Dell Lifecycle Controller 2 Technical White Paper

Dell Lifecycle Controller Web Services Interface Guide for Linux
A Dell Technical White Paper about the Best Practices to be followed for using the WS-Man based remote services provided by iDRAC and Lifecycle Controller
Dell Engineering December 2013
A Dell Best Practices
Date
Description
December 2013
1.0 Release: Initial release
Revisions
Dell, the DELL logo, and the DELL badge are trademarks of Dell Inc. Symantec, NetBackup, and Backup Exec are trademarks of Symantec Corporation in the U.S. and other countries. Microsoft, Windows, and Windows Server are registered trademarks of Microsoft Corporation in the United States and/or other countries. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Dell disclaims any proprietary interest in the marks and names of others.
Dell™, the Dell logo, Dell Boomi™, Dell Precision™ ,OptiPlex™, Latitude™, PowerEdge™, PowerVault™, PowerConnect™, OpenManage™, EqualLogic™, Compellent™, KACE™, FlexAddress™, Force10™ and Vostro™ are
trademarks of Dell Inc. Other Dell trademarks may be used in this document. Cisco Nexus®, Cisco MDS®, Cisco NX­0S®, and other Cisco Catalyst® are registered trademarks of Cisco System Inc. EMC VNX®, and EMC Unisphere® are registered trademarks of EMC Corporation. Intel®, Pentium®, Xeon®, Core® and Celeron® are registered trademarks of Intel Corporation in the U.S. and other countries. AMD® is a registered trademark and AMD Opteron™, AMD Phenom™ and AMD Sempron™ are trademarks of Advanced Micro Devices, Inc. Microsoft®, Windows®, Windows Server®, Internet Explorer®, MS-DOS®, Windows Vista® and Active Directory® are either trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries. Red Hat® and Red Hat® Enterprise Linux® are registered trademarks of Red Hat, Inc. in the United States and/or other countries. Novell® and SUSE® are registered trademarks of Novell Inc. in the United States and other countries. Oracle® is a registered trademark of Oracle Corporation and/or its affiliates. Citrix®, Xen®, XenServer® and XenMotion® are either registered trademarks or trademarks of Citrix Systems, Inc. in the United States and/or other countries. VMware®, Virtual SMP®, vMotion®, vCenter® and vSphere® are registered trademarks or trademarks of VMware, Inc. in the United States or other countries. IBM® is a registered trademark of International Business Machines Corporation. Broadcom® and NetXtreme® are registered trademarks of Broadcom Corporation. Qlogic is a registered trademark of QLogic Corporation. Other trademarks and trade names may be used in this document to refer to either the entities claiming
2 Lifecycle Controller Integration – Web Services Interface Guide for Windows | Revision 1.0.
the marks and/or names or their products and are the property of their respective owners. Dell disclaims proprietary interest in the marks and names of others.
3 Lifecycle Controller Integration – Web Services Interface Guide for Windows | Revision 1.0.
Contents
Revisions ............................................................................................................................................................................................ 2
Executive Summary ....................................................................................................................................................................... 14
1 Introduction .............................................................................................................................................................................. 15
2 References ................................................................................................................................................................................ 16
3 Overview.................................................................................................................................................................................... 17
3.1 Format for WS-Man CLI Examples in Document .................................................................................................... 17
3.2 WS-Man Security and Time Parameters ................................................................................................................... 18
3.2.1 Encryption Certificate Security ................................................................................................................................... 18
3.2.2 Handling Invalid Responses from WS-Man Commands ........................................................................................ 18
3.2.3 Improving WS-Man Enumeration Performance ...................................................................................................... 18
3.2.4 Specifying
3.2.5 Return Values ................................................................................................................................................................. 19
3.2.6 Glossary .......................................................................................................................................................................... 19
4 Discovery ................................................................................................................................................................................... 20
4.1 Discovering Web Service Capability .......................................................................................................................... 20
4.2 Discovering what Profiles are implemented ............................................................................................................ 20
4.3 Discovering Implementation Namespace ................................................................................................................ 21
5 Managing iDRAC Local User Accounts ................................................................................................................................ 23
5.1 Description of iDRAC Attributes Versus Standard DMTF Model ........................................................................... 23
5.2 Account Inventory (using iDRAC Attributes) ............................................................................................................ 23
5.2.1 Account and Capabilities (using iDRAC Attributes) ................................................................................................. 23
5.2.2 Privilege and Capabilities (using iDRAC Attributes) ................................................................................................. 24
5.3 Manage Account Settings (using iDRAC Attributes) ............................................................................................... 25
5.3.1 Modify User Name (using iDRAC Attributes) ............................................................................................................ 25
5.3.2 Modify Password (using iDRAC Attributes) ............................................................................................................... 26
5.3.3 Modify Account State (using iDRAC Attributes) ....................................................................................................... 26
StartTime, Until
Time, and
TIME_NOW
Parameters ............................................................................ 18
5.3.4 Modify User Privilege (using iDRAC Attributes) ........................................................................................................ 28
5.4 Account Inventory (using DMTF Model) ................................................................................................................... 28
5.4.1 Account and Capabilities (using DMTF Model) ........................................................................................................ 29
5.4.2 Privilege and Capabilities (using DMTF Model) ........................................................................................................ 32
5.5 Manage Account Settings (using DMTF Model) ...................................................................................................... 35
4 Lifecycle Controller Integration – Web Services Interface Guide for Windows | Revision 1.0.
5.5.1 Modify User Name (using DMTF Model) ................................................................................................................... 35
5.5.2 Modify Password (using DMTF Model) ...................................................................................................................... 38
5.5.3 Modify Account State (using DMTF Model) .............................................................................................................. 38
5.5.4 Modify User Privilege (using DMTF Model) ............................................................................................................... 39
6 Firmware Inventory ................................................................................................................................................................. 41
6.1 Software Inventory Profile Specification ................................................................................................................... 41
6.2 Remote Inventory Method Invocation Get Software Inventory ...................................................................... 41
7 Firmware Update ..................................................................................................................................................................... 43
7.1 Software Update Profile Specification....................................................................................................................... 43
7.2 ”Rollback” Firmware ...................................................................................................................................................... 43
7.2.1 Request “Rollback” Image ............................................................................................................................................ 43
7.2.2 Create Reboot Job ....................................................................................................................................................... 43
7.2.3 Schedule Update Jobs ................................................................................................................................................. 43
7.2.4 Monitor Update Jobs .................................................................................................................................................... 43
7.3 BIOS Firmware “Rollback” ............................................................................................................................................ 44
7.4 NIC Firmware “Rollback” .............................................................................................................................................. 45
7.5 Update from Network Source .................................................................................................................................... 46
7.5.1 Request Update Download ......................................................................................................................................... 47
7.5.2 Monitor Download Status ............................................................................................................................................ 47
7.5.3 Reboot to Perform Update .......................................................................................................................................... 47
7.5.4 Wait for Job Completion ............................................................................................................................................. 47
7.5.5 Delete Job ...................................................................................................................................................................... 47
7.6 Update NICs from HTTP, CIFS Share, NFS share, TFTP, or FTP ............................................................................ 47
7.7 Update BIOS from HTTP, CIFS Share, NFS share, TFTP, or FTP ........................................................................... 49
7.8 CreateRebootJob() ....................................................................................................................................................... 51
7.9 Automatic Updates ....................................................................................................................................................... 52
7.9.1 Enable automatic update ............................................................................................................................................. 52
7.9.2 Create a Config Job ..................................................................................................................................................... 52
7.9.3 Set Update Schedule .................................................................................................................................................... 53
7.9.4 Get the Update Schedule ............................................................................................................................................ 54
7.9.5 Clear the Update Schedule ......................................................................................................................................... 55
7.10 Device Update from Repository ................................................................................................................................. 55
