TPM User Guide
TPM User Guide
Version 7.2
Provisioning Manager
Version 7.2
Note Before using this information and the product it supports, read the information in Notices on page 1255.
Last updated: July 2011 This edition applies to Tivoli Provisioning Manager 7.2.0.2 and to all subsequent releases and modifications until otherwise indicated in new editions. The material in this document is an excerpt from the Tivoli Provisioning Manager 7.2.0.2 information center and is provided for convenience. This document should be used in conjunction with the information center. Copyright IBM Corporation 2003, 2011. US Government Users Restricted Rights Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.
Contents
Chapter 1. Overview . . . . . . . . . 1
What's new in this version. . . . . . . . . . 1 Information center updates . . . . . . . . . 9 Getting started basics . . . . . . . . . . . 10 Tivoli Provisioning Manager overview . . . . . 13 Component architecture . . . . . . . . . 14 Deployment infrastructure . . . . . . . . 17 Managing your system life cycle . . . . . . 20 First steps . . . . . . . . . . . . . . . 26 Tutorial: Learning the user interface . . . . . . 27 Logging on to the provisioning server . . . . 28 Start Center . . . . . . . . . . . . . 29 Opening an application . . . . . . . . . 30 Searching and table filtering . . . . . . . . 30 Help while you work . . . . . . . . . . 32 Configuring system settings . . . . . . . . . 32 Changing the automatic logoff setting . . . . 32 Configuring the List view to be empty by default 34 Moving Tivoli Provisioning Manager to the top of the information center . . . . . . . . . 34 Notifications overview. . . . . . . . . . 34 System variable and locale attributes . . . . . 36 Everyday tasks . . . . . . . . . . . . . 37 Finding the object ID of a data model object . . 37 Setting up email notification for automation packages . . . . . . . . . . . . . . 38 Provisioning groups . . . . . . . . . . 38 Provisioning computers . . . . . . . . . 45 Frequently asked questions (FAQs) . . . . . . 55 Installation directories and other paths . . . . . 56 Troubleshooting . . . . . . . . . . . . . 59 Troubleshooting aids . . . . . . . . . . 59 Logging on or logging off problems . . . . . 60 Other problems . . . . . . . . . . . . 65 Enabling the Applications tab in the Security Group application . . . . . . . . . . . 93 Configuring failed login limits on the LDAP server . . . . . . . . . . . . . . . 94 Preventing cross-site scripting . . . . . . . 95 Configuring the Web browser to use a certificate 95 Changing passwords . . . . . . . . . . 96 Configuring form base authentication . . . . 99 Importing a certificate for the provisioning Web interface . . . . . . . . . . . . . . 100 Managing users and security groups . . . . 102 Configuring SSL communication for Tivoli Provisioning Manager and DB2 9.5 . . . . . 103 Auditing changes . . . . . . . . . . . . 111 LDAP user and group management . . . . . . 113 Lightweight Directory Access Protocol . . . . 113 LDAP synchronization . . . . . . . . . 114 LDAP configuration information for Web service 114 Attribute mapping from LDAP to IBM Tivoli Provisioning Manager . . . . . . . . . 118 Troubleshooting security. . . . . . . . . . 119 Access control problems and limitations . . . 120 Reference. . . . . . . . . . . . . . . 132 Role based security groups . . . . . . . . 132 Conditional user interface . . . . . . . . 144 Single Sign-on (SSO) . . . . . . . . . . 144
145
. . . . . . . . . . . . . . . . . 146 150 152 153 153 153 154 162 195 195 195 198 199 200 200 201 202
. . 75
75 78 78 79 79 79 80 80 85 89 89 89 91
Controlling user access basics . . . . . . . . Security process . . . . . . . . . . . . . Components . . . . . . . . . . . . . . Integration with IBM Service Management . . . . Requirements . . . . . . . . . . . . . . User roles and requirements . . . . . . . . Managing user access . . . . . . . . . . . Tutorial: manage security and access permissions using LDAP . . . . . . . . . . . . . Tutorial: manage security and access permissions using Maximo authentication . . . . . . . Everyday tasks for security . . . . . . . . . Update Tivoli Provisioning Manager certificate in the Java truststore . . . . . . . . . . . Creating a duplicate maxadmin user for Tivoli Provisioning Manager . . . . . . . . . . Configuring Tivoli Provisioning Manager for PKCS12 for Microsoft Active Directory . . . .
iii
Verifying discovered Microsoft Active Directory resources . . . . . . . . . . . . . . Discovery consolidation rules using different discovery configurations. . . . . . . . . Discovery consolidation rules for different software installations . . . . . . . . . . Tutorial: Discovering your environment . . . . Part 1: Discovering your resources . . . . . Part 2: Managing discovered resources . . . . Tutorial: Replicating business applications from TADDM . . . . . . . . . . . . . . . Part 1: Defining business applications on TADDM server to be replicated into Tivoli Provisioning Manager . . . . . . . . . Part 2: Discovering business applications on Tivoli Provisioning Manager server . . . . . Part 3: Viewing discovered business applications Troubleshooting discovery . . . . . . . . . Log files for troubleshooting discovery . . . . Discovery problems and limitations . . . . .
Tivoli Provisioning Manager for OS Deployment boot server configuration . . . . . . . . OS deployment server replication . . . . . Modifying OS configuration parameters . . . Hardware compatibility list. . . . . . . . Installing and uninstalling the web interface extension . . . . . . . . . . . . . .
387
387 391 392 392 392 392 396
Virtual image management basics . . . . . . Tivoli Provisioning Manager for Images overview Managing different hypervisors . . . . . . Managing different virtual images . . . . . Backing up and restoring images . . . . . . Components for managing virtual images . . . . Obtaining Tivoli Provisioning Manager for Images Upgrading Tivoli Provisioning Manager for OS Deployment to Tivoli Provisioning Manager for Images . . . . . . . . . . . . . . . Image deployment process . . . . . . . . . Managed image types . . . . . . . . . . Network boot . . . . . . . . . . . . . Booting targets without using PXE . . . . . Requirements . . . . . . . . . . . . . User roles and requirements . . . . . . . Web interface prerequisites . . . . . . . . Hypervisor requirements . . . . . . . . Server system requirements . . . . . . . Target system requirements. . . . . . . . Setting up additional child OS deployment servers . . . . . . . . . . . . . . Windows Preinstallation Environment (WinPE) Prerequisites for VMware targets . . . . . . DHCP server requirements and configuration Installing the web interface extension . . . . . Installing and uninstalling the web interface extension . . . . . . . . . . . . . . Virtual image tasks . . . . . . . . . . . Synchronizing images . . . . . . . . . Capturing virtual images . . . . . . . . Deploying virtual images . . . . . . . . Replicating virtual images . . . . . . . . Exporting virtual images . . . . . . . . Importing virtual images . . . . . . . . Tutorial: Managing virtual images . . . . . . Part 1: Setting up for virtual image management Part 2: Creating and managing virtual images Part 3: Creating software modules . . . . . Part 4: Binding rules . . . . . . . . . . Part 5: Installing a virtual image . . . . . . Reference. . . . . . . . . . . . . . . Upgrading Tivoli Provisioning Manager for Images to a later version . . . . . . . . Tivoli Provisioning Manager for OS Deployment boot server configuration . . . . . . . . OS deployment server replication . . . . . Modifying OS configuration parameters . . . Hardware compatibility list. . . . . . . .
397 398 399 399 401 406 406 407 407 410 411 414 417 423 423 428 429 430 430 431 432 433 434 436 437 439 443 447 459 461 462 462 464 468 470 490
iv
Installing WebSphere Application Server with settings from a discovered installation . . . Performing maintenance operations on target computers . . . . . . . . . . . . Simple software product distribution . . . . Software product distribution requirements . Defining software products for distribution . Installing simple software products . . . . Troubleshooting simple software product distribution . . . . . . . . . . . . Uninstalling software . . . . . . . . . . Uninstalling software products . . . . . Uninstalling patches . . . . . . . . . Uninstalling software stacks . . . . . . Installing Tivoli Common Agent Services . . . Tivoli Common Agent . . . . . . . . Tivoli Common Agent Services ports . . . Tivoli Common Agent Stack configuration template parameters . . . . . . . . . Installing the common agent . . . . . . Configuring the common agent . . . . . Configuring dynamic content delivery . . . Configuring the device manager service . . Upgrading the common agents . . . . . Uninstalling the common agent . . . . . Agent registration . . . . . . . . . . Agent manager . . . . . . . . . . . Administering installed software . . . . . . Software concepts . . . . . . . . . . Rollback . . . . . . . . . . . . . Viewing software resources. . . . . . . Adding a top level software resource for a software installation . . . . . . . . . Adding child software resources . . . . . Updating the data model with changes to software resources . . . . . . . . . . Upgrading software resources . . . . . . Cluster domains overview . . . . . . . Configuring Wake on LAN (WOL) . . . . Configuring firewall components . . . . . Packaging software for distribution . . . . Troubleshooting software distribution . . . . Deploying software troubleshooting checklist Recovering from software provisioning problems . . . . . . . . . . . . . Log files . . . . . . . . . . . . . Software deployment problems and limitations Reference. . . . . . . . . . . . . . Configuring RSA credentials and service access points . . . . . . . . . . . . . . Bulk data distribution and storage . . . . Job distribution and management . . . .
. 612 . . . . . . . . . . . . . . . . . . . . . . . . . . 613 618 620 622 624 625 626 626 627 628 628 630 631 633 634 651 657 662 667 669 675 682 689 691 717 719
. 719 . 720 . . . . . . . 721 722 722 737 739 750 751 756
. 836 . 837
Contents
Compliance checks export and import tools . . Exporting compliance checks for selected computers or groups . . . . . . . . . Exporting compliance checks for all computers and groups . . . . . . . . . . . . Importing compliance checks for selected computers or groups . . . . . . . . . Importing compliance checks for all computers and groups . . . . . . . . . . . . Importing compliance checks to different target computers . . . . . . . . . . . . Tutorial: Managing compliance . . . . . . Part 1: Creating compliance checks . . . . Part 2 Recommendations . . . . . . . Example: Running a Sarbanes-Oxley compliance report . . . . . . . . . . . . . . . Example: Running a SOX report . . . . . . Example: Defining a multiple-rule security compliance check . . . . . . . . . . . Example: Restricting software . . . . . . . Allowed software scenario . . . . . . . Prohibited software scenario . . . . . . Example: User-defined compliance checks . . . Defining a compliance check . . . . . . . Adding user-defined security compliance checks Troubleshooting compliance . . . . . . . Log files . . . . . . . . . . . . . Compliance problems and limitations . . . Reference. . . . . . . . . . . . . . Security compliance reference . . . . . . Running recommendations for DB2 . . . . Running recommendations for Oracle . . . Running recommendations for WebSphere Application Server . . . . . . . . . Running recommendations for IBM HTTP Server . . . . . . . . . . . . . .
. 853 . 853 . . . . . . . . . . . . . 854 855 855 856 856 857 857 858 863 864 869 869 873 874
Using Sun Update Connection Enterprise to manage patches in Solaris environments . . . 984 Registering a group of computers with Sun Update Connection . . . . . . . . . . 985 Managing patches in HP-UX environments . . . 985 Troubleshooting SDI Windows patch management 989 Patch management troubleshooting checklist 992 Log files . . . . . . . . . . . . . . 996 Patch management problems and limitations 997 Reference . . . . . . . . . . . . . . 1004 Publishing software to depot servers . . . . 1004 Unpublishing files from depot servers . . . . 1006 Manually defining patches . . . . . . . 1007 Installing individual patches on UNIX and Linux . . . . . . . . . . . . . . 1009 Installing individual patches on Windows . . 1010 Uninstalling patches . . . . . . . . . . 1011
. 874 . 875
vi
Solaris Zones virtualization process . . Requirements . . . . . . . . . . Part 1: Setting up the environment . . . Part 2: Creating a Solaris Zone . . . . Part 3: Performing Solaris Zone activities . Verifying results . . . . . . . . . . Troubleshooting virtualization management . Log files. . . . . . . . . . . . Virtualization problems and limitations .
. . . . . . . . .
. . . . . . . . .
Adding ACL access rules . . . . . . . Enabling IP or host name addressing for the scalable distribution infrastructure . . . . . IPv6 addressing . . . . . . . . . . . IPv6 support in Tivoli Provisioning Manager Enabling IPv6 in the operating system. . . Enabling IPv6 for the provisioning server . EUI 64 MAC addresses . . . . . . . . Specifying an EUI 64 MAC address . . . Managing storage . . . . . . . . . . SAN optimization . . . . . . . . . Storage devices and templates . . . . . SAN and SAN fabrics . . . . . . . . Fibre channel switches . . . . . . . .
. 1146 . 1146 . 1148 1149 . 1151 . 1152 . 1153 . 1154 . 1154 . 1154 . 1155 . 1156 . 1156
. 1166 . 1167 . 1167 1168 . 1169 1169 . . . . . . . . 1169 1170 1170 1171 1171 1172 1173 1173
Contents
vii
Hardware Management Console error messages appear scrambled in a non-English locale. . . . . . . . . . . . . . web interface does not refresh with new data Provisioning tasks cannot be scheduled and submitted from web interface . . . . . Cannot delete shared provisioning tasks . . Provisioning tasks remain in progress after recovery . . . . . . . . . . . . . SSH error occurs during task . . . . . . Install software task fails for extracted installable file . . . . . . . . . . . Task error after using the clean-updeployment-requests command . . . . .
Cannot open report after generating request pages. . . . . . . . . . . . . . . 1208 Exported ad hoc report PDF file does not open 1209
viii
Chapter 1. Overview
Provisioning applications help you automate your IT processes and optimize resource utilization to address changing business demands and meet service level agreements. Tivoli Provisioning Manager offers smart solutions for software, server, storage, and network automation. The following topics describe basic aspects of provisioning and Tivoli Provisioning Manager and help you get started with different areas of the product:
v Tivoli Provisioning Manager 7.2, Fix Pack 1 Installation Guide v Tivoli Provisioning Manager v7.2, Quick Installation Guide for Windows v Version 7.2 Installation guide v Tivoli Provisioning Manager V7.1.1 to V7.2 Upgrade Guide
Description New automation capability to initiate Tivoli Provisioning Manager provisioning tasks from a Maximo instance using out-of-the-box, customizable process workflows. The integration with Tivoli Provisioning Manager is ensured through the web services. New capability of saving images of LPARS with multiple disks is now available. New capability to create LPARs with virtual Fibre Channel adapters. Added support for multiple virtual disks for VMWare and native p (including pBlades) during and after deployment. This also includes support for save and restore. Added support for resizing of disks after deployment on VMWare, native p (including pBlades), and KVM. For virtualization currency, added support for WCA 2.0.0.3 and WCA 3.0 and VMControl 2.3.1.2 and Systems Director 6.2.1.2. Managing virtualization with LPARs Important: Virtual machines managed by Integrated Virtualization Manager that you created before Tivoli Provisioning Manager Fix Pack 2 do not have disk data objects. You must run the Integrated Virtualization Manager Discovery in Tivoli Provisioning Manager Fix Pack 2 before saving a computer. If you do not run the discovery before saving a computer, you will not be able to restore the saved images. Email notification is now supported for virtual Fibre Channel adapters allocation and NPIV resources.
Virtualization
Managing virtualization with LPARs on page 1016 Tutorial: Creating virtual Fibre Channel adapters on page 1078 Chapter 10, Configuring virtual servers, on page 1013
Setting up email notification for virtual Fibre Channel adapter allocation on page 1084
Network
Added support for the creation of subnet objects with the same IP address. New capability to create IPv6 64-bit MAC addresses. EUI 64 MAC addresses on page 1153 Acquiring patches over the scalable distribution infrastructure on page 891 Managing patches in Windows environments using the deployment engine on page 911
Patch management
Added information about patch acquisition options and using a WSUS server on Windows platforms using the scalable distribution infrastructure. Added instructions about patch acquisition on Windows platforms using the deployment engine.
Feature Automation
Description Added target automation support for: v AIX 7.1 v Microsoft Windows Server 2008 R2 SP1 v Microsoft Windows HPC (High Performance Computing) 2008 R2 v Microsoft Windows 7 SP1 v Red Hat Enterprise Linux 6 v Red Hat Enterprise Linux 5.6 v SUSE Linux Enterprise Server 10 SP4 v VMware vSphere 4.0 and 4.1, vCenter 4.0 and 4.1, Virtual Infrastructure 3 Updated the corresponding Tivoli Provisioning Manager automation packages for the additional target OS support. Improvements to the VMWare automation package include, for example: v Enhanced performance for discovery of virtual machines v Discovery limited to templates and or clusters only v Newly added support for raw disks The following automation packages are available on the IBM Integrated Service Management Library: v Oracle 11g v Build Forge v DB2 v VMware_Virtual_Infrastructure Updated the Automation Package Developer Environment installation and configuration procedures. Added Automation Package Developer Environment support with Eclipse 3.6 for both 32-bit and 64-bit.
v Installing and configuring APDE v Installing Automation Package Developer Environment automatically using a shell script v Installing and configuring Automation Package Developer Environment manually Installing the common agent and subagents using a stand-alone installation on page 641 Changing the default polling interval on page 542 Tivoli Provisioning Manager communication ports Changing the automatic logoff setting on page 32 Collecting data with IBM Support Assistant
Updated Tivoli Common Agent stand-alone installation procedure. Added instructions for changing the default polling interval.
Miscellaneous
A list of Tivoli Provisioning Manager port requirements is now available. Added procedure for changing the automatic logoff setting. Updated the IBM Support Assistant for Tivoli Provisioning Manager to collect logs from target computers.
Troubleshooting
Added aids for diagnosing and resolving problems in various areas: v installation v discovery v software distribution v compliance v patch management v Automation Package Developer Environment
v Troubleshooting installation v Troubleshooting discovery on page 239 v Troubleshooting software distribution on page 751 v Troubleshooting compliance on page 858 v Troubleshooting SDI Windows patch management on page 989 v Troubleshooting Automation Package Developer Environment
Chapter 1. Overview
Feature
Description
Resources
Information center Revamped Basics pages for easy access to information. v Controlling user access basics on page 75 enhancements v Discovery basics on page 146 v Operating system management basics on page 261 v Virtual image management basics on page 387 v Image library basics on page 498 v Software deployment basics on page 529 v Compliance basics on page 828 v Patch management basics on page 877 v Virtualization basics on page 1013 v High availability disaster recovery basics on page 1109 v Developer basics
Feature Automation
Description Updated the following automation packages: v Jumpstart v Kickstart The following automation packages are now available on the IBM Integrated Service Management Library: v Build Forge v DB2 Updated the Automation Package Developer Environment installation and configuration procedures.
Added Tivoli Provisioning Manager WSDL-compliant URLs. Added a troubleshooting aid for diagnosing and resolving discovery errors.
Using Tivoli Provisioning Manager URLs to get the WSDL v Troubleshooting discovery v Troubleshooting software distribution v Troubleshooting compliance Patch management troubleshooting checklist on page 992 Getting started basics on page 10
Added a troubleshooting checklist for diagnosing patch management issues. Added a summary of troubleshooting aids on the Getting started basics page. See the Troubleshooting tab. Information center Added a new section for demo videos. enhancements Added a new section for provisioning publications. Enhanced searching: From the Search tab on the information center Welcome page, you can launch your search focusing in specific areas: v IBM Support Portal v Tivoli Provisioning Manager wiki v Integrated Services Management Library v IBM website v Enhanced searching: Added links to message documentation to search for message IDs in the IBM Support Portal or using Google.
Messages
Chapter 1. Overview
v Example: Running a Sarbanes-Oxley compliance report on page 853 v Implementing recommendations on page 852 v Editing software configuration remediation parameters on page 849
v TADDM server versions 7.1.2.6 and 7.2 are supported. v Discovering computers using the RSA credentials on page 157 v Software requirements on page 153
Description v Enhanced software change management and software deployment process due to integration with IBM Service Management. v The maximum size of a software package block of 4 GB has been eliminated. v Software package block files (.SPB files) can now be imported using the web interface, and not only from the Software Package Editor. v You can set a timeout value for installing software package blocks in a DE infrastructure.
Resources
v Importing software package blocks from the Web interface on page 703 v Setting a time out value for installing software package blocks in a DE infrastructure on page 580
Operating system Optional integration with IBM Tivoli Provisioning v Virtual image management basics Manager for Images, which provides a superset of Tivoli and image v Tivoli Provisioning Manager for Images Provisioning Manager for OS Deployment functions. management overview on page 391 Designed to replace Tivoli Provisioning Manager for OS Deployment, Tivoli Provisioning Manager for Images provides all the Tivoli Provisioning Manager for OS Deployment functions plus a set of important virtualization features. The additional virtualization functions enable you to capture virtual images from virtual or physical machines and discover virtual machines and images from various hypervisors. Tivoli Provisioning Manager for Images provides: v Easy management and maintenance of virtual images and physical server images, including content customization and ability to modify images offline. v Tutorial: Managing virtual images on page 437
v More efficient management of image distribution, discovery, capture, replication, storage, and deployment. v Hardware-independent snapshots of server images, to improve agility, flexibility, and recovery of servers. v Server consolidation through image conversions, and quick deployment to various environments. v Management of multiple hypervisor environments by converting images to various formats. v Simplified storage of thousands of images. Patch management v Tivoli Provisioning Manager provides patch management capabilities for SUSE Linux Enterprise Server 11. v Support for patch management on Solaris zones. v New option provides patch acquisition capabilities for Microsoft Windows security bulletins. v Ability to uninstall patches on Windows target computers. v Support extended to Windows Server 2008 R2, and Windows 7. Reporting v Ad hoc Tivoli Provisioning Manager reports enabled by default for several Tivoli Provisioning Manager applications. v New report object structures available for ad hoc reports. v New predefined reports available. v Creating ad hoc reports on page 1196 v Report object structures and report view objects on page 1198 v Predefined reports on page 1190 v Tutorial: Managing patches in SUSE Linux Enterprise Server 11 environments on page 955 v Acquiring patches on page 904 v Cross platform feature support on page 884
Chapter 1. Overview
Description v New option to stop active distributions. v Support for SUSE Linux Enterprise Server 11, Windows Server 2008 R2, and Windows 7. v You can run a prerequisite check on agents using either a script or a workflow.
Resources v Canceling software distributions on page 605 v Checking prerequisites globally on page 637 v Checking prerequisites locally on page 637
Security
v New option to use Maximo authentication. v Data model object finder shows only objects that users are authorized to see.
v Tutorial: manage security and access permissions using Maximo authentication on page 85 v Lesson 5: Enabling instance level security for data model object finder on page 84 v Quick server provisioning on page 52
v A new streamlined application called Server Provisioning that simplifies creating a physical computer or virtual server. v Enhanced retrievability of troubleshooting information by providing it together with the feature that the information belongs to. v Improved error messages consistency and recovery steps. v Detailed and consolidated logs information for easy troubleshooting.
Target computers
v New sudo support for agent installation. v You can use defined temporary directories on the target computers to best manage disk storage on managed resources.
v Installing the common agent on page 570 v Overriding the temporary directory during SPB installation on page 607
v Enhanced task tracking capabilities by providing a progress indicator to monitor tasks that are in progress. v A new user interface skin is available. This skin increases spacing in the user interface views and provides icons that are larger.
Virtualization
v System p Live Partition Mobility support. v Embedded virtualization structures. Consolidated view of the host platform server and associated virtual servers. v KVM hypervisor support. KVM is an open source hypervisor from Red Hat. v VMware vSphere4 integration. Support includes using clusters, the toleration of vNetwork Distributed Switch (vDS) and the ability to use multiple VirtualCenters. v OVF deployment with KVM support. Discover images that have OVF metadata.
v Live Partition Mobility for System p server on page 1056 v Managing virtualization with KVM on page 1030 v Tutorial: Managing virtual servers and host platform servers using VMware on page 1058
Image Library
A new application for cataloging all of the images in the v Chapter 6, Managing images in the image provisioning server. Three new applications are included library, on page 497 in the Image Library: v Configuring an image repository on page 502 1. Image repositories: Represents the managed systems v Master images on page 504 where images are physically located. v Saved Images on page 517 2. Master images: Templates containing hardware and software resources that are used to fully provision new computers. Capture master images and deploy the images onto existing computers and virtual servers, or deploy them to create new computers or virtual servers. 3. Saved images: For virtual servers only, saved images are backups of various states of virtual servers. Use saved images to restore a virtual server, even if the original virtual server has been deleted from the provisioning database.
Feature Workflows
Description v When running commands from provisioning workflows, sudo can be automatically used for the commands that require another user's permission. v Enhanced structure of automation packages documentation for new automation packages. v Increased organization and retrievability of automation packages documentation.
Resources v Running workflow commands using sudo v v Automation packages v Customizing provisioning workflows
IF00001
Table 1. Information center updates
Feature Installation Updates Added new disk space requirements for Tivoli logging directory. Added new documentation for reinstalling the agent manager with bundled JVM on Solaris. Added new documentation to sync Maximo business objects after installing Tivoli Provisioning Manager V7.2, Fix Pack 2. Upgrade Updated the support matrix for upgrading WebSphere Application Server. Added new documentation to bypass the device manager federator upgrade before upgrading Tivoli Provisioning Manager to version 7.2 Runbook automation Added new automation capability to initiate Tivoli Provisioning Manager provisioning tasks from a Maximo instance using out-of-the-box, customizable process workflows. The integration with Tivoli Provisioning Manager is ensured through the web services. Upgrading WebSphere Application Server to Fix Pack 6.1.0.35 Bypass device manager federator upgrade Updated sections Verify the disk space requirements Reinstall the agent manager with bundled JVM Sync Maximo business objects APAR IV02712
Security
Updated documentation to configure DMS for Configuring DMS for SSL DB2 connection a secure socket layer DB2 connection. Update Tivoli Provisioning Manager certificate in the Java truststore on page 89 Updated documentation to update the Java truststore when a new certificate is generated by the WebSphere Application Server.
Chapter 1. Overview
10
v Resources on page 13
Benefits
v Use discovery to identify new assets and changes to assets. v Save time and reduce costs by quickly deploying applications. Leverage image library and image mobility support. v Improve utilization of server resources by dynamically moving workloads v Use included automation packages for provisioning numerous types of resources, or build your own automation v Support for large virtualized environments by scaling automation for enterprise needs v Manage compliance with automated remediation of noncompliance issues
Key terms
automation package A collection of commands, shell scripts, provisioning workflows, logical management operations, and Java plug-ins that applies to the operation of a specific type of software component or a physical device. provisioning The process of configuring servers, software, networks, and storage resources. provisioning workflow A program that is used to manage an environment. The program consists of a sequential series of steps that are performed to accomplish a particular provisioning task. scalable distribution infrastructure A solution that ensures fast and reliable software distribution to large numbers of target computers in a variety of topologies. It enables central management of software distribution, and relies on core services such as Tivoli Common Agent services, the dynamic content delivery, and device manager service to perform the actual software distribution and federated job management operations. Start Center A Start Center contains links to actions, applications, data, records, and reports that are relevant to your role. A Start Center organizes everything you need to get started, and provides it in one convenient location.
Chapter 1. Overview
11
Troubleshooting
If you encounter a problem with the product, refer to the following resources: Installation problems Refer to the troubleshooting section of the installation guides. v Troubleshooting the fix pack installation v Troubleshooting installation Troubleshooting aids Check the troubleshooting section related to the area you are working with first. Some sections of the documentation have a troubleshooting aid to guide you through the process of diagnosing problems for a particular product area. They provide information about how a task is processed and where to look for problem determination information when an error occurs during a step in the process. v Troubleshooting security on page 119 v Troubleshooting discovery on page 239 v Troubleshooting operating systems management v Troubleshooting virtual images management v Troubleshooting image library management on page 522 v Troubleshooting software distribution on page 751 v Troubleshooting compliance on page 858 v Troubleshooting SDI Windows patch management on page 989 v Patch management troubleshooting checklist on page 992 v Troubleshooting virtualization management on page 1095 v Troubleshooting task management on page 1180 v Troubleshooting and Reporting problems on page 1205 v Troubleshooting Automation Package Developer Environment v Automation Package Developer Environment troubleshooting checklist v Troubleshooting provisioning workflows v Activity Plan Editor troubleshooting v Software Package Editor troubleshooting If a troubleshooting aid is not available in the area you are working with, check Troubleshooting section. For example, if you are working with reports, refer to Troubleshooting section under Managing reports. Messages If you received an error message with an ID such as COPCOM004E, search this information center for the message ID or browse through the full list in the Messages section. Search other IBM resources Search the Search the IBM Support Portal for technotes and other documentation about the problem. You can perform a quick search of the IBM Support Portal and other resources on the Search tab of the information center Welcome page. Gather diagnostic data for the product The Support Information section of the information center provides additional troubleshooting resources and tools to help you collect data for problem determination.
12
Resources
Use the following resources to get started with the product: v Tutorials and demos v Tivoli Provisioning Manager overview v First steps on page 26 v For a description of a field in the Tivoli Provisioning Manager console, press Alt+F1.
13
package as an installable file. You can then create software definitions that describe different configuration requirements and configuration options for installing the same software package.
Component architecture
Tivoli Provisioning Manager consists of a provisioning server, a Web-based operator and administrator console, and an Automation Package Developer Environment.Tivoli Provisioning Manager consists of an Automation Package Developer Environment. The following diagram illustrates the main product components, and how they interact with your managed IT infrastructure and other applications in your environment.
Operator and administrator console External management applications
Provisioning server
Automation
Devices - Computers and virtual servers - Network devices - Storage
Reporting
Patch management
Data model
Provisioning database
Software provisioning Tivoli Provisioning Manager for OS Deployment/ Tivoli Provisioning Manager for Images Discovery
Image management
Deployment infrastructures
Deployment engine
Managed IT infrastructure
Automation Package Development Environment
Target (TCA)
Target (TCA)
Target (TCA)
Legend
TCA = Tivoli Common Agent
Target (TCA)
14
Product components
Provisioning server The provisioning server is the server on which Tivoli Provisioning Manager is installed. The provisioning server contains the following components:
Table 2. Provisioning server components Component Provisioning database Data model Description The provisioning database is the physical database for Tivoli Provisioning Manager. The provisioning database holds the data model. The data model is a representation of all the physical and logical assets that are managed by the provisioning applications, such as computers, switches, load balancers, application software, virtual LANs, and security policies. It tracks hardware and associated allocations to applications, and changes to configuration. When a provisioning workflow successfully completes a requested change, the data model is updated to reflect the current infrastructure. The data model also stores information about allocated and deallocated computers in resource pools for tier management. This information can include computer identifiers, resource pool size, the number of available and idle computers, computer priority, and similar information. Discovery and configuration management also use the data model to identify configuration changes that are made outside of the provisioning applications. You can review changes and use the change information to restore an asset to a previously known state. Automation An automation package is a collection of provisioning workflows, scripts, and other commands and tools that apply to the operation of a specific type of software component or a physical device. The deployment engine manages the deployment of provisioning workflows and associated components in an automation package. You can use automation packages to automate the provisioning of software, patches, images, and operating systems, as well as devices, including computers, network devices, and storage. Compliance and remediation Compliance management allows you to examine the software and security setup that you have on a target computer (or a group of computers) in your managed infrastructure and then compare that setup with the setup that you want in order to determine if they match. If they do not match, noncompliance occurs, and recommendations (remediation) on how to fix the noncompliance issues are generated. Reports allow you to retrieve current information about enterprise inventory, activity, and system compliance. The reporting functions include: v Predefined reports. v A Web-based query builder, which you can use to customize existing reports or create new reports. v Access to information in the data model using views. v Sharing of report definitions using import and export capabilities in the web interface. v Charts and graphs. v The ability to schedule reports to run at a later time or at repeating intervals. v E-mail report distribution and notification. v Integration with vendor reporting software.
Reporting
Chapter 1. Overview
15
Table 2. Provisioning server components (continued) Component Discovery Description Discovery provides automated processes that help you find resources, as well as changes to existing resources, within your enterprise or managed IT infrastructure. You can use the following discovery technologies: v Microsoft Active Directory discovery: Discovers computers by organizational unit, Microsoft Active Directory groups, and computer attributes defined in Microsoft Active Directory. v Tivoli Provisioning Manager network discovery: Discovers computers, their host name and networking information, new resources and changes to existing managed resources. v Tivoli Provisioning Manager Inventory discovery: Discovers configuration changes and hardware and software on devices. v TADDM discovery: Imports the information of IT resources and their relationships from Tivoli Application Dependency Discovery Manager (TADDM) into the data model. Deployment infrastructure You can reconfigure and reallocate resources in your managed environment using two different deployment infrastructures: a scalable distribution infrastructure, and a deployment engine infrastructure. For more information about these infrastructures, see Deployment infrastructures. Tivoli Provisioning Manager for OS Deployment is a database-driven, PXE-based deployment solution. You can use Tivoli Provisioning Manager for OS Deployment to perform the following tasks using source servers: v Windows cloning (capturing a golden master image) and unattended setup v AIX unattended setup v Linux cloning (not supported on Linux PPC), and unattended setup v Solaris unattended setup v VMWare ESX unattended setup New with Tivoli Provisioning Manager version 7.2, you can opt to upgrade your Tivoli Provisioning Manager for OS Deployment to Tivoli Provisioning Manager for Imagesto gain access to an important set of virtualization features that are not available in Tivoli Provisioning Manager for OS Deployment.
Tivoli Provisioning Manager for OS Deployment, Tivoli Provisioning Manager for Images
Web Services interface By using Web Services, including Web Services Resource Framework (WSRF) services, you can access the data model directly without launching the web interface. You can use Web Services to access, manipulate, or change objects directly in the data model. Operator and administrator console By using the Web-based operator and administrator console, you interact with the provisioning server. The operator and administrator console provide a graphical representation of the IT assets, includes wizards to simplify configuration, and other features such as reporting and task status tracking that are not available from the command-line interface. Automation Package Developer Environment Automation Package Developer Environment (APDE) is an Eclipse-based plug-in environment that automation package developers can use to create or customize automation packages. IBM Integrated Service Management Library The IBM Integrated Service Management Library is an IBM managed, shared library of process automation. It is a comprehensive online catalog, which contains over 500 IBM Tivoli and Business Partners Product Extensions including automation packages, integration adapters, agents, and documentation. User directory Tivoli Provisioning Manager integrates with several directory servers, allowing you to manage your user accounts and user authentication with a directory server of your choice.
16
External management applications Tivoli Provisioning Manager includes the capability to integrate with external system management applications, including IBM IT Service Management and other vendor software.
Deployment infrastructure
You can reconfigure and reallocate the resources in your managed environment using two different deployment infrastructures. The following deployment infrastructures are supported: v Scalable distribution infrastructure v Deployment engine infrastructure on page 20
Chapter 1. Overview
17
Agent Manager
...
2 1
- Common Agent
The scalable distribution infrastructure includes the following main components: Provisioning server The provisioning server is the server on which Tivoli Provisioning Manager is installed. The following components of the scalable distribution infrastructure are installed on the provisioning server:
18
Table 3. Scalable distribution infrastructure components on the provisioning server Component The dynamic content delivery management center Description v Provides centralized control of the upload, replication, and download of files. v Monitors the state of depot servers and stores file data and download statistics. v The dynamic content delivery management center implements a distribution policy that sends bulk data to some or all the distributed depot servers in advance of when it is needed. The device manager federator v Is installed on the provisioning server and is configured to act as a federated server. v Implements a job distribution policy that sends incoming jobs to all the regional agents. The agent manager Tivoli Provisioning Manager uses the Tivoli Common Agent Services for software distribution and compliance. Tivoli Common Agent Services provides an infrastructure for managing the computer systems in your environment. v The agent manager is the server component of the Tivoli Common Agent Services. Through its functions, the clients get information about agents and resource managers. v It enables secure connections between managed target computers, maintains the database information about the target computers and the software running on them, and processes queries against that database from resource managers. v It includes a registration service, which handles security certificates, registration, tracking of common agents and resource managers, and status collection and forwarding.
Distribution servers The provisioning server connects to distribution servers, or directly to the target computers. The distribution servers contain the following components:
Table 4. Distribution server components Component The device manager federated agent Description v Agents are installed on distribution servers and are configured to communicate with the federator to get command jobs and to distribute them to the set of clients installed on the target computers. v The agents on the distribution server periodically communicate with the federator and detect when there is network connectivity. The dynamic content delivery v Depots ensure communication between the management server and the clients installed on target computers. v The dynamic content delivery depots communicate with the management server to get data requested by the target computers.
Tivoli Common Agent targets Distribution servers connect to the target computers. The target computers contain the following components:
Table 5. Target computer components Component The device manager subagent The dynamic content delivery subagent Description Clients are installed as device manager subagents on the target computers at the branch and are used for receiving job tasks and returning results to the agents. Subagents are installed on all the managed systems or target computers to download files from depot servers or from other clients.
Chapter 1. Overview
19
Table 5. Target computer components (continued) Component Tivoli Common Agent Description v Tivoli Common Agent is installed on the target computers and acts as a common container for all the subagents. v The deployed agent software collects data from, and performs operations on, managed resources on behalf of a Tivoli management application. It provides shared system resources and secure connectivity.
Discovery
Compliance
Redeploy
You want to create a list of what resources are available in your enterprise, and which operating systems and software are on each resource. The automated process of finding resources within an enterprise is called discovery. The discovered inventory is then recorded in the data model. The data model is a centralized repository on the provisioning server that represents all the physical and logical assets that you manage using provisioning applications.
20
You discover that several resources in your enterprise need a new operating system. Using provisioning applications, you install the correct operating system on each computer. These computers now need software. All the software defined in the data model is recorded in the software catalog. Software packages are stored in file repositories linked to the software catalog. From the software catalog, you install the required software on each computer. After installing operating systems and software, you can ensure that all computers in your enterprise have an antivirus program with up-to-date virus definitions. Using compliance checks, you determine which computers are noncompliant. You can then remediate the noncompliant systems by installing the antivirus application and definition file. A few days later you need to apply a patch to all the computers that have the Windows operating system installed. You retrieve the available patches from the third-party repository and then query the computers in your enterprise to see which computers need the patches. You then approve the patches to be installed and distribute and install the patches. Finally, you determine that some of the older computers in your enterprise can be reused. You need to replace the operating systems with a newer version or the installed software stack with different applications. The entire cycle starts over again.
Chapter 1. Overview
21
Provisioning server
1
Discover hardware
2
List of hardware populates the data model
Enterprise
3
Scan the target computers
4
Populate the data model with hardware attributes, software catalog, and inventory of software
5
Organize inventory into groups
6
Report on inventory
1. Run an inventory discovery task to look for hardware within the IT enterprise. You discover hardware including computers, operating systems, CD-ROM, hard disks, hard disk size, memory, input/output devices such as USB devices, network printers, and processor-related information. 2. An inventory with the discovered hardware is generated. This inventory is recorded in the data model. The data model is a centralized repository on the provisioning server that represents all the physical and logical assets that you manage using provisioning applications. 3. Run another inventory discovery task to look for software on each device for which you require this information. You then scan those specific target computers previously discovered in the enterprise. 4. An inventory of the discovered software, including discovered operating systems, is generated. This inventory is recorded in the data model in the software catalog. 5. You can organize the discovered devices and software by using provisioning groups. In dynamic groups, target computers are assigned using queries against the data model by referencing inventory attributes. Additional groups can be defined by additional data model attribute queries. You can also create static groups where you assign target computers manually. 6. You can now generate reports showing the current information about the managed assets, including reports on available software, currently installed software, and hardware activity. You can also generate reports showing the last discovery scan results by target computer and by discovery scan type. The report data is extracted directly from the data model.
22
Data model
Target
Target
Target
Boot server
Target
First, you discover what devices exist in the enterprise that you want to manage and what operating systems exist on these devices. This information is then recorded in the data model. The data model is a centralized repository on the provisioning server that represents all the physical and logical assets that you manage using provisioning applications. Then, the target and operating system installation requirements are registered with the associated boot manager or boot server. The boot server then installs the appropriate operating system image on the appropriate target computer.
Inventory
Target
Target
Software catalog
Target
File repositories
Distribution technologies
The details of all the discovered software that you already installed in your enterprise, and all the software available to your enterprise, are recorded in the software catalog in the data model. The software itself is stored on servers that you use to store software centrally. These servers are called file repositories.
Chapter 1. Overview
23
To install software, you have the option of distributing the software to the targets to be installed immediately or at a scheduled time. You can choose to distribute and install software on a single target, or on groups of targets, on targets running as application tiers, or on targets in resource pools. You can also distribute and install a single software product or multiple software products.
Managing compliance
The compliance management capabilities help you determine if the installed software and security settings in your enterprise match the setup you want. If systems are noncompliant, you get recommendations to fix noncompliant systems. The following diagram illustrates a typical compliance process:
Discover computers
Verify compliance
Legend Provisioning Administrator Provisioning Configuration Librarian Compliance Analyst Deployment Specialist
1. You discover what software is installed and which applicable security settings exist on each target computer in your enterprise. 2. An inventory of the discovered software and security settings for each target computer is generated. This information is recorded in the data model. The data model is a centralized repository on the provisioning server that represents all the physical and logical assets that you manage using provisioning applications. 3. To determine if the software and security on your enterprise matches your requirements, you create compliance checks. Compliance checks define the compliant state of your target computer or group of target computers and are used to detect, report, and remediate any noncompliance. The inventory in the data model is then compared with the compliant state defined in the compliance check. 4. If the compliant state does not match the actual state of the target computer, noncompliance occurs. A report of the noncompliant issues, which recommends corrective actions, is generated. 5. After reviewing the recommended actions, you select and approve the corrective actions you want to take, and then run these actions. A follow-up scan shall show that your target computers are now compliant.
24
Data model
Target
Target
Target
Target
Approval process
1. The details of all software patches and upgrades that you already have installed in your enterprise, and all patches available to your enterprise, are stored in the provisioning server. You can set up your patch management process so that you automatically receive the updates from third-party patch repositories and add them to the patch catalog. 2. You can discover what level of software, including patches, exists on each target in your enterprise. 3. An inventory of the discovered software and patches is generated and a list of software and patches that are required for each target is recommended. This information is recorded in the data model. The data model is a centralized repository on the provisioning server that represents all the physical and logical assets that you manage using provisioning applications. 4. You review the list of recommended patches and approve the patches that you want to install. 5. You install the approved patches on the corresponding targets. A follow-up scan shows that your targets have the approved patches installed.
