OMSAUG
OMSAUG
Dell OpenManage
Server Administrator
Version 6.3
User’s Guide
book.book Page 2 Tuesday, July 6, 2010 12:01 PM
____________________
Information in this publication is subject to change without notice.
© 2010 Dell Inc. All rights reserved.
Reproduction of these materials in any manner whatsoever without the written permission of Dell Inc.
is strictly forbidden.
Trademarks used in this text: Dell™, the DELL™ logo, PowerEdge™, PowerVault™, and
OpenManage™ are trademarks of Dell Inc. Microsoft®, Windows®, Internet Explorer®, Active
Directory®, Windows Server®, and Windows NT® are either trademarks or registered trademarks
of Microsoft Corporation in the United States and/or other countries. EMC® is a registered trademark
of EMC Corporation. Java® is a trademark or registered trademark of Sun Microsystems, Inc. in the
U.S. and other countries. Novell® and SUSE® are registered trademarks of Novell, Inc. in the United
States and other countries. Red Hat® and Red Hat Enterprise Linux® are registered trademarks of
Red Hat, Inc. in the United States and other countries. VMware® is a registered trademark and ESX
Server™ is a trademark of VMware Inc in the United States and/or other jurisdictions. Mozilla® and
Firefox® are registered trademarks of the Mozilla Foundation. Citrix®, Xen®, XenServer® and
XenMotion® are either registered trademarks or trademarks of Citrix Systems, Inc. in the United
States and/or other countries.
Server Administrator includes software developed by the Apache Software Foundation
(www.apache.org). Server Administrator utilizes the OverLIB JavaScript library. This library can be
obtained from www.bosrup.com.
Other trademarks and trade names may be used in this publication to refer to either the entities claiming
the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and
trade names other than its own.
July 2010
book.book Page 3 Tuesday, July 6, 2010 12:01 PM
Contents
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . 9
Overview . . . . . . . . . . . . . . . . . . . . . . . . . 9
Installation . . . . . . . . . . . . . . . . . . . . . . 9
Updating Individual System Components . . . . . 10
Storage Management Service . . . . . . . . . . . 10
Instrumentation Service . . . . . . . . . . . . . . 10
Remote Access Controller . . . . . . . . . . . . . 11
Logs . . . . . . . . . . . . . . . . . . . . . . . . 11
Contents 3
book.book Page 4 Tuesday, July 6, 2010 12:01 PM
4 Contents
book.book Page 5 Tuesday, July 6, 2010 12:01 PM
Contents 5
book.book Page 6 Tuesday, July 6, 2010 12:01 PM
6 Contents
book.book Page 7 Tuesday, July 6, 2010 12:01 PM
A Troubleshooting . . . . . . . . . . . . . . . . . . 111
Connection Service Failure . . . . . . . . . . . . . . . 111
Contents 7
book.book Page 8 Tuesday, July 6, 2010 12:01 PM
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
8 Contents
book.book Page 9 Tuesday, July 6, 2010 12:01 PM
1
Introduction
Overview
Dell OpenManage Server Administrator (OMSA) provides a comprehensive,
one-to-one systems management solution in two ways: from an integrated,
Web browser-based graphical user interface (GUI) and from a command line
interface (CLI) through the operating system. Server Administrator is
designed for system administrators to manage systems locally and remotely
on a network. It allows system administrators to focus on managing their
entire network by providing comprehensive one-to-one systems management.
In the context of Server Administrator, a system refers to a stand-alone
system, a system with attached network storage units in a separate chassis,
or a modular system consisting of one or more server modules in a modular
enclosure.
Server Administrator provides information about:
• Systems that are operating properly and systems that have problems
• Systems that require remote recovery operations.
Server Administrator provides easy-to-use management and administration of
local and remote systems through a comprehensive set of integrated
management services. Server Administrator is the sole installation on the
system being managed and is accessible both locally and remotely from the
Server Administrator home page. Remotely monitored systems may be
accessed by dial-in, LAN, or wireless connections. Server Administrator
ensures the security of its management connections through role-based
access control (RBAC), authentication, and secure socket layer (SSL)
encryption.
Installation
You can install Server Administrator using the Dell Systems Management Tools
and Documentation DVD. The DVD provides a setup program to install,
upgrade, and uninstall Server Administrator, managed system and
Introduction 9
book.book Page 10 Tuesday, July 6, 2010 12:01 PM
Instrumentation Service
The Instrumentation Service provides rapid access to detailed fault and
performance information gathered by industry-standard systems management
agents and allows remote administration of monitored systems, including
shutdown, startup, and security.
10 Introduction
book.book Page 11 Tuesday, July 6, 2010 12:01 PM
Logs
Server Administrator displays logs of commands issued to or by the system,
monitored hardware events, and system alerts. You can view logs on the home
page, print or save them as reports, and send them by e-mail to a designated
service contact.
Introduction 11
book.book Page 12 Tuesday, July 6, 2010 12:01 PM
12 Introduction
book.book Page 13 Tuesday, July 6, 2010 12:01 PM
Introduction 13
book.book Page 14 Tuesday, July 6, 2010 12:01 PM
14 Introduction
book.book Page 15 Tuesday, July 6, 2010 12:01 PM
Introduction 15
book.book Page 16 Tuesday, July 6, 2010 12:01 PM
16 Introduction
book.book Page 17 Tuesday, July 6, 2010 12:01 PM
2
Setup and Administration
Security Management
Dell OpenManage Server Administrator provides security through Role-
Based Access Control (RBAC), authentication, and encryption for both the
Web-based and command line interfaces.
User Privileges
Server Administrator grants different access rights based on the user's
assigned group privileges. The four user levels are: User, Power User,
Administrator, and Elevated Administrator.
• Users can view most information.
• Power Users can set warning threshold values and configure which alert
actions are to be taken when a warning or failure event occurs.
• Administrators can configure and perform shutdown actions, configure
Auto Recovery actions in case a system has a non-responsive operating
system, and clear hardware, event, and command logs. Administrators can
also configure the system to send e-mails.
• Elevated Administrators can view and manage information.
Server Administrator grants read-only access to users logged in with User
privileges, read and write access to users logged in with Power User privileges,
and read, write, and administrator access to users logged in with
Administrator and Elevated Administrator privileges. See Table 2-1.
Table 2-3 defines the user privilege level abbreviations used in Table 2-2.
U User
P Power User
A Administrator
EA Elevated Administrator
Authentication
The Server Administrator authentication scheme ensures that the correct
access types are assigned to the correct user privileges. Additionally,
when the command line interface (CLI) is invoked, the Server Administrator
authentication scheme validates the context within which the current
Encryption
Server Administrator is accessed over a secure HTTPS connection using
secure socket layer (SSL) technology to ensure and protect the identity of the
system being managed. Java Secure Socket Extension (JSSE) is used by
supported Microsoft Windows, Red Hat Enterprise Linux, and SUSE Linux
Enterprise Server operating systems to protect the user credentials and other
sensitive data that is transmitted over the socket connection when a user
accesses the Server Administrator home page.
Creating Users
NOTE: For information about creating users and user groups, see your operating
system documentation.
Table 2-4 lists the legends for adding the role definition to the
omarolemap file
Table 2-4. Legends for adding the role definition in OpenManage Server
Administrator
Table 2-5 lists the examples for adding the role definition to the
omarolemap file.
Table 2-5. Examples for adding the role definition in OpenManage Server
Administrator
Creating Server Administrator Users for VMware ESX 4.X and ESXi 4.X
To add a user to the Users table:
1 Log in to the host using the vSphere Client.
2 Click the Users & Groups tab and click Users.
3 Right-click anywhere in the Users table and click Add to open the Add
New User dialog box.
4 Enter a login, a user name, a numeric user ID (UID), and a password;
specifying the user name and UID are optional. If you do not specify the
UID, the vSphere Client assigns the next available UID.
5 To allow a user to access the ESX/ESXi host through a command shell,
select Grant shell access to this user. Users that access the host only
through the vSphere Client do not need shell access.
6 To add the user to a group, select the group name from the Group drop-
down menu and click Add.
7 Click OK.
command line interface (CLI) to enable or disable SNMP Set operations in Server
Administrator. For more information about the Server Administrator CLI, see the
Dell OpenManage Server Administrator Command Line Interface User's Guide.
NOTE: For IT Assistant to retrieve management information from a system running
Server Administrator, the community name used by IT Assistant must match a
community name on the system running Server Administrator. For IT Assistant to
modify information or perform actions on a system running Server Administrator, the
community name used by IT Assistant must match a community name that allows
Set operations on the system running Server Administrator. For IT Assistant to
receive traps (asynchronous event notifications) from a system running Server
Administrator, the system running Server Administrator must be configured to
send traps to the system running IT Assistant.