5 Lifecycle Controller Integration – Web Services Interface Guide for Windows | Revision 1.0.
7.10.1 Install From Repository ................................................................................................................................................ 55
7.10.2 Get Repo-Based Update List ....................................................................................................................................... 56
8 Power State Management ...................................................................................................................................................... 59
8.1 Description of Base Server versus Power State Management Methods ............................................................. 59
8.2 Get Power State ............................................................................................................................................................ 59
8.2.1 Base Server Method ...................................................................................................................................................... 59
8.2.2 Power State Management Method ........................................................................................................................... 60
8.3 Get Power Control Capabilites .................................................................................................................................. 60
8.3.1 Base Server Method ..................................................................................................................................................... 60
8.3.2 Power State Management Method ............................................................................................................................ 62
8.4 Power Control ............................................................................................................................................................... 63
8.4.1 Base Server Method ...................................................................................................................................................... 63
8.4.2 Power State Management Method ............................................................................................................................ 63
9 Hardware Inventory ................................................................................................................................................................. 65
9.1 Power Supply Inventory ............................................................................................................................................... 65
9.2 Fan Inventory ................................................................................................................................................................. 66
9.3 Memory Inventory ......................................................................................................................................................... 67
9.4 CPU Inventory................................................................................................................................................................ 67
9.5 iDRAC Card Inventory .................................................................................................................................................. 69
9.6 PCI Device Inventory .................................................................................................................................................... 69
9.7 Video Inventory ............................................................................................................................................................. 70
9.8 VFlash SD Card Inventory ............................................................................................................................................ 71
9.9 NIC Inventory and Configuration ............................................................................................................................... 71
9.10 RAID Inventory and Configuration ............................................................................................................................. 73
9.11 BIOS Inventory and Configuration ............................................................................................................................. 74
9.12 System Inventory (including CSIOR attribute) ......................................................................................................... 74
10 Job Control Management ...................................................................................................................................................... 77
10.1 Description of Job Management ............................................................................................................................... 77
10.2 Remote Job Control Examples .................................................................................................................................. 77
10.2.1 Setup Job Queue .......................................................................................................................................................... 77
10.2.2 Delete Job Queue .................................................................................................................................................... 78
10.2.3 List Jobs in Job Store .............................................................................................................................................. 79
6 Lifecycle Controller Integration – Web Services Interface Guide for Windows | Revision 1.0.
11 Operating System Deployment ............................................................................................................................................. 81
11.1 OS Deployment Profile Implementation Conformance ........................................................................................ 81
11.2 Checking OS Deployment Service Availability ......................................................................................................... 81
11.3 OS Deployment Method Invocation Examples ....................................................................................................... 82
11.3.1 Get Driver Pack Information ....................................................................................................................................... 82
11.3.2 Unpack Selected Drivers and Attach to Host OS as USB Device ......................................................................... 83
11.3.3 Detach Emulated USB Device Containing Drivers .................................................................................................. 84
11.3.4 Unpack Selected Drivers and Copy to Network Share .......................................................................................... 85
11.3.5 Check Job Status .......................................................................................................................................................... 86
11.3.6 Boot to Network ISO .................................................................................................................................................... 87
11.3.7 Detach Network ISO USB Device ............................................................................................................................... 89
11.3.8 Boot To PXE ................................................................................................................................................................... 89
11.3.9 Get Host MAC Address Information ......................................................................................................................... 90
11.3.10 Download ISO to VFlash .................................................................................................................................... 90
11.3.11 Boot to ISO from VFlash ..................................................................................................................................... 92
11.3.12 Delete ISO from VFlash ....................................................................................................................................... 92
11.3.13 Detach ISO from VFlash ..................................................................................................................................... 93
11.3.14 Connect Network ISO Image ............................................................................................................................ 93
11.3.15 Disconnect Network ISO Image ....................................................................................................................... 94
11.3.16 Skip ISO Image Boot ............................................................................................................................................ 95
11.3.17 Get Network ISO Image Connection Information ......................................................................................... 95
11.3.18 Connect RFS ISO Image ..................................................................................................................................... 96
11.3.19 Disconnect RFS ISO Image ................................................................................................................................ 97
11.3.20 Get RFS ISO Image Connection Information ................................................................................................. 98
11.3.21 Boot To Hard Drive (HD) .................................................................................................................................... 98
11.3.22 Configurable Boot to Network ISO .................................................................................................................. 99
12 Lifecycle Controller Management Profile ......................................................................................................................... 101
12.1 Collect System Inventory on Restart (CSIOR) ........................................................................................................ 101
12.2 Part Replacement Configuration and Management ............................................................................................. 102
12.2.1 Create Config Job ...................................................................................................................................................... 102
12.2.2 Get LC Config Job Status .......................................................................................................................................... 103
12.2.3 List All LC Jobs ............................................................................................................................................................. 103
7 Lifecycle Controller Integration – Web Services Interface Guide for Windows | Revision 1.0.
12.2.4 Get CSIOR Component Configuration Recovery (CCR) Attribute ..................................................................... 104
12.2.5 Get Part Firmware Update Attribute ........................................................................................................................ 105
12.3 Re-Initiate Auto-Discovery Client ............................................................................................................................ 105
12.4 Clear or Set Provisioning Server ............................................................................................................................... 106
12.5 Check VFlash License Enablement .......................................................................................................................... 107
12.6 Download Server Public Key ..................................................................................................................................... 108
12.7 Download Client Certificates .................................................................................................................................... 109
12.8 Delete Auto-Discovery Client Certificates ............................................................................................................. 110
12.9 Set Public Certificates ................................................................................................................................................ 110
12.10 Set iDRAC Certificate and Private Key ...................................................................................................................... 111
12.11 Delete Auto-Discovery Server Public Key .............................................................................................................. 112
12.12 Insert Comment in Lifecycle Controller Log ......................................................................................................... 113
12.13 Export Lifecycle Controller Log ................................................................................................................................ 113
12.14 ExportCompleteLCLog() ............................................................................................................................................ 114
12.15 Export Hardware Inventory from Lifecycle Controller ......................................................................................... 115
12.16 Export Factory Configuration ................................................................................................................................... 116
12.17 System Decommission .............................................................................................................................................. 118
12.18 Get Remote Services API Status ............................................................................................................................... 118
12.19 Export System Configuration .................................................................................................................................... 119
12.20 Import System Configuration ................................................................................................................................... 120
12.21 XML Template Preview ............................................................................................................................................... 121
12.22 Remote Diagnostics ................................................................................................................................................... 122
12.22.1 Run Diagnostics ................................................................................................................................................. 122
12.22.2 Export Diagnostics Results ............................................................................................................................... 123
12.22.3 Verify the Diagnostics Job Status ................................................................................................................... 123
13 VFlash SD Card Management .............................................................................................................................................. 125
13.1 Listing the SD Card Partitions ................................................................................................................................... 125
13.2 Initialize the Virtual Flash Media ............................................................................................................................... 126
13.2.1 Get VFlash SD Card Inventory .................................................................................................................................. 126
13.2.2 Initialize or Format Media .......................................................................................................................................... 126
13.2.3 Verify Initialization or Formatting ............................................................................................................................. 127
13.3 Enable or Disable VFlash using VFlash State Change ........................................................................................... 128