Chapter 1. Overview
25
First steps
Learn how to get started with Tivoli Provisioning Manager. Depending on your role and goals, you can start with different areas of the product:
26
Table 7. Provisioning scenarios (continued) Scenario Deploying software Description Learn about: v Scalable distribution infrastructure components v Scalable distribution infrastructure process v Troubleshooting software deployment errors Checking compliance Learn about: v Compliance roles v Compliance process v Troubleshooting compliance errors Deploying patches Learn about: v Patch management basics v Patch management process v Troubleshooting patch management Configuring virtual servers Learn about: v Virtualization roles v Virtualization components v Troubleshooting virtualization errors High availability disaster recovery Learn about: v High availability considerations v Solution constraints and architecture v Disaster recovery Managing provisioning tasks Learn about: v Task management roles v How to create and track a provisioning task v Provisioning tasks in IBM Service Management Task management basics on page 1157 High availability disaster recovery basics on page 1109 Virtualization basics on page 1013 Patch management basics on page 877 Compliance basics on page 828 Basic information Software deployment basics on page 529
Learning objectives
v Logging on and logging off v Using the Start Center
Chapter 1. Overview
27
v Opening an application v Searching and filtering v Getting help while you work
Time required
This tutorial should take approximately 30 minutes to finish. If you explore other concepts related to this tutorial, it could take longer to complete.
v You must know the fully qualified domain name, for example, hostname.domain.com, and port number for the provisioning server. v You must know your user name and password for the provisioning server. v The provisioning server must be running. To sign on to the provisioning server:
Procedure
1. Open the Web browser and enter: https://host_name:port/maximo where hostname is the fully qualified domain name of the provisioning server and port is the provisioning server port number. The default secure port number (using https://) is 9443. 2. In the Log On window, type your User ID and Password and click Log On.
Results
You are now signed on to the provisioning server, which displays the appropriate Start Center.
Procedure
Click Sign Out to sign out of the web interface.
28
Results
You are now signed out of the web interface.
What to do next
You must completely close all tabs and exit the browser after logging off the web interface to completely end the session. If you do not exit the browser after logging off, another user can open a new tab and access the web interface without logging on.
Start Center
A Start Center contains links to actions, applications, data, records, and reports that are relevant to your job. A Start Center organizes everything you need to get started, and provides it in one convenient location. The first time that you log on to the system, you see a Start Center that is based on a template for the security group that you are assigned to. Start Centers are assigned to security groups by a system administrator. If your user name is assigned to more than one security group, you might have more than one Start Center. Start Centers can be customized to suit your needs. Each column in the Start Center can be configured to display one or more portlets, or windows, which display data, links, or reports that are available in a specific application. The portlets that make up a specific Start Center are often chosen to support a particular job function, and can include any of the following:
Table 8. Start Center components Component Quick Insert Description The Quick Insert portlet in your Start Center is used to display actions that you perform frequently. Clicking an action in the portlet takes you directly to the task without having to drill down through other menus. Use Favorite Applications to create a list of the applications that you use most frequently. This list can then be used to start these applications from your Start Center. This specific query portlet displays the results of a saved query. IBM Tivoli Unified Process (ITUP) documents processes are based on industry best practices and is designed to help users to easily understand processes, the relationships between processes, and the roles and tools involved in an efficient process implementation. Displays your workflow inbox, which contains records that have been routed to you and that require an action, for example, review and approval. Displays bulletin board messages. It is used to create, post, and view messages, and to broadcast information to system users. Result sets are a set of records that matches the criteria specified in a query to the database for predefined process request queries.
Note: For more information about Start Centers, see the Product Reference guide.
29
Opening an application
An application is a computer program or software component that provides functions in direct support of specific business processes. There are several ways to open an application directly from the Start Center. 1. You can use any of the following methods to open an application: v Go To menu: To open an application, click the Go To link, then select the module and application. For example, to open the Provisioning Computers application, click Go To > Deployment > Provisioning Computers. The Go To menu is typically available from within applications. v Favorite Applications portlet: Click the application link in the Favorite applications portlet to open an application. v Inbox/Assignments portlet: Click the record ID to open an application and view a record that has been assigned to you for action. v Quick Insert portlet: Click the link in the Quick Insert portlet to open an application and insert a new record. v Result sets are a set of records that matches the criteria specified in a query to the database for predefined process request queries. 2. When the application opens, the List tab displays items that you can work with in the application. To view details about an item, select the item in the list and then click the tab that you want to view. For example, the Provisioning Computers application has a Software tab that displays installed software a computer based on the data in the Tivoli Provisioning Manager database. 3. To return to the Start Center, click Start Center at the top of the page. Note: For more information about opening applications, see the Product Reference guide.
Basic searches
Search using saved queries The Query field in the toolbar contains a menu that includes any queries you have created and saved for an application, and two additional search options: v All Records. v All Bookmarks. If you perform a query from this menu, the system executes it immediately.
30
v Where Clause. Click to view your current structured query language (SQL) WHERE clause or to construct a new WHERE clause to use to search the database. v View Search Tips. Click to view a help topic containing tips for searching the database. Save Query The Save Query button in the search toolbar activates the following options: v Save Current Query. Click to name and save your current query so that you can reuse it at a later time. v View/Manage Queries. Click to view and manage your saved queries for the current application.
31
Procedure
1. Back up the web.xml file. On Windows, the web.xml file is normally located in the MAXIMO_HOME\applications\maximo\maximouiweb\webmodule\WEB-INF directory. On UNIX systems, the default location is the MAXIMO_HOME/maximo/applications/maximo/maximouiweb/webmodule/WEB-INF directory. MAXIMO_HOME is the directory where the base services are installed. On Windows, the default path is c:\IBM\SMP. On UNIX systems, the default path is /opt/IBM/SMP. 2. Open the web.xml file in a text editor. 3. In the <session-config> section, search for the session timeout tag, named <session-timeout>. In the following code example, the automatic timeout is set to timeout after 90 minutes.
32
<session-config> <!-- The session-timeout element defines the default session timeout interval for all sessions created in this web application. The specified timeout must be expressed in a whole number of minutes. --> <session-timeout>90</session-timeout> </session-config>
4. Change the existing value in the <session-timeout> tag to the value you want to specify as the new logoff value. 5. Save and close the web.xml file. 6. Rebuild the Maximo EAR file on the administrative workstation to invoke the changes. To rebuild the Maximo EAR, run one of the following scripts, depending on your platform: a. On Windows systems, run the buildmaximoear script, located in the C:\Maximo\deployment directory on the administrative workstation. b. On UNIX systems, run the buildmaximoear.sh script, located in the /opt/IBM/SMP/maximo/ deployment directory on the administrative workstation. 7. Deploy the Maximo EAR to WebSphere Application Server. You can deploy the Maximo EAR using WebSphere Application Server or you can use the command line. To view command line instructions about how to deploy the Maximo EAR file, see Manually deploying the EAR file. To deploy the Maximo EAR on WebSphere Application Server, complete a process similar to the following example on WebSphere Application Server v6.1.0.29: a. Log on to WebSphere Application Server. b. Click Applications, then Enterprise Applications. c. Uninstall the previous Maximo EAR before you begin redeploying the new one because updating the existing Maximo EAR can cause caching issues. d. Click Install. e. If WebSphere Application Server is on the administrative workstation, navigate to the location of the Maximo EAR by clicking Local File System. If you do not have direct access to the administrative workstation on which the Maximo EAR is located, click Remote File System and navigate to the Maximo EAR location, for example on Windows C:\ibm\SMP\maximo\deployment\ default, and click the file. f. Click OK, then click Next. g. On the Select installation options screen, make sure that the Maximo installation is selected. If there are multiple Maximo installations on your WebSphere Application Server environment, click the specific application name for the installation. Then click Next. h. On the Map modules to servers screen, select the web server and application server in the Clusters and Servers box, select all of the modules, then click Apply. i. Click Next. j. On the Map virtual hosts for Web modules screen, click the options for your installation and change the Virtual host options to the host you have set up for the Maximo application. Click Next. k. On the Summary page, review the summary and click Finish. l. After the Maximo EAR file has installed, click Save to save your changes. The Maximo EAR is now deployed to the server. m. Go to the WAS console and from the navigation tree, click Applications > Enterprise Applications. Then click MAXIMO > Class loading and update detection. For WAR class Loader Policy, the Class loader for each WAR file in application option is selected by default. Click the Single class loader for application option. Click Save to save your changes. n. Restart Tivoli Provisioning Manager. If you have problems logging into Tivoli Provisioning Manager after rebuilding the Maximo EAR, see https://www-304.ibm.com/support/ docview.wss?uid=swg21321974 for information about how to resolve the issue.
Chapter 1. Overview
33
Results
You have configured the automatic timeout to a time length of your choice.
Procedure
1. Click Go To > System Configuration > Platform Configuration > Application Designer. 2. On the Applications tab, find the application that you want to modify. To find provisioning applications, type tp in the Application filter field and then press Enter. Click the application name in the search results A preview of the application is displayed on the Workspace tab. 3. In the application preview, click the name of the application next to the Filter heading. 4. On the toolbar, click Control Properties . 5. In the Table Properties window: a. Select the Start Empty check box. b. Clear the Row Details Expanded check box. 6. Close the Table Properties window. 7. Click Save .
Procedure
1. In the WebSphere Application Server installation directory, find the file preferences.ini in the following locations: Windows
%WAS_HOME%\systemApps\isclite.ear\iehs.war\WEB-INF\lib\eclipse\plugins\org.eclipse.help.base_3.0.0 %WAS_HOME%\systemApps\isclite.ear\iehs.war\WEB-INF\lib\eclipse\plugins\org.eclipse.help.base_3.0.1
UNIX
$WAS_HOME/systemApps/isclite.ear/iehs.war/WEB-INF/lib/eclipse/plugins/org.eclipse.help.base_3.0.0 $WAS_HOME/systemApps/isclite.ear/iehs.war/WEB-INF/lib/eclipse/plugins/org.eclipse.help.base_3.0.1
Notifications overview
Users often need an audible or visible indication that their task or workflow has started, finished, or has encountered an error. Such notifications allow the user to continue working on other tasks, rather than monitoring the progress of a software distribution or installation process. You can configure Tivoli Provisioning Manager to send e-mail notifications to users, updating them on the status of a specific task or workflow. The following mail server settings are required when you configure the notifications feature:
34
v v v v
SMTP Server Name: The address of the mail server that will be used to send notification e-mails. SMTP Server Port: The port number of the mail server. User ID logon SMTP Server: The server user ID that you use to authenticate to the mail server. User Password: The password that you use to authenticate to the mail server.
To configure mail server settings: 1. Click Go To > Administration > Provisioning > Provisioning Global Settings. 2. Click the Notification tab. You also have to configure Maximo to send e-mail notifications: 1. Log on to the administrative user interface https://<hostname>:9443/maximo/ui 2. Click Go To > System Configuration > Platform Configuration > System Properties. Set up the following global properties: a. Ensure that the global property mail.smtp.host is pointing to your SMTP server. b. Click Instance Properties > New Row and create two entries for username and password like the following: v mail.smtp.user = <username> v mxe.hostname = <password> 3. Ensure that you apply the changes after saving. To apply the changes, select the check box next to the property and click Select Action > Live Refresh, and click OK. 4. Restart the Maximo server after the configuration change, because the instance system properties cannot be refreshed in live mode. 5. In the self-service user interface, set the e-mail addresses of the users to receive e-mail notifications in the Primary E-mail field for the users. Notifications are available for the following features: v Reports v Software management activities such as installing, distributing, and publishing v Discovery activities v Compliance v Tasks
Procedure
1. Click Go To > Administration > Provisioning > Provisioning Global Settings. 2. Click the Variables tab, and then click New Row. 3. In the Variable field, type NotificationAPIFailureDetails. In the Component field, click Entire System. Set the Value field to true. 4. Save your configuration.
Chapter 1. Overview
35
Results
This procedure enables detailed task status notification. The message specifies which subtask failed, indicates the targets and deployment request ID.
Example
v Before enabling detailed status notification:
COPAPM018E The execution of activity plan "Install Common Agent 1421" (ID: "1421") has failed.
Locales
A locale is a language and country specific code. By default, Tivoli Provisioning Manager supports the following locales: en_US United States English fr_FR de_DE German it_IT Italian French
es_ES Spanish pt_BR Brazilian Portuguese zh_CN Simplified Chinese zh_TW Traditional Chinese ko_KR Korean ja_JP Japanese
ru_RU Russian
36
System variables
Some enterprise environments might require adjustments to system variables defined in Tivoli Provisioning Manager. Attention: Do not modify system variables unless you have been instructed to do so by IBM Tivoli Software Support or the product documentation. Improper configuration of system variables can cause unpredictable system behavior.
v Load balancers v Power units v Routers v Software products, patches and stacks v Resource pools v Discovery These variables, typically tool.toolname variables, allow the user to run external tools to help manage enterprise devices.
Everyday tasks
This section contains some common everyday tasks
Procedure
1. On the Start Center, locate the Data model object finder. 2. In the Object filter, type the name or part of the name of the data model object and press Enter.
Results
A list of data model objects that match the search criteria are displayed with the corresponding object IDs.
Chapter 1. Overview
37
Tip: When you are running a provisioning workflow in the Provisioning Workflows application, the Data model object finder is also available to search for object IDs.
Procedure
1. Open the META-INF/MANIFEST.MF file for your automation package. 2. Add the following to the Require-Bundle section of the META-INF/MANIFEST.MF file:
eventframework;resolution:=optional
3. Use the TPMEmailHelper Java helper method for the email notification. The method is:
public void sendEmail(String[] addresses, String subject, String content);
For example:
array addresses = {"[email protected]", "[email protected]", "[email protected]"} var subject = "My subject" var message = "My message" Java[com.ibm.tivoli.tpm.event.util.TPMEmailHelper#sendEmail(addresses, subject, message)]
For information about the required mail server settings for email notification, see Notifications overview on page 34.
Example
To view an example of email notification used in an automation packages, see Setting up email notification for virtual Fibre Channel adapter allocation on page 1084.
Provisioning groups
Having a provisioning group is a way of organizing resources and facilitating actions such as software distribution, running script and workflow tasks, and managing compliance. You can create groups based on categories that make sense in your organization. Using a group is a convenient way to do operations such as installing an operating system, distributing, installing, or uninstalling software, and running script and workflow tasks. Resources can belong to more than one group. You can select group members manually or using queries. Groups selected manually are static; members are added or removed manually. Groups defined by queries change dynamically to include members matching the conditions of the query upon which they are based. The following examples show what a group can be based on: v You can create a group for configuration compliance management that has a set of common compliance checks associated with it. You can then add all the resources or resource groups that need to comply with these compliance checks to this group. All of the resources in the added groups will then need to comply with the inherited compliance checks or else they will be noncompliant. v You can create groups based on member type. For example, you can place all resources or power units into a single group or create untyped groups that include multiple resource types. v You can assign queries to a group.
38
Creating groups
Defining groups and their members is a way of organizing managed resources to facilitate software distribution, compliance management, and other options. Administrators can create groups that meet the organizational needs of their responsibilities. You can individually add members to a group or you can add multiple members at the same time. You can also define group members using a query. Groups selected manually are static; devices can be added or removed as required. Groups assigned by queries change dynamically to include resources matching the condition of the query. Creating static groups: Static groups are created manually by selecting the resources that you want to group together, based on a user-defined criteria. You can create a static group in one of the following ways: 1. You can select specific resources. 2. You can select specific groups of resources. 3. You can import resources using a text file. To create a static group: Procedure 1. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Groups. . 2. Click New 3. Type the group name and description. 4. From the Member Type list, select the type of resource that you want to include in the group. Note: You cannot change the type after a group has been created. 5. From the Group Type list, select Static. 6. To assign group members, depending on your needs, perform one of the following choices: v Click Add Members to select one or more resources that you want to add to the group. v Click Add Groups to select one or more groups of resources that you want to add to the group. v Click Add From Text File to browse for the text file that you want to use to add the resources to the group. Note: When this option is used, the specified file is opened and read one line at a time with the assumption that each line contains one resource name. When the text file is saved, the encoding format must be either ANSI or UTF-8. 7. Click Save .
Creating dynamic groups: Before you begin Before creating a dynamic group, ensure you create and save the query that the dynamic group must be based on. Create the query for the dynamic group by navigating to the appropriate application to configure the filter, for example use the Provisioning Computers application to create a query to have all Red Hat Linux target computers in the dynamic group by performing the following steps: 1. Click Go To > Deployment > Provisioning Computers. 2. In the Operating System field, type the filter information. For example, type %Red%Hat%.
Chapter 1. Overview
39
3. Press Enter to verify that the filter retrieves all the Red Hat Linux target computers that are in the database. 4. Click Save Query to store the filter as a query. Type a Query Name and a description to identify the query. 5. Click OK. Groups assigned by queries change dynamically to include devices matching the results of a query. To create a dynamic group: Procedure 1. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Groups. . 2. Click New 3. Type the group name and description. 4. From the Member Type list, select the type of resource that you want to include in the group. Note: You cannot change the type after a group has been created. 5. From the Group Type list, select Dynamic. 6. From the Query list, select the query that you want to use to populate the group. 7. (Optional) From the Select Group list, depending on your needs, you can create empty static groups, which will be populated by the dynamic group data. You can use these static groups mainly for tracking purposes, because they capture a snapshot of a dynamic situation on specific dates or under specific circumstances. 8. Click Save Results Whenever a dynamic group is accessed, the membership is recalculated based upon the criteria defined in the query that was used to create it. .
Removing groups
You can remove groups that you no longer need. Removing a group does not delete the members of the group from the data model. To remove a group, perform the following steps:
Procedure
1. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Groups. 2. Locate and open the group that you want to remove. 3. From the Select Action menu click Delete Provisioning Group. 4. Click Yes for confirmation.
40
Procedure
Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Computers. Locate and select the computer that you want to add to a provisioning group. Click Assign To Provisioning Group. Select the group that you want to add the computer to from the Groups list. You can add the computer to multiple groups. 5. Click OK. 1. 2. 3. 4. 6. Click Save .
Nesting groups
In addition to adding members to groups individually, you can also nest groups by identifying groups as members of other groups (parent groups). The nesting of groups enables the creation of hierarchical relationships that can be used to define inherited group membership. A nested group is defined as a child group that is referenced by the parent group. For example, you might want to add a group of a specific member type to a group that you want to contain all members in the data model. Nested groups inherit the same compliance rules, recommendations, and properties as the parent group, whereas parent groups are not affected by the properties of any subgroups. Note: Only compatible group types can be nested. A group can only be nested if it does not already share any group members with the parent. To nest groups, perform the following steps:
Procedure
1. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Groups. 2. Find the group that you want to change and click its name. 3. Click Add Groups. Only groups that are compatible to the parent group type will be listed. 4. From the list select one or more groups that you want to add to the parent group and click OK. These groups will appear in the Members list. 5. Click Save .
41
3. Click Add Members. 4. From the list select one or more members that you want to add to the group and click OK. These members will appear in the Members list. 5. Click Save .
Viewing group members: Viewing a list of members in a group is useful for reviewing relationships between devices. You can use this list to view the type of each member of the group, the IP address, and operating system for members where applicable. To view the members of a group, perform the following steps: Procedure 1. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Groups. 2. Find the group that you want to view and click its name. 3. From the Members list you can click a member name to view its hardware and software details. Removing members from a group: You can only remove devices from static groups. The membership of a dynamic group will only change based on the results of queries that are run each time the group is viewed, changed, or used. To remove a member from a group, perform the following steps: Procedure 1. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Groups. 2. 3. 4. 5. Find the group that you want to change and click its name. From the Members list identify the member you want to remove. Click Mark Row for Delete . These members are removed from the Members list. Click OK for confirmation. .
6. Click Save
Procedure
1. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Groups. 2. In the Provisioning Groups page, select one or more groups. The system checks that the selected provisioning groups are computer groups. In case untyped groups are selected, the system verifies that at least one computer is contained in the group. 3. Click Run Discovery from the Select Action menu. The service access point of each computer is checked by the system.
42
4. If one or more computers in the groups do not have a service access point (SAP) defined, the Add credentials dialog is displayed by the Web interface. Enter the missing credentials. 5. (Optional) If you want to exclude from the discovery the computers with the missing credentials, select the Ignore computers with no SAP ? check box. 6. Click OK. 7. On the Run Discovery dialog, you can specify the provisioning task name, the scheduling and the event notification options for the provisioning task. 8. Click Submit to perform the discovery.
Results
If some selected computers do not have a service access point (SAP) defined, the missing SAP are created after running the discovery. Also, the hardware and software information is updated on the selected computers after performing the network discovery.
To combine the conditions of two dynamic groups having the same object type, perform the following steps:
Procedure
1. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Groups. . 2. Click New 3. Type the group name and description for the first dynamic group you create. 4. From the Member Type list, select the type of resource that you want to include in the group. 5. From the Group Type list, select Dynamic. 6. From the Query list, select the query that you want to use to populate the first group. 7. Click Save .
8. Click New . 9. Type the group name and description for the second dynamic group you create. 10. From the Member Type list, select the same type of resource that you have specified for the first dynamic group you have created. 11. From the Group Type list, select Dynamic. 12. From the Query list, select the query that you want to use to populate the second group. 13. Click Save .
. 14. Click New 15. Type the group name and description for the static group you create. 16. From the Member Type list, select the same type of resource that you have specified for the dynamic groups you have created. 17. From the Group Type list, select Static. 18. Click Add Groups. Only groups that are compatible to the parent group type will be listed. 19. From the list select the two dynamic groups that you want to add to the parent group and click OK. These groups will appear in the Members list.
Chapter 1. Overview
43
Grouping together the provisioning groups for security purposes: Assuming that a regular user has access to the provisioning groups ServerWithWin and ServerWithLinux for security reasons because he needs to specify the accesses to a set of servers with Windows and Linux platforms. The best approach is to create another group which contains all the provisioning groups for security purposes. To group together the provisioning groups for security purposes, perform the following steps: Procedure 1. Click Go To > Deployment > Provisioning Groups. 2. 3. 4. 5. Click New . Create an untyped static group naming it for example ParentGroupsForSec. Click Add Groups. Add to ParentGroupsForSec the two groups ServerWithWin and ServerWithLinux. .
The two groups have been added to the parent group. Defining the provisioning group security constraints: For securing the access to the groups for security purposes, it is now essential to correctly define a condition to be used for data restriction. In this scenario, it is recommended to grant only user read access to the group ParentGroupsForSec and its member groups ServerWithWin and ServerWithLinux. To define this condition, perform the following steps: Procedure 1. Click Go To > Administration > Conditional Expression Manager. 2. Click New Row. 3. Specify a name for the new condition, for example CondForSecP. 4. From the Type list select EXPRESSION. 5. In the Expression field, enter the following:
(EXISTS (select 1 from group_membership gm, tpgroup g where g.name = ParentGroupsForSec AND g.id=gm.group_id and is_nested_group=Y and gm.dcm_object_id=:id)) OR (:name = ParentGroupsForSec )
44
The new condition has been defined and saved. Creating a data restriction using the new condition: After creating the condition, it is now essential to create a read-only data restriction to the security group. In this way, all users in that security group will have read-only access to the provisioning group ParentGroupsForSec and its member groups (ServerWithWin and ServerWithLinux in this scenario) as enforced by the condition. To create a read-only data restriction, perform the following steps: Procedure 1. Click Go To > Security > Security Groups. 2. Locate and click the security group to which belong the users you want to grant read-only access. 3. 4. 5. 6. Click the Data Restrictions tab. Click New Row. From the Object list select TPGROUP. From the Type list select READONLY.
7. From the Condition list select Select Value. 8. Select the name of the new condition you have created, in this scenario CondForSecP. 9. Click Save Results The read-only data restriction has been created. What to do next After the condition is created and the read-only data restriction is set, you can try to log on as a regular user and access the TPGROUP application. You will see all the provisioning groups but for the ParentGroupsForSec, ServerWithWin, and ServerWithLinux groups, you will only have read-only access. .
Provisioning computers
The data model represents the physical and logical assets under Tivoli Provisioning Manager management, such as switches, load balancers, software, and more. The data model keeps track of IT assets and configuration changes associated with them. It also tracks their allocation to customer applications. This can include not only servers and networking components, but also other computers that can perform substantial computations that are now categorized in Tivoli Provisioning Manager under a broad term called computers. Computers can be managed in application tiers.
Chapter 1. Overview
45
Computer types
The following table shows the types of systems managed by Tivoli Provisioning Manager
Table 9. System types managed by Tivoli Provisioning Manager System type Computers
Systems that are required to run the operating systems of The type of systems that fall into this category are: the application, and the application itself. These systems v Blade Servers : These are systems that are used must belong to or be assigned to resource pools. primarily to reduce space restrictions and redundancy. v Virtual Servers and Host platform Servers: These systems typically share their resources with other systems - an effective method to cut down costs. Systems that are required to either boot up or provide network access to other computers. The type of systems that fall into this category are: v Boot Servers: These systems are defined when you need to provision workstations or other systems without any installed software. Each boot server is associated with one or more image stacks (a software stack that is installed as a single image). v Terminal Servers: These systems provide network access to other workstations or systems with broken network connections or to other systems that have no built-in network support. Using Tivoli Provisioning Manager you cannot only manage the system types, but also other computers that can perform substantial computations, including numerous arithmetic operations and logic operations. In the data model they are defined as Traditional computers. Traditional computers can be used by application tiers or resource pools. The type of computers that fall into this category are: v Notebook computers v Desktop computers or even pervasive devices. v Systems that provide facilities to other stations. Some of the examples are a Web server, Application server, file server, a printer server, or a mail server.
Computer details
Quickly and at a glance, you can see a high-level summary and status of the computer. You can clarify what actions you need to take and perform on the computer such as edit or add an agent, work with groups, and capture images. You can also run an inventory scan on the computer from this page to get the latest discovery results. Tivoli Provisioning Manager can help you quickly review your computer's details in one simple view. This snapshot can help you determine at a quick glance, which distribution framework (deployment engine or scalable distribution infrastructure) is on this computer, and even allowing you to evaluate if any compliance configuration checks need to be setup or if already setup, have known issues. This is an efficient way to view and manage installed software, patches, and operating systems for a computer. The General tab: Use this tab to see the configuration, last known status, and membership of the computer. Specifically, this page is divided into the following areas: Configuation details This section lists the computer management IP, the operating system, the locale, any available description, and the disk capacity. The initial discovery feature will populate the management IP and operating system. All other information (except the location) is discovered by discovery scans. The location can be entered using the computer properties menu. Last Known Status details This section highlights the information about the deployment framework that the computer is using and which agent is installed.
46
The Framework field provides the infrastructure type that is used to manage the computer. Framework types can be either the deployment engine or the scalable distribution infrastructure.
v The Agent field provides the agent type and version information if available. The Tivoli Common Agentis used by the scalable distribution infrastructure v The Compliance field provides a summary of the three levels of compliance checks: security, software, and patch. The status will indicate the number of issues within each different compliance level and a link to the Recommendations tab to remediate. If no compliance checks have been created, the field will indicate that a compliance check configuration is required. v The Authority field provides a list of the access groups who are authorized on this computer. Membership details This section highlights the groups and applications that are associated with the computer. If there are no resource pools or application tiers associated with the computer the fields will display Not associated. If there are associations, the type of association will be listed with a link to the object. If the computer is a virtual server, this area will also show the host platform server. If this computer is a host platform server, this area will show a link to list all the virtual servers. Recent Discovery Scan This area will display when the most recent changes have been made using discovery to the data model. Information will include the discovery method, scan type, and time of discovery. You can access additional information by clicking on another specific tab for the computer or direct links in the computer status view: v The Hardware tab: Use this tab to see the network resources, hardware resources, and storage resources that are identified with the computer. v The Software tab: You can view the software installed on the computer, such as software resources, software installations, instances, configurations. v The Compliance tab: Use this tab to review the software compliance status of a computer and its compliance deviations from the required state. v The Variables tab: Use this tab to view and configure the variables for the computer. v The Workflows tab: Workflows must be assigned to hardware, infrastructure, and software assets so that Tivoli Provisioning Manager can run the appropriate commands for provisioning or deprovisioning them. You can assign workflows to the selected computer from here. v The Discovery tab: Before a device can be monitored for configuration changes, it must first be associated with an existing discovery technology. The discovery technology must then be configured further to associate the correct logical management operation and workflows. You can associate a discovery technology from this tab. v The Credentials tab: The credentials for the identified computer can be viewed on this tab. This tab contains SAPs, if the credentials are associated with SAPs
47
v Firewall: Are the access rules set up? v Router: How many routers are there? v Virtual server: Does it need to be powered on or off? In addition to the quick review of the computer's health, you might need to perform additional actions against it, for example: 1. 2. 3. 4. 5. Installing agents (if not already installed) Installing images Configuring compliance Adding hardware and software resources Managing computers remotely
Procedure
1. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Computers. 2. In the Provisioning Computers page, click Add Computer from the Select Action menu. 3. Enter the information needed to add the computer. 4. Click Save .
Results
Tivoli Provisioning Manager adds the computer to the data model with the specified name and credentials, and can optionally install the Tivoli Common Agent. Depending on how you plan to use the system, you might need to perform additional configuration tasks. For example, you might want to assign specific workflows to the computer, set up monitoring, or install software. Creating a virtual server: This task outlines how to create a virtual server from an existing provisioning computer and add it to the data model. Procedure v Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Computers. v For the rest of the procedure, click here. The procedure is the same as when accessing the function from the Virtualization Management page. Deleting computers: You can delete all types of computers, if they are no longer required. Note: Boot servers, terminal servers and blade servers are not displayed on the Provisioning Computers page. To delete boot servers and terminal servers, go the respective server type and then delete the server.
48
Deleting a single computer: To delete a computer from the Provisioning Computers application, follow these steps: Procedure 1. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Computers. 2. To list all available computers in the data model, click Search . 3. Identify the computer that you want to delete, and then click the Delete Computer button on the same row. Note: A workflow task named DeleteComputersFromDCM is immediately invoked without any scheduling options. After the task is submitted, a popup window is displayed asking you to either leave the Provisioning Computers page and navigate to the Provisioning Task Tracking page, to monitor the task execution status while the computer is deleted, or to remain on the Provisioning Computers page. 4. When prompted, click Yes. Results The computer is now removed from the Tivoli Provisioning Manager database, and if the computer is a virtual server it is also destroyed. Deleting multiple computers: You can delete multiple computers at the same time. Procedure 1. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Computers. 2. Search for the computers that you want to delete. Expand Advanced Search and select More Search Fields. Find the computers by filtering the search. For example, you can find computers and virtual servers by provisioning group, host platform, operating system, and so on. 3. To enable selecting multiple computers, click the Select Records checkbox at the bottom of the list of computers. 4. Select the computers that you want to delete from the data model. 5. Click Select Action > Delete Computers. The computers that you selected for deletion are listed. 6. Click one of the following: v Click Delete Record to delete the computers from the provisioning data model. Note: Only the MAXADMIN and TPDEVELOPER users can see the Delete Record option in this window. Delete Record saves the changes to the provisioning server but does not update the VMware VirtualCenter. This option is typically used for testing purposes. v Click OK to delete the computers. If the computers are virtual computers, they are also destroyed. 7. Schedule the computers to be deleted, or click OK to delete them immediately. Results When the provisioning task completes, the selected computers are deleted from the data model.
49
v Rebooting computers v Initializing computers v Deleting computers on page 51 Turning computers on and off: You can turn computers on and off easily using the Web interface. Note: Device.PowerOn and Device.PowerOff are used for virtual machines and blade servers, for which a number of automation packages are available. A generic implementation of Device.PowerOn and Device.PowerOff for physical stand-alone servers is not available. These logical device operations must not be invoked for real systems. To turn on or off the computer, perform the following steps: Procedure 1. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Computers. 2. Click on the computer that you want to power on or off. 3. From the Select Action menu, click Manage > Power On or Power Off. Results The provisioning workflow that implements the Device.PowerOn or Device.PowerOff logical management operation runs. If the provisioning workflow is run successfully, the selected device is turned on or off. Rebooting computers: A device reboot is typically required when the device has stopped responding and you need to power it off and on again. The Generic Restart is a combination of software and hardware reboot mechanisms, and is performed by initiating the provisioning workflow that implements the Device.Reboot logical device operation where Device is the name of the device on which you want to do a generic reboot. The following steps are taken during a generic reboot: 1. The system verifies whether a reboot_preference data center model property is defined for the device you want to reboot. This data center model property specifies which reboot method to use for that specific device. If none found, an asynchronous software reboot is initiated first. 2. If the asynchronous software reboot fails, a synchronous software reboot is attempted. 3. If the synchronous software reboot is unsuccessful, a hardware reboot is performed. To perform a device generic restart, perform the following steps: Procedure 1. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Computers. 2. Identify and click the device that requires a reboot. 3. From the Select Action menu, click Manage > Generic Restart . 4. Click OK. Initializing computers: Prerequisites: The computers must belong to a resource pool to be initialized.
50
Initializing devices resets the devices to the starting value. This value is the value before the device was configured. To initialize a computer, perform the following steps: Procedure 1. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Computers. 2. Identify and click the computer that is assigned to a resource pool that you want to initialize. 3. From the Select Action menu, click Manage > Initialize. Results The SparePool.InitializeServer logical management operation is run. Deleting computers: To delete a computer, perform the following steps: Procedure 1. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Computers. 2. Identify and click the computer that you want to delete. 3. From the Select Action menu, click Delete Computers. 4. Click OK.
Procedure
1. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Computers. 2. In the Provisioning Computers page, select one or more computers. 3. Click Run Discovery from the Select Action menu. The service access point of each selected computer is checked by the system. 4. If one or more computers in the list do not have a service access point (SAP) defined, the Add credentials dialog is displayed by the Web interface. Enter the missing credentials. 5. (Optional) If you want to exclude from the discovery the computers with the missing credentials, select the Ignore computers with no SAP ? check box. 6. Click OK. 7. On the Run Discovery dialog, you can specify the provisioning task name, the scheduling and the event notification options for the provisioning task. 8. Click Submit to perform the discovery.
Chapter 1. Overview
51
Results
If some selected computers do not have a service access point (SAP) defined, the missing SAP are created after running the discovery. Also, the hardware and software information is updated on the selected computers after performing the network discovery.
52
v You can also select Go To Virtual Server Templates from the detail menu to review the virtual server templates available, or create a virtual server template. 7. (Optional) Select the Software Stack to be installed on the virtual server by choosing Select Value detail menu and clicking on the appropriate software stack. This field is used for from the operating system-related software only if the virtual server template requires an operating system. If the virtual server template is packaged with an operating system, that system is automatically populated in this field. You can also select Go To Software Stacks from the detail menu to review the software stacks available, or create a software stack. 8. In the Resource Requirements section, review or edit resource types included in the virtual server template as required. Click New Resource Requirement to add a new resource type to the virtual server template. 9. In the Variables section, review or edit variables included in the virtual server template as required. Click New Row to add a new variable to the virtual server template. 10. (Optional) Click Select Software to choose the software to be installed on the virtual server. a. In the Select Software dialog, place a checkmark next to the software stack to install on the virtual server. b. Click OK. 11. Click Submit. The virtual server object is defined in the data model and an Activity Plan Instance is created to perform the activities you selected. The virtual server is created based on virtual server template specifications. If both operating system and software stacks were selected, the operating system is installed first, and the software stack(s) is installed only if the operating system is installed successfully. Removing empty virtual servers: Configure the host platform server so that empty virtual servers are removed if they fail to be created without the intended software stack deployment. When you create a virtual server and deploy a software stack on the virtual server in the same task, if the software stack deployment fails, the empty virtual server will still be created. You can configure the host platform server so that the empty virtual server will be deleted automatically. Otherwise, you have to manually find and delete the virtual server from the Virtualization Management application. Follow these steps to configure the host platform server: Procedure 1. 2. 3. 4. Click Go To > IT Infrastructure > Provisioning Inventory > Virtualization Management. Select the host platform server from the list. On the Variables tab, click New Row. In the following fields, specify the following information: v Variable: Type Roll_Back. v Component: Select Entire system. v Value: Type true. 5. Click Save Results Any virtual servers that are created on this host platform server without the intended software stack will be automatically deleted.
Chapter 1. Overview
53
Adding computers to resource pools: A resource pool is a container of available computers and servers that support one or more application tiers. The resource pool is also referred to as a spare pool. When an application tier requires more capacity, it can provision a managed system from its associated resource pool. When demand is low, provisioned systems are returned to the resource pool so that they are available to other applications. The decision on how to organize resource pools is an economical and response-time one. You can allocate all the systems in one resource pool, or have two pools, one with systems running Windows, one with systems running Linux, and so on. The more specialized the pool, the better the response time for allocation (the resource is already in an advanced state of readiness), however this arrangement prevents timely, optimal reallocation between pools. With one generic pool only, the allocation time increases, as an operating system must be installed first, and so on. However, the allocation can be optimal among all running environments requiring dynamic allocation of resources. To configure resource pools, perform the following steps: Procedure 1. Click Go To > Administration > Provisioning > Resource Pools. The Resource Pools page lists all the resource pools that are available in the system. . 2. Click New 3. Complete the fields as follows: a. In the Resource Pool field, type a name for the new resource pool. b. Select the computer template to which you want to associate the resource pool to from the Computer Template list. A computer template defines the required state for managed systems in a resource pool. c. If this resource pool is associated with a specific locale, select the locale from the Locale list. . 4. Click Save 5. Optional: To change any parameters for external tools that manage this resource pool, click the Variables tab of the resource pool that you have created and make the required changes. What to do next The resource pool is added. You can perform the following actions with an existing resource pool: v To remove a resource pool, click Mark Row for Delete. If there are computers contained in the resource pool, a list of other resource pools is displayed. Select a new parent resource pool for the computers. If there are no computers in the resource pool, a confirmation window is displayed. Click Yes to confirm the deletion. Adding computers to resource pools: Computers in the data model can be allocated to any application tier associated with the resource pool that the computer belongs to. Allocation of the computer to the application tier is based on demand for the available resources in the pool. To add a computer to a resource pool or an application tier:
54
Procedure 1. Click Go To > Administration > Provisioning > Resource Pools. All the resource pools that are available in the system are listed. 2. Identify and click the resource pool to which you want to add a computer. 3. Click Add Computers from the Select Action menu. 4. From the list, select one or more computers that you want to associate to the resource pool and click OK. Results The computers are now added to the resource pool.
Procedure
1. Click Go To > Administration > Provisioning > Provisioning Global Settings. 2. Click Variables. 3. 4. 5. 6. Click Add Variable from the Edit menu. Specify compliance-summary-ui in the Key field. Specify Compliance Configuration in the Component field. Specify true in the Value field.
Results
After creating this variable and setting the variable to true, on the Computer tab of the Provisioning Computers application, in the Last Known Status section, the Compliance field will have one the following values, depending on the results of the compliance checks: v Yes v No v Configuration Required.
How can I return to the previous page? You cannot use the Back button in a browser to return to a previous page. Doing so might cause Tivoli Provisioning Manager to stop functioning or exit suddenly.
Chapter 1. Overview
55
To reach a prior panel, return to the Go To menu and use it to access your application again. You might also be able to follow the breadcrumb navigation available for some applications. How do I populate the List tab? To find records, use the filter fields and then click Enter or then click . . If you cannot see the filter fields,
For more search options, click the Advanced Search button and select the search option you want to work with. To enter a record, click .
To see details about a record, you can click it (if it is underlined), or expand it if it has an arrow next to it. The db-truncation value controls the list display value for the web interface. If required, you can change it: Click Go To > Administration > Provisioning > Provisioning Global Settings.. Click Variables, then select the db-truncation option and change the value. Note: Some pages can be very slow if you raise this value too high. How do I see a list of users or create a user? Click Go To > Security > Users. To see a list of all users defined for Tivoli Provisioning Manager, leave the filter fields blank and click Enter. To create a user, click . You can also create a user using LDAP: Lesson 1: Creating a user and a security group on page 80 To review a user profile, click the underlined user name. How do I create a portlet in the Start Center? Return to the Start Center by clicking Start Center. Click Change Content/Layout, then decide if you want your new portlet in the left or right column and click Select Content. Change the Display Name to the name you want to call your portlet (for example, New Portlet) and click Finished. The new portlet is now displayed in the Start Center. To add applications to it, click .
How do I access the Provisioning Task Tracking page? There is a direct link to this page in the Favorite Applications section of the Start Center. How do I access the Discovery Wizards or Discovery Configurations page? There is a direct link to these pages in the Favorite Applications section of the Start Center. You will not see these links if you do not have the access right to perform these tasks. What do I do if I cannot see an application or tab? You might need to modify the signature options, which specify privileges for using applications, menu options, and toolbar items. Click System Configuration > Platform Configuration > Application Designer, then click the application you want to work with, and click Select Action > Add/Modify Signature Options..
%TIO_HOME%
Linux
TIO_HOME
56
Table 10. Path variables Path variable AM_HOME Component The agent manager Default directory v
Windows C:\Program Files\IBM\AgentManager UNIX Linux
/opt/IBM/
AgentManager APDE_HOME/eclipse
SystemDrive:\Program Files\IBM\SQLLIB
AIX Linux Solaris
Windows
/opt/ibm/db2/V9.5 SystemDrive is the disk drive that contains the hardware-specific files used to start Windows. Typically, the system drive is C. DCD_HOME Tivoli Provisioning Manager for dynamic content delivery v
Windows Windows
%Program Files%\IBM\tivoli\
Linux
CDS v
UNIX Windows
/opt/IBM/tivoli/CDS
DMS_HOME
C:\Program Files\ibm\DeviceManager
UNIX Linux
/opt/IBM/
/usr/IBM/HTTPServer
Linux
/opt/IBM/HTTPServer
C:\ibm\tivoli\ITM
Linux
/opt/IBM/tivoli/ITM
C:\APDE\java\jre
Linux
/opt/APDE/java/jre v For IBM Tivoli Provisioning Manager, WAS_HOME/java MAXIMO_HOME The base services v v
Windows UNIX
C:\IBM\SMP
Linux
/opt/IBM/SMP
Chapter 1. Overview
57
Default directory v v v
Windows AIX Linux
MWI_workspace
workspace
UNIX
$ORACLE_BASE/product/version/db_1, where $ORACLE_BASE is the directory in which all Oracle Database software is installed: v /u01/app/oracle/product/10.2.0/db_1 (for Oracle 10g) v /u01/app/oracle/product/11.1.0/db_1 (for Oracle 11g)
OSD_DATADIR
Default data directory for Tivoli Provisioning Manager for OS Deployment parent servers: v v
Windows UNIX
%SYSTEMDRIVE%\tpmfosd files
Linux
/opt/tpmfosd_files
Default data directory for Tivoli Provisioning Manager for OS Deployment child servers: v v OSD_HOME Tivoli Provisioning Manager for OS Deployment installation directory
Windows UNIX
%SYSTEMDRIVE%\TPMfOSd Files
Linux
/opt/tpmfosd/
%COMMONPROGRAMFILES%\IBM
Linux
Tivoli v
UNIX
/opt/IBM/tpmfos
Child servers, installed by the Tivoli Provisioning Manager for OS Deployment workflows: v
Windows
%COMMONPROGRAMFILES%\IBM
Linux
/opt/tpmfosd/tpmfos
/opt/tivoli/ep v
Windows C:\Program Files\IBM\LDAP\V6.2 UNIX Linux
/opt/IBM/ldap/V6.2
/opt/IBM/tivoli/tpm
58
Table 10. Path variables (continued) Path variable TIO_LOGS Component Tivoli Provisioning Manager runtime logs Default directory v
Windows C:\Program Files\IBM\tivoli\common\COP\logs UNIX Linux
/usr/ibm/tivoli/
common/COP/logs
Windows
%TEMP%
WAS_HOME
v v
/usr/IBM/WebSphere/AppServer
Solaris
/opt/IBM/WebSphere/
AppServer
Troubleshooting
This section provides some quick tips for troubleshooting. Refer to this section if you have problems logging on, or if you are encountering a general problem that is not related to a specific product feature. For quick links to troubleshooting resources, see the Troubleshooting tab in Getting started basics on page 10.