The following procedures provide step-by-step instructions for configuring
the SNMP agent for each supported operating system:
• “Configuring the SNMP Agent for Systems Running Supported Windows
Operating Systems"
• “Configuring the SNMP Agent on Systems Running Supported Red Hat
Enterprise Linux"
• “Configuring the SNMP Agent on Systems Running Supported SUSE
Linux Enterprise Server"
• "Configuring the SNMP Agent on Systems Running Supported VMware
ESX 4.X Operating Systems to Proxy VMware MIBs"
• “Configuring the SNMP Agent on Systems Running Supported VMware
ESXi 4.X Operating Systems"
The second change is to modify the default access line to give read-only
access to the entire MIB tree for the public community. Server Administrator
looks for the following line:
access notConfigGroup "" any noauth exact systemview
none none
If Server Administrator finds the line above, it modifies the line so that it reads:
access notConfigGroup "" any noauth exact all none none
These changes to the default SNMP agent configuration give read-only access
to the entire MIB tree for the public community.
NOTE: To ensure that Server Administrator is able to modify the SNMP agent
configuration for providing proper access to systems management data, it is
recommended that any other SNMP agent configuration changes be made after
installing Server Administrator.
Server Administrator SNMP communicates with the SNMP agent using the
SNMP Multiplexing (SMUX) protocol. When Server Administrator SNMP
connects to the SNMP agent, it sends an object identifier to the SNMP agent
to identify itself as a SMUX peer. Because that object identifier must be
configured with the SNMP agent, Server Administrator adds the following
line to the SNMP agent configuration file, /etc/snmp/snmpd.conf, during
installation if it does not exist:
smuxpeer .1.3.6.1.4.1.674.10892.1
2 Edit this line, replacing the first none with all. When edited, the new
line should read:
access publicgroup "" any noauth exact all all
none
or
access notConfigGroup "" any noauth exact all all
none
3 To enable SNMP configuration changes, restart the SNMP agent by
typing:
service snmpd restart
2 Edit or copy this line, replacing 127.0.0.1 with the remote host IP address.
When edited, the new line should read:
rocommunity public IP_address
NOTE: You can enable SNMP access from multiple specific remote hosts by
adding a rocommunity directive for each remote host.
3 To enable SNMP configuration changes, restart the SNMP agent by typing:
/etc/init.d/snmpd restart
To enable SNMP access from all remote hosts to a system running Server
Administrator, edit the SNMP agent configuration file /etc/snmp/snmpd.conf,
and perform the following steps:
1 Find the line that reads:
rocommunity public 127.0.0.1
2 Edit this line by deleting 127.0.0.1. When edited, the new line
should read:
rocommunity public
3 To enable SNMP configuration changes, restart the SNMP agent
by typing:
/etc/init.d/snmpd restart
2 Edit this line by replacing public with the new SNMP community
name. When edited, the new line should read:
rocommunity community_name 127.0.0.1
3 To enable SNMP configuration changes, restart the SNMP agent by
typing:
/etc/init.d/snmpd restart
You can open the SNMP port by disabling the firewall, opening an entire
external network interface in the firewall, or opening the SNMP port for at
least one external network interface in the firewall. You can perform this
action before or after Server Administrator is started.
To open the SNMP port on RHEL using one of the previously described
methods, perform the following steps:
1 At the Red Hat Enterprise Linux command prompt, type setup and
press <Enter> to start the Text Mode Setup Utility.
NOTE: This command is available only if you have performed a default
installation of the operating system.
The Choose a Tool menu appears.
2 Select Firewall Configuration using the down arrow and press <Enter>.
The Firewall Configuration screen appears.
3 Press <Tab> to select Security Level and then press the spacebar to select
the security level you want to set. The selected Security Level is indicated
by an asterisk.
NOTE: Press <F1> for more information about the firewall security levels.
The default SNMP port number is 161. If you are using the X Window System
graphical user interface, pressing <F1> may not provide information about
firewall security levels on newer versions of Red Hat Enterprise Linux.
a To disable the firewall, select No firewall or Disabled and go to step 7.
b To open an entire network interface or the SNMP port, select High,
Medium, or Enabled and continue with step 4.
4 Press <Tab> to go to Customize and press <Enter>.
The Firewall Configuration - Customize screen appears.
5 Select whether to open an entire network interface or just the SNMP port
on all network interfaces.
a To open an entire network interface, press <Tab> to go to one of the
Trusted Devices and press the spacebar. An asterisk in the box to the left
of the device name indicates that the entire interface is opened.
b To open the SNMP port on all network interfaces, press <Tab> to go
to Other ports and type snmp:udp.
3
Using Server Administrator
Starting Your Server Administrator Session
To start a Server Administrator session, click the Dell OpenManage Server
Administrator icon on your desktop.
The Server Administrator Log in screen displays. The default port for
Dell OpenManage Server Administrator is 1311. You can change the port,
if required. See "Dell Systems Management Server Administration
Connection Service and Security Setup" for instructions on setting up your
system preferences.
To end your Server Administrator session, click Log Out button, located in
the upper-right corner of each Server Administrator home page.
NOTE: See the OpenManage Installation and Security User’s Guide for information
on Configuring Active Directory on Systems that do not have CLI.
Method 1
1 Click on the Dell OpenManage Server Administrator icon on
your desktop.
2 Type the managed system's IP Address or system name or Fully Qualified
Domain Name (FQDN).
NOTE: If you have entered the system name or FQDN, Dell OpenManage Server
Administrator Web Server host converts the system name or FQDN into the IP
Address of the managed system. You can also enter the port number of the
managed system. For example, Hostname:Port Number, or IP address:Port Number.
If you are connecting to a Citrix XenServer 5.6 managed node, use port 5986 in the
format Hostname:Port Number, or IP address:Port Number.
3 Select the Ignore Certificate Warnings check box, if you are using an
Intranet connection.
4 Select the Active Directory Login check box. Check this option to log in
using Microsoft Active Directory authentication. Do not check this box if
Active Directory software is not used to control access to your network. See
"Using the Active Directory Login" on page 46.
5 Click OK.
Method 2
Open your Web browser and type one of the following in the address field and
press <Enter>:
https ://hostname:1311
where hostname is the assigned name for the managed node system and
1311 is the default port number
or
https ://IP address:1311
where IP address is the IP address for the managed system and 1311 is
the default port number. You should type https :// (and not http://)
in the address field to receive a valid response in your browser.
NOTE: You must have preassigned user rights to log in to Server Administrator.
See "Setup and Administration" on page 17 for instructions on setting up new users.
NOTE: When you launch Server Administrator using either Mozilla Firefox version
3.0 and 3.5 or Microsoft Internet Explorer version 7.0 or 8.0, an intermediate warning
page may appear displaying the problem with security certificate. To ensure system
security, it is strongly recommended that you generate a new X.509 certificate,
reuse an existing X.509 certificate, or import a root certificate or certificate chain
from a Certification Authority (CA). To avoid encountering such warning messages
about the certificate, the certificate used must be from a trusted CA. For more
information on X.509 Certificate Management, see "X.509 Certificate Management."
To ensure system security, Dell strongly recommends that you import a root
certificate or certificate chain from a Certification Authority (CA). See the
VMware documentation for details.
NOTE: If the certificate authority on the managed system is valid and if the
Server Administrator web server still reports an untrusted certificate error, you can
still make the managed system’s CA as trusted by using the certutil.exe. See your
operating system documentation for details on accessing this .exe. On supported
Windows operating systems, you can also use the certificates snap in option to
import certificates.
Single Sign-On
The Single Sign-On option in Windows operating systems enables all logged-
in users to bypass the login page and access the Server Administrator Web
application by clicking the Dell OpenManage Server Administrator icon
on your desktop.
NOTE: See the Knowledge Base article at
support.microsoft.com/default.aspx?scid=kb;en-us;Q258063 for more information
on Single Sign-On.
For local machine access, you must have an account on the machine with the
appropriate privileges (User, Power User, or Administrator). Other users are
authenticated against the Microsoft Active Directory. To launch Server
Administrator using Single Sign-On authentication against Microsoft Active
Directory, the following parameters must also be passed in:
authType=ntlm&application=[plugin name]
Where plugin name = omsa, ita, etc.