8 Lifecycle Controller Integration – Web Services Interface Guide for Windows | Revision 1.0.
13.4 Create Partition ........................................................................................................................................................... 128
13.5 Create Partition using Image .................................................................................................................................... 130
13.6 Delete Partition ............................................................................................................................................................ 131
13.7 Format Partition ........................................................................................................................................................... 132
13.8 Modify Partition ........................................................................................................................................................... 133
13.9 Attach Partition ............................................................................................................................................................ 134
13.10 Detach Partition........................................................................................................................................................... 135
13.11 Export Data from Partition ........................................................................................................................................ 136
14 Boot Control Configuration Management ........................................................................................................................ 139
14.1 Listing the Boot Inventory-ConfigSetting Class .................................................................................................... 139
14.2 Getting a Boot ConfigSetting Instance ................................................................................................................... 140
14.3 Listing the Boot Inventory-SourceSetting Class ................................................................................................... 140
14.4 Changing the Boot Order by InstanceID-ChangeBootOrderByInstanceID() .................................................. 141
14.5 Enable or Disable the Boot Source-ChangeBootSourceState() ......................................................................... 142
15 NIC or CNA Card Management .......................................................................................................................................... 144
15.1 Listing the NIC or CNA Inventory-Enumeration Class ......................................................................................... 144
15.2 Listing the NIC or CNA Inventory-String Class ...................................................................................................... 145
15.3 Listing the CNA Inventory-Integer Class ................................................................................................................ 146
15.4 Listing the CNA Inventory-NICView Class ............................................................................................................. 147
15.5 Listing the CNA Inventory-NICCapabilities Class.................................................................................................. 148
15.6 Listing the CNA Inventory- NICStatistics Class ..................................................................................................... 149
15.7 Applying the Pending Values for CNA-CreateTargetedConfigJob() ................................................................. 150
15.8 Deleting the Pending Values for CNA-DeletePendingConfiguration() ............................................................. 151
15.9 Getting the CNA Enumeration Instance ................................................................................................................. 152
15.10 Setting the
IscsiOffloadMode
Attribute ................................................................................................................... 153
15.11 Setting the MaxBandwidth Attribute ........................................................................................................................ 154
15.12 Setting the VirtMacAddr Attribute ............................................................................................................................ 155
15.13 Setting the LegacyBootProto Attribute ................................................................................................................... 155
15.14 Setting CNA LAN Modes ............................................................................................................................................ 156
15.15 Setting the iSCSI Boot Target.................................................................................................................................... 157
15.16 Setting the FCoE Boot Target ................................................................................................................................... 158
16 RAID Storage Management .................................................................................................................................................. 160
9 Lifecycle Controller Integration – Web Services Interface Guide for Windows | Revision 1.0.
16.1 Listing the RAID Inventory-Enumeration Class ..................................................................................................... 160
16.2 Getting a RAID Enumeration Instance .................................................................................................................... 161
16.3 Listing the RAID Inventory-Integer Class ................................................................................................................ 162
16.4 Getting a RAID Integer Instance ............................................................................................................................... 163
16.5 Listing the RAID Inventory-String Class .................................................................................................................. 164
16.6 Getting a RAID String Instance ................................................................................................................................. 165
16.7 Listing the RAID Inventory-ControllerView Class ................................................................................................. 165
16.8 Getting a RAID ControllerView Instance................................................................................................................. 166
16.9 Listing the RAID Inventory-PhysicalDiskView Class .............................................................................................. 167
16.10 Listing the RAID VirtualDiskView Inventory ............................................................................................................ 168
16.11 Listing the RAID EnclosureView Inventory ............................................................................................................. 169
16.12 Reset Configuration-ResetConfig() ......................................................................................................................... 170
16.13 Clearing the Foreign Configuration-ClearForeignConfig() .................................................................................. 171
16.14 Applying the Pending Values for RAID-CreateTargetedConfigJob() .................................................................. 171
16.15 Deleting the Pending Values for RAID-DeletePendingConfiguration() ............................................................. 173
16.16 Managing Hot-Spare .................................................................................................................................................. 173
16.16.1 Determining Potential Disks-GetDHSDisks() ................................................................................................ 173
16.16.2 Assigning the Hot-Spare-AssignSpare() ......................................................................................................... 174
16.16.3 Unassigning the Hot Spare-UnassignSpare() ................................................................................................ 175
16.17 Managing Keys for Self Encrypting Drives .............................................................................................................. 175
16.17.1 Setting the Key-SetControllerKey() ................................................................................................................. 176
16.17.2 Locking the Virtual Disk-LockVirtualDisk() .................................................................................................... 176
16.17.3 Locking the Controller with a Key-EnableControllerEncryption() ............................................................ 177
16.17.4 Rekeying the Controller-ReKey() .................................................................................................................... 178
16.17.5 Removing the Key-RemoveControllerKey() .................................................................................................. 179
16.18 Managing Virtual Disk ................................................................................................................................................. 180
16.18.1 Getting the Available RAID levels-GetRAIDLevels() ..................................................................................... 180
16.18.2 Getting the Available Disks-GetAvailableDisks() ........................................................................................... 181
16.18.3 Checking the Create VD Parameters Validity-CheckVDValues() .............................................................. 182
16.18.4 Creating a Single Virtual Disk-CreateVirtualDisk() ....................................................................................... 183
16.18.5 Creating a Sliced Virtual Disk-CreateVirtualDisk() ........................................................................................ 186
16.18.6 Creating a Cachecade Virtual Disk-CreateVirtualDisk() .............................................................................. 189
10 Lifecycle Controller Integration – Web Services Interface Guide for Windows | Revision 1.0.
16.18.7 Deleting a Virtual Disk-DeleteVirtualDisk() .................................................................................................... 190
16.19 Setting Controller Attributes ..................................................................................................................................... 191
16.19.1 Changing the Value of a RAID Controller Enumeration Attribute ............................................................ 191
16.19.2 Changing Multiple Values of RAID Controller Enumeration Attributes.................................................... 191
16.19.3 Changing the Value of a RAID Controller Integer Attribute ....................................................................... 192
16.19.4 Changing Multiple Values of RAID Controller Integer Attributes .............................................................. 193
16.20 Convert Physical Disk Drives to RAID-ConvertToRAID() ..................................................................................... 194
16.21 Convert Physical Disk Drives to Non RAID-ConvertToNonRAID()..................................................................... 195
17 Managing BIOS Configuration............................................................................................................................................. 196
17.1 Listing the BIOS Inventory-Enumeration Class ..................................................................................................... 196
17.2 Getting a BIOS Enumeration Instance .................................................................................................................... 197
17.3 Changing the BIOS BootMode-SetAttribute()........................................................................................................ 198
17.4 Setting Multiple BIOS BootMode Parameters ........................................................................................................ 198
17.5 Listing the BIOS Inventory-Integer Class ................................................................................................................ 199
17.6 Listing the BIOS Inventory-String Class .................................................................................................................. 199
17.7 Applying the Pending Values for BIOS & Boot-CreateTargetedConfigJob() .................................................. 200
17.8 Deleting the Pending Values for BIOS and Boot-DeletePendingConfiguration() ........................................... 201
17.9 Managing BIOS Passwords ....................................................................................................................................... 202
17.9.1 Setting the BIOS Password ....................................................................................................................................... 202
17.9.2 Create Target Configuration Job ............................................................................................................................ 203
17.9.3 Monitor Set BIOS Password Status ......................................................................................................................... 203
17.10 Listing the BIOS Inventory-Password Class .......................................................................................................... 204
18 Exporting and Importing Server Profile ............................................................................................................................ 206
18.1 Exporting Server Profile ............................................................................................................................................ 206
18.1.1 Exporting Server Profile to iDRAC vFlash Card-BackupImage() ........................................................................ 206
18.1.2 Exporting Server Profile to NFS Share-BackupImage() ........................................................................................207
18.1.3 Exporting Server Profile to CIFS Share-BackupImage() .......................................................................................207
18.1.4 Monitoring Export status .......................................................................................................................................... 208
18.2 Automatic Backup ...................................................................................................................................................... 208
18.2.1 Enable the Automatic Backup ................................................................................................................................. 209
18.2.2 Set Backup Schedule .................................................................................................................................................. 210
18.2.3 Get the Backup Schedule .......................................................................................................................................... 210
