monday, July 7, 2008 2:59 PM extended memory RAM above 1 MB. Most software that can use it, such as the Windows operating system, requires that extended memory be under the control of an XMM. external cache memory A RAM cache using SRAM chips. Because SRAM chips operate at several times the speed of DRAM chips, the microprocessor can retrieve data and instructions faster from external cache memory than from RAM. F Abbreviation for Fahrenheit. FAT Acronym for file allocation table.
book.book Page 174 Monday, July 7, 2008 2:59 PM firmware Software (programs or data) that has been written onto read-only memory (ROM). Firmware can boot and operate a device. Each controller contains firmware which helps provide the controller's functionality. flash bios A BIOS that is stored in flash memory rather than in ROM. A flash BIOS chip can be updated in place, whereas a ROM BIOS must be replaced with a newer chip.
book.book Page 175 Monday, July 7, 2008 2:59 PM GUI Acronym for graphical user interface. h Abbreviation for hexadecimal. A base-16 numbering system, often used in programming to identify addresses in the system's RAM and I/O memory addresses for devices. The sequence of decimal numbers from 0 through 16, for example, is expressed in hexadecimal notation as: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F, 10. In text, hexadecimal numbers are often followed by h. HBA Abbreviation for host bus adapter.
book.book Page 176 Monday, July 7, 2008 2:59 PM HTTP Abbreviation for Hypertext Transfer Protocol. HTTP is the client-server TCP/IP protocol used on the World Wide Web for the exchange of HTML documents. HTTPS Abbreviation for HyperText Transmission Protocol, Secure. HTTPS is a variant of HTTP used by Web browsers for handling secure transactions. HTTPS is a unique protocol that is simply SSL underneath HTTP.
book.book Page 177 Monday, July 7, 2008 2:59 PM IHV Abbreviation for independent hardware vendor. IHVs often develop their own MIBs for components that they manufacture. interlacing A technique for increasing video resolution by only updating alternate horizontal lines on the screen. Because interlacing can result in noticeable screen flicker, most users prefer noninterlaced video adapter resolutions. internal microprocessor cache An instruction and data cache built in to the microprocessor.
book.book Page 178 Monday, July 7, 2008 2:59 PM ISA Acronym for Industry-Standard Architecture. A 16-bit expansion bus design. The expansion-card connectors in an ISA system are also compatible with 8-bit ISA expansion cards. iSCSI Acronym for Internet SCSI. An IP based storage networking standard for linking data storage facilities. By carrying SCSI commands over IP networks, iSCSI is used to facilitate data transfers over intranets and to manage storage over long distances.
book.book Page 179 Monday, July 7, 2008 2:59 PM Kerberos A network authentication protocol. It is designed to provide strong authentication for client/server applications by using secret-key cryptography. key combination A command requiring you to press multiple keys at the same time. For example, you can reboot your system by pressing the key combination. kHz Abbreviation for kilohertz, 1000 hertz. LAN Acronym for local area network.
book.book Page 180 Monday, July 7, 2008 2:59 PM LPTn The device names for the first through third parallel printer ports on your system are LPT1, LPT2, and LPT3. LRA Abbreviation for local response agent. mA Abbreviation for milliampere(s). mAh Abbreviation for milliampere-hour(s). managed system A managed system is any system that is monitored and managed using Server Administrator. Systems running Server Administrator can be managed locally or remotely through a supported Web browser.
book.book Page 181 Monday, July 7, 2008 2:59 PM MCA Abbreviation for Micro Channel Architecture, which is designed for multiprocessing. MCA eliminates potential conflicts that arise when installing new peripheral devices. MCA is not compatible with either EISA or XT bus architecture, so older cards cannot be used with it. memory A system can contain several different forms of memory, such as RAM, ROM, and video memory.
book.book Page 182 Monday, July 7, 2008 2:59 PM modem A device that allows your system to communicate with other systems over telephone lines. modular system A system that can include multiple server modules. Each server module functions as an individual system. To function as a system, a server module is inserted into a chassis which includes power supplies, fans, a system management module, and at least one network switch module.