For example:
https ://localhost:1311/?authType=ntlm&application=
omsa
To launch Server Administrator using Single Sign-On authentication against
the local machine user accounts, the following parameters must also be
passed in:
authType=ntlm&application=[plugin
name]&locallogin=true
Where plugin name = omsa, ita, etc.
For example:
https ://localhost:1311/?authType=ntlm&application=
omsa&locallogin=true
Server Administrator has also been extended to allow other products (such as
Dell OpenManage IT Assistant) to directly access Server Administrator Web
pages without going through the login page (if you are currently logged in and
have the appropriate privileges).
NOTE: If you have not configured your browser to enable the use of client-side
scripting, you might receive a blank screen when logging in to Server Administrator.
In this case, an error message is displayed instructing you to configure your
browser settings.
Internet Explorer
1 In your Web browser, click Tools Internet Options Security.
2 Click the Trusted Sites icon.
3 Click Sites.
4 Copy the Web address used to access the remote managed system from
the browser’s address bar and paste it onto the Add this Web Site to the
Zone field.
5 Click Custom Level.
For Windows Server 2003:
– Under Miscellaneous, select the Allow Meta Refresh radio button.
– Under Active Scripting, select the Enable radio button.
– Under Active Scripting, select the Allow scripting of Internet
Explorer web browser controls radio button.
6 Click OK to save the new settings. Close the browser and log in to
Server Administrator.
To allow Single Sign-On for Server Administrator without prompts for user
credentials, perform the following steps:
1 In your Web browser click Tools Internet Options Security
2 Click the Trusted Sites icon.
3 Click Sites.
4 Copy the Web address used to access the remote managed system from
the browser’s address bar and paste it onto the Add this Web Site to the
Zone field.
5 Click Custom Level.
6 Under User Authentication, select the Automatic Logon with current
username and password radio button.
7 Click OK to save the new settings. Close the browser and log in to
Server Administrator.
Mozilla Firefox
1 Start your browser.
2 Click Edit Preferences.
3 Click Advanced Scripts and Plugins.
4 Ensure that the Navigator check box is selected under Enable JavaScript for.
5 Click OK to save the new settings.
6 Close the browser.
7 Log in to Server Administrator.
Table 3-1 lists the GUI field names and the applicable system, when Server
Administrator is installed on the system.
Table 3-1. System Availability for the Following GUI Field Names
GUI Field Name Applicable System
Modular Enclosure Modular System
Server module Modular System
Main System Modular System
System Non-Modular System
Main system Chassis Non-Modular System
Figure 3-1 shows a sample Server Administrator home page layout for a user
logged in with administrator privileges on a non-modular system.
action window
Figure 3-2 shows a sample Server Administrator home page layout for a user
logged in with administrator privileges on a modular system.
action window
System Tree
The system tree appears on the left side of the Server Administrator home
page and lists the components of your system that are viewable. The system
components are categorized by component type. When you expand the main
object known as Modular EnclosureSystem/Server Module, the major
categories of system/server module components that may appear are Main
System Chassis/Main System, Software, and Storage.
To expand a branch of the tree, click the plus sign ( ) to the left of an object,
or double-click the object. A minus sign ( ) indicates an expanded entry
that cannot be expanded further.
Action Window
When you click an item on the system tree, details about the component or
object appear in the data area of the action window. Clicking an action tab
displays all available user options as a list of subcategories.
Clicking an object on the system/server module tree opens that component's
action window, displaying the available action tabs. The data area defaults to
a preselected subcategory of the first action tab for the selected object.
The preselected subcategory is usually the first option. For example,
clicking the Main System Chassis/Main System object opens an action
window in which the Properties action tab and Health subcategory are
displayed in the window's data area.
Data Area
The data area is located below the action tabs on the right side of the home
page. The data area is where you perform tasks or view details about system
components. The content of the window depends on the system tree object
and action tab that are currently selected. For example, when you select BIOS
from the system tree, the Properties tab is selected by default and the version
information for the system BIOS appears in the data area. The data area of
the action window contains many common features, including status
indicators, task buttons, underlined items, and gauge indicators.
The Server Administrator user interface displays the date in the
<mm/dd/yyyy> format.
Task Buttons
Most windows opened from the Server Administrator home page contain at
least four task buttons: Print, Export, Email, and Refresh. Other task buttons
are included on specific Server Administrator windows. Log windows,
for example, also contain Save As and Clear Log task buttons. For specific
Underlined Items
Clicking an underlined item in the action window data area displays additional
details about that item.
Gauge Indicators
Temperature probes, fan probes, and voltage probes are each represented by
a gauge indicator. For example, Figure 3-3 shows readings from a system's
CPU fan probe.
Like the Server Administrator home page, the Preferences home page has
three main areas:
• The global navigation bar provides links to general services.
– Clicking Back to Server Administrator returns you to the Server
Administrator home page.
• The left-hand pane of the Preferences home page (where the system tree is
displayed on the Server Administrator home page) displays the preference
categories for the managed system or the Server Administrator Web
server.
• The action window displays the available settings and preferences for the
managed system or the Server Administrator Web Server.
Figure 3-4 shows a sample Preferences home page layout.
• The SMTP Server name and DNS Suffix for SMTP Server fields specify
your company or organization's Simple Mail Transfer Protocol (SMTP)
and domain name server (DNS) suffix. To enable Server Administrator
to send e-mails, you must type the IP address and DNS suffix for the
SMTP Server for your company or organization in the appropriate fields.
NOTE: For security reasons, your company or organization might not allow
e-mails to be sent through the SMTP server to outside accounts.
• The Command Log Size field specifies the largest file size in MB for
the command log file.
NOTE: This field appears only when you log in to manage the Server
Administrator Web Server.
• The Support Link field specifies the URL for the business entity that
provides support for your managed system.
• The Custom Delimiter field specifies the character used to separate
the data fields in the files created using the Export button. The ;
character is the default delimiter. Other options are !, @, #, $, %, ^,
*, ~, ?, |, and ,.
• The SSL Encryption field specifies the encryption levels for the
secured HTTPS sessions. The available encryption levels include Auto
Negotiate and 128-bit or higher.
• Auto Negotiate — To allow connection from browser with any
encryption strength. The browser auto negotiates with the Server
Administrator web server and uses the highest available
encryption level for the session. Legacy browsers with weaker
encryption can connect to the Server Administrator.
• 128-bit or higher — To allow connections from browsers with
128-bit or higher encryption strength. One of the following cipher
suites is applicable based upon the browser for any established
sessions:
SSL_RSA_WITH_RC4_128_SHA
SSL_RSA_WITH_RC4_128_MD5
SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
TLS_DHE_RSA_WITH_AES_128_CBC_SHA
SSL_RSA_WITH_3DES_EDE_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA
TLS_DHE_DSS_WITH_AES_128_CBC_SHA
SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
• Key Signing Algorithm displays the supported signing algorithms. Select
an algorithm from the drop down list. If you select either SHA 512 or SHA
256, ensure that your operating system/browser supports this algorithm. If
you select one of these options without the requisite operating
system/browser support, Server Administrator displays a cannot
display the webpage error. This field is meant only for Server
Administrator auto-generated self-signed certificates. The drop down list is
grayed out if you import or generate new certificates into Server
Administrator
NOTE: 128-bit or higher option does not allow connections from browsers
with lower SSL encryption strength, such as 40 bit and 56 bit.
NOTE: Restart the Server Administrator web server for the changes to take
effect.
NOTE: If the encryption level is set to 128-bit or higher, you can access or
modify the Server Administrator settings using a browser with the same or
higher encryption levels.
4 When you finish setting options in the Server Preferences window,
click Apply Changes.
Supported Citrix XenServer, Red Hat Enterprise Linux and SUSE Linux Enterprise
Server Operating Systems
To start Server Administrator on systems running a supported Citrix
XenServer, Red Hat Enterprise Linux, or SUSE Linux Enterprise Server
operating system, run the following command from the command line:
dsm_om_connsvc start
Supported Citrix XenServer, Red Hat Enterprise Linux and SUSE Linux Enterprise
Server Operating Systems
To stop Server Administrator on systems running a supported Citrix
XenServer, Red Hat Enterprise Linux, or SUSE Linux Enterprise Server
operating system, run the following command from the command line:
dsm_om_connsvc stop
Supported Citrix XenServer, Red Hat Enterprise Linux and SUSE Linux Enterprise
Server Operating Systems
To restart Server Administrator on systems running a supported Citrix
XenServer, Red Hat Enterprise Linux, or SUSE Linux Enterprise Server
operating system, run the following command from the command line:
dsm_om_connsvc restart
4
Server Administrator Services
Overview
The Dell OpenManage Server Administrator Instrumentation Service
monitors the health of a system and provides rapid access to detailed fault and
performance information gathered by industry standard systems management
agents. The reporting and viewing features allow retrieval of overall health
status for each chassis that comprises your system. At the subsystem level,
you can view information about the voltages, temperatures, fan rpm, and
memory function at key points in the system. A detailed account of every
relevant cost of ownership (COO) detail about your system can be seen in the
summary view. Version information for BIOS, firmware, operating system,
and all installed systems management software is easy to retrieve.