11 Lifecycle Controller Integration – Web Services Interface Guide for Windows | Revision 1.0.
18.2.4 Clear the Backup Schedule .................................................................................................................................. 210
18.3 Importing Server Profile ............................................................................................................................................. 211
18.3.1 Importing Server Profile from iDRAC vFlash Card-RestoreImage() ................................................................... 211
18.3.2 Importing Server Profile from NFS share-RestoreImage() ................................................................................... 211
18.3.3 Importing Server Profile from CIFS share-RestoreImage() .................................................................................. 212
18.3.4 Monitoring Import Status ...................................................................................................................................... 213
19 iDRAC Configuration ............................................................................................................................................................. 214
19.1 Listing the iDRAC Card Inventory-Enumeration Class ......................................................................................... 214
19.2 Getting an iDRAC Card Enumeration Instance ...................................................................................................... 215
19.3 Listing the iDRAC Card Inventory-Enumeration Class using
groupID
.............................................................. 216
19.4 Applying the Attributes and Polling Job Completion ........................................................................................... 217
19.4.1 Changing iDRAC Values-ApplyAttributes() (Immediate) ...................................................................................... 217
19.4.2 Polling Job Completion ........................................................................................................................................ 219
19.4.3 Set Attribute Verification ....................................................................................................................................... 219
19.5 Listing the iDRAC Card Inventory-Integer Class .................................................................................................. 220
19.6 Listing the iDRAC Card Inventory-Integer Class using
groupID
......................................................................... 221
19.7 Listing the iDRAC Card Inventory-String Class ...................................................................................................... 222
19.8 Listing the iDRAC Card Inventory-String Class using
groupID
.......................................................................... 224
19.9 Changing the iDRAC IP Change Notification......................................................................................................... 225
19.9.1 Getting the Current iDRAC IPChange State ........................................................................................................... 225
19.9.2 Setting the iDRAC IPChange Notification-SetAttribute() ............................................................................... 226
20 Remote Service Status .......................................................................................................................................................... 227
20.1 Getting Remote Service Status ................................................................................................................................. 227
20.2 Restarting Remote Service Status ........................................................................................................................... 228
21 System Information .............................................................................................................................................................. 230
21.1 Listing the System Inventory-SystemView Class .................................................................................................. 230
22 Sensor Information ................................................................................................................................................................ 232
22.1 Listing the Sensors Inventory-PSNumericSensor Class ....................................................................................... 232
23 Managing Fiber Channel (FC) Configuration .................................................................................................................... 233
23.1 Listing the FC Inventory-Attribute Class ................................................................................................................. 233
23.2 Listing the FC Inventory-Statistics Class ................................................................................................................ 234
23.3 Listing the FC Inventory-String Class ..................................................................................................................... 234
12 Lifecycle Controller Integration – Web Services Interface Guide for Windows | Revision 1.0.
23.4 Listing the FC Inventory-Integer Class .................................................................................................................... 235
23.5 Listing the FC Inventory-Enumeration Class ........................................................................................................ 236
23.6 Changing the FC Attributes-SetAttribute() ............................................................................................................ 236
23.7 Applying the Pending Values for FC-CreateTargetedConfigJob() ..................................................................... 237
23.8 Deleting the Pending Values for FC-DeletePendingConfiguration() ................................................................ 238
23.9 Listing the FC Views ....................................................................................................................................................239
13 Lifecycle Controller Integration – Web Services Interface Guide for Windows | Revision 1.0.
Executive Summary
Dell PowerEdge servers are equipped with the integrated Dell Remote Access Controller and the Lifecycle Controller solution for remote management – iDRAC6 on 11th Generation servers and iDRAC7 on 12th Generation servers. These servers can be remotely managed by using the WS-Man services for configuration, update, deployment, and maintenance. This whitepaper provides information about the various WS­Man interfaces with examples on how to use the interfaces in a Linux environment.
1 Introduction
This document serves as a guideline for utilizing the functionality available from embedded Lifecycle Controller Remote Enablement Web Services. The purpose of this document is to provide information and examples for utilizing the Web services for Management (WS-Man) protocol using Windows WinRM and open source WSMANCLI command line utilities. Examples and invocation information is provided for the following functionality:
 Inventory for BIOS, component firmware and embedded software
 Update of BIOS, component firmware and embedded software
 Job Control of update tasks
 Enhancement of Operating System Deployment using VFlash SD Card
 Enhancement of Discovery and Handshake from LifeCycle Controller 1.x
 Raid configuration management
 iDRAC Inventory and configuration features
 NIC configuration management
 Boot configuration management
 BIOS configuration management
The target audience for this document are script writers and the application that utilizes the remote management capabilities using WS-Man protocol available from Dell Lifecycle Controller.
2 References
Dell 12th Generation PowerEdge Server Resources:
http://www.delltechcenter.com/12thGen
Dell CIM Profiles:
http://www.delltechcenter.com/page/DCIM.Library.Profile
Managed Object Format (MOF) files:
http://www.delltechcenter.com/page/DCIM.Library.MOF
WinRM Scripting API, MSDN:
http://msdn.microsoft.com/en-us/library/aa384469(VS.85).aspx
Openwsman CLI:
http://www.openwsman.org/project/wsmancli
DMTF Common Information Model (CIM) Infrastructure Specification (DSP0004):
http://www.dmtf.org/standards/published_documents/DSP0004_2.5.0.pdf
List of PCI IDs:
http://pciids.sourceforge.net/pci.ids
3 Overview
The remote interface guidelines provided in this document are illustrated by command line examples of the WS-Man protocol Web services APIs that expose the remote management capabilities of the Dell Lifecycle Controller. The command line examples are from the Microsoft® Windows® and Linux
environments using WinRM 4 and WSMANCLI 5 respectively. The Lifecycle Controller remote management capabilities are organized by management domain and documented in Dell CIM Profile
specifications 2. The remote enablement feature for Lifecycle Controller 2.0 provides the following capabilities:
Remotely retrieve information about inventory of the BIOS, component firmware, and
embedded software including version information of both the installed as well as available cached versions
Remote update of BIOS, component firmware, Diagnostic content, DRAC content, driver
pack, power supplies from remotely located Dell Update Packages or cached images located in the Lifecycle Controller
Remotely schedule and track the status of update tasks (jobs) Remotely manage the Part Replacement feature by allowing retrieving and setting auto
update and auto system inventory sync
Enable re-initiation of Lifecycle Controller Auto-Discovery feature Enhancement of Operation System Deployment capabilities by supporting the downloading
of an ISO image to a Dell VFlash SD Card and booting to the ISO image on the VFlash SD Card
NIC configuration enables the ability to get and set NIC attributes that are configurable
using NIC Option ROM or NIC UEFI HII.