Troubleshooting aids
A troubleshooting aid guides you through the process of diagnosing problems for a particular area of the product. A troubleshooting checklist identifies common problems and recommendations on how to resolve them. The following troubleshooting aids and checklists are available: v Troubleshooting security on page 119 v Troubleshooting discovery on page 239 v Troubleshooting operating systems management v Troubleshooting virtual images management v Troubleshooting image library management on page 522 v Troubleshooting software distribution on page 751 v Troubleshooting compliance on page 858 v Troubleshooting SDI Windows patch management on page 989 v v v v v v v Patch management troubleshooting checklist on page 992 Troubleshooting virtualization management on page 1095 Troubleshooting task management on page 1180 Troubleshooting and Reporting problems on page 1205 Troubleshooting Automation Package Developer Environment Automation Package Developer Environment troubleshooting checklist Troubleshooting provisioning workflows
59
Symptoms
You are getting errors when trying to access the web interface.
Causes
The Lightweight Directory Access Protocol (LDAP) server might be shut down.
Note: The default LDAP installation directory is /opt/IBM/ldap/current_version/bin If the LDAP server is running, a confirmation message is displayed. If the LDAP server is not running, start the LDAP server by running the following command:
ibmdirctl -D user_name -w password start
Solution 2 Run the Tivoli Directory Server Web Administration tool to check the status of the LDAP server. 1. Make sure that the Tivoli Directory Server Web Administration tool is installed on the WAS server. For information on how to install it, go to http://www.ibm.com/developerworks/tivoli/library/twebadmin/index.html. 2. In a Web browser, go to http://host_name:9080/IDSWebApp/IDSjsp/Login.jsp 3. Log in with the appropriate user name and password. The Tivoli Directory Server Web Administration tool starts. 4. If you cannot log in, you need to start the LDAP server. On the LDAP server, from the LDAP_Install_dir/appsrv/bin directory, run:
startServer [.sh|.bat] server1
5. In the Tivoli Directory Server Web Administration tool, in the navigation bar, click Server administration. The status of the LDAP server is displayed. 6. If the server is not running, click Start or Restart to start the LDAP server.
Symptoms
After successfully installing Tivoli Provisioning Manager on a computer running a Turkish locale, you are unable to log in.
60
Causes
Tivoli Provisioning Manager can be installed on a computer running any locale but the user will see English if the locale is not one of the supported languages. Turkish is not one of the supported languages. When the user logs in, the default Turkish locale does not recognize the English language.
4. Click Apply > Save to save your configuration changes. 5. Restart WebSphere Application Server to refresh your configuration changes.
Symptoms
You cannot change your password.
Causes
The password policy parameters are incorrect (such as minimum length, minimum number of alphabetic characters, and other parameters), so the LDAP server cannot validate the password.
: startServer.sh
: startServer.bat
2. In a Web browser, go to http://hostname:9080/IDSWebApp/IDSjsp/Login.jsp 3. Log in with the appropriate user name and password. The Tivoli Directory Server Web Administration tool starts. 4. In the navigation bar click Server administration and then click Manage security properties. 5. In the main window: a. Click Password policy to check whether the password syntax is enabled or not. b. Click Password validation to check the password syntax.
Chapter 1. Overview
61
Symptoms
If a session in Tivoli Provisioning Manager is left idle until it expires, any user is then able to access the session without validating their credentials. Some pages might have exception messages because the user is not validated.
Causes
This is a security issue. If users log on to Tivoli Provisioning Manager and leave the session idle for longer than the HTTP Session timeout value configured in WebSphere Application Server, user information is not invalidated and user credentials remain available until the configured LTPA token timeout occurs.
: setupCmdLine.bat v
UNIX
: . ./setupCmdLine.sh. Notice the space between the periods. The special form for this command sources the command to make the setting active for all processes started from the command shell. 4. Start the update installer. Change to the WAS_HOME\updateinstaller directory and run the following command: v
Windows
: update.bat v
UNIX
62
: ./update.sh 5. In the installer, enter the installation location of WebSphere Application Server and select Install maintenance package. 6. Enter the file name of the fix: pk25740.pak. 7. Install the maintenance package. 8. When the installation is complete, log on to the WebSphere Application Server administrative console as tioadmin at the following URL: http://<hostname:port>/admin. where hostname is the fully-qualified domain name of the Tivoli Provisioning Manager computer and port is the WebSphere Application Server Admin host secure port that you defined during installation. The default port number is 9044. For example:
https://tpmserver.example.com:9044/admin
Click Security > Global Security. Under Custom Properties, click New. In the Name field, enter com.ibm.ws.security.web.logoutOnHTTPSessionExpire. In the Values field, enter true.
13. Click Apply and Save to save the changes to your configuration. 14. Restart WebSphere Application Server.
Symptoms
You add a new user using the WebSphere Administrative Console and then log on as that user shortly after the user account is created. Logon is successful, but you cannot see the Start Center for the user.
Causes
The Start Center is created for users in the Maximo database. The following settings influence how often user information is updated in the database: v The WebSphere Application Server Virtual Member Manager synchronization interval. v WebSphere Application Server search cache timeout. WebSphere Application Server uses the cache to save data retrieved from the LDAP server to improve performance. By default, synchronization occurs every 5 minutes and the cache timeout interval is 10 minutes. Because the cache timeout is longer than the synchronization interval, new user information is not provided to the Maximo database until the cache timeout expires.
Chapter 1. Overview
63
4. In the Cron Task Instances section, change the synchronization interval in the Schedule field as required. v To change the search cache timeout: 1. Login to the WebSphere Administrative Console, then navigate to Security > Secure administration, applications, and infrastructure. 2. Locate the User account repository section and pick Federated repositories from the Available realm definition field, and then click Configure. 3. Click the repository link in the Repository identifier, for example ISMITDS. 4. In the Caches section, ensure that Cache the search results is enabled and change the value of Cache times out to the required value.
Symptoms
After the installation of Tivoli Provisioning Manager , the Maximo Console shortcut from the Start menu of the administrative workstation does not work.
Causes
The shortcut was created during bases services installation. During the core components installation, the port is updated to the port provided by the user.
where host_name is the host name of the provisioning server, and port is the port specified by the user during core components installation. The default value is 9443.
Symptoms
The following error is generated when you access the Web interface:
HTTP Error Code: 500 Error Message: JSPG0227E: Exception caught while translating /webclient/components/page.jsp: java.lang.reflect.InvocationTargetException
Causes
WebSphere Application Server cannot access the /opt/IBM/WebSphere/AppServer/profiles/ctgAppSrv01/ temp due to conflicting file permission.
v Log in again.
64
Other problems
This section describes how to recover from miscellaneous Tivoli Provisioning Manager problems.
An error occurs after a successful Tivoli Provisioning Manager 7.2 default install on Win2K8R2 SE 64-bit
Symptoms
The following log files display error messages that occur after a successful Tivoli Provisioning Manager 7.2 default install on Win2K8 R2 SE 64-bit. v TIO_LOGS/trace.log v TIO_LOGS/console.log v TIO_LOGS/install_wrapper/tcinstall.log Note: For the default location of TIO_LOGS, click here.
2010-06-04 01:23:29,274 ERROR [Workflow Dispatcher] (WorkflowDispatcher.java:243) runtime.WorkflowDispatcher: COPDEX040E An unexpected deployment engine exception occurred: java.lang.ClassNotFoundException: com.ibm.tivoli.orchestrator.de.dto.maximo.DeploymentRequestDAO. com.ibm.tivoli.tpm.metadata.MetadataException: java.lang.ClassNotFoundException: com.ibm.tivoli.orchestrator.de.dto.maximo.DeploymentRequestDAO at com.ibm.tivoli.tpm.metadata.dao.DAOFactory.getDAO(DAOFactory.java:26) at com.ibm.tivoli.tpm.metadata.dao.DAOFactory.getDAO(DAOFactory.java:41) at com.ibm.tivoli.orchestrator.de.dto.oracle.DTOFactoryImpl.getDeploymentRequestDto( DTOFactoryImpl.java:87) at com.ibm.tivoli.ldo.runtime.WorkflowDispatcher.pollDatabase (WorkflowDispatcher.java:163) at com.ibm.tivoli.ldo.runtime.WorkflowDispatcher.run(WorkflowDispatcher.java:230) Caused by: java.lang.ClassNotFoundException: com.ibm.tivoli.orchestrator.de.dto.maximo.DeploymentRequestDAO at org.eclipse.osgi.framework.internal.core.BundleLoader.findClass (BundleLoader.java:405) at org.eclipse.osgi.framework.internal.core.BundleLoader.findClass (BundleLoader.java:350) at org.eclipse.osgi.internal.baseadaptor.DefaultClassLoader.loadClass (DefaultClassLoader.java:83) at java.lang.ClassLoader.loadClass(ClassLoader.java:605) at com.ibm.tivoli.tpm.common.resource.TpmClassLoader.forName (TpmClassLoader.java:20) at com.ibm.tivoli.tpm.metadata.dao.DAOFactory.getDAO(DAOFactory.java:23) ... 4 more 2010-06-04 01:23:29,337 DEBUG [Thread-18] (DeploymentEngine.java:75) engine.DeploymentEngine: DeploymentEngine is shutting down
2010-06-03 22:29:18,168 DEBUG [TCAupgrade_CreateSPBs(10001)] (WorkflowExecutionMonitor.java:134) komodor.WorkflowExecutionMonitor: 0Failing workflow: TCAupgrade_CreateSPB_for_platform.java with exception: com.ibm.tivoli.orchestrator.de.engine.WorkflowThrownException: Command failed. Return code = 1 at com.ibm.tivoli.ldo.runtime.WkfBase.throwException(WkfBase.java:26) at com.ibm.tivoli.tpm.wkf.SWDDiscCLI.Build_SPB_from_SPD.execute (Build_SPB_from_SPD.java:185)
Causes
This is caused by a known issue during the creation of the software package block (SPB). This error occurs when the Tivoli Provisioning Manager engine is being stopped or the system is being shutdown.
65
Symptoms
When you click Information Center on the web interface, the information center displays in English, even if the provisioning server was installed in a different language.
Causes
The information center is English by default.
Symptoms
When a non-adminstrator user with RSA credentials for SSH SAP attempts to run workflows to a Windows Cygwin target (part of the data model) using Tivoli Provisioning Manager, the following error occurs:
Execution failed with error: COPCOM123E A shell command error occurred: Exit code=-1, Error stream="3 [main] sshd 1576 C:\cygwin\usr\sbin\sshd.exe: *** fatal error - could notload user32, Win32 error 1114", Output stream="".
Causes
This error is caused by a bug in Cygwin 1.7 and higher.
Symptoms
In the German numbering convention, the period is used as a thousand separator (1.000) and the comma is used as a decimal point (1,0). In the Storage Template application, the field Consumable Size wrongly translates numbers in German that use a thousand separator. For example, 1.200KB would be translated into 1,2KB. This limitation also applies to other non-English numbering conventions.
Causes 66
IBM Tivoli Provisioning Manager Version 7.2.0.2 User Guide
Currently, the Storage Template application respects the English numbering convention only. It does not respect non-English numbering conventions, for example, German (period as a thousand separator) or Russian (space as thousand separator).
Symptoms
If you select an object in a dialog or a table, and then search for a different term, your original item selection is cleared.
Causes
Only the last searched object (or objects) is displayed when searching.
Symptoms
In a portlet of type All DCM Objects (generally named Data model object finder), the graph that represents the result set is not created.
Causes
This is a base services limitation.
Symptoms
When the primary Tivoli Provisioning Manager server is disabled and the user attempts to manually open Tivoli Provisioning Manager from the secondary server, the following message appears:
ALR0027I: Waiting for the currently running lightweight run time to exit.
Chapter 1. Overview
67
Causes
The file system does not release the lwi.lck file after the primary server is disabled.
Symptoms
The provisioning server does not start on Windows, and a message appears in the WebSphere Application Server log (SystemOut.log in the %WAS_HOME%\logs\server1 directory) similar to the following:
3c450cad LdapRegistryI E SECJ0352E: Could not get the users matching the pattern wasadmin because of the following exception javax.naming.AuthenticationException: [LDAP: error code 49 - Invalid Credentials]
Causes
In this configuration, IBM Tivoli Directory Server might treat DB2 as if it has started, even if it has not.
Symptoms
When using a non-login shell on Linux, the provisioning server does not start from GNOME or KDE terminals. The following symptoms might appear: 1. The output of the tioStatus command shows that the deployment engine, policy engine, and the DMS result server did not start:
ADMU0116I: Tool information is being logged in file /opt/ibm/tivoli/tpm/tioprofile/logs/server1/serverStatus.log ADMU0128I: Starting tool with the tioprofile profile ADMU0500I: Retrieving server status for server1 ADMU0508I: The Application Server "server1" is STARTED 2007-10-20 21:13:29,824 INFO log4j configureAndWatch is started with configuration file: /opt/ibm/tivoli/tpm/config/log4j-util.prop 2007-10-20 21:14:00,115 INFO COPCOM422I The deployment engine is not started. 2007-10-20 21:14:00,986 INFO COPCOM424I The policy engine is not started. 2007-10-20 21:14:00,989 INFO COPCOM484I The agent shell server is started. 2007-10-20 21:14:01,000 INFO COPCOM560I The activity plan engine is started. 2007-10-20 21:14:01,002 INFO COPCOM585I The SOAP service is started. 2007-10-20 21:14:01,018 INFO COPCOM588I The DMS Result Server is not started.
68
2. Displaying the value of the LD_LIBRARY_PATH environment variable from a command shell (for example, echo $LD_LIBRARY_PATH) returns null. 3. A message appears in the $TIO_LOGS/console.log file:
COPCOM093E The JDBC driver caused an SQL exception. com.thinkdynamics.kanaha.datacentermodel.DataCenterSystemException: COPCOM093E The JDBC driver caused an SQL exception. ... Caused by: com.ibm.db2.jcc.a.SqlException: Failure in loading T2 native library db2jcct2 at com.ibm.db2.jcc.t2.a.a(a.java:31) at com.ibm.db2.jcc.t2.T2Configuration.<clinit>(T2Configuration.java:75) at com.ibm.db2.jcc.DB2SimpleDataSource.getConnection (DB2SimpleDataSource.java:183) at com.ibm.db2.jcc.DB2SimpleDataSource.getConnection (DB2SimpleDataSource.java:144) at org.apache.commons.dbcp.DataSourceConnectionFactory.createConnection (DataSourceConnectionFactory.java:42) at org.apache.commons.dbcp.PoolableConnectionFactory.makeObject (PoolableConnectionFactory.java:290) at org.apache.commons.pool.impl.GenericObjectPool.borrowObject (GenericObjectPool.java:771) at org.apache.commons.dbcp.PoolingDataSource.getConnection( PoolingDataSource.java:95) at com.thinkdynamics.kanaha.datacentermodel.inprocess. ConnectionManager.getConn(ConnectionManager.java:93)
Causes
When starting from a non-login shell, .TCprofile is not sourced and therefore LD_LIBRARY_PATH is not set properly.
To ensure that the .TCprofile script does not run twice, remove the above lines from the .bash_profile and .profile files in the tioadmin home directory.
Symptoms
An error occurs when you run the versionInfo command on a Windows 64bit computer.
Causes
This command is not supported for Windows-64 bit computers.
Symptoms
Chapter 1. Overview
69
After turning on auditing within Maximo, running the configdb script results in the following error message:
SQLCODE=-670, SQLSTATE=54010
Symptoms
You receive the following error:
COPCOM093E The JDBC driver caused an SQL exception. COPJEE272E (Problem ID: UI449932). com.thinkdynamics.kanaha.datacentermodel .DataCenterSystemException: COPCOM093E The JDBC driver caused an SQL exception
Causes
This is caused by frequency committing to a database, causing a lock timeout. In the $TIO_LOGS/j2ee file, you will find this information:
Caused by: com.thinkdynamics.kanaha.util.exception.DatabaseDeadlockException: DB2 SQL error: SQLCODE: -911, SQLSTATE: 40001, SQLERRMC: 68
Symptoms
70
When the log directory is on the same file system as Tivoli Provisioning Manager, it can reach or exceed the capacity of the file system. This can prevent the application from creating new log files.
Causes
The capacity of the file system is not large enough.
Symptoms
Tivoli Provisioning Manager does not function as you would expect when you run an XML import while all the Tivoli Provisioning Manager processes are running.
Causes
Tivoli Provisioning Manager processes cache some information, and they depend on JMS messages for notification when events occur (for example, when the system runs logical management operations and workflows). However, an XML import does not send any notifications to the Tivoli Provisioning Manager processes. It just loads the database.
Symptoms
You are working in a non-English locale, and error messages are only being displayed in English.
Causes
Chapter 1. Overview
71
6. Return to the Application Server page, and select MXServer. Stop the server and then restart it. All error messages must now be displayed in the language of your locale.
Symptoms
New users are created successfully. But those users are not listed in the user interface. This can only happen on a non-English installation of Tivoli Provisioning Manager.
Causes
The value of the EMAILTYPE domain was translated.
Default insert site configuration does not take effect or is not persistent for the user
This can occur if the default insert site has not been configured. If it has been configured, then the configuration might not have taken effect.
Symptoms
You receive the error BMXAA0012E - Cannot insert/update a record without a default insert site when trying to do an action that requires a default insert site to be configured. This can occur even if you do have a default insert site configured, but is not active.
Causes
This can occur if the default insert site has not been configured. If it has been configured, then the configuration might not have taken effect (for example, you have not logged out of your sessions yet).
72
Additionally, configuration and usage of sites in conjunction with the MAXADMIN user (that is, the user is configured for mxe.adminuserid) could cause system problems because background sessions for that user might be active frequently.
Chapter 1. Overview
73
74
v Resources on page 78
Process
Security includes the following processes: 1. You define what resources must be protected. 2. You decide what groups of users can have access to these protected resources. You also need to decide what type of access to allow to those resources. 3. You must apply the appropriate access controls on these resources to ensure that only the assigned user groups can access them.
75
User roles
You must be assigned to the appropriate user role to manage security configuration. For more information about predefined security roles that are available in Tivoli Provisioning Manager, see Predefined security groups on page 134.
Table 11. User roles Role MAXADMIN Description Manages security Skills Access rights
Thorough knowledge of the To control user access, the security configuration and provisioning administrator requirements. role is required.
Requirements
User roles and requirements on page 79 Target computer requirements: Requirements for Windows target computers on page 556 Requirements for Red Hat Linux target computers on page 560 Requirements for SUSE Linux Enterprise Server (SLES) target computers on page 561 Requirements for AIX target computers on page 562 Requirements for Solaris Operating Environment target computers on page 563 Requirements for HP-UX target computers on page 565 v Components on page 78
76
Key terms
access permission The access privilege that applies to an object. access permission group A group of access permissions. application One or more computer programs or software components that provide functions in direct support of a specific business process or processes. authentication In computer security, verification of the identity of a user or process and the construction of a data structure that contains the privileges that were granted to the user or process. Contrast with authorization. authorization The process of granting a user either complete or restricted access to an object, resource, or function. Contrast with authentication. security group A group defined for the purpose of providing access to applications and optionally to collections of data. role A set of job responsibilities related to a service management process. Each role is implemented as a security group, which gives users with that role access to a set of applications and a start center with role-appropriate information.
instance level security Access permissions that specify what actions a user can perform on specific resource in the Tivoli Provisioning Manager data model. workflow security A security mechanism to ensure that users process the correct set of permissions to run the particular workflow.
Troubleshooting
v Troubleshooting security on page 119 v ../com.ibm.support.tpm.doc/messages/rtrbmsg_tpm.dita v Support information about security v Support information about user access v Contacting Support
Log files
If you encounter security errors, check the following log for details: %TIO_LOGS%/console.log
77
Resources
v Tutorial: manage security and access permissions using LDAP on page 80 v Tutorial: manage security and access permissions using Maximo authentication on page 85 v Managing users and security groups v Role based security groups on page 132 v Conditional user interface on page 144 v Single Sign-on (SSO) on page 144 v Security v For a description of a field in the Tivoli Provisioning Manager console, press Alt+F1.
Related links Chapter 2, Controlling user access, on page 75 Requirements on page 79 Troubleshooting security on page 119 Tutorial: manage security and access permissions using LDAP on page 80 Tutorial: manage security and access permissions using Maximo authentication on page 85
Security process
It is important to understand the overall user access control process before you start managing security with Tivoli Provisioning Manager. Security includes the following processes: 1. You define what resources must be protected. 2. You decide what groups of users can have access to these protected resources. You also need to decide what type of access to allow to those resources. 3. You must apply the appropriate access controls on these resources to ensure that only the assigned user groups can access them.
Components
The Tivoli Provisioning Manager uses the Maximo security framework for both authentication and instance access control. Maximo, in turn, uses Websphere to perform the authentication service. In terms of instance access control, Tivoli Provisioning Manager makes use of the Maximo security framework with security groups containing the resources to be protected, security constraints defining the permissions, and the users to be enforced by the constraints. Tivoli Provisioning Manager security consists of the following components: Tivoli Provisioning Manager static groups A provisioning static group defines the members. A member can be either a provisioning object or another provisioning group. Each provisioning object is associated with a type, for example a computer object has a computer object type. A static group can be typed or untyped. A typed static group contains only the objects of that type whereas an untyped group contains objects of any type. Both typed and untyped static groups can be used for security purposes. Tivoli Provisioning Manager dynamic groups A provisioning dynamic group defines its members by a query. A query is a SQL where clause. Objects are retrieved if and only if the object properties satisfy the query. A query has a type in which it can only apply to the resources of that type. A query defined for a computer type can only apply to computer resources. A dynamic group can be typed or untyped. A typed dynamic group contains only the query of that type. After the dynamic group type is set, it cannot be
78
changed. An untyped dynamic group can contain a query of any type at any time. Only typed dynamic groups can be used for security purposes. Tivoli Provisioning Manager security manager Tivoli Provisioning Manager security manager manages the bridging between the provisioning groups and the Maximo security framework. It manages all of the conditions and data restrictions required for security. It also manages the security on workflows. Users can run protected workflows only if they have the correct set of permissions on the resources specified by the workflow definition. IBM Maximo Asset Management components v Security framework v v v v Condition Security group SQL expression Permission
For a detailed description of the Maximo components, go to IBM Maximo Asset Management online documentation.
Requirements
Before you proceed with setting up the user access control, ensure that all software, hardware, and access rights requirements are met.
Thorough knowledge of the To control user access, the security configuration and provisioning administrator requirements. role is required.
Chapter 2. Controlling user access
79
Supported configurations
You can manage user access using LDAP authentication or Maximo authentication. The following tutorials describe how to manage user access using LDAP authentication and Maximo authentication: v Tutorial: manage security and access permissions using LDAP v Tutorial: manage security and access permissions using Maximo authentication on page 85
Learning objectives
To manage security, you must be assigned and logged in as a MAXADMIN security group member. MAXADMIN is the only security group from which members can configure security and user access control.
In this tutorial, you learn how to: v Create new users v Add users to security groups v Use the predefined security groups, and modify them so that they suit your environment v Create new security groups v Customize access to provisioning groups and applications Allow one hour to create new users, assign them to security groups and customize their access to provisioning applications if required.
Learning objectives
After completing the lessons in this module you will be able to perform the following tasks: v Create a user and a security group in LDAP v Assign user to a security group v Enable the synchronization between the VMM and the Tivoli Provisioning Manager to import the user and security group settings into the system.
Time required
This part takes approximately 30 minutes. Lesson 1: Creating a user and a security group:
80
Before setting up security for your resources managed by Tivoli Provisioning Manager, you must have users created in a system that can access and modify the resources. You can create a user and a group with an LDAP script or using any LDAP management tool. Tip: The WebSphere Administrative Console 6.1 manages users and groups in LDAP. This topic describes the steps that help you to create a user and a security group in this interface. To create a user in WebSphere Administrative Console 6.1 using Tivoli Directory Server, complete the following steps: 1. Go to Users and Groups, and select to Manage Users. 2. Click Search to list existing users in the LDAP. 3. Click Create..., and enter the information in all relevant fields, then click Create. 4. Click Close to return to the user list. You have created a user and the entry displays in the list of users. To create a security group in WebSphere Administrative Console 6.1 using Tivoli Directory Server, complete the following steps: 1. Go to Users and Groups, and select Manage Groups. 2. Click Search to list existing groups in the LDAP. 3. Click Create..., and enter the information in all relevant fields, then click Create. 4. Click Close to return to the group list. You have now created a security group and the entry now appears in the group list. To view the newly created users and groups in Tivoli Provisioning Manager, you must import them into the system. Configure the synchronization between the Virtual Member Manager, which is an LDAP interface, and Tivoli Provisioning Manager by completing the procedures in one of the following lessons. Lesson 2: Adding users to security groups: After you have created users, you assign them to one of the predefined security groups. Security groups are the user containers that provide the ability to manage users for security purposes. Tivoli Provisioning Manager provides predefined security groups that you can use and, if necessary, modify to suit your enterprise environment. You can assign an individual user to more than one security group. Users have permission to perform only those operations that are mapped to their security group assignments. Note: For security groups created using LDAP, users can only be added using LDAP. To assign a user to a security group in WebSphere Administrative Console 6.1, complete the following steps: 1. Go to Users and Groups and click Manage Users. 2. Click Search to list the existing users in LDAP. 3. 4. 5. 6. From the list, click the user that you want to assign to a security group. Click the Groups tab, click Add..., and then Search. Select the group to which you want to add the user and click Add. Click Close. The group to which the user has been added is displayed.
You have configured the user to perform the operations that are mapped to their security group assignments.
Chapter 2. Controlling user access
81
Lesson 3: Configuring user and security group synchronization: After you have created users and groups, you must import them into Tivoli Provisioning Manager by setting up synchronization between the Virtual Member Manager and the system. You have just created users in LDAP using the WebSphere Administrative Console. Now you must import them into Tivoli Provisioning Manager using the Virtual Member Manager synchronization option. Complete the following steps to import the users you have created into Tivoli Provisioning Manager: 1. If necessary, log on to Tivoli Provisioning Manager. 2. Click Go To > System Configuration > Platform Configuration > Cron Task Setup. 3. Type VMMSync into the Cron Task field and press Enter. 4. Activate the Virtual Member Manager synchronization by clicking the Active check box. 5. To keep the history of all of the activities of the VMM Sync Cron task, check the Keep History check box and type 50 in the Max Number of History Records field. By typing 50, you are specifying that you want to keep the 50 most recent records. 6. To ensure that you retrieve the user or security name from LDAP correctly, complete the following steps: a. Click the Next Page arrow on the Parameters tab. b. Select userMapping c. Change the displayName value in the Value field from the <column name="DISPLAYNAME" type="ALN">displayName<\column> expression to an appropriate attribute value defined in LDAP, for example, uid as in <column name="DISPLAYNAME" type="ALN">uid<\column>. Tip: For the list of all attributes available in LDAP, see the Person DataObject for user attributes and the Group DataObject for security group attributes. For information about the attribute mapping between LDAP and Tivoli Provisioning Manager, see Attribute mapping from LDAP to IBM Tivoli Provisioning Manager on page 118. . 7. Save the changes by clicking 8. To view all of the imported objects, restart Tivoli Provisioning Manager. You have now activated the synchronization between Virtual Member Manager and Tivoli Provisioning Manager. You have chosen to keep the history of synchronization activities and specified to keep the 50 most recent records.
Learning objectives
After completing the lessons in this module, you will understand the concepts and know how to do the following: v v v v Assign workflow permissions to security groups Assign read/write permissions to security groups Assign read-only permissions to security groups Modify the access permissions for a given security group
Attention: Adding any type of permission is related to specifying a restriction for a particular security group. Each security group can only have one restriction of the same type.
82
Time required
This module takes approximately 30 minutes. Lesson 1: Assigning read/write type of permissions to security groups: You can grant a security group access to resources by authorizing the group to have read or write access to the resources. You can control whether a resource is read-only or writable for the users in a security group by assigning read or write permissions. Attention: If you define no restriction on a resource type, the security group is granted full access to the resource by default. To add read/write access to a security group, complete the following steps: 1. From Tivoli Provisioning Manager, Click Go To > Security > Security Group. 2. Click the security group for which you want to add permissions. 3. Click the Provisioning Permissions tab, and click Read/Write Permissions. v To add read-only permission, click Add Read-only Permissions, and choose the provisioning group of resources to which you want to add read-only access. Note: The read-only permission restricts user access to viewing data only. To learn how to customize the access to applications of your choice, see Lesson 3: Customizing access to provisioning applications on page 84. v To add read/write permission, click Add Read/Write Permissions, and choose the provisioning group of resources to which you want to add read/write access. Tip: In case you modify the condition for the data restriction generated by the provisioning permission application, you can reset it to its original state by clicking Reset Condition. Important: You can grant a permission for each type of object. Check the group object type before granting new permissions. 4. Save the group configuration changes by clicking .
You have now assigned read/write access to a security group by associating the resources in provisioning group with the users in the security group. Lesson 2: Assigning workflow permissions to security groups: Accessing a provisioning workflow represents having the ability to modify the real implementation of a specific IT process. Learn about how you can grant permissions to workflow processes. To assign a workflow permission to a security group: 1. Log on to Tivoli Provisioning Manager. Click Go To > Security > Security Group. 2. Select the security group for which you want to add workflow permission. 3. Click the Provisioning Permissions tab, and click Workflow Permissions. 4. Add the access to a workflow by clicking New Row, and specifying Provisioning Group and Permission Group. Use to choose from the existing groups.
. 5. Save the settings by clicking 6. Enable the workflow permission by clicking Go To > Security > Security Group, and choosing the security group for which you want to add workflow permission. 7. Go to the Data Restrictions tab, and click New Row.
Chapter 2. Controlling user access
83
. Verify that the Reevaluate? box is checked, and choose TPMWKFCOND for the Condition field. 9. Save the settings by clicking .
You have now assigned the workflow permission to a security group by matching it with the resources in a particular provisioning group and permissions specified in the permission group of your choice. Lesson 3: Customizing access to provisioning applications: Tivoli Provisioning Manager provides six security groups and associated start centers. By modifying a predefined security group you can configure it to have a customized access control to applications of your choice. You can either add or remove access to applications. To grant or revoke access to applications for a specific security group: 1. Log on to Tivoli Provisioning Manager. Click Go To > Security > Security Group. 2. Click the security group that you want to modify. 3. Click the Applications tab, and click the application for which you want to modify access. Clicking the application opens an options table for that particular application. 4. Click the option that you want to modify, check it for granting access, or mark as unchecked to revoke access. 5. Save the new group configuration by clicking .
You have now modified the predefined security group definition to match your environment needs. Lesson 4: Creating custom security groups: Apart from the predefined security groups and associated particular start centers you can create your own security groups that suit your enterprise needs. This lesson shows how to set one up and how to configure it to have a customized access control to applications of your choice. Note: You are also able to create security groups using LDAP. This, however, implies the need to assign users to the groups through LDAP only. To create a security group from the user interface: 1. Log on to Tivoli Provisioning Manager. Click Go To > Security > Security Group. . 2. Click the 3. Enter the information in the appropriate fields. You can define a Long Description and Start Center Template for the new group, and mark it to be Independent of Other Groups. 4. Save the new group definition by clicking You have now created a custom security group. Add users to the newly created security group by following the instructions in Lesson 2: Adding users to security groups on page 81. Additionally, you can modify the user access control by Customizing access to provisioning applications described in Part 2, Lesson 3. For more information about dependent and independent groups, see Chapter 2: Security of the Maximo Asset Manager System Administrator Guide. Lesson 5: Enabling instance level security for data model object finder: .
84
You can enable instance level security for the data model object finder. By enabling instance level security for the data model object finder, you can ensure that users can only view objects that they are authorized to view when they use the data model object finder. If you do not enable instance level security for the data model object finder, users can view all objects. However, users can only view those objects and cannot modify objects unless they have write permissions to those objects. To enable instance level security for the data model object finder, you manage the permissions based on the groups to which users belong. Complete the following steps to enable instance level security in the data model object finder: 1. Log on to Tivoli Provisioning Manager. Click Go To > Security > Security Group. 2. Click the group to which the user for whom you are enabling security belongs. 3. Click Select Action > Enable DcmFinder Security. You have now enabled instance level security for the data model object finder.
Learning objectives
To manage security, you must be assigned and logged in as a MAXADMIN security group member. MAXADMIN is the only security group from which members can configure security and user access control.
In this tutorial, you learn how to: v Create new users in Maximo v Add the new Maximo users to security groups v Use the predefined security groups, and modify them so that they suit your environment v Create new security groups v Customize access to provisioning groups and provisioning applications Allow one hour to create new users, assign them to security groups, and customize their access to provisioning application if required.
Learning objectives
After completing the lessons in this module, you will be able to perform the following tasks: v Create a user and a security group in Maximo v Assign user to a Maximo security group
85
Time required
This part takes approximately 30 minutes. Lesson 1: Creating a user and a security group in Maximo: Before setting up security for the resources managed by Tivoli Provisioning Manager, you must create users in a system that can access and modify the resources. To 1. 2. 3. create a user in Maximo, complete the following steps: Click Go To > Security > Users. Click the New Users icon. Complete the fields in the Users page, as required. For more information, see the Maximo Asset Manager System Administrator Guide
You have now created a user and the entry displays in the user list. To create a security group in Maximo, complete the following steps: 1. Click Go To > Security > Security Group. 2. Click the New Group icon. 3. Complete the fields in the Security Group page, as required. For more information, see the Maximo Asset Manager System Administrator Guide. You have now created a security group and the entry is included in the group list. See the troubleshooting section if you have problems with passwords and the send password by email function. Lesson 2: Adding users to Maximo security groups: After you have created users, you need to assign them to one of the predefined security groups. Security groups are the user groupings that provide the ability to manage users for security purposes. Tivoli Provisioning Manager provides predefined security groups that you can implement and, if necessary, modify to suit your enterprise environment. You can assign an individual user to more than one security group. Users have permission to perform only those operations that are mapped to their security group assignments. To assign a user to a Maximo security group, see the Maximo Asset Manager System Administrator Guide. You have configured the user to perform the operations that are mapped to their Maximo security group assignments.
Learning objectives
After completing the lessons in this module, you will understand the concepts and know how to do the following tasks: v Assign workflow permissions to security groups v Assign read/write permissions to security groups
86
v Assign read-only permissions to security groups v Modify the access permissions for a given security group Attention: Adding any type of permission is related to specifying a restriction for a particular security group. Each security group can only have one restriction of the same type.
Time required
This module takes approximately 30 minutes. Lesson 1: Assigning read/write type of permissions to security groups: You can grant a security group access to resources by authorizing the group to have read/write access to the resources. You can control whether a resource is read-only or writable for the users in a security group by assigning read/write permissions. Attention: If you do not define restrictions on a resource type, the security group is granted full access to it by default. To add read/write access to a security group: 1. Log on to Tivoli Provisioning Manager. Click Go To > Security > Security Group. 2. Click the security group for which you want to add workflow permission. 3. Click the Provisioning Permissions tab, and click Read/Write Permissions. v To add read-only permission, click Add Read-only Permissions, and click the provisioning group of resources to which you want to add read-only access. Note: The read-only permission restricts user access to viewing data only. To learn how to customize the access to applications of your choice, see Lesson 3: Customizing access to provisioning applications on page 84. v To add read/write permission, click Add Read/Write Permissions, and click the provisioning group of resources to which you want to add read/write access. Tip: In case you modify the condition for the data restriction generated by the provisioning permission application, you can reset it to its original state by clicking Reset Condition. Important: You can grant a permission for each type of object. Check the group object type before granting new permissions. 4. Save the group configuration changes by clicking .
You have now assigned read/write access to a security group by associating the resources in provisioning group with the users in the security group. Lesson 2: Assigning workflow permissions to security groups: Accessing a provisioning workflow provides the ability to modify the real implementation of a specific IT process. Learn how you can grant permissions to workflow processes. To 1. 2. 3. assign a workflow permission to a security group: Log on to Tivoli Provisioning Manager. Click Go To > Security > Security Group. Select the security group for which you want to add workflow permission. Click the Provisioning Permissions tab, and click Workflow Permissions.
87
4. Add the access to a workflow by clicking New Row, and specifying Provisioning Group and Permission Group. Use to choose from the existing groups.
. 5. Save the settings by clicking 6. Enable the workflow permission by clicking Go To > Security > Security Group, and choosing the security group for which you want to add workflow permission. 7. Go to the Data Restrictions tab, and click New Row. 8. Specify TPACCESSDOMAIN for Object using , and specify QUALIFIED for the Type field also using
. Verify that the Reevaluate? box is checked, and choose TPMWKFCOND for the Condition field. 9. Save the settings by clicking .
You have now assigned the workflow permission to a security group by matching it with the resources in a particular provisioning group and permissions specified in the permission group of your choice. Lesson 3: Customizing access to provisioning applications: Tivoli Provisioning Manager provides six predefined security groups and associated start centers. However, by modifying a predefined security group, you can configure it to have customized access control to applications of your choice. You can either add or remove access to applications. To grant or revoke access to applications for a specific security group: 1. Log on to Tivoli Provisioning Manager. Click Go To > Security > Security Groups. 2. Select the security group for which you want to modify. 3. Go to Applications tab, and click the application for which you want to modify the access. Clicking the application opens an options table for that particular application. 4. Click the option that you want to modify, check it for granting access, or mark as unchecked for revoking. 5. Save the new group configuration by clicking .
You have now modified the predefined security group definition to match your environment needs. Lesson 4: Enabling instance level security for data model object finder: You can enable instance level security for the data model object finder. By enabling instance level security for the data model object finder, you can ensure that users can only view objects that they are authorized to view when they use the data model object finder. If you do not enable instance level security for the data model object finder, users can view all objects. However, users can only view those objects and cannot modify objects unless they have write permissions to those objects. To enable instance level security for the data model object finder, you manage the permissions based on the groups to which users belong. Complete the following steps to enable instance level security in the data model object finder: 1. Log on to Tivoli Provisioning Manager. Click Go To > Security > Security Group. 2. Click the group to which the user for whom you are enabling security belongs. 3. Click Select Action > Enable DcmFinder Security. You have now enabled instance level security for the data model object finder.
88
WebSphere Application Server key management regenerates the expiring certificate every 365 days. To manually change the expiration date and modify the validity period of your certificate, see Creating a self-signed certificate. Perform the steps in this procedure for Tivoli Provisioning Manager engine SSL to work when a new certificate is generated, either automatically by WebSphere Application Server or manually by the user.
Procedure
1. Stop Tivoli Provisioning Manager:
tio.cmd|.sh stop -t
3. Copy tpmKeyStore.jks to cliTrustStore.jks 4. Copy tpmTrustStore.jks to cliKeyStore.jks 5. Export the Tivoli Provisioning Manager certificate: cd <WAS_HOME>\java\jre\bin
keytool -export -alias tpmuicert -storepass <tpm key store password> -file <TIO_HOME>/cert/tpmnewui.cer -keystore <TIO_HOME>/cert/tpmKeyStore.jks -storetype jks
6. Import the new Tivoli Provisioning Manager certificate to the Java truststore:
keytool -import -trustcacerts -alias tpmnewcert -keystore <JAVA_HOME>/jre/lib/security/cacerts -storetype jks -storepass <changeit> -file <TIO_HOME>/cert/tpmnewui.cer -noprompt
89
following procedure applies to LDAP user and group management. The name of the maxadmin user is assumed to be new_maxadmin. The procedure described here is applied to Tivoli Provisioning Manager using LDAP authentication and authorization.
Procedure
1. Create a new administration user in WebSphere Application Server and assign all roles to the user. 2. Use VMMSYNC to add the new user to Tivoli Provisioning Manager, then stop Tivoli Provisioning Manager. 3. Modify the maximo.properties file in $WAS_HOME/profiles/ctgAppSrv01/installedApps/ctgCell01/ MAXIMO.ear/properties.jar. Use the -xvf option to unjar the file, and -cvf to rejar the file. Modify maximo.properties by adding the following two lines after mxe.db.schemaowner=maximo, where the value for mxe.adminuserid is in uppercase font but the value for mxe.adminuserloginid is in lowercase:
mxe.adminuserid=<NEW_MAXADMIN> mxe.adminuserloginid=<new_maxadmin>
Note: When adding the previous two lines, replace the existing lines:
mxe.adminuserid=maxadmin mxe.adminuserloginid=maxadmin
4. Copy the updated maximo.properties file to $TIO_HOME/lwi/runtime/tpm/eclipse/plugins/tpm_pmp/ properties and $TIO_HOME/eclipse/plugins/tpm_pmp/properties. 5. Update the RunAs users cron task to include the new administration user, where <new_maxadmin> is in lowercase:
UPDATE MAXIMO.CRONTASKINSTANCE SET RUNASUSERID = <new_maxadmin> WHERE RUNASUSERID = MAXADMIN;
6. Update the dynamic content delivery database to use the new admin user by completing the following configuration steps in the dynamic content delivery console: a. Log in to the dynamic content delivery console using the administrator configured during the installation, that is, maxadmin. b. Change the URL to https://<hostname>:9045/admin/configuration, where the change is marked in bold font. c. Click AG_EMBEDDED_APP_ID. A prompt displays. d. Remove the tpm value and click OK. The property is changed. e. Log off and log back on using the original URL https://<hostname>:9045/admin/main.jsp. A Users application is displayed. If you move your mouse over it you see different options for managing users. f. Check if the new administration user is displayed under Users. Create this user if it does not exist. g. Log on as the new user. h. When the log on is successful, log on to https://<hostname>:9045/admin/configuration using maxadmin.