Additionally, system administrators can use the Instrumentation Service to
perform the following essential tasks:
• Specify minimum and maximum values for certain critical components.
The values, called thresholds, determine the range in which a warning
event for that component occurs (minimum and maximum failure values
are specified by the system manufacturer).
• Specify how the system responds when a warning or failure event occurs.
Users can configure the actions that a system takes in response to
notifications of warning and failure events. Alternatively, users who have
around-the-clock monitoring can specify that no action is to be taken and
rely on human judgment to select the best action in response to an event.
• Populate all of the user-specifiable values for the system, such as the name
of the system, the phone number of the system's primary user, the
depreciation method, whether the system is leased or owned, and so on.
NOTE: You must configure the Simple Network Management Protocol (SNMP)
service to accept SNMP packets for both managed systems and network
management stations running Microsoft Windows Server 2003. See "Configuring the
SNMP Agent for Systems Running Supported Windows Operating Systems"
for details.
Modular Enclosure
NOTE: For the purposes of Server Administrator, modular enclosure refers to a
system that may contain one or more modular systems that appear as a separate
Server Module in the system tree. Like a stand-alone Server Module, a Modular
Enclosure contains all of the essential components of a system. The only difference
is that there are slots for at least two Server Modules within a larger container,
and each of them is as complete a system as a Server Module.
To view the modular system’s chassis information and Chassis Management
Controller (CMC) information, click the Modular Enclosure object.
Properties
Subtabs: Information
Under the Properties tab, you can:
• View the chassis information for the modular system being monitored.
• View detailed Chassis Management Controller (CMC) information for the
modular system being monitored.
System/Server Module
The System/Server Module object contains three main system component
groups: "Main System Chassis/Main System," "Software," and "Storage."
The Server Administrator home page defaults to the System object of the
system tree view. Most administrative functions can be managed from the
System/Server Module object action window. The System/Server Module
object action window has the following tabs, depending on the user's group
privileges: Properties, Shutdown, Logs, Alert Management, and Session
Management.
Properties
Subtabs: Health | Summary | Asset Information | Auto Recovery
Under the Properties tab, you can:
• View the current health alert status for hardware and software components
in the Main System Chassis/Main System object and the Storage object.
• View detailed summary information for all components in the system
being monitored.
• View and configure asset information for the system being monitored.
• View and set the Automatic System Recovery (OS watchdog timer) actions
for the system being monitored.
NOTE: Automatic System Recovery options may not be available because the
operating system watchdog timer is enabled in BIOS. To configure the auto
recovery options, the operating system watchdog timer must be disabled.
NOTE: Automatic System Recovery actions may not execute exactly per the
time-out period (n seconds) when the watchdog identifies a system that has
stopped responding. The action execution time ranges from n-h+1 to n+1
seconds, where n is the time-out period and h is the heart beat interval. The
value of the heart beat interval is 7 seconds when n 30 and 15 seconds when
n > 30.
NOTE: The functionality of the watchdog timer feature cannot be guaranteed
when an uncorrectable memory event occurs in the system DRAM Bank_1.
If an uncorrectable memory event occurs in this location, the BIOS code
resident in this space may become corrupted. Because the watchdog feature
uses a call to BIOS to effect the shutdown or reboot behavior, the feature may
not work properly. If this occurs, you must manually reboot the system.
Shutdown
Subtabs: Remote Shutdown | Thermal Shutdown | Web Server Shutdown
Under the Shutdown tab, you can:
• Configure the operating system shutdown and remote shutdown options.
• Set the thermal shutdown severity level to shut down your system in the
event that a temperature sensor returns a warning or failure value.
NOTE: A thermal shutdown occurs only when the temperature reported by
the sensor goes above the temperature threshold. A thermal shutdown does
not occur when the temperature reported by the sensor goes below the
temperature threshold.
• View current Platform Event Filter settings and set the Platform Event
Filtering actions to be performed in the event that a system component
sensor returns a warning or failure value. You can also use the Configure
Destination option to select a destination (IPv4 or IPv6 address) where an
alert for a platform event is to be sent.
NOTE: Server Administrator does not display the scope ID of the IPv6 address in its
graphical user interface.
• View current SNMP trap alert thresholds and set the alert threshold levels
for instrumented system components. The selected traps are triggered if
the system generates a corresponding event at the selected severity level.
NOTE: Alert actions for all potential system component sensors are listed on
the Alert Actions window, even if they are not present on your system. Setting
alert actions for system component sensors that are not present on your
system has no effect.
Session Management
Subtabs: Session
Under the Session Management tab, you can:
• View session information for current users that have logged in to Server
Administrator.
• Terminate user sessions.
NOTE: Only users with administrative privileges can view the Session
Management page and terminate session(s) of logged-in users.
• Memory
• Network
• Ports
• Power Management
• Power Supplies
• Processors
• Remote Access
• Removable Flash Media
• Slots
• Temperatures
• Voltages
NOTE: Hardware performance is supported only on Dell xx0x and above systems.
Power supplies is not available on Dell PowerEdge 1900 system.
Power management is supported on limited Dell xx0x and above systems.
The system/server module may contain one main system chassis or several
chassis. The main system chassis/main system contains the essential
components of a system. The Main System Chassis/Main System object
action window has the following tab: Properties.
Properties
Subtabs: Health | Information | System Components (FRU)| Front Panel
Under the Properties tab, you can:
• View the health or status of hardware components and sensors. Each listed
component has a "System/Server Module Component Status Indicators"
icon next to its name. A green check mark ( ) indicates that a
component is healthy (normal). A yellow triangle containing an
exclamation point ( ) indicates that a component has a warning
(noncritical) condition and requires prompt attention. A red X ( )
indicates a component has a failure (critical) condition and requires
immediate attention. A blank space ( ) indicates that a component's
health status is unknown. The available monitored components include:
– Batteries
– Fans
– Hardware Log
– Intrusion
– Memory
– Network
– Power Management
– Power Supplies
– Processors
– Temperatures
– Voltages
NOTE: Batteries are supported only on Dell PowerEdge x9xx and
Dell xx0x systems.
Power supplies is not available on Dell PowerEdge 1900 system.
Power management is supported on limited Dell xx0x systems.
• View information about the main system chassis attributes.
• View detailed information about the field-replaceable units (FRUs)
installed in your system (under the System Components (FRU) subtab.)
• Enable or disable the managed system's front panel buttons,
namely Power button and Non-Masking Interrupt (NMI) button
(if present on the system). Also, select the managed system’s LCD
Security Access level. The managed system’s LCD information can be
selected from the drop-down menu. You can also enable Indication of
Remote KVM session from the Front Panel subtab.
Batteries
Click the Batteries object to view information about your system’s installed
batteries. Batteries maintain the time and date when your system is turned
off. The battery saves the system’s BIOS setup configuration, which allows
the system to reboot efficiently. The Batteries object action window can have
the following tabs, depending on the user’s group privileges: Properties and
Alert Management.
Properties
Subtab: Information
Under the Properties tab, you can view the current readings and status of
your system’s batteries.
Alert Management
Under the Alert Management tab, you can configure the alerts that you want
to take effect in case of a battery warning or critical/failure event.
BIOS
Click the BIOS object to manage key features of your system's BIOS.
Your system’s BIOS contains programs stored on a flash memory chip set that
control communications between the microprocessor and peripheral devices,
such as the keyboard and the video adapter, and other miscellaneous functions,
such as system messages. The BIOS object action window can have
the following tabs, depending on the user's group privileges:
Properties and Setup.
Properties
Subtab: Information
Under the Properties tab, you can view BIOS information.
Setup
Subtab: BIOS
Under the Setup tab, you can set the state for each BIOS setup object.