Remote RAID configuration allows you to remotely query and configure the Hardware Raid
of the system
Multiple HW Inventory views allows you to remote query the inventory of Hardware
3.1 Format for WS-Man CLI Examples in Document
The examples of WinRM and WSMANCLI command line invocations in this document are formatted for readability and often span multiple lines in the document. In actual use, scripted or hand-typed invocations are incorporated in one line. The examples also use substitute values for the target iDRAC IP address, username (with ExecuteServerCommand privilege), password and other site specific information. Actual use of these examples would require using valid values for IP address, username, password, and so on. These values are represented in the examples as follows:
Target iDRAC IP address = [IPADDRESS]
iDRAC Username = [USER]
iDRAC Password = [PASSWORD]
Additional substitute values are used in some of the examples and are described in the specific example. The following example represents the format used in this document:
EXAMPLE:
wsman enumerate http://schemas.dmtf.org/wbem/wscim/1/cim­schema/2/root/dcim/DCIM_OSDeploymentService-h $IPADDRESS -V -v -c
dummy.cert -P 443 -u $USERNAME -p $PASSWORD -j utf-8 -y basic
3.2 WS-Man Security and Time Parameters
3.2.1 Encryption Certificate Security
For the WS-Man examples provided in this document, the strict checks of certificates such as matching of CNs (Common Names) and verification with the actual CA (Certificate Authority) of the certificate of the WS-Management protocol HTTPS encryption certificate is assumed to be already configured and enabled. To disable the strict certificate checking, run the following command line options to all WS-Man examples: –v and –V.
For more information about directions on setting up encryption certificates and executing WS-Man invocations using full security capabilities for WS-Man, see the WS-Man documentation4 and related documents. For more information about directions on configuring different encryption certificates for the iDRAC Web server, see the Lifecycle Controller User Guide1. Dell recommends that the full security and encryption capabilities of the WS- Management protocol is used for production level utilization of the Lifecycle Controller Web services interfaces.
3.2.2 Handling Invalid Responses from WS-Man Commands
Check the network connection to make sure that the system is connected Check the WS-Man syntax to ensure there are no typos in the command line Check if there are other WS-Man commands sent from other systems Wait for a few seconds and re-try running the WS-Man command
3.2.3 Improving WS-Man Enumeration Performance
Enumeration configuration only available for winRM.
3.2.4 Specifying
The several methods that attach a virtual USB device to the target system accept a StartTime and Until parameter. The parameter data type is CIM date-time. If the StartTime parameter is null the action will not be started. If the Until parameter is null, the default value will be 17 hours. The date-time data
type is defined in the CIM Infrastructure Specification4 as:
ddddddddhhmmss.mmmmmm
Where:
StartTime, Until
Time, and
TIME_NOW
Parameters
dddddddd is the number of days hh is the remaining number of hours mm is the remaining number of minutes
Term
Meaning
BIOS
Basic Input / Output System
HW
Hardware
iDRAC
Integrated DELL Remote Access Controller
IPL
Initial Program Load
DUP
Dell Update Package
MOF
Managed Object File
CIM
Common Information Model
NIC
Network Interface Controller
RAID
Redundant Array of Independent Disks
FQDD
Fully Qualified Device Description
UEFI
Unified Extensible Firmware Interface
AMEA
Advanced Management Enablement Adapter
HII
Human Interface Infrastructure
WS-MAN
WS-Management is a specification of a SOAP-based protocol for the management of servers, devices, applications and more
ss is the remaining number of seconds mmmmmm is the remaining number of microseconds
The Lifecycle controller 2.0 firmware update, and set attribute related methods that require a date time parameter, use the form YYYYMMDDhhmmss (Eg. 20090930112030). You are expected to enter the date and time in this format for all Lifecycle Controller 2.0 updates and set attribute tasks.
TIME_NOW
3.2.5 Return Values
Many of the methods in this document have the following possible return values. They are summarized here for convenience.
is a special value that represents “running the tasks immediately”.
0 = Success
1 = Not Supported
2 = Failed
4096 = Job Created
3.2.6 Glossary
4 Discovery
4.1 Discovering Web Service Capability
Determine if the target system supports the Ws-Man interface using the ‘identify’ command.
Profiles: http://www.dmtf.org/sites/default/files/standards/documents/DSP0217_2.0.0.pdf
EXAMPLE:
wsman identify
-h $IPADDRESS -V -v -c dummy.cert -P 443
-u $USERNAME -p $PASSWORD
-j utf-8 -y basic
-u:[USER] -p:[PASSWORD]
OUTPUT:
<wsmid:IdentifyResponse>
<wsmid:ProtocolVersion>http://schemas.dmtf.org/wbem/wsman/1/wsman
.xsd</wsmid:ProtocolVersion>
<wsmid:ProductVendor>Openwsman Project</wsmid:ProductVendor>
<wsmid:ProductVersion>2.2.4</wsmid:ProductVersion>
</wsmid:IdentifyResponse>
4.2 Discovering what Profiles are implemented
Implemented profiles are advertised using the class CIM_RegisteredProfile. Enumerate this class in the “root/interop” CIM namespace.
Profiles:
http://www.dmtf.org/sites/default/files/standards/documents/DSP1033_1.0.0.pdf
EXAMPLE:
wsman enumerate http://schemas.dmtf.org/wbem/wscim/1/cimschema/ 2/CIM_RegisteredProfile?__cimnamespace=root/interop
-h $IPADDRESS -V -v -c dummy.cert -P 443
-u $USERNAME -p $PASSWORD
-j utf-8 -y basic
OUTPUT:
<n1:DCIM_LCRegisteredProfile> <n1:AdvertiseTypeDescriptions>WS-Identify </n1:AdvertiseTypeDescriptions> <n1:AdvertiseTypeDescriptions>Interop Namespace </n1:AdvertiseTypeDescriptions> <n1:AdvertiseTypes>1</n1:AdvertiseTypes>
<n1:AdvertiseTypes>1</n1:AdvertiseTypes>
<n1:InstanceID>DCIM:Memory:1.0.0</n1:InstanceID>
<n1:OtherRegisteredOrganization>DCIM</n1:OtherRegisteredOrganization> <n1:RegisteredName>Memory</n1:RegisteredName> <n1:RegisteredOrganization>1</n1:RegisteredOrganization> <n1:RegisteredVersion>1.0.0</n1:RegisteredVersion> </n1:DCIM_LCRegisteredProfile> ... <n1:DCIM_RegisteredProfile> <n1:AdvertiseTypeDescriptions>WS-Identify </n1:AdvertiseTypeDescriptions> <n1:AdvertiseTypes>1</n1:AdvertiseTypes> <n1:Caption xsi:nil="true"/> <n1:Description xsi:nil="true"/> <n1:ElementName xsi:nil="true"/> <n1:InstanceID>DCIM:CSRegisteredProfile:1</n1:InstanceID> <n1:OtherRegisteredOrganization xsi:nil="true"/> <n1:RegisteredName>Base Server</n1:RegisteredName> <n1:RegisteredOrganization>2</n1:RegisteredOrganization> <n1:RegisteredVersion>1.0.0</n1:RegisteredVersion> </n1:DCIM_RegisteredProfile>DCIM_RegisteredProfile . . .
The example above shows that the DMTF Base Server profile version 1.0.0 is implemented.
4.3 Discovering Implementation Namespace
The implementation CIM namespace may be discovered from the interop (root/interop) CIM namespace using the class CIM_ElementConformsToProfile that associates an instance of CIM_RegisteredProfile class with an instance of CIM_ComputerSystem class.