90
i. Click AG_EMBEDDED_APP_ID. A prompt displays. j. Add the tpm value for the AG_EMBEDDED_APP_ID property. 7. Update the CREDENTIALS_PASSWORD table with the new administration user by running the following command, where the value of USER_NAME is in lowercase:
UPDATE MAXIMO.credentials_password SET USER_NAME= <new_maxadmin> WHERE USER_NAME= maxadmin;
8. If the new administration user has a different password than the original maxadmin user, you must update the password, as follows:
$TIO_HOME/tools/changePassword.sh c tpmuiadm n <new_password>
9. Check if mxe.LDAPUserMgmt is disabled, as follows: a. Log on to Tivoli Provisioning Manager as the new maxadmin user you created. b. In the Tivoli Provisioning Manager user interface, click Go To -> System Configuration -> Platform Configuration -> System Properties. c. In the Global Properties filter, type mxe.LDAPUserMgmt and press Enter. d. Check if the value is 0. If the value is not 0, set it to 0 by running the following command:
UPDATE MAXIMO.MAXPROPVALUE SET PROPVALUE = 0 WHERE PROPNAME = mxe.LDAPUserMgmt;
For more information about the mxe.LDAPUserMgmt property, see http://www-01.ibm.com/ support/docview.wss?uid=swg21316588 10. Move the existing queries from the maxadmin user to the new admin user by running the following command, where the value of OWNER is in uppercase:
UPDATE MAXIMO.QUERY SET OWNER= <new_maxadmin> WHERE OWNER= MAXADMIN;
11. Restart Tivoli Provisioning Manager. 12. Optional: Delete the maxadmin user from the Tivoli Provisioning Manager user interface. a. Log on to Tivoli Provisioning Manager. b. Click Go To > Security > Users. c. Click the maxadmin user. d. From the User tab, clear the System Account check box. e. Click Save. f. From the Select Action menu, delete the user. 13. Enable LDAP user management as follows:
UPDATE MAXIMO.MAXPROPVALUE SET PROPVALUE = 1 WHERE PROPNAME = mxe.LDAPUserMgmt;
14. Restart Tivoli Provisioning Manager. 15. Log on to the Start Center UI using the new administration user, use the Display Settings link to hide or show the display tabs for the new administration user.
Results
You have created a new administration user with the same permissions as the maxadmin user. Repeat tasks issued from the maxadmin user will fail. The solution to this problem is to delete the repeated tasks and add them back using the new administration user that you have created.
Configuring Tivoli Provisioning Manager for PKCS12 for Microsoft Active Directory
You can configure Tivoli Provisioning Manager to communicate with Microsoft Active Directory with a PKCS12 certificate using Transport Layer Security (TLS) protocol. This configuration applies to both FIPS and non-FIPS implementations. To perform the configuration, you specify settings for the truststore file and communication protocol in the user-factory.xml file. To enable this functionality, Tivoli Provisioning Manager provides an implementation of CustomSSLSocketFactory for secure communication to LDAP using TLS protocol and PKCS12 type keystore files.
Chapter 2. Controlling user access
91
To complete this task, your system must meet the following requirements: v You must have a Microsoft Active Directory certificate generated for LDAP. v The truststore file in PKCS12 format must be created. If you are not using PKCS12, you can also perform this configuration for a JKS truststore and a non-Transport Layer Security protocol environment, for example, SSL.
Procedure
1. Copy the com.ibm.tivoli.tpm.security.realm.CustomSSLSocketFactory.jar jar file from %TIO_HOME%\eclipse\plugins\com.ibm.tivoli.tpm.security.realm to %TIO_HOME%\lwi\lib 2. The user-factory.xml file contains new configuration settings that provide support for PKCS12. To complete the configuration, you modify these settings. The default location of the user-factory.xml file is %TIO_HOME%\config\user-factory.xml. The following table describes the configuration settings.
Table 13. Configuration settings for PKCS12 Configuration setting com.ibm.tivoli.tpm.security.realm.SSLTrustStore Description The truststore file location. Specify the absolute path of the PKCS 12 truststore file. The encrypted truststore password. The truststore type JKS or PKCS12. The SSL protocol, SSLv3 or TLS.
Specify the following settings in the user-factory.xml file: a. The truststore file location, for example c:/testing/trustStore.p12. b. The encrypted truststore file password. c. The truststore type, PKCS12, or, if you are using JKS truststore, you can specify JKS. d. The SSL protocol, TLS, or, if you are using SSLv3 protocol, you can specify SSLv3. 3. Import the Microsoft Active Directory certificate into the truststore that is specified in the com.ibm.tivoli.tpm.security.realm.SSLTrustStore variable in the user-factory.xml file. 4. Restart Tivoli Provisioning Manager. The configuration settings that you specified are enabled when you restart Tivoli Provisioning Manager. Tivoli Provisioning Manager can now communicate with Microsoft Active Directory with a PKCS12 certificate using Transport Layer Security protocol. Note: If you are starting Tivoli Provisioning Manager and a message displays in the console.log and SystemOut.log log files that the CustomSSLSocketFactory class cannot be found, check if there is a com.ibm.tivoli.tpm.security.realm.CustomSSLSocketFactory.jar file in the %LWI_HOME%\lib directory. If not, contact IBM Support. Note: If you are running the soapcli.sh or soapcli.cmd command under %TIO_HOME%/soapclient/ tpmletSoap directory and if you are using a different keystore and truststore, see the instructions at Enabling SSL for TPM.
Example
A sample user-factory.xml file configured for PKCS12 using TLS protocol is as follows:
<ldapRegistry> <initial-context-factory>com.sun.jndi.ldap.LdapCtxFactory</initial-context-factory> <server>vm-tpm-s11.tpmserver.example.com</server> <ldap-port>389</ldap-port> <ldaps-port>636</ldaps-port> <ssl-for-binding>true</ssl-for-binding>
92
<baseDN>ou=users,ou=SWG,o=IBM,c=US</baseDN> <subtree /> <bindingUserName useDN="True">cn=root</bindingUserName> <bindingPassword>YrAjONjSjSPFV6KCj7o3iQ==</bindingPassword> <userSecurityName>uid</userSecurityName> <userUniqueId>dn</userUniqueId> <userDisplayNameAttr>cn</userDisplayNameAttr> <userFilter>(&(uid=%v)(objectclass=inetOrgPerson))</userFilter> <groupSecurityName>cn</groupSecurityName> <groupUniqueId>dn</groupUniqueId> <groupDisplayNameAttr>cn</groupDisplayNameAttr> <groupFilter>(&(cn=%v)(|(objectclass=groupOfURLs)(|(objectclass=groupOfNames) (objectclass=groupOfUniqueNames))))</groupFilter> <groupMember>ibm-allGroups</groupMember> <userMember>ibm-allMembers</userMember> <attributes> <name>cn</name> <first-name>fn</first-name> <last-name>sn</last-name> <home-phone>homeTelephoneNumber</home-phone> <business-phone>businessTelephoneNumber</business-phone> <mobile-phone>mobileTelephoneNumber</mobile-phone> <email>mail</email> <address>postalAddress</address> </attributes> <!-- new settings for the PKCS12 keystore type --> <com.ibm.tivoli.tpm.security.realm.SSLTrustStore> c:/testing/trustStore.p12 </com.ibm.tivoli.tpm.security.realm.SSLTrustStore> <com.ibm.tivoli.tpm.security.realm.SSLTrustStorePassword> YrAjONjSjSPFV6KCj7o3iQ== </com.ibm.tivoli.tpm.security.realm.SSLTrustStorePassword> <com.ibm.tivoli.tpm.security.realm.SSLTrustStoreType> pkcs12 </com.ibm.tivoli.tpm.security.realm.SSLTrustStoreType> <com.ibm.tivoli.tpm.security.realm.SSLProtocol> TLS </com.ibm.tivoli.tpm.security.realm.SSLProtocol> </ldapRegistry>
Procedure
1. Log in to Tivoli Provisioning Manager as the MAXADMIN user. 2. Click Go To > Security > Security Group.
Chapter 2. Controlling user access
93
3. 4. 5. 6. 7.
Click the TPADMIN security group. Click the Applications tab. Use the filter to search for and select Security Group. Select the Grant Access option for the Delete Group signature option. Select the Grant Access option for the Read Global Data signature option.
Results
Your have now enabled the Applications tab in the Security Group application.
Procedure
v To configure Tivoli Directory Server: 1. Enable the administration password policy and modify the default settings by issuing the following command:
idsldapmodify -D cn=root -w password -i pwdPolicy.ldif
2. You must restart the Tivoli Provisioning Manager server for the changes to take effect. For more information see: ../com.ibm.tivoli.tpm.ins.doc/install/tlog_startserver_win.dita ../com.ibm.tivoli.tpm.ins.doc/install/tlog_startserver_ulx.dita v To configure Microsoft Active Directory, follow the instructions in "Apply or modify account lockout policy" help in the Microsoft documentation.
94
Results
After completing this procedure, if a user tries to log on using a wrong password more than three times he gets locked out of the system. To verify which users are locked from the system run the command:
ldapsearch -D cn=root -w password -b "dc=ibm,dc=com" -s sub "(pwdAccountLockedTime=*)"
Note: "dc=ibm,dc=com" might assume a different value. Issue the ldapsearch command to see this value. To unlock a user, run the command:
idsldapmodify -D cn=root -w password -i unlockAccount.ldif -k
Note: The unlockAccount.ldif file has the following content, assuming that the locked user is a tester:
dn:cn=tester,dc=ibm,dc=com changetype:modify replace: ibm-pwdAccountLocked ibm-pwdAccountLocked: FALSE
Procedure
1. Launch Tivoli Provisioning Manager. For example, https://<fully_qualified_domain_name>:9443/ maximo. 2. At the error message stating that the security certificate was not issued by a trusted certificate authority, click Continue to this website (not recommended) to be directed to the login screen. 3. On the security bar, click Certificate Error. 4. In the Untrusted Certificate window, click View certificates. 5. A message that the certificate cannot be verified is displayed. Click Install Certificate to launch the Certificate Import Wizard. 6. On the Welcome page, click Next. 7. On the Certificate Store panel, select Automatically select the certificate store based on the type of certificate. 8. To import the certificate, click Next and then click Finish. 9. A security warning will alert you that you are installing a certificate from your provisioning server, <fully_qualified_domain_name>. Click Yes to continue the installation. 10. When the installation completes, restart the Web browser. 11. Launch Tivoli Provisioning Manager. The login page will display without the certificate error now.
Chapter 2. Controlling user access
95
Results
The certificate is now imported to the Web browser.
Changing passwords
Changing the Maximo user and database password
To change the Maximo user password and the database password, run the changePassword command, update the password on the operating system level, and then update the maximo.properties file.
Review the password restrictions and unsupported characters listed in the Installation Guide: Verify requirements for user names, database names, and user passwords To change the maximo user password and the database password, follow these steps:
Procedure
1. Stop the provisioning server. For more information, see the detailed documentation for the tio command 2. Start WebSphere Application Server. v
Windows
%TIO_HOME%\tools\tio.cmd start -w
v v
UNIX Linux $TIO_HOME/tools/changePassword.sh -c database -u wasadmin -p <wasadmin_password> -n <new_maximo_password> 4. Stop WebSphere Application Server.
Windows
%TIO_HOME%\tools\tio.cmd stop -w
UNIX Linux $TIO_HOME/tools/tio.sh stop -w v 5. Change the maximo password at the operating system level. 6. On the administrative workstation, update the maximo.properties file with the new maximo password. a. Back up the <Maximo_HOME>\applications\Maximo\properties\maximo.properties file. For example, save the maximo.properties file in another location on the administrative workstation. b. In the <Maximo_HOME>\applications\Maximo\properties\maximo.properties file, remove the encrypted value and mxe.encrypted=true. The encrypted value is at the end of the file. c. If the following line is included in the maximo.properties file, remove it:
96
mxe.crontask.donotrun=ALL
e. To encrypt the maximo.properties file, run the encryptproperties command, located in MAXIMO_HOME\maximo\tools\maximo
Windows UNIX
encryptproperties.bat
encryptproperties.sh f. Open the new maximo.properties file and verify that it contains an encryption string at the end. For example:
mxe.rmi.port=0 mxe.crontask.donotrun=ALL mxe.report.birt.disablequeuemanager=1 mxe.db.driver=com.ibm.db2.jcc.DB2Driver mxe.db.schemaowner=maximo mxe.name=MXServer mxe.db.url=jdbc:db2://vm-tpm-s126.tpmserver.example.com:50005/MAXDB71 mxe.registry.port=13400 mxe.db.user=maximo mxe.encrypted=true <81>3<82>g^CAc^KPAo^?<89><86>_A"Ac<8a><8c>^Bu^SA^O^G[g^FWA9AA ^D}<9a>9Y{ASA< TA-^R<88> ~
7. Change the maximo.properties file on the provisioning server: a. Copy the new maximo.properties file from the Administrative Workstation to the following folders on the provisioning server:
%TIO_HOME/lwi/runtime/tpm/eclipse/plugins/tpm_pmp/properties %TIO_HOME/eclipse/plugins/tpm_pmp/properties
c. Create a temporary directory, for example, temp and then change to that directory: cd temp d. Run the following command copy the maximo.properties file with the modified encrypted password to the temp directory, replacing the original one:
JAVA_HOME\bin\jar -xvf WAS_HOME\profiles\ctgAppSrv01\installedApps\ctgCell01\Maximo.ear\properties.jar .
e. Run the following command to repackage the properties.jar file with the updated password in the maximo.properties file. After the command has run, you can delete the temp directory and its contents.
JAVA_HOME\bin\jar -cvf WAS_HOME\profiles\ctgAppSrv01\installedApps\ctgCell01\Maximo.ear\properties.jar .
f. Depending on your platform, navigate to %TIO_HOME%\lwi\runtime\tpm\eclipse\plugins\tpm_pmp\ properties or $TIO_HOME/lwi/runtime/tpm/eclipse/plugins/tpm_pmp/properties and ensure that the following lines are included and have the correct values:
mxe.crontask.donotrun=ALL mxe.report.birt.disablequeuemanager=1 mxe.rmi.enabled=0
%TIO_HOME%\tools\tio.cmd start -t
UNIX Linux $TIO_HOME/tools/tio.sh start -t v 9. Log into the provisioning Web interface using the new maximo password.
Results
The maximo user password and database password is changed.
97
Note: To verify that the user is changed after this procedure, start Tivoli Provisioning Manager and look for following message in <WAS_INSTALL>\profiles\ctgAppSrv01\logs\MXServer\SystemOut.log. If that message is present it verifies the database connection.
BMXAA6451I BMXAA6385I BMXAA6388I BMXAA6389I BMXAA6390I BMXAA6391I Connection BMXAA6453I - The database manager is psdi.server.DBManager@43164316 - Connecting to the database at: jdbc:db2://vm-tpm-s122.tpmserver.example.com:50005/maxdb71 - Database product: DB2/NT - Database product version: SQL09053 -- 9.5 - Database driver: IBM DB2 JDBC Universal Driver Architecture - Database driver version: 3.53.70 pool initialized with 8 free connections. - The server is connecting to database version: V7115-149
Procedure
1. Stop the provisioning server. v v
Windows UNIX
%TIO_HOME%\tools\tio.cmd stop
Linux
$TIO_HOME/tools/tio.sh stop
For more information , see the detailed documentation for the tio command 2. Start WebSphere Application Server. v
Windows
%TIO_HOME%\tools\tio.cmd start -w
v v
UNIX Linux $TIO_HOME/tools/tio.sh stop -w v 5. Change the wasadmin password in the LDAP server. 6. Start the provisioning server.
Windows
%TIO_HOME%\tools\tio.cmd start -t
UNIX Linux $TIO_HOME/tools/tio.sh start -t v 7. Verify that the password works by logging on to the WebSphere Application Server Administrative Console: http://<host_name>:9060/admin
Results
The wasadmin password is now changed.
98
Procedure
1. Back up the master copy of the web.xml file located in the administration workstation SMP location. On Windows, back up the web.xml file located in C:\ibm\SMP\maximo\applications\maximo\ maximouiweb\webmodule\WEB-INF directory. On UNIX platforms, the web.xml file is located in the %WAS_HOME%/profiles/ctgAppSrv01/installedApps/ctgCell01/MAXIMO.ear/maximouiweb.war/WEBINF directory. 2. Open the web.xml file, and comment out the following configuration that specifies the BASIC authentication method:
<login-config> <auth-method>BASIC</auth-method> <realm-name>MAXIMO Web Application Realm</realm-name> </login-config>
3. Uncomment the following configuration that defines the FORM base authentication:
<login-config> <auth-method>FORM</auth-method> <realm-name>MAXIMO Web Application Realm</realm-name> <form-login-config> <form-login-page> /webclient/login/login.jsp?appservauth=true</form-login-page> <form-error-page>/webclient/login/loginerror.jsp</form-error-page> </form-login-config> </login-config>
4. Save the web.xml file. 5. Rebuild the Maximo EAR file on the administrative workstation to invoke the changes. To rebuild the Maximo EAR, run one of the following scripts, depending on your platform: a. On Windows systems, run the buildmaximoear script, located in the C:\Maximo\deployment directory on the administrative workstation. b. On UNIX systems, run the buildmaximoear.sh script, located in the /opt/IBM/SMP/maximo/ deployment directory on the administrative workstation. 6. Deploy the Maximo EAR to WebSphere Application Server. You can deploy the Maximo EAR using WebSphere Application Server or you can use the command line. To view command line instructions about how to deploy the Maximo EAR file, see Manually deploying the EAR file. To deploy the Maximo EAR on WebSphere Application Server, complete a process similar to the following example on WebSphere Application Server v6.1.0.29: a. Log on to WebSphere Application Server. b. Click Applications, then Enterprise Applications. c. Uninstall the previous Maximo EAR before you begin redeploying the new one because updating the existing Maximo EAR can cause caching issues. d. Click Install. e. If WebSphere Application Server is on the administrative workstation, navigate to the location of the Maximo EAR by clicking Local File System. If you do not have direct access to the
Chapter 2. Controlling user access
99
administrative workstation on which the Maximo EAR is located, click Remote File System and navigate to the Maximo EAR location, for example on Windows C:\ibm\SMP\maximo\deployment\ default, and click the file. f. Click OK, then click Next. g. On the Select installation options screen, make sure that the Maximo installation is selected. If there are multiple Maximo installations on your WebSphere Application Server environment, click the specific application name for the installation. Then click Next. h. On the Map modules to servers screen, select the web server and application server in the Clusters and Servers box, select all of the modules, then click Apply. i. Click Next. j. On the Map virtual hosts for Web modules screen, click the options for your installation and change the Virtual host options to the host you have set up for the Maximo application. Click Next. k. On the Summary page, review the summary and click Finish. l. After the Maximo EAR file has installed, click Save to save your changes. The Maximo EAR is now deployed to the server. m. Go to the WAS console and from the navigation tree, click Applications > Enterprise Applications. Then click MAXIMO > Class loading and update detection. For WAR class Loader Policy, the Class loader for each WAR file in application option is selected by default. Click the Single class loader for application option. Click Save to save your changes. n. Restart Tivoli Provisioning Manager. If you have problems logging into Tivoli Provisioning Manager after rebuilding the Maximo EAR, see https://www-304.ibm.com/support/ docview.wss?uid=swg21321974 for information about how to resolve the issue.
Results
You have now changed the authentication to form base login. You can access the Tivoli Provisioning Manager system using the same URL where a login form is used instead of basic authentication.
100
Procedure
1. Click Security > SSL certificate and key management. 2. Select Manage endpoint security configurations. 3. Under Inbound > nodes, open the node called ctgNode01(NodeDefaultSSLSettings, null). 4. Open Servers and select MXServer. 5. Click SSL configuration. In the list of SSL profiles, find the TpmSSLProfile. The displayed page contains information about the truststore and keystore. The default values are TpmTrustStore and TpmKeyStore, respectively. 6. Select Keystores and certificates to find the location of the keystore. Find the TpmKeyStore and note the location. 7. To import a certificate with the keytool, run the following command:
keytool v import v alias <cert_alias> -keystore <keystore_location> -storepass <keystore_ password> -file <cert_file_location>
where cert_alias is the name of the certificate. keystore_location is the location of the TpmKeyStore. keystore_ password is the password of the keystore. cert_file_location is the location of the certificate. Note: This step is based on importing the certificate with the keytool that is provided as part of the JDK. Interfaces may be different, depending on what tool is used. For more information about using the keytool, type keytool, without any parameters, to display the Help feature.
Procedure
1. Click Security > SSL certificate and key management. 2. Click Manage endpoint security configurations. 3. Expand the inbound nodes in the Local Topology window. Open the node called ctgNode01(NodeDefaultSSLSettings, null)). Open Servers and select MXServer. 4. To display the SSL profiles, click SSL configuration. Find the TpmSSLProfile. 5. Click get certificate aliases. Under Default server certificate alias, select the certificate alias that was imported.
Chapter 2. Controlling user access
101
Operations on users and security groups can be divided on the basis of the duration of their effects. They can be either done at all times or to last temporarily.
102
4. 5. 6. 7. 8.
b. Go to the Group tab of the selected group, and from the Select Action select the Authorize Group Reassignment option. c. Click Select Users, choose the TPADMIN from the list, and click OK. Confirm by clicking OK again. Log on again to Tivoli Provisioning Manager system, this time as TPADMIN. GoTo > Security > Security Groups. In the Group field type in the name of the group you want to add the user to, and search for it. Go to Users tab, and click Select Users. Choose the user for whom you want to add the new privilege, and click OK. to save the new settings.
9. Click
You have now temporarily added new privileges to a user of your choice. The change will be overwritten with the information from LDAP as soon as the next VMMSYNC cron task will be run.
Configuring SSL communication for Tivoli Provisioning Manager and DB2 9.5
To deploy a system that is fully FIPS (Federal Information Processing Standard) enabled, you require a FIPS-compliant secure socket layer (SSL) configuration between Tivoli Provisioning Manager and DB2. To set up a FIPS-compliant SSL configuration between Tivoli Provisioning Manager and DB2, you must perform a number of configuration tasks, each of which is described in detail in the following sections.
Procedure
1. Go to http://www-01.ibm.com/support/docview.wss?rs=71&uid=swg21363866. 2. Search for and download the v9.5 FP6 DB2 level (3.59.81 JDBC driver version). 3. Install the 3.59.81 version of the JDBC driver in the locations described here: a. Log on to WebSphere Application Server. b. Click Environment > WebSphere Variables > DB2_JDBC_DRIVER_PATH. There might be two entries for DB2_JDBC_DRIVER_PATH. Search for the one at ctgNode01, that is, Node=ctgNode01. c. Note the value of DB2_JDBC_DRIVER_PATH variable. d. Stop Tivoli Provisioning Manager. e. Replace the db2jcc.jar file with the 3.59.81 version of the JDBC driver that you downloaded, at the location specified in the DB2_JDBC_DRIVER_PATH variable. f. Replace the JDBC driver in the %TIO_HOME%/lwi/runtime/tpm/eclipse/plugins/tpm_pmp/maximoLibs directory with the new JDBC driver that you downloaded. g. Start Tivoli Provisioning Manager.
Results
You have upgraded your version of JDBC. Now proceed to configure DB2 for SSL.
103
Procedure
1. The GSKit is a set of programmable interfaces that allows applications to be SSL enabled. You need a GSKit for SSL communication for DB2. DB2 uses gsk7 to provide SSL support and requires the libraries on the system path. iKeyman, which is used to manage truststore files, keystore files, and certificates, is part of the GSKit installed with Tivoli Provisioning Manager. It is available in the following location:
C:\program Files\IBM\gsk7\bin\gsk7ikm.exe
There is also a copy of iKeyman, bundled with DB2, available in the following location:
<DB2_INSTALL_PATH>\SQLLIB\java\jdk\jre\bin\ikeyman.exe
v Use the following link for general information about the GSKit http://www-01.ibm.com/support/ docview.wss?rs=71&context=SSEPGG&dc=DA400&uid=swg21249656&loc=en_US&cs=UTF-8 &lang=en&rss=ct71db2. v To get the DB2 security plug-ins required for SSL support, download them from https://www14.software.ibm.com/webapp/iwm/web/reg/pick.do?lang=en_US&source=swg-dmdb2ldap&S_TACT=swg-dm-db2ldap. 2. After you have installed the GSKit, set the environment variables. You need to be logged in as an administration user, for example tioadmin, to complete this step. Click Start > Run and enter sysdm.cpl to launch the System Properties. Click Advanced > Environment Variables. In the System variables list, create the environment variables listed in the following table, if necessary, and set them to the values provided.
Table 14. Environment variable settings Variable JAVA_HOME PATH CLASSPATH LIB Variable value C:\Program Files\IBM\SQLLIB\java\jdk\jre; Note: Use the JDK path for the JRE installed with DB2. C:\Program Files\IBM\gsk7\lib;%PATH%; C:\Program Files\IBM\gsk7\classes\cfwk.zip;C:\Program Files\IBM\gsk7\classes\ gsk7cls.jar;%CLASSPATH%; C:\Program Files\IBM\gsk7\lib;C:\PROGRA~1\IBM\SQLLIB\LIB;%LIB%
Note: If you are using a 64-bit platform, you need to need to set your environment variables and reference the GSKit utilities relative to the GSK7_64 installed directory. 3. Create a server keystore file and certificate. DB2 SSL configuration requires a CMS-type keystore and a certificate for SSL communication. Use iKeyman to create a CMS keystore, as follows: a. Run C:\Program Files\IBM\gsk7\bin> gsk7ikm.exe. b. Create a new Key Database file, key.kdb of type CMS. Provide a password and make a note of this password. c. Create a new self-signed certificate, define the key label (it can be anything, such as SSLLabel), and provide the organization name. For the version, specify X509-V3 and 1024 for the key size. The other items are optional. d. Click OK. The new certificate is displayed in the menu. e. Click the certificate and click View/Edit from the right pane. Make sure that Set the Certificate as the Default is selected.
104
f. Click the certificate (for example, SSLLabel) and click Extract Certificate. In the Extract a certificate to a File dialog that opens, select Base64-encoded ASCII data from the Data type drop-down list. You can use the default name, cert.arm. g. Click OK. 4. Configure the DB2 environment, as follows: a. In the command window, run the following command:
set db2instance=ctginst1
b. The DB2COMM registry variable sets communication protocols for the current DB2 instance. If the DB2COMM registry variable is undefined or set to null, no protocol connection managers are started when the database manager is started. Set the DB2COMM registry variable using the following command:
db2set DB2COMM=SSL,TCPIP
c. If it does not exist, create the SSLconfig.ini file in the C:\Documents and Settings\All_Users\ Application Data\IBM\DB2\DB2COPY1\ctginst1 directory. Modify the path, port, and password as required. Include the following data with values similar to those provided:
DB2_SSL_KEYSTORE_FILE= (the location of the key.kdb created in the previous step) DB2_SSL_LISTENER=30171 (check the services file for an unassigned port number C:\WINDOWS\system32\drivers\etc\services file) DB2_SSL_KEYSTORE_PW=xxxxxx (the password provided when creating the key.kdb) DB2_SSL_KEYSTORE_LABEL=SSLLabel (the key label specified for the self-signed certificate)
d. Increase the security on the SSLconfig.ini file by modifying the security permissions for the db2admin user, as follows: 1) Right click the SSLconfig.ini file in Windows and click Properties. 2) Click the Security tab. 3) Click Add to add security permissions for the db2admin user and no other user. 4) Set the following permissions on the SSLconfig.ini file for the db2admin user: v Check the Full Control option. v Check the Modify option. v Check the Read and Execute option. v Check the Read option. v Check the Write option. 5) Save the permissions changes for the SSLconfig.ini file. e. Check that there are no instances connected to the database and then stop and start DB2 using db2stop and db2start commands from the command window. Check that DB2 starts without any errors. If the following message is displayed after you start DB2, check the db2diag.log file:
10/30/2007 16:19:15 0 0 SQL5043N Support for one or more communications protocols failed to start successfully. However, core database manager functionality started successfully. SQL1063N DB2START processing was successful.
For more information about this error in the db2diag.log file, see the following document http://www.redbooks.ibm.com/redbooks/pdfs/sg247555.pdf. f. If the following error is displayed after you start DB2, reboot the server:
CTGINST1-0 : The service has returned a service-specific error code. 09/24/2010 23:27:56 0 0 SQL1042C An unexpected system error occurred. SQL1032N No start database manager command was issued. SQLSTATE=57019
5. A signer certificate is the trusted certificate entry that is normally in a truststore file. Import the signer certificate for the database into the WebSphere Application Server truststore file: a. Copy the cert.arm file that you exported in the previous step to WebSphere Application Server. b. Log on to the admin console, http://hostname:9060/admin. c. Click Security -> SSL certificate and key management, then click the Key stores and certificates link under the Related items.
Chapter 2. Controlling user access
105
d. Click CellDefaultTrustStore. A path to the truststore file is displayed. If you want to use a different tool to import the certificate into the truststore file, note the location of the truststore file. Otherwise, complete the following steps to import the signer certificate using the WebSphere Application Server interface. e. Click Signer certificates. f. Click Retrieve from port, enter the host name of the DB2 server, the SSL port number (for example, 30171), and the alias of the certificate that you are importing (for example, SSLLabel). g. Click Retrieve signer information and click OK to import the certificate. If you see any error messages, make sure that the entries you made in the SSLConfig.ini file are correct and that there are no syntax errors. 6. Import the signer certificate into the Common Agent Services web component: a. Log on to the admin console, http://hostname:21001/admin b. Go to Security -> SSL certificate and key management, click the Key stores and certificates link under the Related items. c. Click NodeDefaultTrustStore. The path to the truststore file is displayed. If you want to use a different tool to import the certificate into the truststore, make a note of the location of the truststore file from this page. Otherwise, complete the following steps to import the signer certificate using the WebSphere Application Server interface. d. Click Signer certificates. e. Click Retrieve from port, enter the host name of the DB2 server, the SSL port number (for example, 30171), and the alias of the certificate to be imported (for example, SSLLabel). f. Click Retrieve signer information, click OK to import the certificate.
Results
You have configured DB2 for SSL. Now proceed to configure the deployment engine for SSL DB2 connection.
Procedure
1. Make sure that the location of your truststore file exists, then update the maximo.properties file by replacing the following line:
mxe.db.url=jdbc:db2://<db2-server>:50005/MAXDB71
For example:
mxe.db.url=jdbc:db2://vip-tpm-s73.tpmserver.example.com:<30171>/maxdb71:sslConnection=true; sslTrustStoreLocation=c:/keystores/DeploymentEngine/detruststore.p12;sslTrustStorePassword=password;
You must update the maximo.properties file with this change in the following two locations: v %TIO_HOME%\lwi\runtime\tpm\eclipse\plugins\tpm_pmp\properties\ v %TIO_HOME%\eclipse\plugins\tpm_pmp\properties\ 2. Increase the security on the maximo.properties file by modifying the security permissions for the tioadmin user, as follows: a. Right click the maximo.properties file in Windows and click Properties. b. Click the Security tab.
106
c. Click Add to add security permissions for the tioadmin user and no other user. d. Set the following permissions on the maximo.properties file for the tioadmin user: v Check the Full Control option. v Check the Modify option. v Check the Read and Execute option. v Check the Read option. v Check the Write option. e. Save the permissions changes for the maximo.properties file. 3. Restart Tivoli Provisioning Manager.
Results
You have configured MXServer for SSL DB2 communication. Now proceed to configure the CDS data source in WebSphere Application Server.
Procedure
1. Log on to http://<tpm-hostname>:9060/admin as wasadmin. 2. Click Resources > JDBC > Data Sources and click CDSDataSource. 3. Change the port number for the SSL port being configured in the SSLconfig.ini, port number 30171 in this example. 4. Click Apply to apply the change of port number. 5. Click Custom properties, click New to create the sslConnection property with the following values: v Name: sslConnection v Value: true v Type: java.lang.Boolean 6. Click OK to add the new variable. 7. Click CDSDataSource to return to the CDSDataSource data source panel. 8. Click Test connection. The following error might be displayed:
Changes have been made to the node, <nodename>, which have not been synchronized. You must synchronize these changes to the master configuration before performing this action.
a. Click the synchronize link to synchronize the changes in the node level with the master configuration. b. Check the Synchronize changes with Nodes. c. Click Save, then OK. d. Click CDSDataSource to return to the CDSDataSource data source panel. e. Click Test connection. The following message displays if the connection is successful:
The test connection operation for data source CDSDataSource on server MXServer at node <nodename> was successful.
Results
You have configured the CDS data source in WebSphere Application Server. Now proceed to configure the Agent Manager
107
Procedure
1. Log on to http://<tpm-hostname>:21001/admin as wasadmin. 2. Click Resources > JDBC > Data sources and click AgentRegistry. 3. Change the port number to the SSL port being configured in the SSLconfig.ini file, 30171 in this example. 4. Click Apply to apply the port number change. 5. Click the Custom properties, then click New to create the sslConnection property with the following values: v Name: sslConnection v Value: true v Type: java.lang.Boolean 6. Click OK to add the new variable. 7. Click AgentRegistry to go back to the AgentRegistry data source panel. 8. Click Test connection. The following error message might be displayed:
Changes have been made to the node, <nodename>, which have not been synchronized. You must synchronize these changes to the master configuration before performing this action.
a. Click the synchronize link to synchronize the changes in the node level to the master configuration. b. Check the Synchronize changes with Nodes. c. Click Save, then OK. d. Click AgentRegistry to return to the AgentRegistry data source panel. e. Click Test connection. The following message is displayed if the connection is successful:
The test connection operation for data source AgentRegistry on server server1 at node <nodename> was successful.
Results
You have configured the Agent Manager. Now proceed to configure DMS for SSL DB2 connection.
Task 6 Configuring the device manager service for SSL DB2 connection
You must configure the device manager service for a secure socket layer DB2 connection. You must modify the Transaction.properties file and specify the clear text password.
Procedure
1. Open the Transaction.properties file:
WAS_HOME\profiles\ctgAppSrv01\installedApps\ctgCell01\DMS_WebApp.ear\dmserver.war \WEB-INF\classes
with:
JDBC.dbConnect=jdbc\:db2\://db-server-hostname\:30171/MAXDB71\:currentSchema\=MAXIMO; sslConnection\=true;sslTrustStoreLocation\=c\:/keystores/DeploymentEngine /detruststore.pkcs;sslTrustStorePassword\=password;
108
where, sslConnection The setting to notify Java Database Connectivity to use the secure socket layer to communicate to the database. sslTrustStoreLocation The location of the truststore containing the certificate of the DB2 server for the secure socket layer communication. sslTrustPassword The clear text password for the truststore. 3. To encrypt the sslTrustStorePassword value: v Install Tivoli Provisioning Manager 7.1.1-IF00007; or v Run Tivoli Provisioning Manager change password script with old database password. To set the new password:
dmsetpw -new new_password -db -user WASusername -password WASpassword
where, new_password Specifies the new password for the database user or the WebSphere Portal Server user. db Identifies if the password is changing for the database user.
user WASusername Identifies the WebSphere Application Server user name for the WebSphere Application Server user name. password WASpassword Identifies the WebSphere Application Server password for the WebSphere Application Server user name. 4. Restart Tivoli Provisioning Manager.
Results
You have configured the device manager service for SSL DB2 connection. Now proceed to configure dcm.xml for SSL DB2 connection.
Procedure
1. Open the %TIO_HOME%/config/dcm.xml file in a text editor. 2. In the URL, update the port number with the SSL port number. In this example, the SSL port number is 30171, so replace:
<url>jdbc:db2://<db-hostname>:50005/MAXDB71</url>
with:
<url>jdbc:db2://<db-hostname>:30171/MAXDB71</url>
3. Create a truststore file and import the DB2 certificate into the truststore file. You can create the truststore file using IKEYMan. The truststore file that you create must be the same type specified in
Chapter 2. Controlling user access
109
the keystore.type property in the %WAS_HOME%/java/jre/lib/security/java.security file. Note that when FIPS is enabled, the keystore.type is set to pkcs12 as follows:
keystore.type=pkcs12
4. To encrypt the password of the truststore file, run the encrypt.cmd from the %TIO_HOME%/tools directory. 5. Add the following new settings to the dcm.xml file to enable SSL:
<SSL-enabled>true</SSL-enabled> <trustStore>location of the truststore</trustStore> <trustStorePassword>UAFmTeSxKPmERDmQdQlNOg==</trustStorePassword>
Results
You have configured dcm.xml for SSL DB2. Now you can configure SSL-only communication.
Procedure
1. Log on to DB2. 2. Set the DB2COMM registry variable using the following command:
db2set DB2COMM=SSL
3. Ensure that Tivoli Provisioning Manager is stopped. 4. Restart DB2. 5. Start Tivoli Provisioning Manager.
Results
You have now configured Tivoli Provisioning Manager to communicate with DB2 using the secure socket layer protocol.
110
Auditing changes
Electronic signatures, audit records, and login tracking provide an additional level of security control and auditing capability. You can enable electronic signatures, login tracking, and audit records for Tivoli Provisioning Manager. Enabling these features provides you with greater tracking ability. Login tracking Login tracking controls the number of login attempts allowed and displays the current login status of the user. Information about how to enable login tracking is available in the Maximo online help. You can access this information by completing the following steps in Tivoli Provisioning Manager: 1. Click Go To > Security > Security Group. 2. Click Help and then Help. 3. Go to Overview > About Login Tracking. Note: When user accounts are managed on an LDAP server, you must configure the LDAP server to enforce limits on maximum login attempts and block login access if users exceed the limit. For more information, see Configuring failed login limits on the LDAP server on page 94. Electronic signatures Electronic signatures ensure that the individual saving or changing a record or accessing a specific action is the same individual who is logged in. When this feature is enabled and users try to save a change to a field, they must authenticate before they can continue. Information about how to enable electronic signatures is available in the Maximo online help. Electronic audit records Electronic audit records provide an audit trail by tracking changes on the records. Each time users add, delete, or modify the value of an attribute and save the change, an audit record is written to the audit object corresponding to the regular database object. Information about how to enable auditing and electronic signatures is available in the Maximo online help. You can access this information by completing the following steps in Tivoli Provisioning Manager: 1. Click Go To > System Configuration > Platform Configuration > Database Configuration. 2. Click Help and then Help. 3. Go to How Do I > Enable Electronic Signatures and Electronic Audit Records. Note: For information about configuring the database for the audit table creation in the Maximo online help, see the Database Configuration section in System Administrator's Guide.
111
Note: If you configured the database using Admin mode, you must restart Tivoli Provisioning Manager for the changes to take effect. For more information, see Starting and stopping the provisioning server on Windows or Starting or stopping the provisioning server on UNIX or Linux, depending on your platform. When you search for tables on which to enable audit, some tables are view-only. If you search for part of the table name using the Filter or Find field, the table might not display in the search results. Use the full table name in the Find filter field when you search for a provisioning table to audit. The following table lists some of the important provisioning applications tables.
Table 15. Table names Table name SOFTWARE_RESOURCE RESOURCE SOFTWARE_MODULE HOST_PLATFORM SERVER Table name to use for searches TP_SOFTWARERESOURCE TP_RESOURCE TP_SOFTWAREMODULE TP_HOSTPLATFORM TP_SERVER
On DB2 only, you can fix long audit columns after you configure the database in Maximo: 1. Log on to the provisioning server as tioadmin. 2. Run the following command: v Windows: %TIO_HOME%\migration\scripts\FixLongAuditColumn.cmd v UNIX or Linux: $TIO_HOME/migration/scripts/FixLongAuditColumn.sh After you run this command, a log file is available in $TIO_LOGS/migration/fixLongAuditColumn.log. Audit tables track the changes to objects when auditing is enabled on the objects. When auditing is enabled on an object, a corresponding audit table is created in the database where the users can see these changes. This audit table has a column called EAUDITUSERNAME that keeps track of the name of the user who changed the object. When a change is made from the UI on this object, the EAUDITUSERNAME column records the name of the user who is logged in, for example, SmithJ. However, if a change is made using a workflow, such as discovering a computer using Initial Discovery, these workflows always run as MAXADMIN and EAUDITUSERNAME column has MAXADMIN as its value rather than the name of the user who is logged in. For more information about electronic signatures, audit records, and login tracking features, see Electronic Signatures and Audit Records section in System Administrator's Guide. Auditing reports There are several auditing reports provided: v A report for user login history, tp_loginTrackingDetail, is available. You must enable login tracking to use the tp_loginTrackingDetail report. If login tracking is not enabled, the report is not displayed, and no error messages are provided. v You can also use a report to monitor user sessions, user_session.rptdesign. This report provides a bar chart that shows you the active and inactive user sessions for a given date range. v There is also a predefined report for user types, usertype.rptdesign. Use this report to see a bar chart of how many user sessions are active, inactive, and blocked. You can also create other reports as required. For more information about creating reports, see the Report Developer's Guide. Related links Chapter 14, Reports, on page 1187
112
Predefined reports on page 1190 Getting started with reports on page 1188
For more information about configuring LDAP authentication, see the Tivoli Provisioning Manager Version 7.2 Installation Guide.
113
To configure LDAP, you must identify a custom user registry to specify how the provisioning server accesses the information in your LDAP. A user registry authenticates a user and retrieves information about users and groups to perform security-related functions, including authentication and authorization. A custom user registry is a customer-implemented user registry. It can support virtually any type of an account repository and provides considerable flexibility in adapting product security to various environments. Before configuring LDAP, you need to do the following v Ensure that the custom user registry (CUR) is implemented. Two sample custom user registries for accessing the following general LDAP: IBM Tivoli Directory Server:
com.ibm.tivoli.websphere.customSecurity.sample.IDSCurImplementation
If these samples, do not suit your system requirements, you can implement your own custom user registry. To create your own, see the WebSphere Application Server documentation on custom user registries for more information. v Identify a user to be used to access the WebSphere Application Server administrative console. The two custom user registry samples identify the user that logs in to the WebSphere Application Server administrative console. The user that you identify must be an existing user in your LDAP. For more information, see the sample information for LDAP.
LDAP synchronization
Use the synchronization option for keeping your Tivoli Provisioning Manager and LDAP servers updated. When you change user and group structure and attributes in LDAP, you must import the changes into the Tivoli Provisioning Manager system. WebSphere Application Server provides a general capability called Virtual Member Management which allows multiple LDAPs and custom user registries to be plugged in underneath WebSphere Application Server, and, thus, display as a single logical user repository to any WebSphere Application Server application such as Tivoli Provisioning Manager. While the users are defined and maintained in the repositories, Tivoli Provisioning Manager needs to know who they and the group to which they belong. You can keep Tivoli Provisioning Manager up-to-date by running a periodic task known as VMM Sync Cron task. 1. In Tivoli Provisioning Manager, click Go To > System Configuration > Platform Configuration > Cron Task Setup. 2. Type the VMMSync into the Cron Task field and click Enter. 3. Activate the Virtual Member Manager synchronization by clicking the Active? check box. 4. To keep the history of all the activities of the VMM Sync Cron task, check the Keep History? check box and type 50 in the Max Number of History Records field. 5. Save the changes by clicking 6. Click .
for the list of available security groups, and select the appropriate one.
114
provides sample configurations using Tivoli Directory Server and Microsoft Active Directory (MSAD). Correctly configuring the user-factory.xml file enables the authentication service to be performed for the Web service interface.
115
<userMember>ibm-allMembers</userMember> <attributes> <name>cn</name> <first-name>fn</first-name> <last-name>sn</last-name> <home-phone>homeTelephoneNumber</home-phone> <business-phone>businessTelephoneNumber</business-phone> <mobile-phone>mobileTelephoneNumber</mobile-phone> <email>mail</email> <address>postalAddress</address> </attributes> </ldapRegistry> </ldapRegistries> </user-database>
The information that is required for the Tivoli Directory Server LDAP sample implementation is specified in the ldapRegistries element in the user-factory.xml file. The following tables provide the information about how the ldapRegistry is constructed and configured for Tivoli Directory Server support.