You can modify the state of many BIOS setup features including but not
limited to the Serial Port, Network Interface Controller cards, Boot Sequence,
Hard Disk Drive Sequence, User Accessible USB Ports, CPU Virtualization
Technology, CPU HyperThreading, AC Power Recovery Mode, Embedded
SATA Controller, Console Redirection, and Console Redirection Failsafe
Baud Rate. You can also configure internal USB device, optical drive
controller settings, automatic system recovery (ASR) Watchdog Timer,
embedded hypervisor and additional LAN network ports on motherboard
information. You can view the settings of Trusted Platform Module (TPM)
and Trusted Cryptographic Module (TCM).
Depending upon your specific system configuration, additional setup items
may be displayed. However, some BIOS setup options may be shown on the
F2 BIOS Setup screen that are not accessible in Server Administrator.
NOTE: The NIC configuration information within the Server Administrator BIOS
setup may be inaccurate for embedded NICs. Using the BIOS setup screen to
enable or disable NICs might produce unexpected results. It is recommended that
you perform all configurations for embedded NICs through the actual System Setup
screen that is available by pressing <F2> while a system is booting.
NOTE: The BIOS Setup tab for your system only displays the BIOS features that are
supported on your system.
Fans
Click the Fans object to manage your system fans. Server Administrator
monitors the status of each system fan by measuring fan rpms. Fan probes
report rpms to the Server Administrator Instrumentation Service. When you
select Fans from the device tree, details appear in the data area in the
right-hand pane of the Server Administrator home page. The Fans object
action window can have the following tabs, depending on the user's group
privileges: Properties and Alert Management.
Properties
Subtab: Fan Probes
Under the Properties tab, you can:
• View the current readings for your system's fan probes and configure
minimum and maximum values for fan probe warning threshold.
NOTE: Some fan probe fields differ according to the type of firmware your
system has: BMC or ESM. Some threshold values are not editable on
BMC-based systems.
• Select fan control options.
Alert Management
Subtabs: Alert Actions | SNMP Traps
Under the Alert Management tab, you can:
• View current alert actions settings and set the alert actions that you want
to be performed in the event that a fan returns a warning or failure value.
• View current SNMP trap alert thresholds and set the alert threshold levels
for fans. The selected traps are triggered if the system generates a
corresponding event at the selected severity level.
Firmware
Click the Firmware object to manage your system firmware.
Firmware consists of programs or data that have been written to ROM.
Firmware can boot and operate a device. Each controller contains firmware
that helps provide the controller's functionality. The Firmware object
action window can have the following tab, depending on the user's group
privileges: Properties.
Properties
Subtab: Information
Under the Properties tab, you can view your system's firmware information.
Hardware Performance
Click the Hardware Performance object to view the status and cause for the
system’s performance degradation. The Hardware Performance object action
window can have the following tab, depending on the user's group privileges:
Properties.
Table 4-1 lists the possible values for status and cause of a probe:
Table 4-1. Possible Values for Status and Cause of a Probe
Properties
Subtab: Information
Under the Properties tab, you can view the details of system’s performance
degradation.
Intrusion
Click the Intrusion object to manage your system's chassis intrusion status.
Server Administrator monitors chassis intrusion status as a security measure
to prevent unauthorized access to your system's critical components. Chassis
intrusion indicates that someone is opening or has opened the cover to the
system's chassis. The Intrusion object action window can have the following
tabs, depending on the user's group privileges: Properties and Alert
Management.
Properties
Subtab: Intrusion
Under the Properties tab, you can view the chassis intrusion status.
Alert Management
Subtabs: Alert Actions | SNMP Traps
Under the Alert Management tab, you can:
• View current alert actions settings and set the alert actions that you want
to be performed in the event that the intrusion sensor returns a warning or
failure value.
• View current SNMP trap alert thresholds and set the alert threshold levels
for the intrusion sensor. The selected traps are triggered if the system
generates a corresponding event at the selected severity level.
Memory
Click the Memory object to manage your system's memory devices.
Server Administrator monitors the memory device status for each memory
module present in the monitored system. Memory device prefailure sensors
monitor memory modules by counting the number of ECC memory
corrections. Server Administrator also monitors memory redundancy
information if your system supports this feature. The Memory object action
window can have the following tabs, depending on the user's group privileges:
Properties and Alert Management.
Properties
Subtab: Memory
Under the Properties tab, you can view memory attributes, memory device
details, and memory device status.
NOTE: If a system with spare bank memory enabled enters a redundancy lost state,
it may not be apparent which memory module is the cause. If you cannot determine
which DIMM to replace, see the switch to spare memory bank detected log entry in
the ESM system log to find which memory module failed.
Alert Management
Subtabs: Alert Actions | SNMP Traps
Under the Alert Management tab, you can:
• View current alert actions settings and set the alert actions that you want
to be performed in the event that a memory module returns a warning or
failure value.
• View current SNMP trap alert thresholds and set the alert threshold levels
for memory modules. The selected traps are triggered if the system
generates a corresponding event at the selected severity level.
Network
Click the Network object to manage your system's NICs. Server Administrator
monitors the status of each NIC present in your system to ensure continuous
remote connection. Dell OpenManage Server Administrator reports NIC
teaming details if it's already configured on the system. Two or more physical
NICs can be teamed into a single logical NIC, to which an administrator can
assign an IP address. Teaming can be configured using NIC vendor tools. For
example, Broadcom - BACS. If one of the physical NICs fails, the IP address
remains accessible because it is bound to the logical NIC rather than to a
single physical NIC. If Team Interface is configured, the detailed team
properties are displayed. The relation between physical NICs and Team
Interface and vice-versa is also reported, if these physical NICs are members
of the Team Interface. The Network object action window can have the
following tab, depending on the user's group privileges: Properties.
Properties
Subtab: Information
Under the Properties tab, you can view information about the physical NIC
interfaces and also the team interfaces installed on your system.
NOTE: In the IPv6 Addresses section, Server Administrator displays only two
addresses, in addition to the link-local address.
Ports
Click the Ports object to manage your system's external ports.
Server Administrator monitors the status of each external port present in
your system. The Ports object action window can have the following tab,
depending on the user's group privileges: Properties.
Properties
Subtab: Information
Under the Properties tab, you can view information about your system's
internal and external ports.
Power Management
Monitoring
Subtabs: Consumption | Statistics
Under the Consumption tab you can view and manage your system’s Power
Consumption information in Watts and BTU/hr.
BTU/hr=Watt X 3.413 (Value rounded off to the nearest whole number)
Server Administrator monitors power consumption status, amperage, and
tracks power statistic details.
You can also view the System Instantaneous Headroom and System Peak
Headroom. The values are displayed in both Watts and BTU/hr
(British Thermal Unit). Power thresholds can be set in Watts and BTU/hr.
The Statistics tab allows you to view and reset your system’s Power tracking
statistics like energy consumption, system peak power, and system peak
amperage.
Management
Subtabs: Budget | Profiles
The Budget tab allows you to view the Power Inventory attributes like System
Idle Power and System Maximum Potential Power in Watts and BTU/hr.
You can also use the Power Budget option to Enable Power Cap and set the
Power Cap for your system.
The Profiles tab allows you to choose a power profile to maximize your
system’s performance and conserve energy.
Alert Management
Subtabs: Alert Actions | SNMP Traps
Use the Alert Actions tab to set system alert actions for various system events
like System Power Probe Warning and System Peak Power.
Use the SNMP Traps tab to configure SNMP traps for your system.
Certain Power Management features may be available only on systems
enabled with the Power Management Bus (PMBus).
Power Supplies
Click the Power Supplies object to manage your system’s power supplies.
Server Administrator monitors power supply status, including redundancy,
to ensure that each power supply present in your system is functioning
properly. The Power Supplies object action window can have the following
tabs, depending on the user's group privileges: Properties and Alert
Management.
Properties
Subtab: Elements
Under the Properties tab, you can:
• View information about your power supply redundancy attributes.
• Check the status of individual power supply elements, including the Rated
Input Wattage and Maximum Output Wattage. The Rated Input Wattage
attribute are displayed only on PMBus systems starting xx1x.
Alert Management
Subtabs: Alert Actions | SNMP Traps
Under the Alert Management tab, you can:
• View current alert actions settings and set the alert actions that you want
to be performed in the event that a system power returns a warning or
failure value.
• Configure Platform Event Alert destinations for IPv6 addresses.
• View current SNMP trap alert thresholds and set the alert threshold levels
for system power watts. The selected traps are triggered if the system
generates a corresponding event at the selected severity level.
NOTE: The System Peak Power trap generates events only for informational
severity.
Processors
Click the Processors object to manage your system's microprocessor(s).
A processor is the primary computational chip inside a system that controls
the interpretation and execution of arithmetic and logic functions.