Profiles: n/a
EXAMPLE:
OUTPUT:
wsman associators http://schemas.dmtf.org/wbem/wscim/1/*
--filter "http://schemas.dell.com/wbem/wscim/1/cim­schema/2/CIM_RegisteredProfile?InstanceID=DCIM:CSRegisteredProfile:1 "
--dialect
“http://schemas.dmtf.org/wbem/wsman/1/cimbinding/associationFilter”
-h $IPADDRESS -P 443 -u $USERNAME -p $PASSWORD -V -v -c dummy.cert
-j utf-8 -y basic -N root/interop
<n1:DCIM_ElementConformsToProfile>
<n1:ConformantStandard>
<wsa:Address>http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anon
ymous</wsa:Address>
<wsa:ReferenceParameters> <wsman:ResourceURI>http://schemas.dell.com/wbem/wscim/1/cimschema/ 2/DCIM_RegisteredProfile</wsman:ResourceURI> <wsman:SelectorSet> <wsman:Selector Name="InstanceID">DCIM:CSRegisteredProfile:1</wsman:Selector> <wsman:Selector Name="__cimnamespace">root/interop</wsman:Selector> </wsman:SelectorSet> </wsa:ReferenceParameters> </n1:ConformantStandard>
<n1:ManagedElement> <wsa:Address>http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anon ymous</wsa:Address> <wsa:ReferenceParameters> <wsman:ResourceURI>http://schemas.dell.com/wbem/wscim/1/cimschema/ 2/DCIM_ComputerSystem</wsman:ResourceURI> <wsman:SelectorSet> <wsman:Selector Name="Name">srv:system</wsman:Selector> <wsman:Selector Name="CreationClassName">DCIM_ComputerSystem</wsman:Selector> <wsman:Selector Name="__cimnamespace">root/dcim</wsman:Selector> </wsman:SelectorSet> </wsa:ReferenceParameters> </n1:ManagedElement> </n1:DCIM_ElementConformsToProfile>
The example shows that implementation namespace is “root/dcim”.
Account Disabled as displayed in
CurrentValue
attribute for
Users.1
5 Managing iDRAC Local User Accounts
5.1 Description of iDRAC Attributes Versus Standard DMTF
Model
The iDRAC user account management data model is represented by both DMTF and Dell Profiles. Both models are currently offered. The DMTF Profiles for Simple Identity Management and Role Based Authorization represent iDRAC user accounts and privileges. The DMTF data model is complex and typically requires multiple transactions to accomplish simple operations such as specifying a username and password or giving a user account admin privileges. For this reason, LC also offers a Dell data model for managing iDRAC user accounts that is based on an attribute model. The DCIM iDRAC Card Profile specifies the attributes for each user account name, password, and privilege. iDRAC has 15 local user accounts that can be managed.
5.2 Account Inventory (using iDRAC Attributes)
The list of user accounts may be retrieved by enumerating the class provides the user account name and enabled state properties.
Profile and Associated MOFs:
http://www.delltechcenter.com/page/DCIM.Library.Profile
5.2.1 Account and Capabilities (using iDRAC Attributes)
Enumerating the attribute AttributeDisplayName = User Admin Enable, will display all of the 16 possible user accounts and their respective status.
EXAMPLE:
wsman enumerate "http://schemas.dmtf.org/wbem/wscim/1/cimschema/ 2/root/dcim/DCIM_iDRACCardEnumeration"
-h $IPADDRESS -V -v -c dummy.cert -P 443
-u $USERNAME -p $PASSWORD
-j utf-8 -y basic
OUTPUT:
<n1:DCIM_iDRACCardEnumeration>
</n1:DCIM_iDRACCardEnumeration>
DCIM_iDRACCard
classes. The
DCIM_iDRACCardEnumeration
class, Section 19.1, and parsing the output for the
<n1:AttributeDisplayName>User Admin Enable</n1:AttributeDisplayName> <n1:AttributeName>Enable</n1:AttributeName> <n1:CurrentValue>Disabled</n1:CurrentValue> <n1:DefaultValue>Disabled</n1:DefaultValue> <n1:Dependency xsi:nil="true"/> <n1:DisplayOrder>0</n1:DisplayOrder> <n1:FQDD>iDRAC.Embedded.1</n1:FQDD> <n1:GroupDisplayName>Users</n1:GroupDisplayName> <n1:GroupID>Users.1</n1:GroupID> <n1:InstanceID>iDRAC.Embedded.1#Users.1#Enable</n1:InstanceID> <n1:IsReadOnly>true</n1:IsReadOnly> <n1:PossibleValues>Disabled</n1:PossibleValues> <n1:PossibleValues>Enabled</n1:PossibleValues>
Account Enabled as displayed in
CurrentValue
attribute for
Users.2
<n1:DCIM_iDRACCardEnumeration>
<n1:AttributeDisplayName>User Admin Enable</n1:AttributeDisplayName> <n1:AttributeName>Enable</n1:AttributeName> <n1:CurrentValue>Enabled</n1:CurrentValue> <n1:DefaultValue>Enabled</n1:DefaultValue> <n1:Dependency xsi:nil="true"/> <n1:DisplayOrder>0</n1:DisplayOrder> <n1:FQDD>iDRAC.Embedded.1</n1:FQDD> <n1:GroupDisplayName>Users</n1:GroupDisplayName> <n1:GroupID>Users.2</n1:GroupID> <n1:InstanceID>iDRAC.Embedded.1#Users.2#Enable</n1:InstanceID> <n1:IsReadOnly>false</n1:IsReadOnly> <n1:PossibleValues>Disabled</n1:PossibleValues> <n1:PossibleValues>Enabled</n1:PossibleValues>
</n1:DCIM_iDRACCardEnumeration>
. .
5.2.2 Privilege and Capabilities (using iDRAC Attributes)
Enumerating the attribute AttributeDisplayName = User Admin IPMI LAN(or Serial) Privilege, will display all of the 16 possible user accounts and their respective status.
EXAMPLE:
<n1:DCIM_iDRACCardEnumeration>
<n1:AttributeDisplayName>User Admin IPMI LAN Privilege </n1:AttributeDisplayName> <n1:AttributeName>IpmiLanPrivilege</n1:AttributeName> <n1:CurrentValue>NoAccess</n1:CurrentValue> <n1:DefaultValue>NoAccess</n1:DefaultValue> <n1:Dependency xsi:nil="true"/> <n1:DisplayOrder>0</n1:DisplayOrder> <n1:FQDD>iDRAC.Embedded.1</n1:FQDD> <n1:GroupDisplayName>Users</n1:GroupDisplayName>
<n1:GroupID>Users.1</n1:GroupID> <n1:InstanceID>iDRAC.Embedded.1#Users.1#IpmiLanPrivilege </n1:InstanceID>
<n1:IsReadOnly>true</n1:IsReadOnly>
<n1:PossibleValues>User</n1:PossibleValues>
<n1:PossibleValues>Operator</n1:PossibleValues>
<n1:PossibleValues>Administrator</n1:PossibleValues>
<n1:PossibleValues>NoAccess</n1:PossibleValues>
</n1:DCIM_iDRACCardEnumeration>
<n1:DCIM_iDRACCardEnumeration>
<n1:AttributeDisplayName>User Admin IPMI Serial
Privilege</n1:AttributeDisplayName>
<n1:AttributeName>IpmiSerialPrivilege</n1:AttributeName>
<n1:CurrentValue>NoAccess</n1:CurrentValue>
<n1:DefaultValue>NoAccess</n1:DefaultValue>
<n1:Dependency xsi:nil="true"/>
<n1:DisplayOrder>0</n1:DisplayOrder>
<n1:FQDD>iDRAC.Embedded.1</n1:FQDD>
<n1:GroupDisplayName>Users</n1:GroupDisplayName>
<n1:GroupID>Users.1</n1:GroupID>
<n1:InstanceID>iDRAC.Embedded.1#Users.1#IpmiSerialPrivilege </n1:InstanceID>
<n1:IsReadOnly>true</n1:IsReadOnly> <n1:PossibleValues>User</n1:PossibleValues> <n1:PossibleValues>Operator</n1:PossibleValues>
DCIM_iDRACCardEnumeration
class, Section 19.1, and parsing the output for the
<n1:PossibleValues>Administrator</n1:PossibleValues> <n1:PossibleValues>NoAccess</n1:PossibleValues> </n1:DCIM_iDRACCardEnumeration>
5.3 Manage Account Settings (using iDRAC Attributes)
When the account setting capability allows, the username of an account may be modified by invoking the ApplyAttributes() method on the username or password verification can be obtained by enumerating the class( Section 19.6).