Table 17. General LDAP server configuration Attribute ws-security Description Specifies if the Web service is enabled. True or false values indicate if the Web service security is turned on or off. The Web service is enabled if you specify true. The user role required to run Tivoli Provisioning Manager Web service commands. The default value is TPWEBSERVICEUSER. The host name of the Tivoli Directory Server. It must be a fully qualified host name. The non-secure socket layer (SSL) port for the LDAP protocol. This port number is normally 389. The SSL port for the LDAP protocol. This port number is normally 636. Specifies if the SSL is used for communication between Tivoli Provisioning Manager and Tivoli Directory Server. Additional configuration is required when you use the LDAPs protocol. See the related documentation for how the LDAPs is enabled in the Tivoli Directory Server. The base DN that Tivoli Provisioning Manager will search for in the user and group information. In Tivoli Directory Server, the base DN can be the suffix that the user and group information resides in. An additional way to specify the name of the context or object to search. For example, if the user information resides in an OU-TIO under the suffix specified in the baseDN element, specify OU=TIO under subtree to refine the search to the organization unit, TIO. bindingUserName bindingPassword The user name that is used to bind to the Tivoli Directory Server. The encrypted password that is used together with the bindingUserName to bind to the Tivoli Directory Server.
baseDN
subtree
Table 18. User-specific LDAP server configuration information Attribute userSecurityName Description This is used for user authentication and authorization in WebSphere Application Server. The value of the attribute in Tivoli Directory Server is used to validate the user login name when accessing Tivoli Provisioning Manager. The unique identifier for the user. The value has to be unique for all registered Tivoli Directory Server directories. It has a value of dn.
userUniqueId
116
Table 18. User-specific LDAP server configuration information (continued) Attribute userDisplayNameAttr userFilter Description This is used to specify the attribute to store the display name of the user that is shown in the Web interface. This filter is used for searching for the user in the registry. It contains information such as the objectclass that the user belongs to. For example, (&(cn=%v)(objectclass=organizationalPerson) . The parameter %v is necessary because during the search, the %v is replaced with the real user name.
117
The information that is required for the Microsoft Active Directory LDAP sample implementation is mainly focused in the ldapRegistries element in the user-factory.xml file. The following tables provide the information about how the ldapRegistry is constructed and configured for Microsoft Active Directory support:
Table 19. General LDAP server configuration Attribute ws-security Description Specifies if the Web service security is enabled. True or false values indicate if the Web service security is turned on or off. The Web service security is enabled if you specify true. The user role required to run Tivoli Provisioning Manager Web service commands. The default value is TPWEBSERVICEUSER. The host name of the Microsoft Active Directory. It must be a fully qualified host name. The non-secure socket layer (SSL) port for the LDAP protocol. This port number is typically 389. The SSL port for the LDAP protocol. This port number is typically 636. Specifies if the SSL is used for communication between Tivoli Provisioning Manager and the Microsoft Active Directory. Additional configuration is required when you use the LDAP protocol. Refer to the related documentation for how LDAP is enabled in the Microsoft Active Directory. The domain value of the Microsoft Active Directory. The user name that is used to bind to the Microsoft Active Directory. The encrypted password that is used together with the bindingUserName to bind to the Microsoft Active Directory.
Table 20. User-specific LDAP server configuration information Attribute userSecurityName Description This is used for user authentication and authorization in WebSphere Application Server. The value of the attribute in Microsoft Active Directory is used to validate the user login name when accessing Tivoli Provisioning Manager. The unique identifier for the user. The value must be unique across all registered Microsoft Active Directory directories. It has a dn value. This is used to specify the attribute to store the display name of the user that is shown in the Web interface. This filter is used for searching for the user in the registry. It contains information such as the objectclass that the user belongs to. For example, (&(cn=%v)(objectclass=organizationalPerson) . The parameter %v is necessary because during the search, the %v is replaced with the real user name.
118
group in Tivoli Provisioning Manager. If you define an attribute in the LDAP entry, and you complete a VMM synchronization, the item can display in Tivoli Provisioning Manager. The following tables lists the mapping between LDAP attributes and Tivoli Provisioning Manager.
Table 21. User attribute mapping from LDAP to Tivoli Provisioning Manager LDAP attribute uid uid uid LDAP attribute uid givenName sn displayName street st l postalCode c LDAP attribute uid telephoneNumber LDAP attribute uid PERSONID Column name in MAXUSER table USERID LOGINID PERSONID Column name in PERSON table PERSONID FIRSTNAME LASTNAME DISPLAYNAME ADDRESSLINE1 STATEPROVINCE CITY POSTALCODE COUNTRY Column name in PHONE table PERSONID PHONENUM Column name in EMAIL table PERSONID EMAILADDRESS
Table 22. Group attribute mapping from LDAP to Tivoli Provisioning Manager LDAP attribute cn description Column name in MAXGROUP table GROUPNAME DESCRIPTION
Troubleshooting security
To help you to troubleshoot problems with security, gather as much information as possible about the error. Review the following list to assess the problem.
Procedure
1. Verify that all requirements for the scenario were met as described in Requirements on page 79. 2. Check the interface and log files for error messages. The console log file contains information for the scenario. %TIO_LOGS%/console.log
119
3. If there is an error message with a message ID, check the Tivoli Provisioning Manager ../com.ibm.support.tpm.doc/messages/rtrbmsg_tpm.dita section under Reference for a description of the error message. 4. Check the Tivoli Provisioning Manager Support technotes and FAQs or the latest available fix pack readme file for information about known issues or updates to the documentation.
Symptoms
When you run a VMMSYNC cron task, the information from LDAP does not get synchronized into the Tivoli Provisioning Manager system. No records created in LDAP can be seen in the user interface.
Causes
There are several possible causes for this: v Incorrect LDAP setup v Incorrect user credentials v Administrative mode is turned on for database configuration
Symptoms
When you request the VMMSYNC cron task to run, the task does not work.
Causes
The LDAP distinguished names in the GroupMapping and UserMapping parameters contain quotation marks (" ").
120
Navigate to Go To > System Configuration > Platform Configuration > Cron Task Setup. In the list, find the VMMSYNC cron task. Click the VMMSYNC cron task. Click the Parameters tab and expand the GroupMapping parameter. In the Value field, find the LDAP information within the <basedn> tags and remove any quotation marks around the distinguished names. 6. Expand the UserMapping parameter and remove any quotation marks around the LDAP distinguished names within the <basedn> tags. 7. Click Save. 8. Restart the provisioning server. 1. 2. 3. 4. 5.
Symptoms
A Tivoli Provisioning Manager user other than MAXADMIN has update permissions to provisioning groups applications, and can change provisioning groups created for security.
Causes
The security groups that are created based on provisioning groups have no security constraints set up.
Restrict the user access to the newly created group by creating appropriate conditions for the group: 1. Click Go To > Administration > Conditional Expression Manager. 2. Add a new condition by clicking New Row. 3. Define the name for the condition by choosing the EXPRESSION as its Type, and then type the following Expression:
(EXISTS (select 1 from group_membership gm, tpgroup g where g.name = new_group_name AND g.id=gm.group_id and is_nested_group=Y and gm.dcm_object_id=:id)) OR (:name = new_group_name)
where new_group_name is the name of the group defined in the step above. 4. Check the Always Evaluate? check box, and then click .
Create a data restriction with the new condition After the condition is created for the group, add a READONLY data restriction to it with the following actions:
Chapter 2. Controlling user access
121
1. 2. 3. 4. 5.
Click Go To > Security > Security Group. . Select the security groups that you created. Click the Data Restrictions tab, and then select New Row to create a data restriction. Define Object as TPGROUP, and Type as READONLY. Click Select Value from the Detail Menu list.
6. Select the newly selected condition name. 7. Save the settings by clicking .
You have now set a data restriction that restricts access to security groups that you want to protect.
Symptoms
The message BMXAA0024E - ADD is not allowed on WOACTIVITY is displayed when a user attempts add a task to a plan in a work order using the Work Order Tracking application.
Causes
A default site is not configured for the user.
Symptoms
Some records are listed twice when looking at provisioning applications in the Security Groups application.
Causes
Applications have the same labels for different sign options (option names) when displayed in the Security Groups > Applications tab. These are valid distinct function options. For example, one might be used in a menu and the other in a button.
122
Symptoms
If you include special characters like comma (,), equals (=), plus (+), less than (<), greater than (>), number sign (#), semicolon (;), backslash (\), and quotation marks (" ") in the user name or role name, the following error occurs:
COPCOM132E An error occurred during the LDAP operation: cn=#dffded: [LDAP: error code 34 - Invalid DN syntax].
Causes
The Distinguished Name (DN) syntax supported by the directory server does not support special characters. This is a known problem with IBM Tivoli Directory Server and is described in detail in the Tivoli Directory Server Administration Guide that is available in the Tivoli Software Information Center.
Symptoms
When a session times out, the user is not logged off if basic authentication is being used.
Causes
The user is not automatically logged off when using basic authentication. If you click Refresh or press F5 after getting the timeout message, you return to the console without a password prompt.
Symptoms
When you add a new security group in a one-node Microsoft Active Directory (MSAD) setup, the group does not display immediately.
Causes
It can take up to 1 minute to refresh the page because the refresh interval for the Microsoft Active Directory server is 1 minute.
123
Symptoms
When you access Tivoli Provisioning Manager using secure socket layer (SSL), not all content is SSL enabled. After you submit the user name and password, you receive a warning message asking if content that is not encrypted with SSL during the initial login can be displayed.
Causes
The Web browser that you used to access Tivoli Provisioning Manager is outdated (for example, Internet Explorer 6). Use a new version of the Web browser to avoid the security warnings.
Symptoms
Errors occur when you try to change the user password in the provisioning Web interface.
Causes
Changing the user password in the Web interface is not supported.
<install_path>\idstools\bin\startWebadminApp.bat <install_path>/idstools/bin/startWebadminApp
124
where install_path is the directory where you installed Tivoli Directory Server. For detailed instructions, see the topic called Starting the Web application server to use the Web Administration Tool: http://publib.boulder.ibm.com/infocenter/tivihelp/v2r1/index.jsp?topic=/com.ibm.IBMDS.doc/ install18.htm. 2. Users can launch the tool using the following Web address:
http://<hostname>:12100/IDSWebApp/IDSjsp/Login.jsp
where hostname is the host name of the Tivoli Directory Server. 3. Log on to the tool with your user name. 4. Click User properties > Change password. If users receive the following error when they try to change their password, they do not have permission to update their own password:
GLPWCO025W The password cannot be changed. The user does not have the authority to modify the password.
The LDAP administrator can update the permissions by running the following command:
ldapmodify -D <adminDN> -w <AdminPwd> -i <modifyACL.ldif>
For example:
ldapmodify -D cn=root -w password -i modifyACL.ldif
where the modifyACL.ldif file contains the following information, for example:
dn: cn=tioappadmin,dc=ibm,dc=com changetype: modify add: aclentry aclentry: access-id:cn=this:at.userpassword:rwsc
Replace cn=tioappadmin,dc=ibm,dc=com with your user dn. After the command is run, users must correct permission to update their own passwords.
Symptoms
For Maximo authentication only, if the SMTP server is not set up correctly and you try to change a password without providing a valid email address, an error might occur and you might not be able to change the password. The following error messages are displayed: v BMXAA3813E - The password cannot be emailed to the user because SMTP Host is not set in the MXServer property file. This error message is displayed if the SMTP server is not set up correctly. v BMXAA3816E - An email message with the new password could not be sent to the user. This error message is displayed if the SMTP server is not configured correctly or if it is not currently online.
Causes
The problem occurs if the Always Email Generated Passwords to Users (Never Display On Screen) option is enabled. This option works correctly only if the SMTP server is set up and running and if you provide a valid email address for the user when you are changing the password.
125
To resolve the problem, you must set up the SMTP server to enable the email to be sent. However, you can use the following workaround to disable the email function: 1. Log in as the maxadmin user. 2. Click Go To > Security > Users. 3. Click Select Action -> Security Controls. 4. If the Always Email Generated Passwords to Users (Never Display On Screen) option is enabled, disable it by selecting the Allow Generated Passwords to Be Displayed On Screen option. Note: When you are creating a new user or updating an existing user password, disable the Always Email Generated Passwords to Users (Never Display On Screen) option. By disabling this option, you do not need to set up the SMTP server or provide email information for the user when creating a new user and password or updating an existing password.
Symptoms
Particular applications might display in the Favorite applications list for particular users.
Causes
You can configure the Favorites applications list to determine the applications that display in the list but this does not control actual access. You control access to applications using the Security functionality.
Symptoms
After you install Tivoli Provisioning Manager and enable Maximo authentication and change the default admin user from MAXADMIN to something else, the MAXADMIN user is not disabled and can still log on to the Tivoli Provisioning Manager application web user interface. Additionally, you cannot log on as the default administration user that you specified.
Causes
There is a known issue with the base service installation.
126
4. 5. 6. 7. 8.
the User tab. Select Action > Change Status. the New Status list. Inactive. OK.
Symptoms
After you grant permissions to a particular provisioning application group, you cannot immediately view the application in the Favorites Applications portlet.
Causes
This occurs because there is a time lag before the changes become effective. The server searches for changes periodically and your changes become effective only after they have been processed by the server.
Symptoms
New users and groups that you add to your directory server are not updated in the Users application after synchronization.
Causes
If the Virtual Member Manager cache is enabled and its timeout period is longer than the frequency with which the VMMSync cron task runs, new entries that you create are not synchronized.
127
2. 3. 4. 5. 6. 7. 8. 9. 10.
Click Security > Secure administration, applications, and infrastructure. Click Configure. Under Related Items, click Manage repositories. Click your repository identifier. From the Additional Properties menu, click Performance. Clear the Cache the attributes option. Clear the Cache the search results option Click Apply and then save. Restart Tivoli Provisioning Manager.
Symptoms
You might encounter problems if you try to authenticate using user names or passwords that have non-Latin characters.
Symptoms
You receive an error message when trying to start the Dynamic Content Delivery console using a Firefox browser.
Causes
This error can occur if there is a certificate stored from a previous version and it uses the same serial number.
128
9. Log on to the Dynamic Content Delivery administration console. You receive a message stating that the connection is not trusted. 10. Click I Understand the Risks, Add Exception, and Confirm Security Exception. You should now be able to log on to Maximo and the Dynamic Content Delivery console without any errors. If you are still having problems, check if there is another Tivoli Provisioning Manager server with the same certificate. If there is another Tivoli Provisioning Manager server with the same certificate, you need to delete that certificate also.
Symptoms
Users might still see objects that they do not permission to access when adding new members to a Tivoli Provisioning Manager group.
Symptoms
You cannot delete users from Tivoli Provisioning Manager using the Maximo user interface. You receive the following error message when you try to delete users:
DMXAA0026E - The method cannot be called because application server security is enabled.
Environment
You are using LDAP to manage the user repository.
6. Start Tivoli Provisioning Manager. 7. Ensure that the user is removed from the LDAP server.
Chapter 2. Controlling user access
129
8. 9. 10. 11.
Go To > Security > Users. the user that you want to remove. Select Action->Delete User. the following SQL command:
Symptoms
When importing a key or certificate in to a keystore or truststore, the following error may be shown:
Java.io.IOException: Error in loading the keystore: Private key decryption error: (java.security.InvalidKeyException: Illegal key size)
Causes
The error is caused by the restricted policy on the JCE that is installed by default.
130
Symptoms
After updating the maximo.propertiesfile, when starting the provisioning server, an error similar to the following can be seen in the SystemOut.log.
javax.crypto.BadPaddingException
Causes
The problem is caused by the editor that is being used for updating the maximo.properties. The editor adds an extra character into the encrypted password section.
GSKit key manager does not recognize CMS key database type
When configuring DB2 for SSL communication, the GSKit key manager does not recognize the CMS key database type. Because of this, you cannot generate a new keystore file.
Symptoms
The GSKit key manager does not recognize the CMS key database type. You receive an error message stating that the CMS Java native library is not found.
Causes
This problem might occur if you have an older JDBC version that was installed with DB2 v 9.5 FP3a.
Symptoms
The following error message is displayed in the %TIO_LOGS%\tio_start_service.log file:
COPTDM094E The operation cannot be performed because the computer srvtivoli cannot be found in the data model. at com.thinkdynamics.kanaha.util.LocalServerUtil.getLocalServerId (LocalServerUtil.java:97) at com.thinkdynamics.kanaha.util.LocalServerUtil.getLocalServerName (LocalServerUtil.java:68) at com.ibm.tivoli.orchestrator.de.engine.DeploymentEngineSettings.getDeploy mentEngineInstanceName (DeploymentEngineSettings.java:91) at com.ibm.tivoli.orchestrator.de.engine.DeploymentEngine.start
131
Causes
This problem occurs because the Maximo administrator user cannot access the server on which Tivoli Provisioning Manager is running.
2. Reconfigure the group membership so that the Maximo administrator user is no longer a member of the security group with instance level security defined. For information about how to configure instance level security, see Lesson 1: Assigning read/write type of permissions to security groups on page 83 and Lesson 2: Adding users to security groups on page 81. You can identify if the Maximo administrator user is a member of a security group by looking for the security restriction defined in the security group. 3. Restart Tivoli Provisioning Manager.
Reference
Reference information supports the tasks that you want to complete.
132
v Conditions that provide lists of resources to be protected v Users to whom the security restrictions and conditions apply Tivoli Provisioning Manager provides predefined security groups that you can use and, if necessary, modify to suit your enterprise environment. A security group typically consists of multiple users. An individual user can be assigned to more than one security group. The primary group assignment determines which Start Center is open when a user logs on; users who are assigned to multiple security groups can tab to the Start Centers for their secondary groups. Users have permission to perform only those operations that are mapped to their security group assignments. From the Web interface, you can create user accounts and customize security roles to control access to features based on job responsibility. When a user logs on, they can only view information or make changes based on the access rights assigned to the account of the user. Tivoli Provisioning Manager uses read-only LDAP authentication. Before you create new user accounts in the Web interface, the users must first be created in LDAP. There are several settings that are configurable in security groups: v Start Center assignments v Application authorization and access v Data restrictions v Site, and location v Provisioning object, and provisioning groups Note: The read-only permission restricts user access to view data only. To learn how to customize the access to applications of your choice, see Lesson 3: Customizing access to provisioning applications on page 84. For more information about the settings configuration, refer to the System Administrator Guide of Maximo Asset Manager .
What is authentication?
Authentication is the process of verifying that the users are who they claim to be. Authentication is required for all users accessing the system. The user authentication process is always performed under SSL. v Authentication verifies who you are - it does nothing to say what you are permitted to do. It answers questions such as: Who is the user? Are the users really who they claim themselves to be? For more information about authentication service, see the section about Setting Up Authentication and Application Server Authentication in Chapter 2: Security of System Administrator Guide of Maximo Asset Manager .
What is authorization?
Authorization is the process of determining whether a user can perform a specific operation on a software or hardware resource. Authorization is determined from the access control information in Tivoli Provisioning Manager. v Authorization is about what you are allowed to do - it assumes that authentication has already happened. It answers questions such as: Is an Operator authorized to access xxx resources? Is an Operator authorized to perform yyy operation?
Chapter 2. Controlling user access
133
Is an Operator authorized to perform yyy operation on xxx resource? The access control information is what grants users access to your resources. Access control provides security to the data model in two ways: v Protects which users are allowed to access which resources. Users are permitted access to resources with assigned security roles. v Protects which users are allowed to perform which operations on resources. Access permissions (access groups and permission groups) define the operations that users are allowed to perform on specific resources. The different operations can range from managing servers, viewing reports, running discovery, and any of the other operations that are required to operate and manage your data model. In general, when a user attempts to access a protected resource, the access control information first determines what access controls are applicable for that user and then based on the access permissions of the user, it determines if the user is allowed to perform the requested operation on the given resource. Example In a scenario, an operator might have full access control over one application, such as monitoring, installing, patching, rebooting, and so on. In another case, that same operator will have limited access to another application, such as monitoring and rebooting.
134
Table 23. The operations that can be performed by members of TPADMIN security group.
Security Group TPADMIN Provisioning Administrator Provisioning Tasks Skills
v Runs initial discovery scans. Configures v Extensive knowledge on the provisioning environment. discovery scans required to maintain the network inventory. v Administration skills for relevant v Views and groups servers and software operating system and database according to needs of the environment. environments. Responsible for maintaining the catalog v Experience in installing and configuring (editing, deleting, grouping). Imports system management software. the necessary tools to enable target v System, application, and user security computers for receiving deployments. concepts and strategies. Might also set up the scans for new v Experience in planning and patches and import them into the implementing high availability inventory. Possible cooperation with the configurations. Deployment Specialist to prepare the target computers with the TCA or v Performance tuning and overall system WUA, to receive deployments. troubleshooting. v Manages the approvals of software for deployments and scanning of servers for patches. This includes working with a Deployment Specialist to determine the appropriate set of patches required for a specific platform or software product and then approving the patches that are needed. v Designs and tests deployments to ensure that they are ready for production. Works with the Deployment Specialist to prepare for regular deployment into the production environment. v Performs many complex tasks critical to the setup and operation of the deployment environment. This includes managing the overall deployment environment, performing the necessary duties to set it up and keep everything running smoothly by handling any problems that arise. v Regularly monitors the deployment environment to ensure that everything is going smoothly, including summary reports. When troubleshooting is needed, assists with determining the cause of any problems using available tools and information. Validates successful deployments to ensure that everything is working properly.
135
Table 24. The operations that can be performed by members of TPDEPLOYMENTSPECIALIST security group.
Security Group TPDEPLOYMENTSPECIALIST Deployment Specialist Provisioning Tasks v Performs day-to-day deployments of software (OS, patches, software) to computers. Can also deploy tools on to computers to facilitate future deployment tasks, such as the installation of an agent on a target computer. v Performs a limited set of tasks repeatedly and wants a user interface that is simple and fast to use, with no wasted clicks or unnecessary steps. The Deployment Specialist Role has an associated Start Center. This role maps to the ITUP Deployment Specialist. v Enables computers for patch management by installing TCA or WUA. v Installs patches, triggers installation of patches and monitors progress. v View tasks in progress and monitors problems. Validates that patches installed correctly. v Reviews computer or group compliance. Runs scheduled compliance checks. v Performs a visual inspection of computer inventory. Starts new scans to validate data progress. Skills v Administration skills for the relevant operating system and database environments. v Experience in installing and configuring system management software. v Advanced knowledge of the software available in the software catalog, and the software installation and configuration options. v Knowledge of running inventory scans and inventory and compliance reports to identify software required.
Table 25. The operations that can be performed by members of TPDEVELOPER security group..
Security Group TPDEVELOPER Automation Package Developer Provisioning Tasks v Accesses all of the software packaging tools and creates automation packages for deployment. v Views inventory, workflows, and task status. Uses the Software Package Editor. Has links to tools used for development and test. Skills v Understands general programming concepts and logic. v Knowledge of a scripting language, such as bash, perl, Expect, or VBScript. v Knowledge of Java. v Basic knowledge of Eclipse.
136
Table 26. The operations that can be performed by members of TPCOMPLIANCEANALYST security group.
Security Group TPCOMPLIANCEANALYST Compliance Analyst Provisioning Tasks v Guides policies for compliance within the organization and ensures that they are being followed to meet goals. v Checks the compliance of resources for which they are responsible. Helps guide policies for compliance within the organization and ensures that policies are being followed to meet goals. v Might also assist with specific compliance issues from both a technical and business perspective. v Uses Tivoli Provisioning Manager for reviewing and updating compliance data. v Analyzes list of missing patches and approves, rejects, or ignores it for a group or a computer. v Reviews new items in the catalog and approves, rejects, or ignores them for installation on a group or a computer. v Restricts patches to a group or a computer. v Defines groups for compliance.
Table 27. The operations that can be performed by members of TPCONFIGURATIONLIBRARIAN security group.
Security Group TPCONFIGURATIONLIBRARIAN Provisioning Configuration Librarian Provisioning Tasks v Is responsible for the inventory database and for maintaining its currency and accuracy. v Performs various scans as appropriate. Delegates regular scanning tasks (such as discovery or inventory scans) to others as part of their regular duties. v Updates records in the database to ensure accuracy. Skills v Understands the configuration requirements of the selected discovery technologies such as inventory discovery. v Advanced knowledge of the managed environment within the enterprise, including awareness of applications that can cause configuration changes outside the scope of Tivoli Provisioning Manager.
v Has access to run or schedule discovery v Ability to reconcile unexpected changes scanning and inventory tasks and can detected in the environment so they can edit them. either be accepted as changes in the v Creates and runs reports. inventory or remediated to restore the required state.
Table 28. The operations that can be performed by members of TPWEBSERVICEUSER security group.
Security Group TPWEBSERVICEUSER Web Service administrator Provisioning Tasks v Uses the Web service interface. Web service authentication is required for Dynamic Content Delivery authentication. Skills v Knowledge of Tivoli Provisioning Manager Web service interface.
Table 29. Automation package Developer TPDEVELOPER application authorization permissions Application TPDCMFIND TPDISCINIT TPSERVERS TPTASK TPTASKINV TPSTACK Display name Provisioning Object Finder Discovery Wizards Provisioning Computers Provisioning Task Tracking Provisioning Task Definitions Software Stacks X Read access only X X X X X Read/write access
137
Table 29. Automation package Developer TPDEVELOPER application authorization permissions (continued) Application TPSWPATCH TPVIRTUAL TPWFSTAT TPSWRES TPDISC TPWORKFLOW TPSTPOOL TPACL TPLDBAL TPFILEREP TPSWITCHS TPSTSUBST TPSAN TPCLSTDMN Display name Patches Virtualization Management Provisioning Software Resources Discovery Configurations Provisioning Workflows Storage Pools Access Control Lists Load Balancers File Repositories Switches Storage Subsystems Storage Area Networks Cluster Domains X X X X X X X X X X X Read access only X X X Read/write access
Note: If you have TPWEBSERVICEUSER permissions, you can run commands in the Web service interface, but you do not have user interface permissions to Tivoli Provisioning Manager.
Table 30. Provisioning administration applications
Provisioning Administrator RISDM RISDM Deployment Specialist Compliance Analyst Provisioning Configuration Librarian RS RS Automation Package Developer
Application Click Go To > Administration > Provisioning > Device Drivers. Click Go To > Administration > Provisioning > Device Driver Categories. Click Go To > Administration > Provisioning > Provisioning Workflows. Click Go To > Administration > Provisioning > Provisioning Workflow Status.
RISDM
RM
RISDM
RISDM
RISDM
RISDM
RISDM
138
Application Click Go To > Administration > Provisioning > Provisioning Global Settings. Click Go To > Administration > Provisioning > Dynamic Content Delivery Configuration. Click Go To > Administration > Provisioning > Provisioning Customers. Click Go To > Administration > Provisioning > Resource Pools. Click Go To > Administration > Provisioning > Cluster Domains.
RISDM
RISDM
RISDM RISDM
RSM RSM
RM
R RS RISDM
Application Click Go To > Deployment > Provisioning Computers. Click Go To > Deployment > Provisioning Groups. Click Go To > Deployment > OS Management > Boot Servers. Click Go To > Deployment > OS Management > Boot Server Installation. Click Go To > Deployment > OS Management > Images. Click Go To > Deployment > OS Management > Image Capture. Click Go To > Deployment > OS Management > Image Deployment. Click Go To > Deployment > OS Management > Image Replication. Click Go To > Deployment > OS Management > Unattended Setup Image. Click Go To > Deployment > OS Management > Hardware Configuration Image. Click Go To > Deployment > OS Management > Software Modules. Click Go To > Deployment > Software Management > Common Agent Installation. Click Go To > Deployment > Software Management > Software Product Publishing. Click Go To > Deployment > Software Management > Software Product Unpublishing.
RISD RISDM
RISDM
RISDM
RISDM RISDM
RISDM RISDM
RISDM
RISDM
RISDM
RISDM
RISDM
139
Application Click Go To > Deployment > Software Management > Software Product Distribution. Click Go To > Deployment > Software Management > Software Product Installation. Click Go To > Deployment > Software Management > Software Product Upgrade. Click Go To > Deployment > Software Management > Software Product Uninstallation. Click Go To > Deployment > Software Management > File Distribution. Click Go To > Deployment > Software Management > File Publishing. Click Go To > Deployment > Software Management > File Unpublishing. Click Go To > Deployment > Software Management > Software Stack Distribution. Click Go To > Deployment > Software Management > Software Configuration Templates. Click Go To > Deployment > Patch Management > Windows Update Agent Installation. Click Go To > Deployment > Patch Management > Patch Publishing.
RISDM
RISDM
RISDM
RISDM
RISDM
RISDM
RISDM
RISDM
RISDM
RISDM
RISDM
RISDM
RISDM
RISDM
RISDM
RSM
RISDM
RS
RISDM
RISDM
RISDM
Click Go To > Deployment > Patch RISDM Management > Patch Unpublishing. Click Go To > Deployment > Patch Management > Patch Distribution. Click Go To > Deployment > Patch Management > Patch Installation. RISDM RISDM
Click Go To > Deployment > Patch RISDM Management > Patch Uninstallation.
Application Click Go To > Discovery > Provisioning Discovery > Discovery Wizards. Click Go To > Discovery > Provisioning Discovery > Discovery Configurations.
RISDM
RISDM
RISDM
140
Application Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Computers. Click Go To > IT Infrastructure > Provisioning Inventory > Virtualization Management. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Groups. Click Go To > IT Infrastructure > Provisioning Inventory > File Repositories. Click Go To > IT Infrastructure > Provisioning Inventory > Access Control Lists. Click Go To > IT Infrastructure > Provisioning Inventory > Firewalls. Click Go To > IT Infrastructure > Provisioning Inventory > Load Balancers. Click Go To > IT Infrastructure > Provisioning Inventory > Routers. Click Go To > IT Infrastructure > Provisioning Inventory > Switches. Click Go To > IT Infrastructure > Provisioning Inventory > Unknown Resources. Click Go To > IT Infrastructure > Provisioning Inventory > Virtual LANs. Click Go To > IT Infrastructure > Provisioning Inventory > Subnetworks. Click Go To > IT Infrastructure > Provisioning Inventory > Storage Area Networks. Click Go To > IT Infrastructure > Provisioning Inventory > Storage Pools. Click Go To > IT Infrastructure > Provisioning Inventory > Storage Managers. Click Go To > IT Infrastructure > Provisioning Inventory > Storage Subsystems. Click Go To > IT Infrastructure > Provisioning Inventory > Computer Templates. Click Go To > IT Infrastructure > Provisioning Inventory > Virtual Server Templates. Click Go To > IT Infrastructure > Provisioning Inventory > Storage Templates.
RISDM
RSM
RISD
RISDM
RISDM
RSM
RC
RISD
RISDM
RSM
RISD
RISDM
RISDM
RSM
RISD
RISDM
RISDM RISDM
RSM RSM
RISDM
RSM
RISD
RISDM
RSM
RISD
RISDM
RSM
RISD
RISDM
RISDM
RSM
RISD
RISDM
RISDM
RSM
RISD
RISDM
RSM
RISD
RISDM
RISDM
RISDM
RISDM
RISDM
141
Application Click Go To > IT Infrastructure > Provisioning Inventory > Blade Servers. Click Go To > IT Infrastructure > Provisioning Inventory > Power Units. Click Go To > IT Infrastructure > Provisioning Inventory > Terminal Servers. Click Go To > IT Infrastructure > Software Catalog > Software Products.
RISDM
RSM
RISD
RISDM
RSM
RISD
RISDM
RSM
RISD
Click Go To > IT Infrastructure > RISDM Software Catalog > Software Stacks. Click Go To > IT Infrastructure > Software Catalog > Software Product Import. Click Go To > IT Infrastructure > Software Catalog > Software Validation. Click Go To > IT Infrastructure > Software Catalog > Software Signatures. Click Go To > IT Infrastructure > Software Catalog > Patches. Click Go To > IT Infrastructure > Software Catalog > Patch Acquisition. RISDM
RSM
RISD RISDM
RISDM
RSM
RISD
RISDM
RSM
RISDM
RISDM RISDM
RSM
RC
RISD RISDM
Application Click Go To > Security > Provisioning Permission Groups. Click Go To > Security > Users. Click Go To > Security > Security Group.
Application
RISDM Click Go To > Task Management > Activities and Tasks. Click Go To > Task Management > Provisioning Tasks > Provisioning Task Tracking. RISDM
RDM
RISDM
RISDM
RISDM
142
Application Click Go To > Task Management > Provisioning Tasks > Provisioning Task Definitions. Click Go To > Task Management > Provisioning Tasks > Provisioning Workflow Status.
RISDM
RM
RISDM
RISDM
RISDM
143
Table 36. Supported provisioning groups for security purposes. Static groups Typed Supported for security purposes Membership SQL Nesting group properties Yes Generated query Untyped Yes Generated query Typed Yes User specify No nesting group supported Dynamic groups Untyped No N/A N/A
Supported for Supported for security, nested group security, nested has to be the same groups can be of any type type, typed or untyped
144
145
TADDM Discovery v For importing the information of IT resources and their relationships with Tivoli Application Dependency Discovery Manager (TADDM) into the data model. Microsoft Active Directory discovery v For discovering resources by organizational unit. v For discovering Microsoft Active Directory groups. v For discovering resource attributes defined in Microsoft Active Directory.
Discovery basics
Find out more about the discovery process, the key terms for discovery, who are the users that perform discovery, and what are the requirements that you need to verify before running discovery. Review the troubleshooting information and the log files names and location for this feature and also additional resources that help you complete your discovery tasks. v Process on page 147 v User roles on page 147 v Requirements on page 148 v Key terms on page 148 v Troubleshooting on page 149 v Log files on page 149 v Resources on page 150
146
Process
A typical discovery process using Tivoli Provisioning Manager is depicted in the following diagram:
Discover computers
List of hardware attributes, software catalog, inventory of software populates the data model
Report on inventory
Database
Legend
Provisioning Administrator Provisioning Configuration Librarian
You want to create an inventory of what devices are available in the enterprise, and which operating systems and software are on each device. The following discovery flow describes how Tivoli Provisioning Manager can automate discovery: 1. Your first step is to discover which computers exist within the IT enterprise. Perform a network discovery of your computers.Tivoli Provisioning Manager can discover the operating system information of the computers. 2. Next, you need to find out which hardware and software is installed on your resources. You will run another discovery, an inventory scan, to detect hardware and software information about each resource. 3. Tivoli Provisioning Manager generates an inventory of the discovered software, including discovered operating systems. This inventory is recorded in the data model in the software catalog.
4. You can now generate reports showing the current information about data center inventory, including reports on available software, currently installed software, and hardware activity. You can also generate reports showing the last discovery scan results by target computer and discovery scan type. The report data is extracted directly from the data model.
User roles
You must be assigned to the appropriate user role to perform discovery operations.
147
Table 37. User roles Role Provisioning Administrator Description of role v Discover and group target computers. v Set up servers and infrastructure, including the installation of the Tivoli common agent on targets computers. Provisioning Configuration Librarian Access permissions User has access to everything in the web interface. He can also create new users and assign access control to users.
v Own the inventory database and is User that manages all inventory aspects, but performs tasks related to responsible for maintaining its software or hardware inventory only. accuracy. He can manage discovery scans, the v Run, schedule, and edit discovery software catalog and the software scanning and inventory tasks. signatures. He can also generate reports related to inventory, and can update or delete records within the inventory database.
Requirements
User roles and requirements on page 153 Target computer requirements: Requirements for Windows target computers on page 556 Requirements for Red Hat Linux target computers on page 560 Requirements for SUSE Linux Enterprise Server (SLES) target computers on page 561 Requirements for AIX target computers on page 562 Requirements for Solaris Operating Environment target computers on page 563 Requirements for HP-UX target computers on page 565 v Software requirements on page 153 v Requirements for common agent installation on page 547
Key terms
Discovered resources A group of resources that have been successfully discovered by provisioning. Unknown resources A group of resources that provisioning cannot log on to, when performing a network discovery. Unknown resources are generated after running a network discovery or an initial discovery in the following cases: v When the discovery protocol used, RXA, is correct but the provided user credentials are wrong. v When the discovery protocol used, RXA, is correct but the resource is not supported. v When a RXA-based network discovery is submitted without specifying the user credentials. v When the provided IP address can be reached by the ping command, but provisioning cannot discover any other information about the resource. Discovery wizard Using the discovery wizard application you can perform a more generic discovery.
148
Troubleshooting
v Troubleshooting discovery on page 239 v Log files for troubleshooting discovery on page 244 v Discovery problems and limitations on page 245 v Discovery messages v Support information about discovery v Contacting support
Log files
Follow the steps below and review the indicated log files to recover from problems that you might encounter when running discovery: v For any discovery v For the Tivoli Provisioning Manager Inventory Discovery v For any Inventory Discovery if the Tivoli Common Agent is not installed
For any discovery: 1. Check the log files and/or the workflow logs to determine the problem. On the Tivoli Provisioning Manager server: v
Windows
%TIO_LOGS%\console.log
UNIX Linux $TIO_LOGS/console.log v v Workflow logs available from the web interface 2. If the Inventory Discovery is involved, perform the checks described for the Inventory Discovery.
3. Resolve the cause and then try again. For the Tivoli Provisioning Manager Inventory Discovery: 1. Check the log files and/or the workflow logs to determine the problem. 2. If Common Inventory Technology (CIT) is run under the Tivoli common agent (TCA), check also the TCA logs. On the Tivoli Provisioning Manager server: v
Windows
%TIO_LOGS%\console.log
UNIX Linux $TIO_LOGS/console.log v v Workflow logs available from the web interface On the target computer:
Windows
%ProgramFiles%\IBM\tivoli\common\CIT\logs\ traceCIT.log
UNIX Linux /usr/ibm/tivoli/common/CIT/logs/ traceCIT.log v For the TCA-based Inventory Discovery, on the target computer:
v CA_HOME/logs/error-log-n.xml v CA_HOME/logs/trace-log-n.xml and n = 0,1,2,... Note: You can also set a higher trace level modifying the following file:
$CA_HOME/../../../cit/ config/CitTrace.properties
149
%ProgramFiles%\Tivoli\ep\runtime\agent
UNIX Linux /usr/tivoli/ep/runtime/agent v 3. Resolve the cause and then try again.
For any Inventory Discovery if the Tivoli Common Agent is not installed: 1. Check the log files and/or the workflow logs to determine the problem. On the Tivoli Provisioning Manager server: v TIO_LOGS\console.log v $TIO_HOME/tmp/cit_subagent/platform/target_id_timestamp Note: By default this directory is deleted. You should set a property to keep it. On the computer: v /tmp/cit_discoveryId 2. If the Inventory Discovery is involved, perform the checks described for the Inventory Discovery. 3. Resolve the cause and then try again.
Resources
To learn more about discovery, refer to one of the following resources: v Tutorial: Discovering your environment on page 230 v Tutorial: Replicating business applications from TADDM on page 234 v Regular discoveries on page 153 v Verifying discovered resources on page 227 v For a description of a field in the Tivoli Provisioning Manager console, press Alt+F1.
Related links Chapter 3, Discovering IT resources, on page 145 Requirements on page 152 Troubleshooting discovery on page 239 Tutorial: Discovering your environment on page 230 Tutorial: Replicating business applications from TADDM on page 234
Discovery process
Tivoli Provisioning Manager provides you with automated processes to discover devices and configuration changes for the computers, switches, subnetworks, software, and images within your environment. The following diagram depicts typical discovery processes using Tivoli Provisioning Manager:
150
Discover computers
List of hardware attributes, software catalog, inventory of software populates the data model
Report on inventory
Database
Legend
Provisioning Administrator Provisioning Configuration Librarian
You want to create an inventory of what devices are available in the enterprise, and which operating systems and software are on each device. The following discovery flow describes how Tivoli Provisioning Manager can automate discovery: 1. Your first step is to discover which computers exist within the IT enterprise. Perform a network discovery of your computers.Tivoli Provisioning Manager can discover the operating system information of the computers. 2. Next, you need to find out which hardware and software is installed on your resources. You will run another discovery, an inventory scan, to detect hardware and software information about each resource. 3. Tivoli Provisioning Manager generates an inventory of the discovered software, including discovered operating systems. This inventory is recorded in the data model in the software catalog. 4. You can now generate reports showing the current information about data center inventory, including reports on available software, currently installed software, and hardware activity. You can also generate reports showing the last discovery scan results by target computer and discovery scan type. The report data is extracted directly from the data model.
151
Scheduling discovery
Different sections of your environment will likely have different rates of change. Identifying operational groups on your network by IP addresses, IP address ranges, subnetworks, and subnet ranges, enables you to schedule partitions of your infrastructure to have different discovery schedules, as appropriate. You can specify which targets the discovery can be run against, you can specify ranges, or discover everything known to a specific discovery method. For example, depending on the size of your environment and your operational needs, you can schedule Tivoli Provisioning Manager to perform a full discovery once every week, complete a discovery of a network once every day, and so on. The discovery schedule can be set up to repeat at certain intervals or to run once.
Requirements
Before you start working with discovery, ensure that you meet all requirements. When you run a discovery it searches for resources that are unknown to Tivoli Provisioning Manager and adds them to the data model. The discovery updates the data model with any new or changed information.
Computer requirements
For details about the target computer requirements, see the following topics: Requirements for Windows target computers on page 556 Requirements for Red Hat Linux target computers on page 560 Requirements Requirements Requirements Requirements for SUSE Linux Enterprise Server (SLES) target computers on page 561 for AIX target computers on page 562 for Solaris Operating Environment target computers on page 563 for HP-UX target computers on page 565
152
v Own the inventory database and is User that manages all inventory aspects, but performs tasks related to responsible for maintaining its software or hardware inventory only. accuracy. He can manage discovery scans, the v Run, schedule, and edit discovery software catalog and the software scanning and inventory tasks. signatures. He can also generate reports related to inventory, and can update or delete records within the inventory database.
Software requirements
Ensure that you are using supported software required for discovery.