The Processors object action window can have the following tabs,
depending on the user's group privileges: Properties and Alert Management.
Properties
Subtab: Information
Under the Properties tab, you can view information about your system's
microprocessor(s) and access detailed capabilities and cache information.
Alert Management
Subtabs: Alert Actions | SNMP Traps
Under the Alert Management tab, you can:
• View current alert actions settings and set the alert actions that you want to
be performed in the event that a processor returns a warning or failure value.
• View current SNMP trap alert thresholds and set the alert threshold levels
for processors. The selected traps are triggered if the system generates a
corresponding event at the selected severity level.
Remote Access
Click the Remote Access object to manage the Baseboard Management
Controller (BMC) or Integrated Dell Remote Access Controller (iDRAC)
features and Remote Access Controller features.
Selecting Remote Access tab allows you to manage the BMC/iDRAC features
such as, general information on the BMC/iDRAC. You can also manage the
configuration of the BMC/iDRAC on a local area network (LAN), serial port
for the BMC/iDRAC, terminal mode settings for the serial port, BMC/iDRAC
on a serial over LAN connection, and BMC/iDRAC users.
NOTE: BMC is supported in Dell PowerEdge x8xx and x9xx systems and iDRAC is
supported in Dell xx0x and xx1x systems only.
NOTE: If an application other than Server Administrator is used to configure the
BMC/iDRAC while Server Administrator is running, the BMC/iDRAC configuration
data displayed by Server Administrator may become asynchronous with the
BMC/iDRAC. It is recommended that Server Administrator be used to configure the
BMC/iDRAC while Server Administrator is running.
DRAC allows you to access your system's remote system management
capabilities. The Server Administrator DRAC provides remote access to
inoperable systems, alert notification when a system is down, and the ability
to restart a system.
The Remote Access object action window can have the following tabs,
depending on the user's group privileges: Properties, Configuration, and Users.
Properties
Subtab: Information
Under the Properties tab, you can view general information on the remote
access device. You can also view the attributes of the IPv4 and IPv6 addresses.
Click Reset to Defaults to reset all the attributes to their system default
values.
Configuration
Subtabs: LAN | Serial Port | Serial Over LAN |Additional Configuration
Under the Configuration tab when BMC/iDRAC is configured, you can
configure the BMC/iDRAC on a LAN, serial port for BMC/iDRAC, and
BMC/iDRAC on a serial over LAN connection.
NOTE: The Additional configuration tab is available only on systems with iDRAC.
Under the Configuration tab, when DRAC is configured, you can:
Configure network properties
NOTE: The Enable NIC, NIC Selection, and Encryption Key fields display only on
Dell PowerEdge x9xx systems.
Under the Additional Configuration tab you can either enable or disable
IPv4/IPv6 properties.
NOTE: Enabling/disabling IPv4/IPv6 is possible only in a dual stack environment
(where both the IPv4 and IPv6 stacks are loaded).
Users
Subtab: Users
Under the Users tab, you can modify the remote access user configuration.
You can add, configure, and view information about Remote Access
Controller users.
NOTE: On the Dell PowerEdge x9xx systems:
- Ten user IDs are displayed. If a DRAC card is installed, sixteen user IDs are
displayed.
- Serial Over LAN Payload column is displayed.
Slots
Click the Slots object to manage the connectors or sockets on your system
board that accept printed circuit boards, such as expansion cards. The Slots
object action window has a Properties tab.
Properties
Subtab: Information
Under the Properties tab, you can view information about each slot and
installed adapter.
Temperatures
Click the Temperatures object to manage your system temperature in order
to prevent thermal damage to your system’s internal components.
Server Administrator monitors the temperature in a variety of locations in your
system's chassis to ensure that temperatures inside the chassis do not become
too high. The Temperatures object action window displays the following tabs,
depending on the user's group privileges: Properties and Alert Management.
Properties
Subtab: Temperature Probes
Under the Properties tab, you can view the current readings and status for
your system's temperature probes and configure minimum and maximum
values for temperature probe warning threshold.
NOTE: Some temperature probe fields differ according to the type of firmware your
system has: BMC or ESM. Some threshold values are not editable on BMC-based
systems. When assigning probe threshold values, Server Administrator sometimes
rounds the minimum or maximum values you enter to the closest assignable value.
Alert Management
Subtabs: Alert Actions | SNMP Traps
Under the Alert Management tab, you can:
• View current alert actions settings and set the alert actions that you want
to be performed in the event that a temperature probe returns a warning or
failure value.
• View current SNMP trap alert thresholds and set the alert threshold levels
for temperature probes. The selected traps are triggered if the system
generates a corresponding event at the selected severity level.
NOTE: You can set minimum and maximum temperature probe threshold values for
an external chassis to whole numbers only. If you attempt to set either the minimum or
maximum temperature probe threshold value to a number that contains a decimal,
only the whole number before the decimal place is saved as the threshold setting.
Voltages
Click the Voltages object to manage voltage levels in your system. Server
Administrator monitors voltages across critical components in various chassis
locations in the monitored system. The Voltages object action window can
have the following tabs, depending on the user's group privileges: Properties
and Alert Management.
Properties
Subtab: Voltage Probes
Under the Properties tab, you can view the current readings and status for
your system's voltage probes and configure minimum and maximum values
for voltage probe warning threshold.
NOTE: Some voltage probe fields differ according to the type of firmware your
system has: BMC or ESM. Some threshold values are not editable on
BMC-based systems.
Alert Management
Subtabs: Alert Actions | SNMP Traps
Under the Alert Management tab, you can:
• View current alert actions settings and set the alert actions that you want
to be performed in the event that a system voltage sensor returns a warning
or failure value.
• View current SNMP trap alert thresholds and set the alert threshold levels
for voltage sensors. The selected traps are triggered if the system generates
a corresponding event at the selected severity level.
Software
Click the Software object to view detailed version information about the
managed system's essential software components, such as the operating system
and the systems management software. The Software object action window has
the following tab, depending on the user's group privileges: Properties.
Properties
Subtab: Summary
Under the Properties tab, you can view a summary of the monitored system's
operating system and system management software.
Operating System
Click the Operating System object to view basic information about your
operating system. The Operating System object action window has the
following tab, depending on the user's group privileges: Properties.
Properties
Subtab: Information
Under the Properties tab, you can view basic information about your
operating system.
Storage
Server Administrator provides the Storage Management Service:
The Storage Management Service provides features for configuring storage
devices. In most cases, the Storage Management Service is installed using Typical
Setup. The Storage Management Service is available on Microsoft Windows,
Red Hat Enterprise Linux, and SUSE Linux Enterprise Server operating systems.
When the Storage Management Service is installed, click the Storage object
to view the status and settings for various attached array storage devices,
system disks, and so on.
In the case of Storage Management Service, the Storage object action window
has the following tab, depending on the user's group privileges: Properties.
Properties
Subtab: Health
Under the Properties tab, you can view the health or status of attached
storage components and sensors such as array subsystems and operating
system disks.
General Settings
Click the General Settings object to set user and DSM SA Connection
Service (Web server) preferences for selected Server Administrator functions.
The General Settings object action window has the following tabs,
depending on the user's group privileges: User and Web Server.
User
Subtab: Properties
Under the User tab, you can set user preferences, such as the home page
appearance and the default e-mail address for the Email button.
Web Server
Subtabs: Properties | X.509 Certificate
Under the Web Server tab, you can:
• Set DSM SA Connection Service preferences. See "Dell Systems
Management Server Administration Connection Service and
Security Setup" for instructions on configuring your server preferences.
• Configure the SMTP server address and Bind IP address in either the IPv4
or IPv6 addressing mode.
• Perform X.509 certificate management by generating a new
X.509 certificate, reusing an existing X.509 certificate, or importing a root
certificate or certificate chain from a Certification Authority (CA).
For more information about certificate management, see "X.509
Certificate Management" on page 61.
Server Administrator
Click the Server Administrator object to enable or disable access to users with
User or Power User privileges and to configure the SNMP root password.
The Server Administrator object action window can have the following tab,
depending on the user's group privileges: Preferences.
Preferences
Subtabs: Access Configuration | SNMP Configuration
Under the Preferences tab, you can:
• Enable or disable access to users with User or Power User privileges.
• Configure the SNMP root password.
NOTE: The default SNMP configuration user is root and the password
is calvin.
• Configure the SNMP Set Operations.
NOTE: The defAfter configuring SNMP Set Operations, services must be restarted
for the change to take effect. On systems running supported Microsoft
Windows operating systems, the Windows SNMP Service must be restarted.