5.3.1 Modify User Name (using iDRAC Attributes)
EXAMPLE:
wsman invoke -a ApplyAttributes http://schemas.dmtf.org/wbem/wscim/1/cimschema/ 2/root/dcim/DCIM_ iDRACCardService ?SystemCreationClassName=DCIM_ComputerSystem, CreationClassName=DCIM_iDRACCardService,SystemName=DCIM:ComputerSystem,Name=D CIM:iDRACC ardService
-h $IPADDRESS -V -v -c dummy.cert -P 443
-u $USERNAME -p $PASSWORD -j utf-8 -y basic -J DracCard_UserName.xml
The input file, DracCard_UserName.xml, is shown below:
<p:ApplyAttributes_INPUT
xmlns:p="http://schemas.dmtf.org/wbem/wscim/1/cimschema/
2/root/dcim/DCIM_iDRACCardService">
<p:Target>iDRAC.Embedded.1</p:Target> <p:AttributeName>Users.4#UserName</p:AttributeName> <p:AttributeValue>HELLO</p:AttributeValue>
</p:ApplyAttributes_INPUT>
OUTPUT:
When this method is executed, a
<n1:ApplyAttributes_OUTPUT>
<wsa:Address>http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous< /wsa:Address>
UserName
property. Confirmation of successful
DCIM_iDRACCardString
jobid
or a message is displayed indicating an error.
<n1:Job>
<wsa:ReferenceParameters>
<wsman:ResourceURI>http://schemas.dell.com/wbem/wscim/1/cimschema/ 2/DCIM_LifecycleJob</wsman:ResourceURI>
<wsman:SelectorSet> <wsman:Selector Name="InstanceID">JID_001299682234</wsman:Selector> <wsman:Selector Name="__cimnamespace">root/dcim</wsman:Selector>
</wsman:SelectorSet> </wsa:ReferenceParameters> </n1:Job> <n1:ReturnValue>4096</n1:ReturnValue>
</n1:ApplyAttributes_OUTPUT>
5.3.2 Modify Password (using iDRAC Attributes)
EXAMPLE:
wsman invoke -a ApplyAttributes "http://schemas.dmtf.org/wbem/wscim/1/cimschema/ 2/root/dcim/DCIM_ iDRACCardService ?SystemCreationClassName=DCIM_ComputerSystem, CreationClassName=DCIM_iDRACCardService,SystemName=DCIM:ComputerSystem,Name=D CIM:iDRACC ardService"
-h $IPADDRESS -V -v -c dummy.cert -P 443
-u $USERNAME -p $PASSWORD -j utf-8 -y basic -J DracCard_Password.xml
The input file, DracCard_Password.xml, is shown here:
<p:ApplyAttributes_INPUT
xmlns:p="http://schemas.dmtf.org/wbem/wscim/1/cim-
schema/2/root/dcim/DCIM_iDRACCardService"> <p:Target>iDRAC.Embedded.1</p:Target> <p:AttributeName>Users.4#Enable</p:AttributeName> <p:AttributeValue>Enabled</p:AttributeValue> <p:AttributeName>Users.4#Password</p:AttributeName> <p:AttributeValue>PWORDHERE</p:AttributeValue> </p:ApplyAttributes_INPUT>
OUTPUT:
When this method is executed, a
jobid
or a message is displayed indicating an error.
<n1:ApplyAttributes_OUTPUT>
<n1:Job> <wsa:Address>http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anon ymous</wsa:Address> <wsa:ReferenceParameters> <wsman:ResourceURI>http://schemas.dell.com/wbem/wscim/1/cimschema/ 2/DCIM_LifecycleJob</wsman:ResourceURI> <wsman:SelectorSet> <wsman:Selector Name="InstanceID">JID_001299683297</wsman:Selector> <wsman:Selector Name="__cimnamespace">root/dcim</wsman:Selector> </wsman:SelectorSet> </wsa:ReferenceParameters> </n1:Job> <n1:ReturnValue>4096</n1:ReturnValue>
</n1:ApplyAttributes_OUTPUT>
5.3.3 Modify Account State (using iDRAC Attributes)
When the account setting capability allows, the user account may be enabled or disabled by invoking the method ApplyAttributes() method on the can be obtained by enumerating the
Enable
DCIM_iDRACCardString
property. Confirmation of the change
class( Section 19.6).
EXAMPLE:
wsman invoke -a ApplyAttributes "http://schemas.dmtf.org/wbem/wscim/1/cimschema/ 2/root/dcim/DCIM_ iDRACCardService ?SystemCreationClassName=DCIM_ComputerSystem, CreationClassName=DCIM_iDRACCardService,SystemName=DCIM:ComputerSystem,Name=D CIM:iDRACC ardService"
-h $IPADDRESS -V -v -c dummy.cert -P 443
-u $USERNAME -p $PASSWORD -j utf-8 -y basic -J DracCard_AccountChange.xml
The input file, DracCard_ AccountChange.xml, is shown below:
<p:ApplyAttributes_INPUT
xmlns:p="http://schemas.dmtf.org/wbem/wscim/1/cim-
schema/2/root/dcim/DCIM_iDRACCardService">
</p:ApplyAttributes_INPUT>
<p:Target>iDRAC.Embedded.1</p:Target> <p:AttributeName>Users.4#Enable</p:AttributeName> <p:AttributeValue>Enabled</p:AttributeValue> <p:AttributeName>Users.4#Password</p:AttributeName> <p:AttributeValue>PASSWORDHERE</p:AttributeValue>
OUTPUT:
When this method is executed, a
jobid
or a message is displayed indicating an error.
ApplyAttributes_OUTPUT <n1:ApplyAttributes_OUTPUT>
<n1:Job> <wsa:Address>http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anon ymous</wsa:Address> <wsa:ReferenceParameters> <wsman:ResourceURI>http://schemas.dell.com/wbem/wscim/1/cimschema/ 2/DCIM_LifecycleJob</wsman:ResourceURI> <wsman:SelectorSet> <wsman:Selector Name="InstanceID">JID_001299683957</wsman:Selector>
<wsman:Selector
Name="__cimnamespace">root/dcim</wsman:Selector> </wsman:SelectorSet> </wsa:ReferenceParameters> </n1:Job> <n1:ReturnValue>4096</n1:ReturnValue>
</n1:ApplyAttributes_OUTPUT>
The following error may result if the password has not initially been set to a value. The password may be set an initail value at the same time as the account is enabled by adding the attribute name and corresponding attribute value, as shown above.
<n1:ApplyAttributes_OUTPUT>
<n1:Message>The User Password is not configured so cannot Enable the User or set values for User Password IPMILan IPMISerial or User Admin Privilege</n1:Message> <n1:MessageArguments>NULL</n1:MessageArguments> <n1:MessageID>RAC023</n1:MessageID> <n1:ReturnValue>2</n1:ReturnValue>
</n1:ApplyAttributes_OUTPUT>
Users.4#Password
5.3.4 Modify User Privilege (using iDRAC Attributes)
When the account setting capability allows, the user privileges may be enabled or disabled by invoking the method ApplyAttributes() method on the can be obtained by enumerating the
Enable
DCIM_iDRACCardString
property. Confirmation of the change
class( Section 19.6).