Regular discoveries
Discovery is a periodic task that keeps the data model up-to-date as an IT resource changes. To be able to update and manage your resources in your data model, you need to periodically populate it by performing discoveries using the various available discovery methods appropriate for your enterprise. Discoveries can be scheduled to run automatically at a specified date and time and, if necessary, to repeat on a regular basis to collect the information required. You can use different discoveries depending on the kind of the resources you want to discover:
Chapter 3. Discovering IT resources
153
Network discovery If you want Tivoli Provisioning Manager to discover your IT assets and gather information about all the resources that can be found, such as their network interfaces and IP addressing information. Software discovery Knowing what type of software and the details about that software helps to automate the process of documenting computer and application configurations, mapping interdependencies, and tracking changes in real-time. If you want Tivoli Provisioning Manager to install and monitor software, then there are a number of discovery configurations you can use: v You can use the Tivoli Provisioning Manager Inventory discovery to perform a hardware or inventory scan using the registry or software signature feature. Software signatures are the set of unique information that identifies a software application, such as the name, version, and file size of an application. Note: It is recommended, for scalability issues, that you install the Tivoli Common Agent on the target computers to perform the inventory scan. The Tivoli Common Agent can be installed separately or installed when a computer is created using the Add Computer wizard. The Tivoli Provisioning Manager Inventory discovery discovers the following operating systems: Windows Linux UNIX AIX Solaris v You can use Microsoft Active Directory discovery to import all of your existing Microsoft Active Directory groups and computer information into Tivoli Provisioning Manager. v You can discover all your software resources defined in the Change and Configuration Management Database. You can also correlate with an existing software module for all discovered software installations. If an existing software module cannot be found, then a placeholder software module will be created to associate it with the discovered software installation. v There are also other different discovery applications to do inventory scans on VMware and cluster system management systems as well. The discovery of any software, operating system or otherwise, is created as a software resource and will be associated with an existing software product if there is an appropriate match and can be viewed on the software tab of the resource.
154
You can select the scope elements when initiating a discovery to optionally restrict the number of components and subnets explored. You might want to do this when you need to focus on gathering information about a particular portion of your infrastructure, and do not want to spend the time discovering your entire network. Provisioning network discovery is separated in the following two ways: Remote Execution and Access (RXA) discovery Discovers Windows, Linux, AIX, Solaris and HP-UX resources using RXA that identifies if your resources are working over SMB or SSH protocols. For this reason, ensure that at least one of these two protocols is active on your computers. To discover the maximum number of data, you can specify the user IDs and passwords of the computers to access and the related protocol used by the computers, or you can provide the RSA credentials to obtain the same result. This information is optional. If credentials are not correct, discovered computers are added to the Unknown Resources group. Unknown resources are resources to which a network discovery cannot logon, either because it is not using the appropriate credentials to access the resource, or because the logon service is down. If you do not enter any user IDs and passwords, then a basic discovery is performed and only limited information, such as the host name and operating system, might be retrieved. Note: When SMB or SSH discoveries are used, computer host names are matched using the following algorithm: 1. The discovery looks for an existing server in the Data Center Model (DCM) that has the same discovered NIC MAC address of the management interface. 2. If no match is found, the discovery looks for an existing server in DCM that has same IP address and host name. 3. If no match is found, it creates a new server in DCM. Simple Network Management Protocol (SNMP) discovery Discovers resources, switches, routers, and virtual LANs. Note: The SNMP Agent must be installed and configured on the target computer. For RXA discovery, discovered data includes host name, MAC address, IP address, NIC, SSH service access points, credentials for run and copy file commands, and the OS type. The OS type will be captured as a hardware resource in the discovered object. Having the OS type will allow the installation of the Tivoli Common Agent after discovery. When deciding which of the two provisioning network discovery methods to choose, consider the following. v RXA is the recommended method for discovering Windows, UNIX and Linux variant operating systems. v SNMP is the recommended method for discovering networking resources (including VLANs on switches). Although it can be used to discover resources as well, only SNMP credentials are created, whereas RXA credentials provide more computer management capability.
155
addresses, the discovery fails. You can change the limit using the global variable MaxIpNumber. Take into consideration that a large limit might impact the time it takes for a discovery to complete. 1. Click Go To > Administration > Provisioning > Provisioning Global Settings. 2. Click the Variables tab. 3. Search for the variable MaxIpNumber. If the variable does not exist, click New Row to create the variable and set Variable to the name MaxIpNumber and Component to Entire System. 4. Set the Value of the variable to maximum number of addresses that a single discovery run can discover. It also creates credentials for each resource object based on the credential information supplied in the provisioning network discovery configuration profile. After the installation has completed successfully, the provisioning network discovery can be used to discover your IT assets and gather information about them. You can assign the discovered computers to a provisioning group. The provisioning network discovery will discover the network's hardware and immediately populate the data model with this information. Note: The network discovery does not necessarily use the fully qualified domain name of the computer to register the discovered computer in the data model. If the Tivoli Provisioning Manager server cannot retrieve a fully qualified domain name because of its network configuration, the value used to register the discovered computer is the output of the host name command performed against the target computer, and this might be the computer short name. The administrator must supply both IP (Host names, IP ranges, subnets, or all) and credential information to set up the discovery configuration. Both IPv4 and IPv6 addresses are supported by the RXA network discovery. After a computer is discovered using this discovery configuration, the service access points and credentials will be set up for that target computer. Note: When discovery is run to find resources, all resources in the specified IP range will be discovered and populated to the data model, however, if one resource fails, the discovery process will continue. Check the provisioning workflow execution logs for specific details on individual resource failures. To run a network discovery using RXA, perform the following steps:
Procedure
1. Click Go To > Discovery > Provisioning Discovery > Discovery Configurations. . 2. Click New Discovery Configuration 3. Enter a name and description of the discovery configuration. 4. In the Category list, click Hardware Discovery. 5. Select Discover Computers using RXA from the Method menu. 6. Click OK. 7. (Optional) Select from Add Computers to Group the name of the provisioning group to which you want to assign the discovered computers. When you enter a group name in Add Computers to Group, a list of the computer groups in your environment is displayed. 8. Enter any necessary discovery parameters and their values such as: v Host names v IP Address ranges
156
Note: In case IPv6 addresses have been enabled, a consistency validation occurs when you enter the start and end of each IP range. Both must be either IPv4 or IPv6. This same consistency validation occurs for both addresses and masks if you specify subnetworks. v Subnetworks v Credentials Note: Ensure that the credentials and passwords specified are for the target computer and not the domain administrator ID. Note: The parameters Host names, IP Address ranges, and Subnetworks can also be imported using a flat text file. In the text file the parameters you specify must be preceded by the following keys: #HOSTNAMES Enter this key before specifying a list of host names in the file. To specify the list of host names use the following format:
hostname1 hostname2
#IPRANGES Enter this key before specifying a list of IP address ranges in the file. To specify the list of IP address ranges use the following format:
9.168.123.172-9.168.123.176 9.168.123.180
#SUBNETWORKS Enter this key before specifying a list of subnetworks in the file. To specify the list of subnetworks use the following format:
192.168.123.172-255.255.255.224 192.168.123.150-255.255.255.248
9. Click Save
Results
You have now created a new discovery configuration.
What to do next
You can now schedule the discovery or run it immediately to update the data model. To run the discovery immediately, select the newly created discovery configuration, and click Run Discovery to start the operation. You can view the status of the discovery task by performing the following action: v Click Go To > Task Management > Provisioning Tasks > Provisioning Task Tracking.
157
Note: The common agent installation does not support RSA credentials for Windows target computers. When the network discovery is performed using the RSA credentials, a set of password credentials for SMB must also be used to discover the Windows target computers. To run a network discovery using the RSA credentials, perform the following steps:
Procedure
1. Click Go To > Discovery > Provisioning Discovery > Discovery Configurations. 2. 3. 4. 5. . Click New Discovery Configuration Enter a name and description of the discovery configuration. In the Category list, click Hardware Discovery. Select Discover Computers using RXA from the Method menu.
6. Click OK. 7. Click the Credentials tab. 8. In the RSA Credentials section, specify the following information: RSA User Name The user name of a RSA credential. This identifies the user being associated with the RSA key mechanism. Passphrase (Optional) The pass phrase of a RSA credential. This is the extra text identifier to perform authentication. (Optional) Confirm Passphrase (Optional) Enter the pass phrase of a RSA credential again. Private Key File Path Specify from the pull-down menu the location (relative path) of the RSA credential private key. Note: The RSA private key file must be stored under the directory $TIO_HOME/keys/ my_directory. The file name must be identity. 9. Click Run Discovery. 10. (Optional) Check the provisioning task name and set the notification and scheduling options for the discovery. 11. Click Submit.
Results
You have created or updated the Service Access Point (SAP) of the target computers with the RSA authentication. You can now manage these target computers using the RSA authentication, instead of the credential and password authentication.
Procedure
1. Click Go To > Discovery > Provisioning Discovery > Discovery Wizards. Or access the discovery wizard application by clicking directly the Start Center link. 2. Click New .
158
3. Enter a name and a description for the new discovery. The Discovery Wizard is a required field, while the description field is optional. 4. From the Type menu select Computers with related hardware and software information. 5. From the Target Source Type menu select Run network discovery. 6. Click OK. 7. In the Select Targets page of the wizard, from the Add Computers to Group menu you can specify to which existing provisioning group of computers you want to add the discovered resources, or you can create a new group of computers. Note: The Add Computers to Group menu is also available when running the following ready-to-use network discoveries provided by provisioning: v Computer Discovery v Computer and Inventory Discovery v Computer Discovery, Tivoli Common Agent Installation and Inventory Discovery 8. Review and submit the discovery as usual.
Results
You have added the resources discovered by a network discovery to an existing or a new computer group.
159
v v v v v
Cisco Router 2620 Cisco Router 2621 Cisco Router 3725 Cisco Switch Extreme Networks Switch
v Foundry Switch v IBM Gigabit Ethernet Switch Module To run a discovery using SNMP, perform the following steps: 1. Click Go To > Discovery > Provisioning Discovery > Discovery Configurations. 2. 3. 4. 5. . Click New Discovery Configuration Enter a name and description of the discovery configuration. In the Category list, click Hardware Discovery. Select Discover Devices (computers, switches, routers) using SNMP from the Method menu.
6. Click OK. 7. Enter any necessary discovery parameters and their values such as: v IP Address ranges Note: IPv6 addresses are not supported by the SNMP discovery. v Subnetworks v SNMP Communities Note: The parameters IP Address ranges and Subnetworks can also be imported using a flat text file. In the text file the parameters you specify must be preceded by the following keys: #IPRANGES Enter this key before specifying a list of IP address ranges in the file. #SUBNETWORKS Enter this key before specifying a list of subnetworks in the file. 8. Click Save. 9. To run the discovery immediately, select the newly created discovery configuration, and click Run Discovery to start the operation. 10. (Optional) Click Schedule to set some scheduling options for the discovery configuration. 11. Click Submit. The scope of the discovery is limited to the specified IP ranges and subnetworks.
160
1. Click Go To > IT Infrastructure > Provisioning Inventory > Unknown Resources. The Unknown Resources page is displayed. These are the main actions that you can perform from the Unknown Resources page: v Run Discovery if you want to run an additional discovery against a set of unknown resources, when the previous discovery ended with an error. Depending on the type of error, solve the problem that caused it, as for example correct the wrong credentials or start the login services, and then rerun the discovery. v Ignore Resource if you no longer intend to manage the unknown resource. It might be a printer or any other type of resource that provisioning cannot manage. You can reactivate the ignored resource later on if you want to manage it again. v Reactivate Resource if you want to edit the unknown resource and manually assign a resource type to that resource. You can delete the unknown resources using the SOAP client interface. The workflow name to use is Unknown_IP_Device_Delete. The parameter for the workflow is the IP address. Running this workflow will delete the unknown resources in the data model. Reactivating an unknown resource: If you know which type of resource is an unknown resource, you can mark as active an unknown resource that you had previously ignored. To manually reactivate an unknown resource, perform the following steps: Procedure 1. Click Go To > IT Infrastructure > Provisioning Inventory > Unknown Resources. The Unknown Resources page is displayed. 2. In the resource list, identify and select the unknown resource you want to modify, and click Reactivate Resource from the Select Action menu. Ignoring unknown resources: If you no longer intend to manage an unknown resource, you can decide to ignore it. That resource will be ignored in the future discoveries. To ignore an unknown resource from the web interface, perform the following steps: Procedure 1. Click Go To > IT Infrastructure > Provisioning Inventory > Unknown Resources. The Unknown Resources page is displayed. 2. In the resource list, identify and select the unknown resource you no longer want to manage, and click Ignore Resource from the Select Action menu. 3. Enter a reason for which you intend to ignore that resource. 4. Click OK. Rediscovering unknown resources: Run again a discovery configuration against a set of unknown resources, when the previous discovery ended with errors. Depending on the type of errors, solve the problems, as for example correct the wrong credentials or start the login services and then, rerun the discovery again. To rediscover an unknown resource from the web interface, perform the following steps:
161
Procedure 1. Click Go To > IT Infrastructure > Provisioning Inventory > Unknown Resources. The Unknown Resources page is displayed. 2. In the resource list, identify and select the unknown resource or the subset of unknown resources you want to discover again, and click Run Discovery from the Select Action menu. If you specify a set of unknown resources that have been discovered using the same discovery method, you are redirected to a discovery wizard pre-filled with the last configuration parameters used, such as the IP address range and the user credentials. If you select a set of unknown resources that have been discovered using different discovery methods, you are redirected to the first page of the discovery wizard on which you need to manually enter the configuration parameters. 3. Perform a network discovery.
On any target computer, provisioning Inventory discovery uses a configuration file which defines the scanning capabilities. In it, there is a default value for scanning software signatures. To perform an Inventory discovery on target computers with Red Hat Enterprise Linux 4.0, 5.0, and 6.0 operating systems, you need to install on the target computers the following prerequisites:
162
Table 40. Provisioning Inventory discovery prerequisites Target computer platform Red Hat Enterprise Linux version 4 Red Hat Enterprise Linux version 4 64-bit Prerequisite compatibility pack compat-libstdc++-33 1. libgcc-3.4.3-9 2. compat-libstdc++-33 Install these compatibility packs in the order specified. Red Hat Enterprise Linux version 6 and 5 SuSE Linux Enterprise Server version 10 SP 3 64-bit compat-libstdc++-33 libstdc++33-32bit
To run an Inventory discovery without downloading the Common Inventory Technology, you need to install the common agent and ensure that its listening port is open on target computers, otherwise inventory scans will fail. The default common agent port number is 9510. Note: If you already installed the common agent, the Inventory discovery requires that a depot server is installed to work in a scalable distribution infrastructure (SDI). If you already installed the common agent but you do not have a depot server in your environment, you must remove the sdi_host Service Access Point (SAP) from the Credentials tab of the provisioning computer. In this way, the discovery will run using a deployment engine infrastructure (DE). In UNIX environments, when running an Inventory discovery on a computer without an agent installed, which has been defined providing the root credentials, the Inventory discovery returns all the available computer data, while performing this discovery on a computer without an agent installed, which has been defined providing general credentials, the discovery returns only the data it is authorized to access.
Discovery.Upload.HostPort
163
Procedure
Click Go To > Administration > Provisioning > Provisioning Global Settings. Click the Variables tab. Click New Row. In the Variable field, type the appropriate variable name, depending on your operating system. For Windows, the variable name is Cit_agentless_win_install_path. For UNIX and Linux, the variable name is Cit_agentless_unix_install_path. 5. In the Component list, select Entire system. 6. In the Value field, type the path where you want the Common Inventory Technology software to be installed. 7. Click Save. 1. 2. 3. 4.
Results
If these variables are not specified, Tivoli Provisioning Manager uses the following default paths: v (For Windows) %PROGRAMFILES%\tivoli\cit v (For UNIX and Linux) /opt/tivoli/cit
Procedure
1. Click Go To > Discovery > Provisioning Discovery > Discovery Configurations. . 2. Click New 3. Type the name and description for the inventory scan. 4. Click Hardware Discovery.
164
5. In the Method field, select Tivoli Provisioning Manager Inventory Discovery. 6. Click OK. 7. Select the type of discovery you want to perform: hardware discovery, software discovery, or both. 8. Click Save .
Results
You have now created a discovery configuration.
Example
The following table displays hardware information with examples that can be discovered with provisioning Inventory discovery:
Table 42. Hardware discovery types and examples Resource Computer Types Manufacturer Version Serial number Type Family Name Architecture Type Brand Model Disk Disk Disk Disk Disk Disk size security order model serial number manufacturer Examples IBM Phoenix FirstBIOS ThinkPad 99RCGV 2373 Windows Microsoft Windows 2003 Intel win2k3-2 IBM -[622158G]56411291648 bytes Yes 0 HTS726060M9AT00 230089-DK-00 Hitachi cdrom 1 MATSHITA MATSHITA UJDA755zDVD/ CDRW G3907 IBM 80 18 2 3071,44 MB Pentium M Intel 1700 32-bit 1 1 1
Platform
Disk
CD-ROM
Name Order Manufacturer Model Model Manufacturer Cylinder Sector Head Size Name Family Frequency Type corePerPackageCount logicalProcPerCore activeCoreCount
Floppy
Ram CPU
165
Table 42. Hardware discovery types and examples (continued) Resource Memory module Types Module size Max module size Socket name Packaging Memory type Note: This data is returned only for specific platforms. The currently supported platforms are Linux and Windows X86 workstations. Manufacturer Name Year manufactured Serial number Size Adapter name Colors Bios version Type Subtype Code page Examples 512 MB 1024 MB DIMM 1/Bank 0/1 SODIMM Synchronous
Monitor
IBM254D ThinkPad LCD 1400 x 1050 2004 4D:25:d400000 15 inch ATI MOBILITY FIRE GL T2 16777216 ati2mtag_M10GL/oem40.inf Standard 101/102-Key or Microsoft Natural PS/2 Keyboard Enhanced (101- or 102-key) 00000409 3 USB Human Interface Lexmark 3200 Color Jetprinter LPT1 My computer Lexmark 3200 Color Jetprinter Agere Agere Systems AC'97 Modem Agere modem Internal Modem COM3 115200 mbs 8N1 p123a psprint1:p123a IBM Infoprint Color 8 IBM Infoprint Color 8 2.0 1 USB Human Interface Device E:\ OS/2 HPFS | Win NTFS 638476288 bytes 17573036032 bytes 99RCGVH 50% 50% 50%
Video
Keyboard
Buttons Model Name Port name Description Driver name Manufacturer Description Provider name Modem name Modem type Port Port speed Port settings Name Port name Description Driver name Version Port Production fsMountPoint: File system type: Free size: Total size: Serial number Node capacity Capacity sharePoolCapacity
Modem
Network printer
USB
Partition
LPAR
166
Table 42. Hardware discovery types and examples (continued) Resource Bios Types Vendor Version Power-on password Note: This resource contains data on the operating system only on System Management Basic Input/Output System (SMBIOS)-compliant systems. Locale Time zone Daylight Mac Model Type Manufacturer Connector Type Name Revision Other network resources Network interface IP Gateway IP Subnet mask IP Computer host name Mac address DHCP enabled Examples IBM 1RETDIWW (3.14) Disabled
Regional
English_Canada.1252 Eastern Standard Time Eastern Daylight Time 005056906307 Intel(R) PRO/1000 MT Ethernet Adapter Intel Ethernet 802.3 LSI LSI53C1020/1030 (PCI-X to Ultra320 SCSI Controller) 0x01
PCI device
The following table displays: v Names of the hardware discovery attributes v Descriptions of the hardware discovery attributes v Default unit of measures stored in the data model v Default unit of measures displayed by the Hardware tab of the Computer properties on the web interface.
Table 43. Hardware discovery attributes, descriptions, and default unit of measures Unit of measures stored in the data model Mega Herz (MHz) Bytes Unit of measures displayed by the web interface Mega Herz (MHz) This value is converted into MB or GB, depending on its size. This value is converted into MB or GB, depending on its size. Mega Bytes (MB) Mega Bytes (MB)
Description The CPU speed in MHz The size of a physical hard disk
memory.size
Bytes
Memory size in each memory module Maximum capacity of the memory for each memory module
167
Table 43. Hardware discovery attributes, descriptions, and default unit of measures (continued) Unit of measures stored in the data model Inches Bits per second (bps) Bytes Unit of measures displayed by the web interface Inches Bits per second (bps) This value is converted into MB or GB, depending on its size. This value is converted into MB or GB, depending on its size.
Description The size of the monitor The modem port speed The total size of the partition
partition.freeSize
Bytes
Note: For hardware component discovery, the unit of both disk size and RAM size are in bytes.
What to do next
You can now schedule the discovery or run it immediately to update the data model. To run the discovery immediately, select the discovery configuration, and click Run Discovery to start the operation. If available, select the targets that you want to run this discovery on. Note: For better performance, if you are selecting multiple targets, you can change the default concurrency level from 5 to a specific number. The concurrency level need not match the number of targets. To 1. 2. 3. make this change: Click Go To > Administration > Provisioning > Provisioning Global Settings. Click Variables. Expand default concurrency level.
4. Change the Value field to the amount that you want. For example, for 4 targets, enter 2 and click Save. You can view the status of the discovery task by clicking Go To > Task Management > Provisioning Tasks > Provisioning Task Tracking. Verifying the discovery for dual core processors: There are two scenarios where the inventory scan can show multiple processors found during the discovery process. 1. If the target computers that were discovered during an inventory scan have multiple CPUs, the scan will describe each processor information in a specific CPUn resource. 2. If a virtual server is running the provisioning Inventory discovery, the node capacity that contains the number of physical processors on the computer and the LPAR capacity (the number of physical processors dedicated to the logical partition or virtual workstation) is shown. For example, lpar.nodeCapacity=4.000000 lpar.capacity=2.000000
168
indicates that there are a total of four CPUs in the computer, and two of them are dedicated to this virtual workstation.
Procedure
1. Click Go To > Discovery > Provisioning Discovery > Discovery Configurations. 2. 3. 4. 5. 6. 7. 8. . Click New Type the name and description for the inventory scan. Click Software Discovery. In the Method field, select Tivoli Provisioning Manager Inventory Discovery. Click OK. Select the type of inventory scan you want to perform. If hardware, software, or both. Under Software, choose to scan the software by one of the following methods: v Use registry: Scans the registry of the resources. v Use software signatures: Scans for all available software signatures. Note: This will run an inventory scan to a target using all defined signatures in the signature catalogue to find any matches. It might take some time to complete the scan. v Use selected software signature: Filters by signature type. If this option is selected, then select the type of signature to search on from the list. Note: If you need to discover software on the same targets using both the registry and software signature software scan options, you must create two separate discovery configurations to run against the targets. Otherwise, the discovered software resources found during the first discovery will be replaced the second time you run discovery with the different software scan options.
Chapter 3. Discovering IT resources
169
9. Click Save
Results
You have now created a discovery configuration.
What to do next
You can now schedule the discovery or run it immediately to update the data model. To run the discovery immediately, select the newly created discovery configuration, and click Run Discovery to start the operation. Note: For better performance, if you are selecting multiple targets, you can change the default concurrency level from 5 to a specific number. The concurrency level need not match the number of targets. To make this change: 1. Click Go To > Administration > Provisioning > Provisioning Global Settings. 2. Click Variables. 3. Expand default concurrency level. 4. Change the Value field to the amount that you want. For example, for 4 targets, enter 2 and click Save. You can view the status of the discovery task by performing the following action: v Click Go To > Task Management > Provisioning Tasks > Provisioning Task Tracking.
Procedure
1. Click Go To > Administration > Provisioning > Provisioning Global Settings. 2. Click the Variables tab. 3. In the variable list, expand the CIT_UNINSTALL variable, which allows you to remove the Common Integration Technology software from the computers where this software has been installed during a provisioning Inventory Discovery. 4. Type true. 5. Click Save.
Results
The Common Integration Technology software is removed from the computers.
170
You can select one or more software signatures to be used for scanning a target computer or a resource group. You can use preinstalled software signatures or specify a subset of the software signatures to customize your inventory scan. Tip: The inventory scan will be faster if you only choose a subset of the software signature to be scanned on targets. Software signature correlation with a software definition (software module) can be created by using the software signature management feature. When the correlation is created, the software signature scan will find an existing software signature. It will then use this correlation to find which software module that this discovered software installation belongs to. Based on this information, the discovered software installation will be associated with a software module using this software signature correlation. To add a custom software signature in the web interface: Procedure 1. Click Go To > IT Infrastructure > Software Catalog > Software Signatures. 2. Click New signature. to create a new software signature, or modify to change an existing software
3. Specify the appropriate information such as software signature, software name, software version, platform, and variables. For example, Match Software Signature By supports: v by File Size v by Existence of OS registry key such as in the Windows registry v by Registry Key such as key name, entry, and value in the Windows registry 4. Click Save Results This information will be used to create a software signature, which can be used to scan a target computer to find a match. If there are no cached software signature files available on the file system, the user is required to run the importSoftwareSignature command in order to refresh the signature caching under %TIO_HOME%\tmp folder.. Only one set of signature caching files are created per OS. Refresh the signature caching files using the web interface: Tip: The inventory scan will be faster if you only choose a subset of the software signature to be scanned on targets. To refresh the signature caching files in the web interface: Procedure 1. Click Go To > IT Infrastructure > Software Catalog > Software Signatures. 2. From the Select Action list, click Refresh Signature Caching. Results This will refresh the signature caching files on the TPM server and will be used by the TPM inventory scan. This command will update the signature caching files from the file system that are stored in %TIO_HOME%\tmp Associating software signatures using the command line:
Chapter 3. Discovering IT resources
171
You can associate a specific software signature to an existing software definition from the command line by importing an XML file with the required information. Before you begin
Windows 2008 Select the option Run as administrator for all the commands that you run from %TIO_HOME%\tools. For more information about user account control in Windows 2008, see User Account Control Step-by-Step Guide.
If you want to import your own software signature using the command line, you must create your own file with the XML description of the software definition and the software signature that you want to associate with it. Do not modify the IBM-software-custom-signature.xml file that is provided with the product. Important: In order for the import command to recognize an edited or newly created software signature file, it is recommended that you use an editor that supports UTF-8. For example, you can use <TIO_HOME>\tio\eclipse\eclipse.exe but not notepad.exe. If you must use notepad.exe, you must remove the three bytes (called BOM) that are inserted at the top of the file. To import a software definition with a software signature. Procedure 1. Create an XML file with the software definition that you want to associate with the software signature. In many cases, the XML is defined in the automation package for the software. Check the xml subdirectory for an XML file with the software definition. 2. Add a software-signature element to the software definition with the software signature that you want to associate with the software. The following example shows an XML file with an AIX 5.1 software definition. The software-signature element is the last element in the software definition. <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE datacenter PUBLIC "-//IBM//DTD XML Import//EN" "xmlimport.dtd"> <datacenter> <software-module name="AIX 5L Version 5.1" version="5.1" title="AIX 5L Version 5.1" vendor="IBM" locale="en_US" is-device-model="AIX Operating System"> <software-capability type="OS" name="os.family" value="AIX"/> <software-capability type="OS" name="os.distribution" value="AIX 5L"/> <software-capability type="OS" name="os.name" value="AIX 5L Version 5.1"/> <software-capability type="OS" name="os.version" value="5.1"/> <software-capability type="OS" name="os.servicepack" value="ML8"/> <software-requirement type="HARDWARE" name="cpu.family"> <software-requirement-value value="powerpc"/> </software-requirement> <software-requirement type="HARDWARE" name="cpu.type"> <software-requirement-value value="32-bit"/> <software-requirement-value value="64-bit"/> </software-requirement> <software-resource-template name="AIX Installation" software-resource-type= "INSTALLATION" software-resource-device-model="AIX Operating System" srt-definition="/AIX Installation" multiplicity-type="One" software-configuration-type="Regular" is-selected="true" is-default="true" is-deployable="true"> </software-resource-template> <software-signature signature-guid="bc.62.8b.f1.05.eb.11.db.a3.14.00.02.55.56.f2.7d" /> </software-module> </datacenter>
172
$TIO_HOME/tools/xmlimport.sh file:file name Where file name is the name of your XML file. Results The software signature is added to the software definition, which can be used to scan a target computer to find a match. Creating a custom software signature using the command line: You can create a custom software signature and import it using the importSoftwareSignature command. The importSoftwareSignature command will create a set of software signature caching files which will be used by inventory discovery to improve runtime performance. Before you begin
Windows 2008 Select the option Run as administrator for all the commands that you run from %TIO_HOME%\tools. For more information about user account control in Windows 2008, see User Account Control Step-by-Step Guide.
Create a custom software signature, then import it. When importing software signatures in an XML file, the GUID value need not be defined, or can be defined based on some unique parameters that you choose. You can create your own GUID value as part of the signature, if it is unique in scope, and then import it into the target computer. Or you can remove the signature-guid tag from the XML file, and have the import create a GUID value for this signature. Procedure 1. Create a software signature XML file. You can use the %TIO_HOME%\xml\samplebook\IBM-softwarecustom-signature.xml as a sample file to base your software signature XML file. Do not modify the IBM-software-custom-signature.xml file. 2. Import the software signature file with the importSoftwareSignature command:
Windows
Where filename is the fully qualified path of your software signature file and true means the signature type is custom. 3. After the signature is loaded into TPM server, the importSoftwareSignature command will create a set of signature caching files under the %TIO_HOME%\tmp directory. Only one set of signature caching files are created per OS. 4. Run the TPM inventory discovery from either the discovery wizard or from the TPM inventory discovery configuration page. The signature caching files on the file system under the %TIO_HOME%\tmp directory are used during the inventory discovery.
Chapter 3. Discovering IT resources
173
Results The software signature is added to provisioning. Refresh the signature caching files using the command line: Tip: The inventory scan will be faster if you only choose a subset of the software signature to be scanned on targets. Procedure To refresh the signature caching files in the command line: Windows From the %TIO_HOME%\tools directory, type:
importSoftwareSignature.cmd -UpdateSigCacheOnly
UNIX Linux
./importSoftwareSignature.sh -UpdateSigCacheOnly
Results This will refresh the signature caching files on the TPM server and will be used by the TPM inventory scan. This command will update the signature caching files from the file system that are stored in %TIO_HOME%\tmp
Procedure
1. Open the configuration file TPMconfig.xml in: v
Windows
\Program Files/tivoli/cit/bin/
Results
You have now updated the default settings.
What to do next
You can now schedule the discovery or run it immediately to update the data model. To run the discovery immediately, on the newly created discovery configuration, click Run Discovery to start the operation. If available, select the targets that you want to run this discovery on.
174
Note: For better performance, if you are selecting multiple targets, you can change the default concurrency level from 5 to a specific number. The concurrency level need not match the number of targets. To 1. 2. 3. 4. do make this change: Click Go To > Administration > Provisioning > Provisioning Global Settings. Click Variables. Expand default concurrency level. Change the Value field to the amount that you want. For example, for 4 targets, enter 2. .
5. Click Save
You can view the status of the discovery task by performing the following action: v Click Go To > Task Management > Provisioning Tasks > Provisioning Task Tracking. You can also specify in the configuration file the directories to be excluded from the scan if you want to perform scanning excluding specific directories on the target computer. To specify the directories to be excluded from the scan: 1. Open the configuration file TPMconfig.xml on the target computer. 2. Locate the FSScan section of the file, which is the section that provides configuration information for the file system scanner. 3. Find the attribute excludeDirectory. 4. Edit the value for this attribute as follows:
<Attribute name="excludeDirectory" value="SystemDrive:/directory_name"/>
175
v v v v
name of the inventory extension. name of the data model table containing the collected information. full path name of the scripts to be used for each platform. full path name of the output file containing the information collected on the target computer.
On each target computer: v Create the output files for the inventory extension data on page 178. Create a custom table in the data model: Before creating the inventory extension, you must create a custom table in the data model to contain the collected information. You can use the same table also to run reports generated by different inventory extensions. Before you begin When creating the custom tables in the data model, ensure that you follow these rules: v A column named discovery_id is mandatory and a foreign key to the discovery table must be set. v A column named server_id is mandatory and a foreign key to the server table must be set. When creating the custom tables, also the following rules are recommended: v Set the discovery_id column as not nullable. v Set the server_id column as not nullable. v Cascade the delete constraints on server_id and discovery_id. To create a custom table in the data model to contain the collected information, perform these actions: 1. Log on as Windows Administrator, or root for UNIX platforms, to the Tivoli Provisioning Manager server command line. 2. Create an SQL script file named my_table.sql. A sample SQL script file is the following:
DROP TABLE MY_TABLE; CREATE TABLE MY_TABLE( discovery_id server_id parameter endpoint network_interface value ); BIGINT NOT NULL, BIGINT NOT NULL, VARCHAR(255), VARCHAR(255), VARCHAR(255), VARCHAR(255)
ALTER TABLE my_table ADD FOREIGN KEY (server_id) REFERENCES SERVER(server_id) on DELETE CASCADE; ALTER TABLE my_table ADD FOREIGN KEY (discovery_id) REFERENCES DISCOVERY(discovery_id) on DELETE CASCADE; COMMIT;
then type db2cw to open a new window from which you can run DB2 commands. On UNIX platforms, run the command:
su - ctginst1
176
where xxx Is the password associated to the Maximo user. 5. When you are connected to the database, enter the command:
db2 -tvf C:\myfilename.sql
where C:\myfilename.sql Is the full path name associated to your SQL script file. Create the pre and post scripts for the target computers: Create pre and post script files for each target platform where the inventory extension will run. Procedure 1. Create pre and post script files for each type of operating system on which you plan to run the inventory extension. You might use the pre script file to prepare the target computer to run the inventory extension. You might use the post script file to clean up the target computer after the inventory extension has been run. The pre and post script files run if they are commented out in the properties file you create for the inventory extension. 2. Manually distribute the scripts on the target computers on which the inventory extension will run. Ensure that the script files are the same files that you created for the operating system installed on the target computer. 3. Test on each target system that these script files run correctly. Example The following is a sample pre script file for Windows:
echo "Prescript start.....creating c:\test\my_table.windows.mif.backup" copy c:\test\my_table.windows.mif c:\test\my_table.windows.mif.backup echo "Postscript ends" EXIT
177
Create the output files for the inventory extension data: The output file for the inventory extension custom data must be written in XML data format and must follow specific syntax rules. For compatibility reasons also the MIF file format is supported. The MIF file is automatically converted into XML format when the discovery configuration is run. When you define the XML output file for the inventory scan custom data, ensure that you follow these syntax rules:
<?xml version="1.0" encoding="UTF-8"?> <!ELEMENT custom-data (custom-table+)> <!ELEMENT custom-table (string-column+ | integer-column+)+> <!ATTLIST custom-table name CDATA #REQUIRED > <!ELEMENT integer-column EMPTY> <!ATTLIST integer-column name CDATA #REQUIRED length (32 | 64) #REQUIRED value CDATA #IMPLIED > <!ELEMENT string-column EMPTY> <!ATTLIST string-column name CDATA #REQUIRED length CDATA #IMPLIED value CDATA #IMPLIED >
178
End Attribute Start Attribute Name = "value" Id = 4 Type = String(255) value = "9.168.100.40" End Attribute End Group End Component
Results The output file that you created is the file that contains the data that is read by the inventory extension and saved into the custom table when the discovery configuration is run. It is your responsibility to create this file to satisfy your needs. Create the properties file for the inventory extension: Create a property file for the inventory extension in which you specify: v The name of the inventory extension. v The name of the table containing the collected data. v A specific stanza for each target platform where the inventory extension will run. Each specific stanza might contain any combination of pre, post, and output file information. The following is a sample properties file named my_file.properties:
# Name of the extension # # This is the name of the inventory extension that will be created. When you create the inventory extension also a # Discovery Configuration named <extName>_Discovery will be created. # You will then run that Discovery Configuration to collect data on the targets. # You can add this inventory extension also to other Discovery Configurations from the TPM Web interface. # extName=my_inventory
# Description of the extension # # This will be the name of the custom report that you will run to see the data collected on the targets by the inventory extension # extDescription=my inventory extension data
# Table fields # # This is the name of the custom table that will contain the data collected by the inventory extension # TABLE_1.NAME=my_table
# # Full path names on the targets of pre, post and output files # # Files for AIX operating systems targets
Chapter 3. Discovering IT resources
179
AIX=yes #pre_aix=/home/test/prescript.sh out_aix=/home/test/my_file.mif #post_aix=/home/test/postscript.sh # Files for HP-UX operating systems targets HPUX=no #pre_hpux=/home/test/prescript.sh out_hpux=/home/test/my_file.mif #post_hpux=/home/test/postscript.sh # Files for Solaris operating systems targets SOLARIS=no #pre_solaris=/export/home/test/prescript.sh out_solaris=/export/home/test/my_file.xml #post_solaris=/export/home/test/postscript.sh # Files for Linux operating systems targets LINUX=yes pre_linux=/home/test/prescript.sh out_linux=/home/test/my_file.xml post_linux=/home/test/postscript.sh # Files for Windows operating systems targets WINDOWS=yes #pre_windows=c:\\test\\prescript.windows.bat out_windows=c:\\test\\my_file.windows.mif #post_windows=c:\\test\\postscript.windows.bat # This is a dummy entry that you might use to address operating systems other than those selected above # # to use this entry set Unknown=yes and specify full path names for pre, post, and output files # Unknown=no pre_unknown=dummy out_unknown=dummy post_unknown=dummy
The following considerations apply to the properties file: v The extension name is a required parameter, but the extension description is optional. v The property names are not case sensitive. In the Table list section of the file, the following structure is supported:
# Table list TABLES = my_table,another_table
Manually create the custom tables in the database. The following restrictions apply to this format: v The numbering following the TABLE tag must start from 1. v The numbering following the TABLE tag must be sequential.
180
The following considerations apply to the Operating System sections of the file: v These sections specify, for each operating system, if this inventory extension applies to that specific operating system. v If the section applies to the operating system (operating_system = yes), the command parses the pre, out, and post properties to enter the information in the appropriate files for that operating system. v If the section does not apply to the operating system (operating_system = no), the pre, out, and post properties are not read. v The Unknown section contains the default values for all the undefined operating systems. Create the inventory extension: Create the inventory extension to be used to collect the requested information about the target computers. To create the inventory extension, perform the following steps: Procedure 1. Log on as Provisioning Administrator (tioadmin) to the Tivoli Provisioning Manager server command line. 2. Run the InventoryExtension create command, as described in the inventoryExtension create command. 3. Verify that the inventory extension was created successfully: a. Check if the InventoryExtension create command output ends successfully. b. Run the InventoryExtension list command to check if the inventory extension is listed. c. For each inventory extension you create specifying that the report associated to the extension must be created, two files are generated named my_inventory.rptdesign and my_inventory.xml. Check if these files have been created in the TIO_HOME/tmp directory. d. Log on as maxadmin to the Tivoli Provisioning Manager Web interface. e. Click Go To > Discovery > Provisioning Discovery > Discovery Configurations. f. Filter for the inventory extension name. The my_inventory_Discovery configuration is displayed. Migrate inventory extensions from version 5.1.1.2: If you have Tivoli Provisioning Manager 5.1.1.2 inventory extensions you want to migrate to Tivoli Provisioning Manager 7.1.1, perform the following steps: 1. Run the command on Windows platforms:
TIO_HOME/migration/scripts/InvExtReportRegenFrom5112.cmd
By running these commands the inventory extension reports are created in the TIO_HOME/tmp directory. 2. Copy the generated files from the Tivoli Provisioning Manager server to the administrative workstation as described in Set up the environment to run the custom report on page 183. Get a DB2 database report: To get a DB2 report, follow this procedure: 1. From the DB2 command window, connect to the database using the following command:
db2 connect to <database_name> user <db2_admin> using <db2_admin_password>
181
For example, if your database name is TIODB, your DB2 administrator user ID is db2admin, and your DB2 administrator user password is db2adminpswd, this is the command to use:
db2 connect to TIODB user db2admin using db2adminpswd
2. Issue the following reorgchk. The command calculates statistics on the database to determine if tables need to be reorganized.
db2 reorgchk
Search for asterisks (*) in the REORG column of the report. This indicates that the table or index needs to be reorganized. For more information about how to read the output from the reorgchk command, see reorgchk command in DB2 information center. For more information about reorganizing tables, see "Table reorganization" in the DB2 information center. Setting up parameters for importing inventory extension reports: In preparation for importing inventory extension reports, you must customize the parameters in a properties file to use the correct port number and enable SSL for communication with the provisioning server. Procedure 1. On the administrative workstation, open the MAXIMO_HOME/maximo/reports/birt/tools/ reporttools.properties file and replace its contents with the following information:
maximo.report.birt.hostname=host_name maximo.report.birt.port=9443 maximo.report.birt.ssl=true maximo.report.birt.username=username maximo.report.birt.password=password maximo.report.birt.outputfolder=./../../birt
where MAXIMO_HOME The directory where the base services are installed. The default path is: v v
Windows UNIX
C:\IBM\SMP
Linux
/opt/IBM/SMP
host_name The fully-qualified host name (or IP address) of the provisioning server. username The default user name is maxadmin. 2. Copy the TIO_HOME/cert/tpmui.cer certificate file from the provisioning server to the administrative workstation. 3. Add the certificate from the provisioning server to the base services security keystore v
Windows
where, CERT_LOC is the directory containing the certificate file. If the Tivoli Provisioning Manager configuration does not require a separate administrative workstation, CERT_LOC is equivalent to TIO_HOME/cert. 4. When prompted for a password, type changeit. Enter yes to confirm the certificate has been added.
182
6.
# Default JSSE socket factories #ssl.SocketFactory.provider=com.ibm.jsse2.SSLSocketFactoryImpl #ssl.ServerSocketFactory.provider=com.ibm.jsse2.SSLServerSocketFactoryImpl # WebSphere socket factories (in cryptosf.jar) ssl.SocketFactory.provider=com.ibm.websphere.ssl.protocol.SSLSocketFactory ssl.ServerSocketFactory.provider=com.ibm.websphere.ssl.protocol.SSLServerSocketFactory
to
# Default JSSE socket factories ssl.SocketFactory.provider=com.ibm.jsse2.SSLSocketFactoryImpl ssl.ServerSocketFactory.provider=com.ibm.jsse2.SSLServerSocketFactoryImpl # WebSphere socket factories (in cryptosf.jar) # ssl.SocketFactory.provider=com.ibm.websphere.ssl.protocol.SSLSocketFactory # ssl.ServerSocketFactory.provider=com.ibm.websphere.ssl.protocol.SSLServerSocketFactory
8. In the MAXIMO_HOME/maximo/reports/birt/tools directory, run the importreports.cmd|.sh reports command. 9. On the web interface, click Go To > Administration > Reporting > Report Administration and click Generate Request Pages. Set up the environment to run the custom report: Before you begin Before you import the inventory extension reports, perform the steps described in Setting up parameters for importing inventory extension reports on page 182. To set up the environment to run the custom report associated to the inventory extension, perform the following steps: Procedure 1. Log on as Windows Administrator, or root for UNIX platforms, to the Tivoli Provisioning Manager server command line. 2. Copy the two files generated for each inventory extension named my_extension.rptdesign and my_extension.xml from the Tivoli Provisioning Manager server to the administrative workstation directory maximo_inst_dir/reports/birt/reports/TPSERVERS. 3. Import the custom report by running the following command in the Administrative workstation:
Maximo_HOME\maximo\reports\birt\tools\importreports app TPSERVERS
What to do next The imported report can then be generated from the Tivoli Provisioning Manager Web interface. Run the Inventory Discovery with the inventory extension: Run the inventory extension that you created to register in the custom table the requested information collected on the target computers. To run the inventory extension perform the following steps:
183
Procedure 1. Log on as maxadmin to the Tivoli Provisioning Manager web interface. 2. Click Go To > Discovery > Provisioning Discovery > Discovery Configurations. 3. Filter for the inventory extension name. The my_inventory_Discovery configuration is displayed. 4. Click the my_inventory_Discovery configuration. 5. Click Run Discovery. 6. Select the target computers for the discovery. 7. Verify that the task ends successfully from the Provisioning Task Tracking application. Add the custom report to the list of reports: To add the custom report associated to the inventory extension to the list of reports that can be run from the Tivoli Provisioning Manager Web interface, perform the following steps: Procedure 1. Log on to the Tivoli Provisioning Manager Web interface with at least Provisioning Configuration Librarian authorization. 2. 3. 4. 5. Click Go To > Administration > Reporting > Report Administration. Locate and select the report associated to the inventory extension. Click Generate Request Page. Verify that the command completes successfully.