On systems running supported Red Hat Enterprise Linux and SUSE Linux
Enterprise Server operating systems, Server Administrator services must be
restarted by running the srvadmin-services.sh restart command.
5
Working With Remote Access
Controller
NOTE: Baseboard Management Controller (BMC) is supported on Dell PowerEdge
x8xx and x9xx systems and the Integrated Dell Remote Access Controller (iDRAC) is
supported on Dell xx0x and xx1x systems.
Overview
This chapter provides information on accessing and using the remote access
features of BMC/iDRAC and DRAC.
The Dell systems baseboard management controller (BMC)/Integrated
Dell Remote Access Controller (iDRAC) monitors the system for critical
events by communicating with various sensors on the system board and sends
alerts and log events when certain parameters exceed their preset thresholds.
The BMC/iDRAC supports the industry-standard Intelligent Platform
Management Interface (IPMI) specification, enabling you to configure,
monitor, and recover systems remotely.
The DRAC is a systems management hardware and software solution
designed to provide remote management capabilities, crashed system
recovery, and power control functions for Dell systems.
By communicating with the system’s baseboard management controller
(BMC)/ Integrated Dell Remote Access Controller (iDRAC), the DRAC can
be configured to send you e-mail alerts for warnings or errors related to
voltages, temperatures, and fan speeds. The DRAC also logs event data and
the most recent crash screen (available only on systems running Microsoft
Windows operating system) to help you diagnose the probable cause of a
system crash.
The Remote Access Controller provides remote access to an inoperable
system, allowing you to get the system up and running as quickly as possible.
The Remote Access Controller also provides alert notification when a system
is down and allows you to remotely restart a system. Additionally, the Remote
Access Controller logs the probable cause of system crashes and saves the
most recent crash screen.
You can log in to the Remote Access Controller through the Server
Administrator home page or by directly accessing the controller's IP address
using a supported browser.
When using the Remote Access Controller, you can click Help on the global
navigation bar for more detailed information about the specific window you are
viewing. Remote Access Controller help is available for all windows accessible
to the user based on user privilege level and the specific hardware and software
groups that Server Administrator discovers on the managed system.
NOTE: See the Dell OpenManage Baseboard Management Controller Utilities
User's Guide for more information about the BMC.
NOTE: See the Dell Remote Access Controller 4 User’s Guide for more information
on using DRAC 4 or Dell Remote Access Controller 5 User’s Guide for more
information on using DRAC 5.
NOTE: See the Integrated Dell Remote Access Controller User’s Guide for detailed
information on configuring and using the iDRAC.
Table 5-1 lists the GUI field names and the applicable system, when Server
Administrator is installed on the system.
Table 5-1. System Availability for the following GUI Field Names
See the Dell Systems Software Support Matrix for more information on the
systems support for remote access devices.
Server Administrator allows remote, in-band access to event logs, power
control, and sensor status information and provides the ability to configure
the BMC/iDRAC. You can manage BMC/iDRAC and DRAC through the
Server Administrator graphical user interface by clicking the Remote Access
object, which is a subcomponent of the Main System Chassis/Main System
group.
3 Click LAN.
The LAN Configuration window appears.
NOTE: BMC/iDRAC management traffic does not function properly if the LAN
on motherboard (LOM) is teamed with any network adapter add-in-cards.
4 Configure the following NIC configuration details:
– Enable NIC (this option is available on Dell PowerEdge x9xx systems
and when DRAC is installed. Select this option for NIC teaming.
In Dell PowerEdge x9xx systems, you can team NICs for added
redundancy.)
NOTE: Your DRAC contains an integrated 10BASE-T/100BASE-T Ethernet NIC
and supports TCP/IP. The NIC has a default address of 192.168.20.1 and a
default gateway of 192.168.20.1.
NOTE: If your DRAC is configured to the same IP address as another NIC on
the same network, an IP address conflict occurs. The DRAC stops responding
to network commands until the IP address is changed on the DRAC. The DRAC
must be reset even if the IP address conflict is resolved by changing the
IP address of the other NIC.
NOTE: Changing the IP address of the DRAC causes the DRAC to reset.
If SNMP polls the DRAC before it initializes, a temperature warning is logged
because the correct temperature is not transmitted until the DRAC is initialized.
– NIC Selection
NOTE: NIC Selection cannot be configured on modular systems.
– Enable IPMI Over LAN
– IP Address Source
– IP Address
– Subnet Mask
– Gateway Address
– Channel Privilege Level Limit
– New Encryption Key (This option is available on Dell PowerEdge x9xx
systems.)
6
Server Administrator Logs
Overview
Server Administrator allows you to view and manage hardware, alert,
and command logs. All users can access logs and print reports from either the
Server Administrator home page or from its command line interface.
Users must be logged in with Administrator privileges to clear logs or must be
logged in with Administrator or Power User privileges to e-mail logs to their
designated service contact.
See the Dell OpenManage Server Administrator Command Line Interface
User's Guide for information about viewing logs and creating reports from the
command line.
When viewing Server Administrator logs, you can click Help on the global
navigation bar for more detailed information about the specific window you
are viewing. Server Administrator log help is available for all windows
accessible to the user based on user privilege level and the specific hardware
and software groups that Server Administrator discovers on the
managed system.
Integrated Features
Clicking a column heading sorts by the column or changes the sort direction
of the column. Additionally, each log window contains several task buttons
that can be used for managing and supporting your system.
Hardware Log
Use the hardware log to look for potential problems with your system's
hardware components. On Dell PowerEdge x8xx, x9xx, and xx1x systems, the
hardware log status indicator changes to critical status ( ) when the log file
reaches 100 percent capacity. There are two available hardware logs,
depending on your system: the Embedded System Management (ESM) log
and the System Event Log (SEL). The ESM log and SEL are each a set of
embedded instructions that can send hardware status messages to systems
management software. Each component listed in the logs has a status
indicator icon next to its name. A green check mark ( ) indicates that a
component is healthy (normal). A yellow triangle containing an exclamation
point ( ) indicates that a component has a warning (noncritical)
condition and requires prompt attention. A red X ( ) indicates that a
component has a failure (critical) condition and requires immediate
attention. A blank space ( ) indicates that a component's health status is
unknown.
To access the hardware log, click System, click the Logs tab, and click Hardware.
Information displayed in the ESM and SEL logs includes:
• The severity level of the event
• The date and time that the event was captured
• A description of the event
Alert Log
NOTE: If the Alert log displays invalid XML data (for example, when the XML data
generated for the selection is not well formed), click Clear Log and then redisplay
the log information.
Use the Alert log to monitor various system events. The Server Administrator
generates events in response to changes in the status of sensors and other
monitored parameters. Each status change event recorded in the Alert log
consists of a unique identifier called the event ID for a specific event source
category and an event message that describes the event. The event ID and
message uniquely describe the severity and cause of the event and provide
other relevant information such as the location of the event and the
monitored component's previous state.
To access the Alert log, click System, click the Logs tab, and click Alert.
Information displayed in the Alert log includes:
• The severity level of the event
• The event ID
• The date and time that the event was captured
• The category of the event
• A description of the event
NOTE: The log history may be required for future troubleshooting and diagnostic
purposes. Therefore, it is recommended that you save the log files.
See the Server Administrator Messages Reference Guide for detailed
information about alert messages.
Command Log
NOTE: If the Command log displays invalid XML data (for example, when XML data
generated for the selection is not well formed), click Clear Log and then redisplay
the log information.
Use the Command log to monitor all of the commands issued by Server
Administrator users. The Command log tracks logins, logouts, systems
management software initialization, and shutdowns initiated by systems
management software, and records the last time the log was cleared. The size
of the command log file can be specified as per your requirement.
To access the Command log, click System, click the Logs tab, and click
Command.
Information displayed in the Command log includes:
• The date and time that the command was invoked
• The user that is currently logged in to the Server Administrator home page
or the CLI
• A description of the command and its related values
NOTE: The log history may be required for future troubleshooting and diagnostic
purposes. Therefore, it is recommended that you save the log files.
7
Setting Alert Actions
Setting Alert Actions for Systems Running
Supported Red Hat Enterprise Linux and SUSE
Linux Enterprise Server Operating Systems
When you set alert actions for an event, you can specify the action to display
an alert on the server. To perform this action, Server Administrator sends a
message to /dev/console. If the Server Administrator system is running an X
Window System, you do not see that message by default. To see the alert
message on a Red Hat Enterprise Linux system when the X Window System
is running, you must start xconsole or xterm -C before the event occurs. To
see the alert message on a SUSE Linux Enterprise Server system when the X
Window System is running, you must start xterm -C before the event occurs.