book.book Page 183 Monday, July 7, 2008 2:59 PM NDIS Abbreviation for Network Driver Interface Specification. NIC Acronym for network interface controller. NIF Acronym for network interface function. This term is equivalent to NIC. NIS Abbreviation for network information system. NIS is a network naming and administration system for smaller networks. A user at any host can get access to files or applications on any host in the network with a single user identification and password.
book.book Page 184 Monday, July 7, 2008 2:59 PM NVRAM Acronym for nonvolatile random-access memory. Memory that does not lose its contents when you turn off your system. NVRAM is used for maintaining the date, time, and system configuration information. OID Abbreviation for object identifier. An implementation-specific integer or pointer that uniquely identifies an object.
book.book Page 185 Monday, July 7, 2008 2:59 PM PC card A credit-card sized, removable module for portable computers standardized by PCMCIA. PC Cards are also known as "PCMCIA cards." PC Cards are 16-bit devices that are used to attach modems, network adapters, sound cards, radio transceivers, solid state disks and hard disks to a portable computer. The PC Card is a "plug and play" device, which is configured automatically by the Card Services software.
book.book Page 186 Monday, July 7, 2008 2:59 PM PIP Acronym for peripheral interchange program. pixel A single point on a video display. Pixels are arranged in rows and columns to create an image. A video resolution, such as 640 x 480, is expressed as the number of pixels across by the number of pixels up and down. PKCS #7 Abbreviation for Public Key Cryptography Standard #7. PKCS #7 is an RSA Data Security, Inc., standard for encapsulating signed data such as a certificate chain.
book.book Page 187 Monday, July 7, 2008 2:59 PM ppm Abbreviation for pages per minute. PPP Abbreviation for Point-to-Point Protocol. PQFP Abbreviation for plastic quad flat pack, a type of microprocessor socket in which the microprocessor chip is permanently mounted. program diskette set The set of diskettes from which you can perform a complete installation of an operating system or application program. When you reconfigure a program, you often need its program diskette set.
book.book Page 188 Monday, July 7, 2008 2:59 PM PXE Abbreviation for Pre-boot eXecution Environment. QFP Abbreviation for quad flat pack. RAC Acronym for remote access controller. RAID Acronym for redundant array of independent disks. RAM Acronym for random-access memory. A system's primary temporary storage area for program instructions and data. Each location in RAM is identified by a number called a memory address. Any information stored in RAM is lost when you turn off your system.
book.book Page 189 Monday, July 7, 2008 2:59 PM read-only file A read-only file is one that you are prohibited from editing or deleting. A file can have read-only status if: • Its read-only attribute is enabled. • It resides on a physically write-protected diskette or on a diskette in a write-protected drive. • It is located on a network in a directory to which the system administrator has assigned read-only rights to you.
book.book Page 190 Monday, July 7, 2008 2:59 PM RIMM Acronym for Rambus In-line Memory Module, which is the Rambus equivalent of a DIMM module. RMI Acronym for Remote Method Invocation. RMI is a part of the Java programming language library that enables a Java program running on one system to access the objects and methods of another Java program running on a different system. ROM Acronym for read-only memory. Your system contains some programs essential to its operation in ROM code.
book.book Page 191 Monday, July 7, 2008 2:59 PM schema A collection of class definitions that describes managed objects in a particular environment. A schema is a collection of class definitions used to represent managed objects that are common to every management environment, which is why CIM is called the Common Information Model. SCSI Acronym for small computer system interface. An I/O bus interface with faster data transmission rates than standard ports.
book.book Page 192 Monday, July 7, 2008 2:59 PM server module A modular system component that functions as an individual system. To function as a system, a server module is inserted into a chassis which includes power supplies, fans, a system management module, and at least one network switch module. The power supplies, fans, system management module, and network switch module are shared resources of the server modules in the chassis. See modular system.
book.book Page 193 Monday, July 7, 2008 2:59 PM SMART Acronym for Self-Monitoring Analysis and Reporting Technology. A technology that allows hard drives to report errors and failures to the system BIOS, which then displays an error message on the screen. To take advantage of this technology, you must have a SMART-compliant hard drive and the proper support in the system BIOS. SMBIOS Acronym for system management BIOS. SMD Abbreviation for surface mount device.