What to do next The added report can then be run from the Tivoli Provisioning Manager Web interface. Run the custom report: To retrieve and display the information in the custom report associated to the inventory extension, perform the following steps: Procedure 1. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Computers. 2. Locate and select the provisioning computer on which you ran the inventory extension. 3. From the Select Action menu, click Run Report. 4. Select the custom report my_inventory_extension_data. 5. Click Run. What to do next In the report output you see the information collected on the target computers. Example: Defining a custom inventory extension for a target computer:
The inventory extensions are used to perform custom inventory scans. You can define inventory extensions when you want to discover on target computers any information which is not discovered by the Tivoli Provisioning Manager Inventory discovery.
In the following example, an inventory extension is defined and run on a target computer. To complete this task, you must be logged on as a Maximo user.
184
To define this inventory extension, perform the following steps: Procedure 1. Create the tables as described in Set up the environment to create the inventory extension on page 175. To be able to create the tables, ensure that you log on to the database as Maximo user. 2. Create on the Tivoli Provisioning Manager server the properties file named my_inv_extension.properties containing the extension name, description, and related custom scripts with full paths listed by platform. The properties file must have the structure described in inventoryExtension create command. Before running this command, log on as Provisioning Administrator (tioadmin) to the Tivoli Provisioning Manager server. 3. Manually copy on the target computers my_inv_extension.bat / my_inv_extension.sh and my_inv_extension.xml files. The location of these files is specified in my_inv_extension.properties. 4. Copy my_inv_extension.rptdesign and my_inv_extension.xml from the Tivoli Provisioning Manager server %TIO_HOME%/tmp directory to the directory maximo_inst_dir/reports/birt/reports/TPSERVERS of the administration client workstation. 5. Using the base services administration client workstation logged on as Administrator, move to the directory maximo_inst_dir/reports/birt/tools. 6. Run the importreports.cmd app TPSERVERS command from the base services console to import the newly-created report definition. Before you import the inventory extension reports, perform the steps described in Setting up parameters for importing inventory extension reports on page 182. 7. Discover the target computer by performing an RXA-based initial network discovery from the Tivoli Provisioning Manager Web interface. 8. From the discovery configuration run the discovery named my_inv_extension_name. 9. Check if on the target computer are stored the TXT files that verify if the inventory extension can run the command on the target. 10. Generate the report associated to my_inv_extension.xml as described in Add the custom report to the list of reports on page 184. 11. Run the report as described in Run the custom report on page 184. Example: Customizing the Inventory scan depending on specific needs: You can customize the inventory scan depending on your business needs.
In this example a specific customization of the Common Inventory Technology (CIT) configuration file is described, needed to customize the Inventory scan depending on your business needs.
Procedure 1. Customize the TPMconfig.xml file on the target computer, as described in Customizing the CIT configuration file on page 186. 2. Create and run the pre script file on the target computer, as described in Creating and running the pre script file on the target computer on page 186. 3. Create a custom table, as described in Creating a custom table in the data model on page 187. 4. Create the inventory extension, as described in Creating the properties file and the inventory extension on page 187. 5. Perform an Inventory Discovery, as described in Running the Inventory discovery using the inventory extension on page 188. 6. Import the reports associated to the inventory extension, as described in Importing the inventory extension reports on page 188. 7. Run the reports associated to the inventory extension, as described in Running the inventory extension reports on page 189.
Chapter 3. Discovering IT resources
185
Customizing the CIT configuration file: You can use the CIT scan script located on the target computer subagent directory to customize the inventory scan. Procedure 1. Locate the TPMconfig.xml file on the target computer. The default TPMconfig.xml file is as follows:
<FSScan version="1.0"> <IncludeDirectory value="C:\"/> <FileMask value="*.dll"/> <FileMask value="*.exe"/> <ExcludeFileMask value="w*"/> <AttributeMask value="rw?rw?rw?"/> <SizeMask value="lt200000"/> <SizeMask value="gt100000"/> <Age value="60"/> <Timeout value="1800"/> <OutputData value="BASIC"/> </FSScan>
Note: If TPMconfig.xml does not exist, make the changes in config.xml. Results The Age parameter represents the age of the retrieved data, specified in minutes. The default value is 60 minutes. It means if the cache is younger than 60 minutes, the output file contains the files deleted between scans and the files created during this time will not be received. Setting this value to "0" would disable caching and therefore it would have a negative performance impact on the duration of the scan. Creating and running the pre script file on the target computer: Procedure 1. Create the pre script file as follows:
"c:\progra~1\tivoli\cit\bin\wscanfs.exe" c "c:\progra~1\tivoli\cit\bin\TPMconfig.xml" -o c:\Mydir\myoutput.mif m
2. Run the pre script file on the target computer and the output looks as follows:
C:\Mydir>type myoutput.mif START COMPONENT NAME = "Tivoli Inventory Basic File Scan MIF" START GROUP NAME = "TIV_Software_Files" CLASS = "DMTF|TIV_Software_Files|1.0" START ATTRIBUTE NAME = "File_Path" ID = 3 TYPE = STRING(1024) VALUE = "" END ATTRIBUTE START ATTRIBUTE NAME = "File_Name" ID = 4
186
TYPE = STRING(256) VALUE = "" END ATTRIBUTE START ATTRIBUTE NAME = "File_Size" ID = 5 TYPE = INTEGER VALUE = 0 END ATTRIBUTE START ATTRIBUTE NAME = "File_Type" ID = 6 TYPE = STRING(64) VALUE = "" END ATTRIBUTE KEY = 3,4 END GROUPSTART TABLE NAME = "TIV_Software_Files" ID = 1 CLASS = "DMTF|TIV_Software_Files|1.0" {"C:/Program Files/tivoli/cit/bin/","citxfs.dll",176128,"regular"} {"C:/Program Files/tivoli/cit/bin/","fsmon.exe",139264,"regular"} {"C:/Program Files/tivoli/cit/bin/","libbase.dll",102400,"regular"} {"C:/Program Files/tivoli/cit/bin/","libCcLogWrapper.dll",159744, "regular"} {"C:/Program Files/tivoli/cit/bin/","libcit.dll",139264,"regular"} {"C:/Program Files/tivoli/cit/bin/","provider_standard.dll",106496, "regular"} END TABLE END COMPONENT
Creating a custom table in the data model: Procedure 1. Define the custom table as follows:
C:\Mydir>type mytable.sql DROP TABBLE TIV_Software_Files; CREATE TABLE TIV_Software_Files( discovery_id BIGINT NOT NULL, server_id BIGINT NOT NULL, File_Path VARCHAR(1024), File_Name VARCHAR(256), File_Size BIGINT, File_Type VARCHAR(64) ); ALTER TABLE TIV_Software_Files ADD FOREIGN KEY (server_id) REFERENCES SERVER(server_id) on DELETE CASCADE; ALTER TABLE TIV_Software_Files ADD FOREIGN KEY (discovery_id) REFERENCES DISCOVERY(discovery_id) on DELETE CASCADE; COMMIT; }
2. Create the table in the data model by running the following commands:
set DB2INSTANCE=ctginst1 db2 connect to maxdb71 user maximo using password db2 -tvf C:\mytable.sql
Note: In this step the mentioned commands apply to a UNIX workstation. Creating the properties file and the inventory extension:
Chapter 3. Discovering IT resources
187
Procedure 1. Create the properties file for the inventory extension. Specify the following in my_file.properties:
extName=my_inventory2 TABLE_1.NAME=TIV_Software_Files # Files for Windows operating systems targets WINDOWS=yes pre_windows=c:\\Mydir\\mywscanfs.cmd out_windows=c:\\Mydir\\myoutput.mif #post_windows=c:\\test\\postscript.windows.bat
All other platforms are set to no. The post script is not needed in this case. 2. Create the inventory extension by running the following command:
C:\Program Files\IBM\tivoli\tpm\tools>inventoryExtension.cmd create -p c:\Mydir my_file.properties
Running the Inventory discovery using the inventory extension: Procedure 1. Log on as maxadmin to the Tivoli Provisioning Manager Web interface. 2. Click Go To > Discovery > Provisioning Discovery > Discovery Configurations. 3. Filter for the inventory extension name. The my_inventory2_Discovery configuration is displayed. 4. Click the my_inventory2_Discovery configuration. 5. Click Run Discovery. 6. Select the target computers on which you want to perform the discovery. 7. Verify that the task ends successfully from the Provisioning Task Tracking application. Importing the inventory extension reports: For more details about how to import the inventory extension reports, see Setting up parameters for importing inventory extension reports on page 182.
188
Procedure 1. Set up the parameters needed for importing inventory extension reports. On the administrative workstation, open the Maximo_HOME/maximo/reports/birt/tools/reporttools.properties file and replace its contents with the following information:
maximo.report.birt.hostname=tpm_fully_qualified_host_name maximo.report.birt.port=9443 maximo.report.birt.ssl=true maximo.report.birt.username=maxadmin maximo.report.birt.password=maxadmin_pwd maximo.report.birt.outputfolder=./../../birt
2. Copy the TIO_HOME/cert/tpmui.cer certificate from the provisioning server to the administrative workstation. 3. On the administrative workstation, import the certificate as follows:
C:\ibm\SMP\maximo\tools\java\jre\bin>keytool -import -trustcacerts -keystore C:\ibm\SMP\maximo\tools\java\jre\lib\security\cacerts -file c:\Progra~1\IBM\tivoli\tpm\cert\tpmui.cer
4. Enter the keystore password: changeit. Answer yes to the Trust this certificate? question. The certificate was now added to the keystore. 5. Copy the two files generated for each inventory extension named my_extension.rptdesign and my_extension.xml from the Tivoli Provisioning Manager server to the administrative workstation directory. 6. Import the custom report by running the following command:
Maximo_HOME\maximo\reports\birt\tools\importreports app TPSERVERS
7. Generate the imported report from the Tivoli Provisioning Manager Web interface as follows: a. Click Go To > Administration > Reporting > Report Administration. b. Locate and select the report associated to the inventory extension. c. Click Generate Request Page. Running the inventory extension reports: Procedure 1. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Computers. 2. Locate and select the provisioning computer on which you ran the inventory extension. 3. Click Run Reports from the Select Action menu. 4. In the Reports dialog, search for the custom report by description, not by report name, entering a description for the report. 5. Click Submit to run the report. You do not need to enter a computer name in Server Name. A report is displayed. What to do next To run a custom inventory extension report on other target computers, you must copy the pre script file to the target computers. This can be done by creating a workflow. Example: Displaying CIT custom inventory extension data: You can display the Common Inventory Technology (CIT) custom inventory extension data directly in Tivoli Provisioning Manager.
189
In this example it is described how to set up a sample CIT custom inventory extension and feed that data back to Tivoli Provisioning Manager.
Procedure 1. Configure the managed system to execute the CIT custom inventory extension, as described in Preparing the managed system to provide additional inventory data. 2. Configure the server to store the additional data, as described in Preparing the server to store additional inventory data on page 191. 3. Create the CIT custom inventory extension, as described in Creating the CIT custom inventory extension in Tivoli Provisioning Manager on page 193. 4. Test the new custom inventory extension you created, as described in Testing the CIT custom inventory extension on page 193. 5. Display the CIT data in the provisioning application, as described in Changing the provisioning application to include the custom inventory extension data on page 194. Preparing the managed system to provide additional inventory data: You can prepare the managed system to execute the CIT custom inventory extension. When developing a custom scanner for CIT of your own, you would need to provide output data in a CIT-compatible format, which would either be a Management Information Format (MIF) file or an XML file, both with a predefined format. Because this scenario does not focus on the development of a completely custom scanner, you will use the wscanfs.exe command provided by the CIT scanner, which scans the file system for files. This command provides a suitable output. To use the command as a CIT Custom Inventory Extension, you need to prepare it on the target system. Previewing the MIF output of the wscanfs command: Before running the report, it is recommended, when using Tivoli Provisioning Manager, to run the command directly on the managed system. You will create a sample output as a MIF file on the managed system. Procedure 1. Log on to the managed system and open a command shell to run the following two commands:
cd c:\program files\tivoli\cit\bin wscanfs.exe -c TPMconfig.xml -o myoutput.mif -m
2. A myoutput.mif file is created containing the result of the CIT file system scanner with the configuration in the TPMconfig.xml file. The content of myoutput.mif is the following:
START COMPONENT NAME = "Tivoli Inventory Basic File Scan MIF" START GROUP NAME = "TIV_Software_Files" CLASS = "DMTF|TIV_Software_Files|1.0" START ATTRIBUTE NAME = "File_Path" ID = 3 TYPE = STRING(1024) VALUE = "" END ATTRIBUTE START ATTRIBUTE NAME = "File_Name"ID = 4 TYPE = STRING(256) VALUE = "" END ATTRIBUTE
190
START ATTRIBUTE NAME = "File_Size" ID = 5 TYPE = INTEGER VALUE = 0 END ATTRIBUTE START ATTRIBUTE NAME = "File_Type" ID = 6 TYPE = STRING(64) VALUE = "" END ATTRIBUTE KEY = 3,4 END GROUP START TABLE NAME = "TIV_Software_Files" ID = 1 CLASS = "DMTF|TIV_Software_Files|1.0" {"C:/Program Files/tivoli/cit/bin/","citxfs.dll",176128,"regular"} {"C:/Program Files/tivoli/cit/bin/","fsmon.exe",139264,"regular"} {"C:/Program Files/tivoli/cit/bin/","libbase.dll",102400,"regular"} {"C:/Program Files/tivoli/cit/bin/","libCcLogWrapper.dll",159744,"regular"} {"C:/Program Files/tivoli/cit/bin/","libcit.dll",139264,"regular"} {"C:/Program Files/tivoli/cit/bin/","provider_standard.dll",106496,"regular"} END TABLE END COMPONENT
Configuring the wscanfs config.xml file: On the managed system, in the c:\programfiles\tivoli\cit\bin directory, modify the original TPMconfig.xml file as follows:
<FSScan version="1.0"> <IncludeDirectory value="C:\"/> <SizeMask value="gt10000000"/> <Age value="60"/> <Timeout value="1800"/> <OutputData value="BASIC"/> </FSScan>
On the managed system, in a directory of your choice, crate a batch file to be called by the CIT custom inventory extension scan. For example, create a directory C:\test and a text file in that directory named mywscanfs.cmd and insert the following content:
"c:\program files\tivoli\cit\bin\wscanfs.exe" c "c:\program files\tivoli\cit\bin\config.xml" -o c:\test\myoutput.mif m
Note the path to the mywscanfs.cmd script, as you will need it later on to create a properties file on the Tivoli Provisioning Manager server. Preparing the server to store additional inventory data: Once the command to scan and collect the additional data is completed, you need to define a place, where the CIT scanner can write the collected data to. You can use a table in the database as a source for a report. To use the database table in the Tivoli Provisioning Manager applications, you will define that table using the Database Configuration application. Procedure 1. Log on to the Tivoli Provisioning Manager Wweb interface. 2. Click Go To > System Configuration > Platform Configuration > Database Configuration. 3. Click Advanced Search, clear the N in the Internal? field and click Find.
Chapter 3. Discovering IT resources
191
4. Ensure that there are no outstanding changes. If there are outstanding changes, communicate with whoever made this changes, and either discard them or apply them before continuing. 5. Click New Object and enter the following information:
Object: TIV_SOFTWARE_FILES Description: for example CIT Custom Inventory Extension fs scan Storage Partition: IBM32KSPACE Add Rowstamp?: No Entity: TIV_SOFTWARE_FILES
6. Navigate to the Attributes tab and perform the following changes to the attributes:
- Delete: Description o o o o o o o o o o o o New Row Attribute: DISCOVERY_ID Same as Object: TPDISCOVERY Same as Attribute: ID New Row Attribute: SERVER_ID Same as Object: TPSERVER Same as Attribute: ID New Row Attribute: File_Name Type: ALN Length: 256 New Row Attribute: File_Path Type: ALN Length: 1024
- New Row o Attribute: File_Size o Type: Integer o o o New Row Attribute: File_Type Type: ALN Length: 64
7. Navigate to the List tab and search for the TPSERVER object. 8. Select the TPSERVER object and go to the Relationships tab. 9. Create a new row with the following data:
Relationship: TIV_SOFTWARE_FILES Child Object: TIV_SOFTWARE_FILES Where Clause: server_id = :id
10. Save the TPSERVER object and go back to the List tab. Clear any filters that you have set. Now there should be one object with an outstanding change. Modifying the database table: Procedure 1. Stop the Tivoli Provisioning Manager server. 2. Back up the database. 3. Log on to the Administrative Workstation and open a command shell to run the following commands:
cd c:\IBM\SMP\maximo\tools\maximo configdb.bat
4. Log on to the database server of Tivoli Provisioning Manager and open the DB2 Control Center. 5. Select the Tivoli Provisioning Manager database and filter the table names such as TIV%, DISCOVERY, SERVER where any condition applies. The table tree should contain three tables:
192
v TIV_SOFTWARE_FILES v DISCOVERY v SERVER 6. Right-click the TIV_SOFTWARE_FILES tables, select Alter... and navigate to the Keys tab. 7. Select Add Foreign ... and add two foreign keys for:
Schema: MAXIMO MAXIMO Name: DISCOVERY SERVER Primary Key: DISCOVERY_ID SERVER_ID Foreign Key: DISCOVERY_ID SERVER_ID On delete: CASCADE CASCADE
and click OK. Note: If you prefer to create an SQL statement, the correct statement is as follows:
ALTER TABLE MAXIMO.TIV_Software_Files ADD FOREIGN KEY (server_id) REFERENCES SERVER(server_id) on DELETE CASCADE; ALTER TABLE MAXIMO.TIV_Software_Files ADD FOREIGN KEY (discovery_id) REFERENCES DISCOVERY(discovery_id) on DELETE CASCADE; COMMIT;
8. Right-click the TIV_SOFTWARE_FILES tables, select Alter... and go to the Columns tab. 9. Select TIV_SOFTWARE_FILESID and click Change.... Select the Value generation tab, select Identity with initial value 1 and increment 1, click OK twice. Note: If you prefer to create an SQL statement, the correct statement is as follows:
ALTER TABLE MAXIMO.TIV_SOFTWARE_FILES ALTER COLUMN TIV_SOFTWARE_FILESID SET GENERATED AS IDENTITY ( START WITH 1 INCREMENT BY 1 NO CACHE ) ;
10. Start the Tivoli Provisioning Manager server. Creating the CIT custom inventory extension in Tivoli Provisioning Manager: Before starting the CIT scan using the custom inventory extension, the extension must be known to Tivoli Provisioning Manager. To do this, a property file must be created, and this property file must then be added to the extension. Procedure 1. Log on to the Tivoli Provisioning Manager server command line interface as tioadmin. 2. Create in any directory you want (for example C:\tpm_temp) a new text file named my_inventory2.properties. 3. Edit the file and insert the following content:
extName=my_inventory2 TABLE_1.NAME=TIV_Software_Files # Files for Windows operating systems targets WINDOWS=yes pre_windows=c:\\test\\mywscanfs.cmd out_windows=c:\\test\\myoutput.mif #post_windows=c:\\test\\postscript.windows.bat
4. Save the file. 5. Run the following commands to add the my_inventory2.properties file to the CIT custom inventory extension of Tivoli Provisioning Manager:
cd %TIO_HOME%\tools inventoryExtensions.cmd create p c:\tpm_temp\my_inventory2.properties
193
Procedure 1. Log on to the Tivoli Provisioning Manager web interface. 2. Click Go To > Discovery > Provisioning Discovery > Discovery Configurations. 3. Locate and select the my_inventory2_Discovery configuration. 4. Perform the discovery against the managed system running the Tivoli common agent (TCA). 5. Log on to the database server of Tivoli Provisioning Manager and connect to the database. 6. Issue the following SQL statement:
select * from maximo.TIV_SOFTWARE_FILES
Results The result should display some lines. If not, there was a problem writing to the database. Changing the provisioning application to include the custom inventory extension data: The collected additional CIT data can be displayed not only in a report, but also in the provisioning server application. This example will focus on modifying the existing Provisioning Computers application, so that you can select the managed system and see the additional data in the computer information. Before you modify the original Provisioning Computers application, you should make a backup of the original Provisioning Computers application by exporting and saving the XML application presentation using the Application Designer. If you update Tivoli Provisioning Manager and you have performed changes to the original Provisioning Computers application, restore the original application definition before applying the update, then update Tivoli Provisioning Manager, and later add your changes to the updated Provisioning Computers application. Procedure 1. Log on to the Tivoli Provisioning Manager web interface. 2. Click Go To > System Configuration > Platform Configuration > Application Designer. 3. Select the Provisioning Computers application and go to the Workspace tab. 4. Once the application has finished loading, click Export Application Definition in the toolbar to display the application presentation and save that XML to a different directory. 5. When the application is opened in the Application Designer, add your new additional data table. A good choice would be to drag a new tab from the Control Palette named Extended Discovery Results. Drag a new table from the Control Palette and drop it on the new tab. Additionally, drag and drop four more table columns to the new table. Close the Control Palette, select the table, and open the table properties. 6. In Label enter a name for the table such as CIT Custom Inventory Extension File Scan Results. 7. In Relationship enter TIV_SOFTWARE_FILES. 8. Select the table body, open its properties, and check Filterable? and Filter Expanded?. 9. Open the properties of all table columns and provide each table column with an attribute of the TIV_SOFTWARE_FILES object (DISCOVERY_ID, FILE_NAME, FILE_SIZE, FILE_TYPE, FILE_PATH). You can leave out SERVER_ID. Enter the attribute name in the Attribute field. 10. For the DISCOVERY_ID, you can also provide a Go To menu entry (use the menu type NORMAL), so that you can go to the Discovery Configurations application, select the appropriate discovery configuration and get the value. 11. Save the application. Results When you open the Provisioning Computers application and select the managed system for which you gathered the additional CIT data, there is now a new tab (or the table should appear where you created it) displaying the discovery results.
194
195
When you identify the scope of the discovery, provisioning will automatically import the organizational data and reflect that data in the inventory by using the same group views in the web interface. Microsoft Active Directory discovery configuration can also support advanced search. Advanced search allows customer to input LDAP query scripts and this query is run against the Microsoft Active Directory server. The result of the MSAD query will be placed in a provisioning group. For example, to create a group using an MSAD query which will contain all resources and sub-organizations under the TivoliOU organizational unit, in the User Defined Search Command field of the Microsoft Active Directory discovery configuration, input the following: Note: These queries are case sensitive. (OU=TivoliOU) You can further refine the query against your LDAP registry. For example: To return all entries that are within the MyDept1 or MyDept3 departments: (|(OU=MyDept1)(OU=MyDept3)) To list all computers whose name starts with c: (CN=c*) To list all computers except the computer called camean: (&(CN=c*)(!(CN=camean))) To list all computers which start with c or h: (|(CN=c*)(CN=h*)) To list an organization unit and additional computers that start with f: (|(OU=SteveOU)(CN=f*)) To list all computers whose isCriticalSystemObject attribute is set to TRUE: (&(CN=*)(isCriticalSystemObject=TRUE)) To list all organization units and computers including the domain controllers: (&(objectclass=organizationalunit)) Tip: For the most recent results, run the Microsoft Active Directory discovery configuration first to synchronize with Microsoft Active Directory. You can customize the discovery by modifying the discovery schedules.
196
and discovery object types such as organization unit (OU), resource, and software. The provisioning discovery will search the Microsoft Active Directory environment starting from an entry based domain name and find the resources and software within the scope and populate the data model with this information. A Microsoft Active Directory discovery configuration is supplied with the product if you want to use it immediately. Otherwise, you can create your own discovery configuration. To create a Microsoft Active Directory discovery configuration, perform the following steps:
Procedure
1. Click Go To > Discovery > Provisioning Discovery > Discovery Configurations. 2. 3. 4. 5. . Click New Discovery Configuration Type a name and description for the configuration created. Click Hardware Discovery. In the Method field, select Microsoft Active Directory Discovery.
6. Click OK. 7. In the Active Directory Information tab, enter the following discovery parameters: a. In Server name specify the fully qualified host name of the Microsoft Active Directory server. b. In Base Distinguished Name specify the domain name path of the Microsoft Active Directory server. c. In User Id and Password specify the credentials of the Microsoft Active Directory server. Note: For example if the name of the Microsoft Active Directory server is exampleMSAD.com and the user ID that logs on to the Microsoft Active Directory server is Administrator, then enter exampleMSAD\Administrator in the User Id field. If you enter only Administrator you receive the following error message:
COPDEX040E An unexpected deployment engine exception occurred: class com.ibm.tivoli.orchestrator.discovery.msad.exception. MsadDiscoveryException: COPCOM675E The server "ldap://example.ibm.com:389/DC=exampleMSAD, DC=com" cannot be accessed or updated because the specified user account does not exist..
8. In the Filters tab, clear or leave selected the following check boxes you can use to filter the Microsoft Active Directory discovery results: v User Defined Search Command This option allows running any custom LDAP query from the discovery. To not overwrite any specific option on this custom query, any options which might change the query behavior or result are turned off. This includes the "Discover Groups" and "Discover Organizational units" check boxes which will not be displayed by the Web interface when the "User Defined Search Command" check box is selected. A root group, named MSAD Query : discoveryId, is created corresponding to the discovery performed. v Discover Groups If this check box is selected, the discovery will discover the servers within groups. v Discover Organizational units If this check box is selected, the discovery will discover the servers within organizational units. v Dynamic IPs (DHCP) This check box defines whether or not a DHCP network interface is populated based on the computer discovered by this discovery. For example, if the check box is selected, and a computer with a DHCP IP address is detected by the discovery, it is updated on the corresponding network interface. But if this option is not selected, and if the IP address from a computer discovered by the
Chapter 3. Discovering IT resources
197
Microsoft Active Directory discovery is DHCP, or the same IP is already defined in the data model in the DHCP IP range, the IP address is not populated in the network interface. Note: By default, Filter LDAP Attributes is enabled. This check box ensures that the discovery does not process specific LDAP attributes such as objectSid and objectGUID. If this check box is cleared, all discovered LDAP attributes are displayed in the web interface as resource variables. 9. Click Save .
Results
You have now created a discovery configuration.
What to do next
You can now schedule the discovery or run it immediately to update the data model. To run the discovery immediately, on the newly created discovery configuration, click Run Discovery to start the operation. You can view the status of the discovery task by performing the following action: v Click Go To > Task Management > Provisioning Tasks > Provisioning Task Tracking.
Procedure
1. Click Go To > Discovery > Provisioning Discovery > Discovery Configurations. . 2. Click New Discovery Configuration 3. Type a name and description for the configuration created. 4. 5. 6. 7. Click Software Discovery. In the Method field, select Microsoft Updates Discovery. Click OK. Specify the discovery parameters and enter their values. v Product: Specify one of the available software products.
IBM Tivoli Provisioning Manager Version 7.2.0.2 User Guide
198
v Locale: Specify the locale. v Severity: Specify the severity of the patches to be imported among the following options: Critical, Important,Moderate, Low. v Patch Status: Specify the patch status for all newly discovery patches among the following options: NEW, APPROVED, DISCONTINUED. If no selection is made, then the default will be Not Approved. Note: In order for objects to be considered when a WUA scan is run, then the Status must be APPROVED for the data model patch objects that are created as a result of the discovery can be approved in the data model. 8. Click Save.
Results
You have now created a discovery configuration.
What to do next
You can now schedule the discovery or run it immediately to update the data model. To run the discovery immediately, on the newly created discovery configuration, click Run Discovery to start the operation. You can view the status of the discovery task by performing the following action: v Click Go To > Task Management > Provisioning Tasks > Provisioning Task Tracking.
Procedure
1. Click Go To > Discovery > Provisioning Discovery > Discovery Configurations. 2. 3. 4. 5. 6. 7. . Click New Type a name and description for the configuration created. Click Other. In the Method field, select Solaris - HostPlatform and Zone Discovery. Click OK. Specify the discovery parameters and enter their values. .
8. Click Save
Results
You have now created a discovery configuration.
199
What to do next
You can now schedule the discovery or run it immediately to update the data model. To run the discovery immediately, on the newly created discovery configuration, click Run Discovery to start the operation. You can view the status of the discovery task by performing the following action: v Click Go To > Task Management > Provisioning Tasks > Provisioning Task Tracking.
Procedure
1. Click Go To > Discovery > Provisioning Discovery > Discovery Configurations. . 2. Click New 3. Type a name and description for the configuration created. 4. Click Other. 5. In the Method field, select AIX_WPAR_HostPlatform_Discovery. 6. Click OK. 7. Specify the discovery parameters and enter their values. 8. Click Save .
Results
You have now created a discovery configuration.
What to do next
You can now schedule the discovery or run it immediately to update the data model. To run the discovery immediately, on the newly created discovery configuration, click Run Discovery to start the operation. You can view the status of the discovery task by performing the following action: v Click Go To > Task Management > Provisioning Tasks > Provisioning Task Tracking.
200
To create a discovery configuration for your virtual centers, perform the following steps:
Procedure
1. Click Go To > Discovery > Provisioning Discovery > Discovery Configurations. 2. 3. 4. 5. . Click New Type a name and description for the configuration created. Click Other. In the Method field, select VMware_VirtualCenter_Discovery.
6. Click OK. 7. Specify the discovery parameters and enter their values. 8. Click Save .
Results
You have now created a discovery configuration.
What to do next
You can now schedule the discovery or run it immediately to update the data model. To run the discovery immediately, on the newly created discovery configuration, click Run Discovery to start the operation. You can view the status of the discovery task by performing the following action: v Click Go To > Task Management > Provisioning Tasks > Provisioning Task Tracking.
Procedure
1. Click Go To > Discovery > Provisioning Discovery > Discovery Wizards. Or access the discovery wizard application by clicking directly the Start Center link. . 2. Click New 3. Enter a name and a description for the new discovery. The Discovery Wizard is a required field, while the description field is optional. 4. From the Type menu select Host Computers with hosted Virtual Servers. 5. From the Target Source Type menu, you must choose how to retrieve the targets by selecting one of the following options: Select from targets If you want to retrieve the targets from existing lists of computers or computer groups. Run network discovery If you want to display a RXA network discovery configuration page.
201
6. If you have selected Select from targets, on the Add Discovery Wizard Configuration dialog displayed you can select one or more of the following check boxes: v VMware Virtual Center v AIX LPARs v AIX WPARS v Solaris Zones v Linux KVM 7. If you have selected Run network discovery as Target Source Type, on the Add Discovery Wizard Configuration dialog displayed you can select one or more of the following check boxes: v AIX WPARS v Solaris Zones v Linux KVM 8. Click OK. 9. If you have selected Select from targets as Target Source Type, in the Select Targets page of the wizard, you can specify the provisioning computers or provisioning groups against which you want to run the discovery. For each target specify the Target Type. 10. In the Discovery page of the wizard, the type of discovery you will perform is listed. 11. In the Review and Submit page of the wizard, you can set scheduling options, notification options, and e-mail address information for the provisioning task and verify the provisioning task name. 12. Click Submit to perform the discovery.
Results
You have configured and submitted a discovery that detects the virtual servers of your environment. Note: After running successfully one of these virtualization discoveries using this wizard, the Virtualization Management application is populated with a list of host platforms. The following host platforms are displayed on the Host Platforms list if you run a virtual discovery on them from this wizard, even if they are just a normal server without any virtual machines: v AIX 6.1 or 7.1 (when running AIX WPARS option) v Solaris 10 or later (when running Solaris Zones option) v Linux (when running Linux KVM option)
Procedure
1. 2. 3. 4. Access either the discovery configuration application or the discovery wizard application. Open a new or an existing Tivoli Provisioning Manager Inventory Discovery. Select Hardware as type of discovery you want to perform. Select the target computers for the discovery.
202
Results
The system starts a Common Inventory Technology (CIT) scan on the target computers. CIT collects the information about the PCI devices and stores them in a CIT XML output file. The PCI device data is stored in the data model as a hardware resource. The data is then displayed in the provisioning computer application, after the discovery ends successfully.
Procedure
1. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Computers. 2. Search for the resource that is running WebSphere Application Server and click on it to view its details. 3. Click the Software tab. 4. In the Software Installations table, expand IBM WebSphere Application Server. 5. In the Configuration Template field, verify that the wsadmin.username parameter value is correct. 6. Enter a password in the wsadmin.password field. 7. Click Save .
TADDM discovery
TADDM discovery discovers computers and replicates hardware and software discovery data from the TADDM database to the data model. Replicated data include discovered computers, computer hardware, network resources, operating systems, software components, and composite applications such as DB2. The discovery can be run against a set of selected computers; it can also be run against one or more computers based on the fully qualified computer names.
Chapter 3. Discovering IT resources
203
When running this discovery, you can also select a file containing a list of the computers you intend to discover.
Types of discovery
TADDM provides two types of discovery - hardware discovery and software discovery. Using hardware discovery, you can discover: v Network resources v System resources Using software discovery, you can discover: v Installed software components v WebSphere Application Server v Oracle v v v v Web Servers WebLogic Server servers DB2 VMWare ESX
Hardware discovery
Network Resources You can discover network resources such as network interface IP addresses, netmask Gateway IP for route, computer host names, fully qualified domain names, network interface cards, switches, routers, and firewalls. Note: TADDM discovers the configured IPv6 addresses in addition to the IPv4 addresses. System Resources You can discover system resources such as CD-ROMs, diskette devices, hard disks, memory, and input/output devices such as USB devices Note: When you display the hardware properties of a Windows computer you discovered using the TADDM discovery, for diskette and CD-ROM devices specific entries are created. The same entries are duplicated and can be found also under the partition of the computer file system.
Software discovery
Installed software components You can discover all your software resources defined in the Change and Configuration Management Database. You can also correlate with an existing software module for all discovered software installations. If an existing software module cannot be found, then a placeholder software module will be created to associate it with the discovered software installation. IBM WebSphere Application Server You can discover WebSphere Application Server information such as the installation profile and path, the WebSphere server, version, and type, and the Websphere node and cell. Oracle You can discover: Oracle installations, Oracle servers, including Oracle configuration parameters such as: oracle_home and install-path. Web Servers You can discover the following for Web servers such as IBM HTTP Server, Apache Server, and Microsoft Internet Information Server (IIS): v Web server installations
204
v Web servers v Web server modules v Configuration parameter details such as server port, server root, and installation directory. WebLogic Server For WebLogic Server, you can discover server installations and instances, WebLogic Server configuration details such as BEA home, server root, and installation path. DB2 For DB2, you can discover DB2 installation and instances, and parameter details such as installation path and DB2 product key.
VMWare ESX You can discover information about the installed VMWare and defined virtual machines. Business applications You can discover information about configured business applications. Computer collections You can discover information about collections of computers in TADDM, which are imported as computer groups.
Procedure
1. The two jar files which relate to TADDM API are taddm-api-client.jar and platform-model.jar. The versions of these files that work with TADDM version 7.2 are stored under the $TIO_HOME/lwi/ runtime/tpm/eclipse/plugins/TADDMDiscovery/lib directory. While the versions of these files that work withTADDM version 7.1.2.x are archived in the $TIO_HOME/lwi/runtime/tpm/eclipse/ plugins/TADDMDiscovery/lib_7.1.2.x directory. 2. Copy the required versions of the two jar files to the following two locations, overwriting the existing jar files: v $TIO_HOME/lwi/runtime/tpm/eclipse/plugins/tpm_pmp/maximoLibs/ v $TIO_HOME/eclipse/plugins/tpm_pmp/maximoLibs/ 3. Stop Tivoli Provisioning Manager and start it again.
Procedure
1. 2. 3. 4. Click Go To > Discovery > Provisioning Discovery > Discovery Configurations. In the Method field, type TADDM Discovery. Select the Tivoli Application Dependency Discovery Manager Discovery. In the Server Information tab, provide the following TADDM server information: v Name: The name of the TADDM server that will perform the discovery. v Port Number: The port number of the server.
Chapter 3. Discovering IT resources
205
v User ID and Password: The credentials of the TADDM server. 5. In the Computer to be Discovered tab, specify the Fully Qualified Host Name of the computers you want to discover. All the hosts that you specify in this list will be discovered on the TADDM server. Note: If you want to discover all the resources on the TADDM server, do not specify any hosts in the discovery list. If you leave the list empty, all resources on the TADDM server will be discovered. Note: Before performing any software distribution operation on the computers imported from TADDM, you must manually add the service access point to them, because on the computers imported from TADDM the service access point is not automatically created 6. In the Scope tab, select the appropriate check boxes to determine what software information will be discovered on the TADDM servers. v Installed Software Components. Installed software components are software installations registered under the operating system of a computer. For example, on a Windows computer, they are registered in the registry editor, and for Linux, in the RPM package manager. If you select this option, all software installations that are in the operating systems registry for that computer will be discovered. Note: This option is different than the rest of the Software Discovery options as the other options discover composite application information, including detailed configuration information; whereas this option does not discovered detailed configuration information, only basic details about the software installation in the registry. v WebSphere Application Server. You can discover Websphere Application Server information such as the installation profile and path, the WebSphere server, version, and type, and the Websphere node and cell. v Oracle. You can discover Oracle information such as server and database instances, the product version, the home installation path and name, its software ID, and its port and base path. After the discovery is complete, the Oracle server can be started or stopped from provisioning if the appropriate credentials to access it are set. v Web Server. You can discover the following three types of Web servers: IBM HTTP Server, Apache Server, and Microsoft IIS. Different configuration details can be discovered for each Web server. Refer to the related information for more details. v WebLogic Server. You can discover Web Logic attributes such as servers, product version, installation path, J2EE application names and file paths, and the BEA home. v DB2. You can discover DB2 information such as servers, ports, the installation path, the DB2.ESE and DB2.ADCL files, and these parameters: uninstall_delete_users, db2_product_key default_DB2INSTANCE, das_group_name, das_user_name, fence_group_name, fence_group_id, fence_user_name, instance_user_name, instance_port ,db2_auth_type, db2_word_width, db2_auto_start. v VMWare ESX. You can discover information about the virtual computers in your environment. v Business Applications. You can discover information such as the business applications installed, their functional groups and application tier numbers. v Computer Collections. You can discover information about how the computers are grouped in your environment. 7. Click Save .
Results
You have now created a discovery configuration.
206
What to do next
If you are using this discovery configuration to discover your own software, you need to provide a software resource mapping in the provisioning $TIO_HOME/lwi/runtime/tpm/eclipse/plugins/ TADDMDiscovery/resource/discovery-resource-map.xml file.
Procedure
1. Click Go To > Discovery > Provisioning Discovery > Discovery Configurations. 2. Click New. 3. Type the name and description for the discovery. 4. In the Category field, select Hardware Discovery. 5. In the Method field, select TADDM Discovery. 6. Click OK. 7. In the Server Information tab, provide the following TADDM server information: v Name: The fully qualified host name or the IP address of the TADDM server. v Port Number: The port number of the TADDM server. v User ID and Password: The TADDM server administration user ID and password. 8. (Optional) In the Computer to be Discovered tab, specify the fully qualified host name of the computers you want to discover. Only the computers that you specify in this list are replicated from the TADDM server. To specify the host names you can click either New Row and enter the computer host name or Add from File and browse for a file containing the fully qualified host names of the computers to discover. If you want to discover all the resources, do not specify any hosts in the discovery list. If you leave the list empty, all resources on the server will be replicated. 9. In the Scope tab, select the Extended Attributes? check box. 10. Click Save. 11. Run or schedule the discovery.
What to do next
The computer extended attributes which have been discovered from TADDM are now visible on the Variables tab of the selected provisioning computer.
Procedure
On the newly created discovery configuration, click Run Discovery to start the operation.
207
Results
You have discovered the resources of your TADDM environment.
What to do next
Before performing any software distribution operation on the computers imported from TADDM, you must manually add the service access point to them, because on the computers imported from TADDM the service access point is not automatically created.
Defining the Service Access Point for computers discovered from TADDM
Ensure that you define the Service Access Point (SAP) for computers which have been detected using a TADDM discovery before running any recommendations on them. When a computer is discovered into the data model from TADDM, you need to create a SAP for a root or administrator user ID, before running any recommendations on this computer. To manually add the service access point to the computer, perform the following steps:
Procedure
1. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Computers. 2. Identify and click the computer for which you want to add a SAP. 3. Click the Credentials tab. 4. Click Add Credentials > New Service Access Point. 5. Add the user name root or administrator. 6. Set a password for the root or administrator user ID. 7. In the Workflows tab, assign the appropriate workflows to the SAP. 8. Specify the Protocol Type and Application Protocol parameters. 9. Assign the created SAP to the Command execution and File Transfer sections. 10. Click Save .
What to do next
Now that you have manually added the service access point to the computers imported from TADDM, you can run any recommendations on them.
Windows
v v v v v v Windows Windows Windows Windows Windows Windows 2000 Server 2000 Advanced Server 2000 Professional (SP 4) 2000 Server (SP 4) 2000 Advanced Server (SP 4) Server 2003 Standard Edition
208
v v v v v v v v v v v v
Windows Windows Windows Windows Windows Windows Windows Windows Windows Windows Windows Windows
Enterprise Edition Enterprise Edition (SP 1) Standard Edition (SP 1) R2 Enterprise Edition (SP 1) Data Center Edition (Build (Build (Build (Build 3790 3790 2195 2195 Multiprocessor Free) Uniprocessor Free) Multiprocessor Free) Uniprocessor Free)
Server 2003 - 5.2 Server 2003 - 5.2 2000 Server - 5.0 2000 Server - 5.0 XP Professional Vista Ultimate Vista Enterprise
AIX
v AIX 4.3 v AIX 5.1 v AIX 5.2 v AIX 5.3
SUN
v Solaris 5.8 v Solaris 5.9 v Solaris 5.10 v Solaris 2.6 v Solaris 7 v Solaris 8 v Solaris 9 v Solaris 10
v Red Hat Enterprise Linux Server release 5 v Red Hat Enterprise Linux Server release 5.1 v v v v Red Red Red Red Hat Hat Hat Hat Enterprise Linux Server release 5.2 Linux release 7.3 (Valhalla) Linux release 8.0 (Psyche) Linux release 9
HP
v HP-UX 11.0 v HP-UX 11i v1
Chapter 3. Discovering IT resources
209
v HP-UX 11i v2
Linux - SLES
v SUSE LINUX Enterprise Server 8 v SUSE LINUX Enterprise Server 9 v SUSE LINUX Enterprise Server 10
Procedure
1. Open the file discovery-resource-map.xml located in %TIO_HOME%\lwi\runtime\tpm\eclipse\plugins\ TADDMDiscovery\resource. 2. Provide the following associations: v discovered-software-installation name: Must match the name of the installed software displayed on the Software tab of the target computer. v software-module name: Must match the name of the existing software product. 3. Save your changes. 4. Run the discovery configuration again to update the data model.