When you set Alert Actions for an event, you can specify the action to
Broadcast a message. To perform this action, Server Administrator executes
the wall command, which sends the message to everybody logged in with
their message permission set to Yes. If the Server Administrator system is
running an X Window System, you do not see that message by default. To see the
broadcast message when the X Window System is running, you must start a
terminal such as xterm or gnome-terminal before the event occurs.
When you set Alert Actions for an event, you can specify the action to
Execute application. There are limitations on the applications that Server
Administrator can execute. Follow these guidelines to ensure proper
execution:
• Do not specify X Window System based applications because Server
Administrator cannot execute such applications properly.
• Do not specify applications that require input from the user because
Server Administrator cannot execute such applications properly.
• Redirect stdout and stderr to a file when specifying the application so that
you can see any output or error messages.
• If you want to execute multiple applications (or commands) for an alert,
create a script to do that and put the full path to the script in the Absolute
path to the application box.
Example 1:
ps -ef >/tmp/psout.txt 2>&1
The command in Example 1 executes the application ps, redirects stdout
to the file /tmp/psout.txt, and redirects stderr to the same file as stdout.
Example 2:
mail -s "Server Alert" admin </tmp/alertmsg.txt
>/tmp/mailout.txt 2>&1
The command in Example 2 executes the mail application to send the
message contained in the file /tmp/alertmsg.txt to Red Hat Enterprise
Linux user or SUSE Linux Enterprise Server user, and Administrator, with
the subject Server Alert. The file /tmp/alertmsg.txt must be created by the
user before the event occurs. In addition, stdout and stderr are redirected
to the file /tmp/mailout.txt in case an error occurs.
Event Description
Fan Probe Failure The fan is running too slow or not at all.
Voltage Probe Failure The voltage is too low for proper operation.
Discrete Voltage Probe The voltage is too low for proper operation.
Failure
Temperature Probe The temperature is approaching excessively high or
Warning low limits.
Temperature Probe The temperature is either too high or too low for
Failure proper operation.
Event Description
Chassis Intrusion The system chassis has been opened.
Detected
Redundancy (PS or Fan) Redundancy for the fans and/or power supplies has
Degraded been reduced.
Redundancy (PS or Fan) No redundancy remains for the system's fans and/or power
Lost supplies.
Processor Warning A processor is running at less than peak performance or
speed.
Processor Failure A processor has failed.
PPS/VRM/DCtoDC The power supply, voltage regulator module, or DC to
Warning DC converter is pending a failure condition.
Power Supply/VRM/D2D The power supply, voltage regulator module, or DC to
Failure DC converter has failed.
Hardware log is full or Either an empty or a full hardware log requires
emptied administrator attention.
Automatic System The system is hung or is not responding and is taking an
Recovery action configured by Automatic System Recovery.
System Power Probe The power consumption is approaching the failure
Warning threshold.
System Power Probe The power consumption has crossed the highest
Failure acceptable limit and has resulted in a failure.
Removable Flash The removable flash media is present.
Media Present
Removable Flash The removable flash media is pending a failure condition.
Media Failure
Removable Flash The removable flash media is present.
Media Warning
A
Troubleshooting
Connection Service Failure
On Red Hat Enterprise Linux, when SELinux is set to enforced mode,
the Dell Systems Management Server Administrator (DSM SA) Connection
service fails to start. Perform any one of the following steps and start this
service:
• Set SELinux to Disabled mode or to Permissive mode.
• Change the SELinux allow_execstack property to ON state. Run the
following command:
setsebool allow_execstack on
• Change the security context for the DSM SA connection service. Run the
following command:
chcon -t unconfined_execmem_t
/opt/dell/srvadmin/sbin/dsm_om_connsvcd
Troubleshooting 111
book.book Page 112 Tuesday, July 6, 2010 12:01 PM
112 Troubleshooting
book.book Page 113 Tuesday, July 6, 2010 12:01 PM
Troubleshooting 113
book.book Page 114 Tuesday, July 6, 2010 12:01 PM
114 Troubleshooting
book.book Page 115 Tuesday, July 6, 2010 12:01 PM
Troubleshooting 115
book.book Page 116 Tuesday, July 6, 2010 12:01 PM
116 Troubleshooting
book.book Page 117 Tuesday, July 6, 2010 12:01 PM
B
Frequently Asked Questions
This section lists the frequently asked questions about Dell OpenManage
Server Administrator:
NOTE: These questions are not specific to this release of Server Administrator.
1 What are the tasks that need to be performed after adding a VMware ESX
4.1 operating system to the active directory domain?
After adding a VMware ESX 4.1 operating system to the Active Directory
domain, an Active Directory user must do the following:
• Log in to the Server Administrator while using the VMware ESX 4.1
operating system as a Server Administrator and restart the DSM SA
Connection Service.
• Log in to the Remote Node while using the VMware ESX 4.1
operating system as a Remote Enablement Agent. Wait for
approximately 5 minutes for the sfcbd process to add the permission
to the new user.
2 What is the minimum permission level a user would need to install Server
Administrator?
You need to have a minimum permission level of Administrator to install
Server Administrator. Power Users and Users do not have permissions to
install Server Administrator.
6 Are there other ports users can use apart from 1311?
Yes, you can set your preferred https port. Navigate to Preferences
General SettingsWeb ServerHTTPS Port
Instead of Use default, click on the Use radio button to set your preferred
port.
NOTE: Changing the port number to an invalid or in-use port number might
prevent other applications or browsers from accessing Server Administrator
on the managed system. See the Dell OpenManage Installation and Security
User's Guide for the list of default ports.
Index
A BMC, manage, 81
about browser setting, Windows, 48-49
server, 9
action window, of home page, 53
C
administer, Server
Administrator, 17 certificate management
X.509, 61
alert, 70-78, 80-81, 84-85
chassis, 71
alert actions, Red Hat Enterprise
Linux, 112 chassis, intrusion, 76
alert messages, BMC, 108 command line interface
(CLI), 64
assign, user privileges, 20
components of home page
authentication
action window, 53
for Red Hat Enterprise Linux, 19
data area, 54-55
for Windows, 19
navigation bar, 53
Server Administrator, 18-19
system tree, 53
single sign-on, 46-47
configuring SNMP Agent, 25
for Red Hat Enterprise
Linux, 30-33
B
for Windows, 26-29
Bind IP address, 88
configuring, BMC users, 97
BIOS, manage, 74
configuring, firewalls
BMC, 81, 89 for Red Hat Enterprise Linux, 40
about, 89
configuring, SNMP Agent, 25-33
alert messages, 108
configuring users, 97 connectors, manage, 84
filter alerts, 98 creating users
viewing basic details, 91 Red Hat Enterprise Linux, 21
working with, 89
Index 121
book.book Page 122 Tuesday, July 6, 2010 12:01 PM
F I
fans, manage, 75 installing, server, 9
firewalls, configuring for Red instrumentation
Hat Enterprise Linux, 40 server, 10
firmware, manage, 76 instrumentation service, 65
intrusion, manage, 76
G
gauge indicator, home page, 55 L
Local Login, 45
122 Index
book.book Page 123 Tuesday, July 6, 2010 12:01 PM
Index 123
book.book Page 124 Tuesday, July 6, 2010 12:01 PM
S Server Administrator,
starting, 62
secure port, 58 on Red Hat Enterprise Linux, 63
security, 17, 46-47, 58 on Windows, 62
access control, 17 Server Administrator,
Server Administrator, 17 stopping, 63
user privileges, 17 on Red Hat Enterprise Linux, 63
security, management, 17 on Windows, 63
server Server Administrator, using, 43
home page, 14 server features, integrated
install, 9 home page, 14
instrumentation, 10 installation, 9
logs, 11 instrumentation, 10
Server Administrator, 9 logs, 11
about, 9 server port, 58
adding users, 21
server preferences, 58
authentication, 18-19
controlling, 62 server storage management, 10
disabling users, Windows, 25 service, instrumentation, 65
encryption, 20
session, Server Administrator, 43
logs, 101, 105
restarting, 63 setting, BMC filter alerts, 98
124 Index
book.book Page 125 Tuesday, July 6, 2010 12:01 PM
Index 125
book.book Page 126 Tuesday, July 6, 2010 12:01 PM
V
viewing, BMC basic details, 91
voltage, manage, 85
W
Web server shutdown, 69
126 Index