Skip to content

Latest commit

 

History

History
199 lines (128 loc) · 10.1 KB

Dell-EMC-OpenManage-Ansible-Modules.md

File metadata and controls

199 lines (128 loc) · 10.1 KB

Dell EMC OpenManage Ansible Modules for iDRAC (BETA)

1. Introduction

Dell EMC OpenManage Ansible Modules provide customers the ability to automate the Out-of-Band configuration management, deployment and updates for Dell EMC PowerEdge Servers using Ansible by leeveragin the management automation built into the iDRAC with Lifecycle Controller. iDRAC provides both REST APIs based on DMTF RedFish industry standard and WS-Management (WS-MAN) for management automation of PowerEdge Servers.

With OpenManage Ansible modules, you can do:

  • Server administration
  • Configure iDRAC's settings such as:
    • iDRAC Network Settings
    • SNMP and SNMP Alert Settings
    • Timezone and NTP Settings
    • System settings such as server topology
    • LC attributes such as CSIOR etc.
  • Perform User administration
  • BIOS and Boot Order configuration
  • RAID Configuration
  • OS Deployment
  • Firmware Updates

1.1 How OpenManage Ansible Modules work?

OpenManage Ansible modules extensively uses the Server Configuration Profile (SCP) for most of the configuration management, deployment and update of PowerEdge Servers. Lifecycle Controller 2 version 1.4 and later adds support for SCP. A SCP contains all BIOS, iDRAC, Lifecycle Controller, Network amd Storage settings of a PowerEdge server and can be applied to multiple servers, enabling rapid, reliable and reproducible configuration.

A SCP operation can be performed using any of the following methods:

  • Export/Import to/from a remote network share via CIFS, NFS
  • Export/Import to/from a remote network share via HTTP, HTTPS (iDRAC firmware 3.00.00.00 and above)
  • Export/Import to/from via local file streaming (iDRAC firmware 3.00.00.00 and above)

⚠️ NOTE: This BETA release of OpenManage Ansible Module supports only the first option listed above for SCP operations i.e. export/import to/from a remote network share via CIFS or NFS. Future releases will support all the options for SCP operations.

Setting up a local mount point for a remote network share

Since OpenManage Ansible modules extensively uses SCP to automate and orchestrate configuration, deployment and update on PowerEdge servers, you must locally mount the remote network share (CIFS or NFS) on the ansible server where you will be executing the playbook or modules. Local mount point also should have read-write privileges in order for OpenManage Ansible modules to write a SCP file to remote network share that will be imported by iDRAC.

You can use either of the following ways to setup a local mount point:

  • Use the mount command to mount a remote network share

    # Mount a remote CIFS network share on the local ansible machine.
    # In the below command, 192.168.10.10 is the IP address of the CIFS file
    # server (you can provide a hostname as well), Share is the directory that
    # is being shared, and /mnt/CIFS is the location to mount the file system
    # on the local ansible machine
    sudo mount -t cifs \\\\192.168.10.10\\Share -o username=user1,password=password,dir_mode=0777,file_mode=0666 /mnt/CIFS
    
    # Mount a remote NFS network share on the local ansible machine.
    # In the below command, 192.168.10.10 is the IP address of the NFS file
    # server (you can provide a hostname as well), Share is the directory that
    # is being exported, and /mnt/NFS is the location to mount the file system
    # on the local ansible machine. Please note that NFS checks access
    # permissions against user ids (UIDs). For granting the read-write
    # privileges on the local mount point, the UID and GID of the user on your
    # local ansible machine needs to match the UID and GID of the owner of the
    # folder you are trying to access on the server. Other option for granting
    # the rw privileges would be to use all_squash option.
    
    sudo mount -t nfs 192.168.10.11:/Share /mnt/NFS -o rw,user,auto
    
  • Alternate and preferred way would be to use the /etc/fstab for mounting the remote network share. That way, you won’t have to mount the network share after a reboot and remember all the options. General syntax for mounting the network share in /etc/fstab would be as follows:

    # Mounting a CIFS network share:
    //192.168.10.10/Share /mnt/CIFS cifs username=user,password=pwd,domain=domain_name,dir_mode=0777,file_mode=0666,iocharset=utf8 0 0
    
    # Mounting a NFS network share:
    192.168.10.11:/Share /mnt/NFS nfs rw,user,auto 0 0
    

1.2 What is included in this BETA release?

Use Cases Included in this BETA release
Protocol Support
  • WS-Management
Server Administration Power and Thermal
  • Power Control
iDRAC Reset
  • Yes
iDRAC Configuration User and Password Management
  • Local user and password management
    • Create User
    • Change Password
    • Change User Privileges
    • Remove an user
iDRAC Network Configuration
  • NIC Selection
  • Zero-Touch Auto-Config settings
  • IPv4 Address settings:
    • Enable/Disable IPv4
    • Static IPv4 Address settings (IPv4 address, gateway and netmask)
    • Enable/Disable DNS from DHCP
    • Preferred/Alternate DNS Server
  • VLAN Configuration
SNMP and SNMP Alert Configuration
  • SNMP Agent configuration
  • SNMP Alert Destination Configuration
    • Add, Modify and Delete an alert destination
Server Configuration Profile (SCP)
  • Export SCP to remote network share (CIFS, NFS)
  • Import SCP from a remote network share (CIFS, NFS)
iDRAC Services
  • iDRAC Web Server configuration
    • Enable/Disable Web server
    • TLS protocol version
    • SSL Encryption Bits
    • HTTP/HTTPS port
    • Time out period
Lifecycle Controller (LC) attributes
  • Enable/Disable CSIOR (Collect System Inventory on Restart)
BIOS Configuration Boot Order Settings
  • Change Boot Mode (Bios, Uefi)
  • Change Bios/Uefi Boot Sequence
  • One-Time Bios/Uefi Boot Configuration settings
Deployment OS Deployment
  • OS Deployment from:
    • Remote Network Share (CIFS, NFS)
Storage Virtual Drive
  • Create and Delete virtual drives
Update Firmware Update
  • Firmware update from:
    • Remote network share (CIFS, NFS)
Monitor Logs
  • Export Lifecycle Controller (LC) Logs to:
    • Remote network share (CIFS, NFS)
  • Export Tech Support Report (TSR) to:
    • Remote network share (CIFS, NFS)

2. Requirements


3. Modules

OpenManage Ansible modules can be broadly categorized under the following sections. Each section describes the modules that are currently implemented including examples.

3.1 Server Administration

Power Control

Lifecycle Controller (LC) and Server Status

Hardware Inventory

Firmware Inventory

3.2 iDRAC Configuration

User Administration

iDRAC Network Settings

SNMP and SNMP Alerts

Server Configuration Profile (SCP)

Timezone and NTP

iDRAC Web Server

Remote Syslog

Lifecycle Controller Job Management

Lifecycle Controller Attributes

3.3 BIOS Configuration

Boot Order

3.4 Storage Configuration

Virtual Drives

3.5 OS Deployment

Boot to Network ISO

3.6 Firmware Update

Update Firmware from a Network Share

3.7 Monitor

Lifecycle Controller Logs

Tech Support Report (TSR)


Copyright © 2017 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be trademarks of their respective owners.