EXAMPLE:
wsman invoke -a ApplyAttributes "http://schemas.dmtf.org/wbem/wscim/1/cimschema/ 2/root/dcim/DCIM_ iDRACCardService ?SystemCreationClassName=DCIM_ComputerSystem, CreationClassName=DCIM_iDRACCardService,SystemName=DCIM:ComputerSystem,Name=D CIM:iDRACC ardService"
-h $IPADDRESS -V -v -c dummy.cert -P 443
-u $USERNAME -p $PASSWORD -j utf-8 -y basic
-J DracCard_PrivilegeChange.xml
The input file, DracCard_ PrivilegeChange.xml, is shown below:
<p:ApplyAttributes_INPUT
xmlns:p="http://schemas.dmtf.org/wbem/wscim/1/cim-
schema/2/root/dcim/DCIM_iDRACCardService">
<p:Target>iDRAC.Embedded.1</p:Target> <p:AttributeName>Users.4#IpmiLanPrivilege</p:AttributeName> <p:AttributeValue>Operator</p:AttributeValue>
</p:ApplyAttributes_INPUT>
OUTPUT:
When this method is executed, a
<n1:ApplyAttributes_OUTPUT>
<n1:Job> <wsa:Address>http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anon ymous</wsa:Address> <wsa:ReferenceParameters> <wsman:ResourceURI>http://schemas.dell.com/wbem/wscim/1/cimschema/ 2/DCIM_LifecycleJob</wsman:ResourceURI> <wsman:SelectorSet> <wsman:Selector Name="InstanceID">JID_001299684480</wsman:Selector> <wsman:Selector Name="__cimnamespace">root/dcim</wsman:Selector> </wsman:SelectorSet> </wsa:ReferenceParameters> </n1:Job> <n1:ReturnValue>4096</n1:ReturnValue>
</n1:ApplyAttributes_OUTPUT>
jobid
or a message is displayed indicating an error.
5.4 Account Inventory (using DMTF Model)
The list of user accounts may be retrieved by enumerating the provides the user account name and included but it is a write-only property.
EnabledState
properties. The user account password is also
Profiles:
http://www.dmtf.org/sites/default/files/standards/documents/DSP1034_1.0.1.pdf http://www.dmtf.org/sites/default/files/standards/documents/DSP1039_1.0.0.pdf
CIM_Account
class. The class
5.4.1 Account and Capabilities (using DMTF Model)
Example-A demonstrates standard ouput. Example-B demonstrates EPR mode output.
EXAMPLE-A:
wsman enumerate "http://schemas.dmtf.org/wbem/wscim/1/cim­schema/2/CIM_Account"
-h $IPADDRESS -V –v -c dummy.cert -P 443
-u $USERNAME -p $PASSWORD
-j utf-8 -y basic
OUTPUT-A:
<n1:DCIM_MFAAccount>
<n1:AuthenticateMethod xsi:nil="true"/> <n1:AvailableRequestedStates xsi:nil="true"/> <n1:Caption xsi:nil="true"/> <n1:CommunicationStatus xsi:nil="true"/> <n1:ComplexPasswordRulesEnforced xsi:nil="true"/> <n1:CreationClassName>DCIM_MFAAccount</n1:CreationClassName> <n1:Description xsi:nil="true"/> <n1:Descriptions xsi:nil="true"/> <n1:DetailedStatus xsi:nil="true"/> <n1:ElementName>MFA Account 13</n1:ElementName> <n1:EnabledDefault>2</n1:EnabledDefault> <n1:EnabledState>3</n1:EnabledState> <n1:HealthState xsi:nil="true"/> <n1:Host xsi:nil="true"/> <n1:InactivityTimeout xsi:nil="true"/> <n1:InstallDate xsi:nil="true"/> <n1:LastLogin xsi:nil="true"/> <n1:LocalityName xsi:nil="true"/> <n1:MaximumSuccessiveLoginFailures xsi:nil="true"/> <n1:Name>DCIM User 13</n1:Name> <n1:OU xsi:nil="true"/> <n1:ObjectClass xsi:nil="true"/> <n1:OperatingStatus xsi:nil="true"/> <n1:OperationalStatus xsi:nil="true"/> <n1:OrganizationName>DCIM</n1:OrganizationName> <n1:OtherEnabledState xsi:nil="true"/> <n1:PasswordExpiration xsi:nil="true"/> <n1:PasswordHistoryDepth xsi:nil="true"/> <n1:PrimaryStatus xsi:nil="true"/> <n1:RequestedState>0</n1:RequestedState> <n1:SeeAlso xsi:nil="true"/> <n1:Status xsi:nil="true"/> <n1:StatusDescriptions xsi:nil="true"/> <n1:SystemCreationClassName>DCIM_SPComputerSystem </n1:SystemCreationClassName> <n1:SystemName>systemmc</n1:SystemName> <n1:TimeOfLastStateChange xsi:nil="true"/> <n1:TransitioningToState>12</n1:TransitioningToState> <n1:UserCertificate xsi:nil="true"/> <n1:UserID/> <n1:UserPassword xsi:nil="true"/>
</n1:DCIM_MFAAccount>
<n1:DCIM_MFAAccount>
<n1:AuthenticateMethod xsi:nil="true"/> <n1:AvailableRequestedStates xsi:nil="true"/> <n1:Caption xsi:nil="true"/> <n1:CommunicationStatus xsi:nil="true"/> <n1:ComplexPasswordRulesEnforced xsi:nil="true"/> <n1:CreationClassName>DCIM_MFAAccount</n1:CreationClassName> <n1:Description xsi:nil="true"/> <n1:Descriptions xsi:nil="true"/> <n1:DetailedStatus xsi:nil="true"/> <n1:ElementName>MFA Account 2</n1:ElementName> <n1:EnabledDefault>2</n1:EnabledDefault> <n1:EnabledState>2</n1:EnabledState> <n1:HealthState xsi:nil="true"/> <n1:Host xsi:nil="true"/>
EXAMPLE-B:
wsman enumerate "http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/CIM_Account"
-h $IPADDRESS -V -v -c dummy.cert -P 443
-u $USERNAME -p $PASSWORD
OUTPUT-B:
<wsa:EndpointReference> <wsa:Address>http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous< /wsa:Address> <wsa:ReferenceParameters> <wsman:ResourceURI>http://schemas.dell.com/wbem/wscim/1/cimschema/ 2/DCIM_MFAAccount</wsman:ResourceURI> <wsman:SelectorSet> <wsman:Selector Name="SystemCreationClassName">DCIM_SPComputerSystem</wsman:Selector> <wsman:Selector Name="SystemName">systemmc</wsman:Selector> <wsman:Selector Name="CreationClassName">DCIM_MFAAccount</wsman:Selector> <wsman:Selector Name="Name">DCIM User 1</wsman:Selector> </wsman:SelectorSet> </wsa:ReferenceParameters> </wsa:EndpointReference> <wsa:EndpointReference> <wsa:Address>http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous< /wsa:Address> <wsa:ReferenceParameters> <wsman:ResourceURI>http://schemas.dell.com/wbem/wscim/1/cimschema/ 2/DCIM_MFAAccount</wsman:ResourceURI> <wsman:SelectorSet> <wsman:Selector Name="SystemCreationClassName">DCIM_SPComputerSystem</wsman:Selector> <wsman:Selector Name="SystemName">systemmc</wsman:Selector> <wsman:Selector Name="CreationClassName">DCIM_MFAAccount</wsman:Selector>
<wsman:Selector Name="Name">DCIM User 2</wsman:Selector> </wsman:SelectorSet> </wsa:ReferenceParameters> </wsa:EndpointReference> . .
.
Loading...
+ 210 hidden pages