book.book Page 194 Monday, July 7, 2008 2:59 PM SSL Abbreviation for secure socket layer. state Refers to the condition of an object that can have more than one condition. For example, an object may be in the "not ready" state. status Refers to the health or functioning of an object. For example, a temperature probe can have the status normal if the probe is measuring acceptable temperatures. When the probe begins reading temperatures that exceed limits set by the user, it reports a critical status.
book.book Page 195 Monday, July 7, 2008 2:59 PM system board As the main circuit board, the system board usually contains most of your system's integral components, such as the following: • Microprocessor • RAM • Controllers for standard peripheral devices, such as the keyboard • Various ROM chips Frequently used synonyms for system board are motherboard and logic board.
book.book Page 196 Monday, July 7, 2008 2:59 PM TCP/IP Abbreviation for Transmission Control Protocol/Internet Protocol. A system for transferring information over a computer network containing dissimilar systems, such as systems running Windows and UNIX. termination Some devices (such as the last device at each end of a SCSI cable) must be terminated to prevent reflections and spurious signals in the cable.
book.book Page 197 Monday, July 7, 2008 2:59 PM time-out A specified period of system inactivity that must occur before an energy conservation feature is activated. tpi Abbreviation for tracks per inch. TPM Acronym for Trusted Platform Module TQFP Abbreviation for thin quad flat pack. TSOP Abbreviation for thin small outline package. A very thin, plastic, rectangular surface mount chip package with gull-wing pins on its two short sides. TSR Abbreviation for terminate-and-stay-resident.
book.book Page 198 Monday, July 7, 2008 2:59 PM unicode A fixed width, 16-bit world wide character encoding, developed and maintained by the Unicode Consortium. upper memory area The 384 KB of RAM located between 640 KB and 1 MB. If the system has an Intel386 or higher microprocessor, a utility called a memory manager can create UMBs in the upper memory area, in which you can load device drivers and memory-resident programs. UPS Abbreviation for uninterruptible power supply.
book.book Page 199 Monday, July 7, 2008 2:59 PM VAC Abbreviation for volt(s) alternating current. varbind An algorithm used to assign an object identifier (OID). The varbind gives rules for arriving at the decimal prefix that uniquely identifies an enterprise, as well as the formula for specifying a unique identifier for the objects defined in that enterprise's MIB. variable A component of a managed object.
book.book Page 200 Monday, July 7, 2008 2:59 PM video adapter The logical circuitry that provides—in combination with the monitor—your system's video capabilities. A video adapter may support more or fewer features than a specific monitor offers. Typically, a video adapter comes with video drivers for displaying popular application programs and operating systems in a variety of video modes. On some systems, a video adapter is integrated into the system board.
book.book Page 201 Monday, July 7, 2008 2:59 PM virtual memory A method for increasing addressable RAM by using the hard drive. For example, in a system with 16 MB of RAM and 16 MB of virtual memory set up on the hard drive, the operating system would manage the system as though it had 32 MB of physical RAM. virus A self-starting program designed to inconvenience you.
book.book Page 202 Monday, July 7, 2008 2:59 PM Wakeup on LAN The ability for the power in a client station to be turned on by the network. Remote wake-up enables software upgrading and other management tasks to be performed on users' machines after the work day is over. It also enables remote users to gain access to machines that have been turned off. Intel calls remote wake-up "Wake-on-LAN." Web server An application that makes Web pages available for viewing by Web browsers using the HTTP protocol.
book.book Page 203 Monday, July 7, 2008 2:59 PM write-protected Read-only files are said to be write-protected. You can write-protect a 3.5-inch diskette by sliding its write-protect tab to the open position or by setting the write-protect feature in the System Setup program. WMI Acronym for Windows Management Instrumentation. WMI provides CIM Object Manager services. X.509 Certificate An X.509 certificate binds a public encryption key to the identity or other attribute of its principal.
book.
book.
book.
book.
book.book Page 208 Monday, July 7, 2008 2:59 PM logs, 95 about, 149-150, 153 alert log, 151 command log, 152 features, 149 hardware log, 150 server, 14 N navigation bar, of home page, 58 network properties, RAC, 76 network, managing, 105 O online help, using, 61 M manage current, 101 intrusion, 103 memory devices, 104 ports, 105 power supplies, 106 processors, 107 system, 90 temperatures, 109 management alert, 96-104, 106-107, 110-111 certificate, X.
book.
book.
book.
book.