Example
Examples of these mappings for
Windows Windows
and
Linux
<discovered-software-installation name = "Windows Server 2003 Enterprise Edition (SP 1) - Microsoft(R) Windows(R) Serve2003, Enterprise Edition"> <device-model-element>Windows Operating System</device-model-element> <os-type>Windows</os-type> <software-module>Windows Server 2003 Enterprise Edition SP1</software-module> </discovered-software-installation>
Linux
<discovered-software-installation name = "Linux - Red Hat Enterprise Linux AS release 4 (Nahant Update 1)"> <device-model-element>redhat-linux-operating-system</device-model-element> <os-type>Linux</os-type> <software-module>Red Hat Enterprise Linux ES release 4 (Update 1)</software-module>
210
The example source code you need to use can be found on your provisioning server in this directory: v Windows: %TIO_HOME%\lwi\runtime\tpm\eclipse\plugins\TADDMDiscovery\example\ v UNIX: $TIO_HOME/lwi/runtime/tpm/eclipse/plugins/TADDMDiscovery/example/ In our example situation, you have a Microsoft SQL Server discovered using the TADDM server in your data center. You want to bring this discovered SQL Server composite application into the provisioning data model, and also model it properly. After this, you can create an automation package for managing this SQL Server and the configurations that you have brought into provisioning. The current TADDM discovery does not bring SQL Server applications into the data model by default. However, because the TADDM discovery does provide an external interface, you can implement your own discovery and bring the SQL Server into provisioning. The following TADDM discovery interfaces are available for customers:
public ModelObject[] queryTADDMApplication(CMDBApi api, ComputerSystem computerSystem) throws ApiException, AttributeNotSetException List<SoftwareResource> processApplication(Connection conn, CMDBApi api, ComputerSystem computerSystem, int discoveryId, Server server, ModelObject applications[], OperatingSystem theOs) throws TaddmDiscoveryException;
The Java interface queryTADDMApplication is used to query the TADDM server to get the list of the application objects and their child objects. It passes the TADDM resource object as an input parameter and returns the list of the applications found on that resource. The Java interface processApplication is then used to take the application list that is retrieved from the TADDM server, process it and populate it into provisioning. In order to discover the SQL Server, and populate it into provisioning, you will need to create a Java implementation, and implement the queryTADDMApplication and processApplication interface. To 1. 2. 3. complete this task, you must: Set up a development environment Design and implement a Java class to populate a SQL Server application on page 212 Compile the code and install the code on the provisioning server under the plug-in directory on page 213 4. Register the SQL Server software module and the device module in TADDMDiscovery automation package. on page 214 5. Run TADDM discovery to verify the new implementation on page 214
211
You can find this Java class on your provisioning server in this directory: v Windows: %TIO_HOME%\lwi\runtime\tpm\eclipse\plugins\TADDMDiscovery\example\ v UNIX: $TIO_HOME/lwi/runtime/tpm/eclipse/plugins/TADDMDiscovery/example/ Note: DcmObjectHandler is a super class that includes some of the helper methods necessary for implementation. In this new class, you implement two interfaces as previously described.
public ModelObject[] queryTADDMApplication(CMDBApi api, ComputerSystem computer) throws ApiException, AttributeNotSetException { ModelObject[] mos = api.find("select * from SqlServer where host.guid=="+ computer.getGuid()+"", 3, null, null); return mos; }
Note: This API is deprecated, but is still working with TADDM 7.1.2. The first interface queryTADDMApplication queries the TADDM server and gets the application list. A TADDM query API api.find() can be used to retrieve the information that you are searching for. For example, in order to get a list of the SQL Server objects, the query select * from SqlServer where host.guid==xxx can be used. Another query example is: select * from WebLogicServer where host.guid==xxx. This is to get the list of the Web logic server objects for a given resource system from TADDM. The queryTADDMApplication method returns a set of TADDM objects that provisioning can use to process, then you need to implement the second interface processApplication. Based on the design, you need to perform the following tasks to bring the SQL Server object into the data model: 1. Collect all configuration data from TADDM for this SQL Server. The SQL Server objects were returned by the TADDM query - this step is to get all required configuration parameters for each SQL server that is discovered such as product name and version number.
212
2.
3.
4.
5. 6.
7.
Create or associate a software definition with the discovered SQL Server. The software definition and software installation mapping can be registered under %TIO_HOME%\lwi\runtime\tpm\eclipse\ plugins\TADDMDiscovery\resource\discovery-resource-map.xml. When a software definition is associated with a specific software installation, and when there is a device module defined for the given software module, the software installation object can be managed by provisioning right after its discovery. In this step, it will try to find a registered software module in discovery-resource-map.xml for the given software installation name. If it cannot find one, it will create a software definition with discovered software information such as product name, version, or vendor. Find the software configuration template for the given SQL Server installation name based on the software definition. A software configuration template is used to store all configuration parameters that are discovered. If you already had an automation package written in provisioning for the SQL Server, a software configuration template might already exist that can be used to store the configuration data; otherwise, this step will create a software configuration template to be used. Obtain the device driver from the resource-mapping.xml file. If there is an automation package written, the device driver name can be registered in resource-mapping.xml file and loaded by this step. Create a Microsoft SQL Server installation object in provisioning, and attach the device module and software definition to this new installation object. Clone the software configuration template from the software module and attach the cloned software configuration template to the newly created Microsoft SQL Server installation object, then update the software configuration template parameter values based on the configuration details discovered from TADDM. This software configuration template includes all the configuration parameters that are discovered from TADDM, and it can be used by the automation package to manage the object. After creating the installation object, the SQL Server instance needs to be created . For each server, one or more database instances will also be created as configuration data. Device drivers and software modules can also be attached to the server level.
Compile the code and install the code on the provisioning server under the plug-in directory
If you have all the required JARs included in your class path, you might be able to compile your code without having any issues. An example makefile for Windows is available in the following directory: %TIO_HOME%\lwi\runtime\ tpm\eclipse\plugins\TADDMDiscovery\example\compile.cmd. If you run compile.cmd under the example directory, it will produce a binary class called MSSqlServerApplicationAdapterImpl.class. Because this class uses example as its Java package name, when it is put under the example directory, TADDMDiscovery code is able to load it during the run time. If you implement your code under a different package (for example, com.mypackage,) you need to ensure that the binary class is put under %TIO_HOME%\lwi\runtime\tpm\eclipse\plugins\ TADDMDiscovery\com\mypackage\*.class) You also need to register your Java implementation under %TIO_HOME%\lwi\runtime\tpm\eclipse\ plugins\TADDMDiscovery\resource\taddm-application-registry.xml. add the following to the file in order to register your implementation class:
<application name="SQL Server" type = "Custom Application" class-name="example.MSSqlServerApplicationAdapterImpl"/>
213
Register the SQL Server software module and the device module in TADDMDiscovery automation package.
When you have an SQL Server automation package written, you can register the software module and the device driver under %TIO_HOME%\lwi\runtime\tpm\eclipse\plugins\TADDMDiscovery\ resource\discovery-resource-map.xml. The software module and device module correlation is done programmatically during the discovery. You need to restart the provisioning server to pick up the changes.
214
(LOW PERFORMANCE IMPACT) authentication cpuspeed datalinks diaglevel (NON-PERFORMANCE-RELATED) catalog_noauth clnt_krb_plugin clnt_pw_plugin dftdbpath
Note: Refer to the TADDM documentation for details about these configuration parameters (CDM class: Db2InstanceConfigValue). Refer to the DB2 documentation for details about the meaning of each specific parameter.
Oracle database
For this type of database, the following attributes will be discovered:
product name product version for each Oracle instance: instance home instance name instance port instance guid from the database which the instance works for: name and value of every "inizialization parameter" available from TADDM at run time. A few examples might be: AUDIT_FILE_DEST BACKUP_TAPE_IO_SLAVES OBJECT_CACHE_MAX_SIZE_PERCENT
Note: Refer to the TADDM documentation for details about these configuration parameters (CDM class: OracleInitValue). Refer to the Oracle documentation for details about the meaning of each specific parameter.
215
v v v v v v v v v v v v v v v v v v
DefaultType DocumentRoot ErrorLog FancyIndexing HostnameLookups Installation path and credentials Installation location ihsselectLocale.lang ihsService.active installAfpa LogLevel HeaderName KeepAlive KeepAliveTimeout LanguagePriority MaxKeepAliveRequests MaxRequestsPerChild NTService.user
v NTService.password v NTService.confirmPasswd v Options v v v v v v v v v v v v PidFile security.active ServerName ServerType ServerRoot ServerPort ServerAdmin ScoreBoardFile ScriptAlias Timeout TypesConfig UseCanonicalName
Apache server
For Apache server the following configuration details can be discovered and populated into the data model: v v v v v Server instance Server port Web modules runAs installDirectory
IBM Tivoli Provisioning Manager Version 7.2.0.2 User Guide
216
v installExecPath v installLogFile v installTMPDirectory v imagePath v ServerDomain v uninstallProductID v The following Apache directives: AccessFileName AddIconByEncoding AliasMatch DefaultIcon DefaultType DirectoryIndex DocumentRoot ErrorLog ForceLanguagePriority HeaderName HostnameLookups
IndexIgnore KeepAlive KeepAliveTimeout LanguagePriority LogLevel MaxKeepAliveRequests MaxRequestsPerChild PidFile ReadmeName ScriptAlias ServerAdmin ServerName ServerRoot ServerTokens ServerSignature Timeout TypesConfig UseCanonicalName UserDir
217
v These metabase properties: AdminACL AllowKeepAlive AnonymousUserName AnonymousUserPass AppAllowClientDebug AppAllowDebugging AspAllowSessionState AppPoolId AspAppServiceFlags AspCodepage AspEnableAspHtmlFallback AspMaxDiskTemplateCacheFiles AspQueueTimeout AspScriptEngineCacheMax AspScriptLanguage AspEnableChunkedEncoding AspDiskTemplateCacheDirectory
AspScriptErrorMessage AspKeepSessionIDSecure AspExecuteInMTA AspExceptionCatchEnable AspLogErrorRequests AspCalcLineNumber AspBufferingOn AspTrackThreadingModel AspErrorsToNTLog AspScriptFileCacheSize AspScriptTimeout AspLCID AspMaxRequestEntityAllowed AspSessionTimeout AspProcessorThreadMax AspSessionMax AspRunOnEndAnonymously
218
AuthExpiredUnsecureURL AuthExpiredURL AuthFlags AuthNotifyPwdExpURL AuthNotifyPwdExpUnsecureURL CacheISAPI CentralBinaryLoggingEnabled CGITimeout ConnectionTimeout ContentIndexed DefaultDoc DirBrowseFlags DownlevelAdminInstance HttpErrors IIs5IsolationModeEnabled InProcessIsapiApps LogFileDirectory LogFilePeriod
LogFileTruncateSize LogInUTF8 LogOdbcDataSource LogOdbcPassword LogOdbcTableName LogOdbcUserName LogPluginClsid LogType MaxBandwidth MaxConnections MaxGlobalBandwidth
219
for each node: node name node guid cell name which the node belongs to authMappingModule authDataAlias mappingConfigAlias globalSecuritySettings activeIIOPProtocol cacheTimeoutMsecs enableJava2SecRuntimeFiltering enabled enforceJava2Security issuePermissionWarning useDomainQualifiedUserNames useLocalSecurityServer ldapUserRegistry baseDN bindDN monitorInterval reuseConnection searchTimeout sslConfig sslEnabled for each application server belonging to the node: name guid appClassloaderPolicy appClassloadingMode ejbContainerAttributes defaultDatasourceJNDIName InactivePoolCleanupIntervalMsecs passivationDirectory jvmSettings bootClasspath classPath debugArgs debugMode disableJIT executableJarFileName genericJvmArguments hprofArguments initialHeapSizeMB maximumHeapSizeMB runHprof verboseModeClass verboseModeGarbageCollection verboseModeJNI sessionTuningParameters allowOverflow invalidationTimeout maxInMemSessionCount processMonitoringPolicy autoRestart maxStartupAttempts nodeRestartState pingIntervalSecs pingTimeoutMSecs webContainer enableServletCaching sessionAffinityFailoverServer sessionAffinityTimeout
220
Note: Refer to the TADDM documentation and to the IBM WebSphere Application Server documentation for details about these configuration parameters (CDM classes: WebSphere*). Refer to the IBM WebSphere Application Server documentation for details about the meaning of each specific parameter.
Weblogic Server
For this type of resource, the following attributes will be discovered: Weblogic platform installation object
resource-name Vendor Guid deviceModelId
Note: The parameters installDir and beaHome must be updated using the correct values on the target computer, because TADDM cannot discover them. Weblogic Server and Administration Server object
resource-name deviceModelId Guid RootDirectory ServerName IsAdminServer DomainName ConfigFileName ConfigFileURI CompleteHTTPMessageTimeout CompleteIIOPMessageTimeout CompleteT3MessageTimeout DefaultProtocol DefaultSecureProtocol DefaultTGIOPUser HelpPageURL IdleIIOPConnectionTimeout JavaCompiler: CmdLine JDBCLogFileName ListenThreadStartDelaySecs LoginTimeout LoginTimeoutMillis MaxHTTPMessageSize MaxIIOPMessageSize MaxT3MessageSize ServerStatus StdoutSeverityLevel TunnelingClientPingSecs ThreadPoolPercentSocketReaders TunnelingClientTimeoutSecs MaxIIOPMessageSize MaxT3MessageSize ZACPublishRoot HTTPDEnabled IIOPEnabled InstrumentStackTraceEnabled JDBCLoggingEnabled JMSDefaultConnectionFactoriesEnabled
Chapter 3. Discovering IT resources
221
LogRemoteExceptionsEnabled NativeIOEnabled ReverseDNSAllowed SSL.KeyEncrypted SSL.SslPort SSL.SslEnabled SSL.TwoWaySslEnabled SSL.ServerCertificateChainFileName StdoutDebugEnabled StdoutEnabled TGIOPEnabled TunnelingEnabled ZACEnabled Process.CmdLine Process.CWD Process.Decrement Process.Env Process.DisplayName Process.Increment Process.InitialSize Process.MaxSize Process.MinSize Process.Size Process.WindowsServiceList
222
Note: Refer to the TADDM documentation and to the Weblogic Server documentation for details about these configuration parameters.
Discovery process
The discovery library adapter takes the resources from provisioning and writes them back to discovery library books. The following diagram shows how discovery library adapters perform discovery and how products consume that information. There are two different discovery library adapters in this diagram: the provisioning discovery library adapter, represented with the orange numbers; and third party ones, represented with the blue numbers.
223
Discovery books
2 Generates
Provisioning server
XML
2 Generates
1 Scans
Data center
3 Updates
IT Infrastructure
1 Scans
3 Consumes
Vendor 2 Tivoli Change and Configuration Management Database
Vendor 3
224
Procedure
1. Click Go To > Administration > Provisioning > Provisioning Workflows. 2. Identify and select one of the following provisioning workflows: v DiscoveryLibraryAdapter if you want to export into the book all the data model objects of your environment. v DiscoveryLibraryAdapterExportByDevices if you want to export into the book only the list of computers you specify. v DiscoveryLibraryAdapterExportBySoftwareProducts if you want to export into the book only the software catalog. 3. From the Select Action menu, click Run Workflow. 4. Specify the workflow parameters. 5. Click Run.
Results
The xml discovery library book is created in the location specified in the path and the creation date of the book corresponds to the Coordinated Universal Time (UTC) and not to the product timezone. Exporting the discovery library book to the IBM TADDM: If you want to export this newly created discovery library book to the IBM TADDM, you must ensure that the MAC address for each resource is defined in order for the TADDM to recognize the contents of the book. After you have run the DiscoveryLibraryAdapter provisioning workflow, you can verify if the resources have MAC addresses defined. Procedure 1. Click Go To > Administration > Provisioning > Provisioning Workflow Status. 2. Click the Deployment Request to view the status. For each resource, you will see a description similar to
There is no Primary Mac address found on the computer x. This computer will not be written into the book.
What to do next You can either automatically or manually add the MAC address to resources. Automatically Run provisioning Inventory discovery or provisioning network discovery
225
Manually For each resource, look at its Hardware tab, and for each network interface card, click NIC, and then specify the MAC addressin the MAC field. Note: Software installations for those resources without operating systems defined will also not be exported to the TADDM. To verify if the operating system is defined, perform the following steps: 1. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Computers. 2. In the Operating System column, see if there is anything defined. After adding the MAC address, you need to generate the provisioning discovery library adapter again. Your book is now ready to be exported to the IBM TADDM. A Tivoli Directory Integrator (TDI): Discovery Library Integration Framework Plug-in for Tivoli Provisioning Manager can be downloaded from the Integrated Service Management Library website, and enables you to automate the Discovery Library Adapter (DLA) book creation from Tivoli Provisioning Manager and import it into TADDM. This procedure is valid for Tivoli Provisioning Manager 7.1 and has not been verified for Tivoli Provisioning Manager 7.1.1 and 7.2.
Procedure
1. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Computers. 2. Select the computer to view the Hardware tab. 3. Expand the Local Area Connection table to find a network interface card. 4. Specify the MAC address in the MAC field. 5. Click Save .
Results
The MAC address is now added to the computer.
What to do next
You can now import the discovery library book into TADDM. You can view the status of the workflow by performing the following action: v Click Go To > Task Management > Provisioning Tasks > Provisioning Task Tracking.
226
present. This feature ensures that any operation initiated using the deployment engine (DE) correctly discovers the target computer using the NAT addressing. To enable the NAT addressing for the target computers, perform the following steps:
Procedure
1. Click Go To > Discovery > Provisioning Discovery > Discovery Configurations. . 2. Click New Discovery Configuration 3. In the Method field, select IBM Tivoli Agent Manager Discovery or IBM Tivoli Agent Manager Discovery Device. 4. Enable the NAT support by setting the Use Observed IP as network management IP property to true. 5. Run the agent manager discovery.
Results
You are now able to run the workflow using the deployment engine on the target computers discovered using the NAT addressing.
Procedure
1. Click Go To > Discovery > Provisioning Discovery > Discovery Configurations. 2. From the Select Action menu, click Discovered Resources. 3. Filter the discovery configuration that was used to discover the resources. Note: Specify the discovery configuration by opening the filter available on this window, instead of clicking the name of the discovery configuration from the list which might cause the following error message:
BMXAA2278E - You do not have authorization for the Application Designer application.
4. From the Select Discovered Resources Type menu, select one of the available options. 5. Specify the time period of the last scan to search for resources that were discovered during that particular time period. A default time period is already pre-filled. 6. Click Search.
Results
A list of resources that have been found will be displayed.
227
Microsoft Active Directory discovery will find the following resources: v Computer information v Microsoft Active Directory groups
Procedure
1. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Computers. 2. Search for a computer that was discovered by the Microsoft Active Directory discovery configuration and click on it. 3. From the Computer page, verify the correct host name and networking information. 4. Click the Variables tab to verify the variable data and the last scan data. 5. Click the Software tab and verify the software information. 6. Optional: If any operating system information was discovered, it will be specified as a software installation on the computer. Click the Software tab to verify this information.
Procedure
1. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Groups. 2. Search for a group that was discovered by the Microsoft Active Directory discovery configuration and click on it. 3. From the Group page, verify the group data.
Procedure
1. Click Go To > Administration > Provisioning > Provisioning Workflows. 2. In the Name field, type MSAD and click Search. A list of Microsoft Active Directory provisioning workflows are displayed in the list.
228
3. 4. 5. 6. 7.
Find and click MSAD_Discovery_Profile_Update. From the Select Action menu, click Run Workflow. For the DiscoveryID, specify the object ID for the Microsoft Active Directory discovery configuration. Specify the days that the computer was last used. In the isScan field, type true to enable the provisioning workflow.
8. Click Run.
Results
The provisioning workflow is now enabled to find inactive computers and put them into a new group. The next time you run a Microsoft Active Directory inventory scan, any inactive computers will be put into the provisioning group called MSAD Inactive Computers Group <discoveryID>.
229
Learning objectives
In this tutorial you will learn how to: v v v v Create a specific discovery Submit a specific discovery Track the discovery results Learn how to manage the collected information
This tutorial might take approximately 2 hours to finish. If you explore other concepts related to this tutorial, it can take longer to finish. Installation times are not included.
230
231
4. From the Target Source Type menu, you must choose how to retrieve the targets by selecting one of the following options: v Select from targets If you want to retrieve the targets from existing lists of computers or computer groups. v Run network discovery If you want to display a RXA network discovery configuration page. Note: If you want to create a provisioning group before running this network discovery, you can later on manually assign the discovered computers to it. 5. (Optional) Click Do you want to install the Tivoli Common Agent? to install the common agent on the computers you have specified. Use this option only if you have a depot server installed in your environment. 6. (Optional) Click Do you want to run the Tivoli Provisioning Manager Inventory Discovery? if you want to perform an inventory scan on these computers. You can specify the type of inventory scan you want to perform. If hardware scan, software scan, or both. 7. (Optional) Click Do you want to run the Windows Discovery? if you want to perform a discovery of Windows computers to detect Windows specific information such as user accounts and user domains. 8. Click OK. The Select Targets page is displayed. 9. Perform one of the following actions: a. If you have selected Select from targets you can specify which computers or groups of computers you want to discover from the list. To display the available lists, click Select and then either choose Computers or Groups from the menu. b. If you have selected Run network discovery specify which discovery parameters you want to use to discover your computers. The Run network discovery option gives you the possibility to define a valid range of IP addresses, host names of computers, or a subnetwork. All these parameters can be imported from a file or defined manually. 10. If you have performed step 6, click Inventory Discovery to display the related page. a. Select Hardware to perform a hardware scan on the computers discovered. b. Select Software to perform a software scan on the computers discovered. c. Click one of the following available options: v Use registry: Scans the registry of the resources. v Use software signature: Scans for all available software signatures. Note: This will run an inventory scan to a target using all defined signatures in the signature catalogue to find any matches. It might take some time to complete the scan. v Use selected software signature: Filters by signature type. If this option is selected, then select the type of signature to search on from the list. For details about how to create or modify software signatures, see Adding software signatures on page 170. 11. Click Review and Submit to display the related page. 12. In the Summary section, verify that all selections made in the wizard are correct. 13. (Optional) Click Schedule to specify some scheduling options for the new discovery, if you do not intend to run it immediately. 14. Click Submit. You have configured and submitted a discovery that detects the computers of your environment and their hardware and software information, installs the common agent, and performs a Windows discovery.
232
If you leave the discovery progress page, you can always monitor the discovery status later on, by performing the following actions using the web interface: 1. Click Go To > Task Management > Provisioning Tasks > Provisioning Task Tracking. 2. Click the task name from the displayed list to see details about its status and monitor its progress until the task has completed. Click Refresh to see an update on its status. 3. If the task you are monitoring is a discovery, when you select the Run Task Again option available from the Select Action menu, the target computers are not recalculated. If you run again the task, the target computers taken into account are the same computers that you specified initially in the discovery wizard. Even if new computers have been added after the discovery wizard creation, these are not considered by the task. Also the unknown resources, that provisioning could not reach for various reasons when performing a discovery, are not passed to the task.
233
Learning objectives
In this tutorial you will: v Learn how to configure and run a discovery for business applications installed on your TADDM resources, to synchronize discovery data between TADDM and the data model. v Learn how to view discovered business applications in the data model. v See how business applications on your TADDM server are mapped on the Tivoli Provisioning Manager server.
Prerequisites
Before you start, you need the following: v A Tivoli Provisioning Manager server. v A TADDM server.
Part 1: Defining business applications on TADDM server to be replicated into Tivoli Provisioning Manager
In this section, you will learn how to define on the TADDM server the business applications manually, or by importing them using an XML file. You will also learn how business applications are structured, their naming conventions, and how they are mapped from TADDM into the Tivoli Provisioning Manager data model. This section contains the following lessons: Considerations on business applications Business applications consist of components grouped in functional groups in TADDM, while they have a tier-based structure in Tivoli Provisioning Manager. Guidelines for defining the business applications You can define the business applications on the TADDM server, either manually using a wizard, or importing them using application descriptor XML files. The XML descriptors must be deployed on the target computers of the data center. When TADDM discovers these computers, the XML descriptors enable TADDM to build the topologies of the distributed applications. Overriding the business application rules You can override the business application rules followed by the standard Tivoli Provisioning Manager behavior, by customizing the ba-naming.properties file. What you can override is the way how the tiers are numbered based on the functional group names, because you can specify these rules in the ba-naming.properties file.
234
To every functional group located on theTADDM server corresponds a tier on the Tivoli Provisioning Manager server. Every functional group hosts a number of technologically homogenous components. Every component is based on a target computer. Every business application consists of one or more tiers, and every tier is hosted on one or more target computers. More computers might belong to a tier. In the current implementation, the following limitation applies: in Tivoli Provisioning Manager a computer can only serve in one single tier of one single business application of one single customer. If you have, in the TADDM environment, a computer which is used by multiple components across all business applications, this information will not correctly be reported into the Tivoli Provisioning Manager server. A customer name is a logical way of grouping business applications that belong to the same customer. The object customer only exists in Tivoli Provisioning Manager, while in TADDM the object customer is not defined. In the current implementation, we have assumed that a customer name can be embedded in the URL of the description page of the business application. With this assumption we can define a customer entity also in the TADDM domain.
Note: If you use this naming convention, the tier number is decided according to rules which are hard coded in Tivoli Provisioning Manager. or
tierName.tierNumber.specificTechnology
for example:
db.2.oracle
Where: tierName Is the name of the business application tier, such as db in this example. tierNumber Is the number corresponding to the business application tier, such as 2 in this example. specificTechnology Is the vendor specific technology used by the business application, such as oracle in this example.
Chapter 3. Discovering IT resources
235
When defining the business application descriptor pages, in URL format, on the TADDM server, ensure you use the following naming convention:
protocol://customerName.*/page
for example:
http://customer2.company.com/description.html
Where: protocol Is the protocol used to access the URL page, such as http. The URL page does not need to physically exist. It can also be a fake URL address. customerName Is the name of the customer, such as customer2. The name of a customer represents a logical group of business applications used by the same customer. The customer name is required in Tivoli Provisioning Manager for every business application, while such a concept does not exist in TADDM. Note: In case the customer name is missing, the business application is saved in a group named Default Customer. page Is the name of the HTML page which contains the description of the business application, such as description.html.
In Tivoli Provisioning Manager a properties file named ba-naming.properties is provided together with the TADDM-discovery tc-driver. The properties file is located in the resource folder of the driver. The purpose of this file is to completely customize the tier numbering rules, overriding the default rules of the product.
This file contains key-value pairs. In particular the enabled key, which can be set to true or false, must be located. If its value is set to true, the embedded rules are not active and the rules defined inside the properties file are valid instead. Any other key of the properties file works as follows: the key is the name of a functional group, the assigned value is the arbitrary number that the user wants to assign to the tier, when created on the Tivoli Provisioning Manager server. For example, if in the properties file you have specified:
db.mysql=2
236
It means that: v A functional group named db.mysql will generate a tier named db.mysql. v The tier named db.mysql will have tier number 2.
v Port Number: The port number of the TADDM server. v User ID and Password: The TADDM server administration user ID and password. 8. (Optional) In the Computer to be Discovered tab, specify the fully qualified host name of the computers you want to discover. Only the computers that you specify in this list are replicated from the TADDM server. To specify the host names you can click either New Row and enter the computer host name or Add from File and browse for a file containing the fully qualified host names of the computers to discover. If you want to discover all the resources, do not specify any hosts in the discovery list. If you leave the list empty, all resources on the server will be replicated. 9. In the Scope tab, select the Business Application check box to ensure that business applications will be discovered on the TADDM server. 10. Click Save. The TADDM discovery configuration is now configured and you are ready to run it.
237
To 1. 2. 3. 4.
scan the resources in your TADDM environment and populate the data model: Click Go To > Discovery > Provisioning Discovery > Discovery Configurations. Locate and click the Tivoli Application Dependency Discovery Manager Discovery configuration. Click Run Discovery. (Optional) Set the available scheduling options, to perform a periodic discovery of your business applications and keep updated your TADDM resources in the data model. 5. Click Submit. You have now run a discovery to discover computers and business applications. These computers have been populated in the Tivoli Provisioning Manager data model. You can now view the list of the discovered resources defined on TADDM.
238
Table 45. Same computers imported into Tivoli Provisioning Manager after the discovery Computer name lab133065.romelab.it.ibm.com lab134065.romelab.it.ibm.com Application tier db Tier number 2
In this example computers having different functional groups on TADDM are stored under the same application tier on Tivoli Provisioning Manager. In this example, the default naming rules are used, not the rules defined in the ba-naming.properties file.
Troubleshooting discovery
When you run a discovery, there are multiple product components that handle the discovery task. To identify the source of a discovery problem, it is important to understand the components that process a discovery task. Use the information on the Process section to learn about the main steps that occur during discovery. Use the remaining sections to find out how to troubleshoot discovery errors that occur during specific parts of the process. v Process v 1. Task status on page 240 v 2. Publish status on page 242 v 3. Job status on page 242 v 4. Target status on page 243 v 5. Results on page 244
Process
To demonstrate how components interact, the following steps outline the component interactions during an Inventory discovery that uses software signatures on target computers in an environment that uses the scalable distribution infrastructure. 1. The task is submitted and activity plan engine starts task execution. 2. The deployment engine runs the workflow to perform the discovery. 3. The software signature file is published to the depot. 4. The job is submitted to device manager. 5. The target computer polls device manager for the job and runs the following items: a. The software signature file is downloaded from depot.
Chapter 3. Discovering IT resources
239
b. The Inventory discovery scan runs on the computer. c. The scan result is uploaded to the provisioning server queue. 6. The discovery engine worker processes the results, picking up the results from the queue. If an error occurs during discovery: 1. Verify that all requirements for discovery are met as described in Requirements on page 152. 2. Use the subsections of this topic to learn more about how to troubleshoot specific parts of a discovery task. The troubleshooting steps for discovery in this topic are based on the process for an Inventory discovery using the scalable distribution infrastructure, but many of the steps apply to other types of discoveries. Note: If there is an error message in the interface or the log files with a message ID, you can check the Messages section under Reference for a description of the error message.
1. Task status
Check the status of the discovery task. For information about task status, see Tracking a provisioning task on page 1165. 1. Check for error messages that might explain the source of the problem. 2. On the provisioning server, check the log files for the activity plan engine and the deployment engine. By default, the log level for console.log is info and the log level for trace.log is error. Change the log level to debug to obtain more troubleshooting information. For information about setting the log level, see Configuring log4j dynamically
Table 46. Log files Log file console.log Location
Windows
%TIO_LOGS%
Linux
UNIX
$TIO_LOGS
trace.log
Windows
%TIO_LOGS%
Linux
UNIX
$TIO_LOGS
The following excerpts from console.log show key messages for a successful discovery task: This line indicates that the task has started.
DEBUG [Activity Plan Engine] ( TpmTask.java:55) manager.TpmTask: Task execution started: Discovery.OnDevice
The following line shows that permissions were successfully verified on the target computer.
DEBUG [Discovery.OnDevice(77401) from com.ibm.tivoli.tpm.activityplan.manager.AggregateTaskDispatcher] (WorkflowAccessManager.java:106) accesscontrol.WorkflowAccessManager: checking permission (target:1411)Discovery.OnDevice Discovery.OnDevice on 22305 succeeded
If you encounter discovery errors with permissions, check the following information: v Lack of information from Initial Discovery on page 245 v Deployment engine exception when running discovery on page 254 The following lines show that the provisioning workflow was started.
INFO [Discovery.OnDevice(77401) from com.ibm.tivoli.tpm.infrastructure.soa.OSGiSdiTaskDispatcher] (MessageTranslatorProxy.java:303) messagetranslator.MessageTranslatorProxy: createDeploymentRequest(workflowName=Cit_SDI_OnDevice) DEBUG [Cit_SDI_OnDevice(11200)] (WorkflowExecutionMonitor.java:67) komodor.WorkflowExecutionMonitor: Starting workflow: Cit_SDI_OnDevice.java
240
COPINF029E The system failed to run the workflow Cit_SDI_OnDevice in order to process execution through the infrastructure.
Check the logs for the Cit_SDI_OnDevice provisioning workflow in the web interface to determine where the error occurred. The error messages in the log can help you to identify which component is the source of the problem. 4. Open the Workflow Execution Logs view if it is not displayed. a. From the Eclipse menu, click Window > Show View > Other. b. Expand Automation Package and click Workflow Execution Logs. c. Click OK. The Workflow Execution Logs page displays the provisioning workflow run history. There is a limit of 4000 characters for provisioning workflow output. If this limit is exceeded, the output is truncated. You can check the workflowlogexport.xml file to try to identify where any errors occurred as a workflow is executing. Check the workflowlogexport.xml file for the following: 1. The line tagged with the deployment request contains a lot of information. In particular, this line contains: v The unique deployment request number of the workflow operation, for example, 11309. v The error details string. This is a complete error stack that you or IBM Support can use to trace the stack exception. v There might be clues to the problem is in the string error message. This is also a good starting point for troubleshooting. v The error code provides a Tivoli Provisioning Manager specific error, normally of the form ABCDEF###E. For example, COPDEX040E or COPCOM123E. v The status code at the end of the line is useful and can indicate failed or success or in-progress. If you are calling IBM Support, provide Support with this status code. The following sample extract from a workflowlogexport.xml shows the relevant content marked in bold font:
<deployment-request id="11309" error-details=" Device$CopyFile(line:24) Apache_Install___Red_Hat ... at com.ibm.tivoli.ldo.runtime.WorkflowExecutionThread. run(WorkflowExecutionThread.java:84)" error-message= "SourceDeviceID is a required parameter" workflw-name="SoftwareModule.Install" create-username=">MAXADMIN" error-code= "COPDEX123EworkflowThrownException" status="failed"
2. Search the workflowlogexport.xml file to try to identify the line where the error occurred. When a workflow executes successfully, it involves a series of steps, each of which executes in turn. When an error occurs, a message is written to the workflowlogexport.xml and workflow code stops execution. As the workflow steps the execution of the code, additional content is written to the XML file. Therefore, the information about the actual error is not normally contained at the end of the XML file. To try to identify the information about the error, search for Failed workflow in the file and copy that entire line. This information is very useful for you to analyze yourself or to submit to IBM Support. To help IBM Support understand the context of the error, also provide the lines of output preceding and following the error in the workflowlogexport.xml file. If you need to call IBM Support, collect all of the information described here to help the Support staff address your issue quickly.
241
2. Publish status
For an inventory scan with software signatures, verify that the software signature was published to the depot. 1. On the provisioning server, check console.log for the following message:
DEBUG [Cit_SDI_OnDevice(11200)] (FileManager.java:317) cds.FileManager: Published file C:/Program Files/IBM/tivoli/tpm/tmp/cit_subagent/4546-SoftwareSignatureForSOA-1270567409156 with taskId 77401 to CDS depots: depot.example.com
2. Verify in the dynamic content delivery console that the file is on the depot server. In a supported Web browser, type the following URL:
https://host_name:9045/admin
3. Log on with the Tivoli Provisioning Manager administrator user name and password that you specified during core components installation. The default user is maxadmin. 4. If more information is required for the depot, check the following log files on the provisioning server, .
Table 47. Log files Log file trace_cdsmgr.log Message and trace information for download plans as well as general message and trace information trace_cdssec.log Message and trace information for Web services authentication and authorization trace_distribution.log Message and trace information for the distribution agent Location
Windows
%TIO_LOGS%\ctgde\logs
Linux
UNIX Windows
$TIO_LOGS/ctgde/logs
%TIO_LOGS%\ctgde\logs
Linux
UNIX Windows
$TIO_LOGS/ctgde/logs
%TIO_LOGS%\ctgde\logs
Linux
UNIX
$TIO_LOGS/ctgde/logs
3. Job status
Verify the status of the discovery job. 1. On the provisioning server, check console.log for a message to indicate that the job was submitted:
INFO [Cit_SDI_OnDevice(11200)] (JobManagementServiceClient.java:534) client.JobManagementServiceClient: Submitted job to the job management server. Job id is: [127056745464054137] INFO [Cit_SDI_OnDevice(11200)] (ExecutionLogger.java:333) runtime.ExecutionLogger:
2. If more information is required for device manager, check the following log files on the provisioning server.
Table 48. Log files Log file TraceDMSnumber.log Location
Windows
%TIO_LOGS%\ctgde\logs
Linux
UNIX
$TIO_LOGS/ctgde/logs
DMSMsgn.log
Windows
%TIO_LOGS%\ctgde\logs
Linux
UNIX
$TIO_LOGS/ctgde/logs
In TraceDMSnumber.log, search for the string jdml. The default DMS polling interval is 60 minutes, so the timestamp in the log might be as much as 60 minutes after the job was submitted. The following example shows an exerpt from the log.
242
INSERT INTO JOB_PARM (PARM_VALUE, LAST_MODIFIED, PARM_KEY, JOB_ID) VALUES (http://www.ibm.com/xmlns/prod/tivoli/tpm/jdml/2.0" failurePolicy="stop-on-error" priority="1" name="CitScan" applicationData="Discovery"
The Job Description Markup Language (JDML) also helps you to link the ID for the task with the ID for the job. For example:
<jdml:Variable name="jobId" literal="true">6125</jdml:Variable> <jdml:Variable name="taskId" literal="true">77401</jdml:Variable>
4. Target status
Check the progress of the discovery job on the target computer for the discovery task. 1. On the target computer, verify that the discovery job was received for processing. Look in CA_HOME/logs/trace-log-number.xml CA_HOME The agent installation directory v v v
Windows HP UX AIX
C:\Program Files\tivoli\ep
Linux Solaris
/opt/tivoli/ep
/usr/tivoli/ep
number A number such as 1. The following message shows that the discovery job was received.
JES023I Processing job: name = [CitScan], requestId = [6e58be70988b11dfbef4000c291214c0]
If the job was not received, check the following items: a. Verify communication with the target computer. Run the TCA_PingAgent provisioning workflow. b. If the discovery task is taking a very long time to complete, one possible cause is that the target computer is not polling for jobs, so the job is never received. To fix this problem, see Jobs not reaching target computer 2. Verify that the discovery job ran in trace-log-number.log. For an Inventory discovery, the following line indicates that the results of the discovery were generated on the target computer.
CIT034I Combined CIT output file as an XML import format C:\Program Files x86)\tivoli\ep\conf\org.eclipse.osgi\bundles\167\data\cit_tpmlabw2k82010.08.04.11.26.20.xml
The following line indicates that the discovery results were uploaded to the provisioning server.
JES037I Done executing work item: Job [CitScan], Work Item [ScanFileUpload] ]
3. On the target computer, check the following log files for additional information.
Table 49. Log files Log file error-log-number.log For error messages generated during agent run time. Location v v v
Windows HP UX AIX
C:\Program Files\tivoli\ep
Linux Solaris
/opt/tivoli/ep
/usr/tivoli/ep
243
%ProgramFiles%\IBM\tivoli\common\ /usr/ibm/tivoli/common/CIT/logs
For Inventory discovery discovery only Note: You can also set a higher trace level modifying the v file: $CA_HOME/../../../cit/config/ CitTrace.propertiesThe default value for variable CA_HOME is: v v
Windows UNIX
CIT\logs
UNIX
%ProgramFiles%\Tivoli\ep\runtime\agent /usr/tivoli/ep/runtime/agent
5. Results
Verify that the discovery results were processed. On the provisioning server, check console.log for the following information: These lines show the selection of the discovery scan results, and then processing of the results.
DEBUG [Discovery engine worker 0] ( Queue.java:177) engine.Queue: Selected message 77403 DEBUG [Discovery engine worker 0] (DcmDeviceIntegrator.java:258) util.DcmDeviceIntegrator: Found 0 subnets associated with discovery technology 4546 DEBUG [Discovery engine worker 0] (DiscoveryWorker.java:81) engine.DiscoveryWorker: Processed message: id 77403
Related links Support information about discovery Log files for troubleshooting discovery Discovery problems and limitations on page 245
%TIO_LOGS%\console.log
UNIX Linux $TIO_LOGS/console.log v v Workflow logs available from the web interface 2. If the Inventory Discovery is involved, perform the checks described for the Inventory Discovery. 3. Resolve the cause and then try again.
244
Windows
%TIO_LOGS%\console.log
UNIX Linux $TIO_LOGS/console.log v v Workflow logs available from the web interface On the target computer:
Windows
%ProgramFiles%\IBM\tivoli\common\CIT\logs\ traceCIT.log
UNIX Linux /usr/ibm/tivoli/common/CIT/logs/ traceCIT.log v For the TCA-based Inventory Discovery, on the target computer: v CA_HOME/logs/error-log-n.xml v CA_HOME/logs/trace-log-n.xml
and n = 0,1,2,... Note: You can also set a higher trace level modifying the following file:
$CA_HOME/../../../cit/ config/CitTrace.properties
%ProgramFiles%\Tivoli\ep\runtime\agent
UNIX Linux /usr/tivoli/ep/runtime/agent v 3. Resolve the cause and then try again.
For any Inventory Discovery if the Tivoli Common Agent is not installed
1. Check the log files and/or the workflow logs to determine the problem. On the Tivoli Provisioning Manager server: v TIO_LOGS\console.log v $TIO_HOME/tmp/cit_subagent/platform/target_id_timestamp Note: By default this directory is deleted. You should set a property to keep it. On the computer: v /tmp/cit_discoveryId 2. If the Inventory Discovery is involved, perform the checks described for the Inventory Discovery. 3. Resolve the cause and then try again.
Symptoms
When running Initial Discovery, very limited information about the discovered computers is returned if no user credentials are provided.
Causes
User credentials are needed to access full information about the discovered computers.
245
To retrieve detailed information about the discovered computers, it is recommended that you provide user credentials. If you do not provide them, only limited information about the computer (such as the host name and operating system) is returned, and the discovered computers are added into the Unknown Resources page.
Symptoms
After running a Rembo Hardware Discovery against a target computer, the value for cpu.type is not correctly inserted into the data model.
Causes
The discovery cannot always determine whether the target computer has a 32-bit or 64-bit processor. The discovery populates a 32-bit value in the data model by default, but with this value it is not possible to install a 64-bit operating system image on the target computer.
Symptoms
Microsoft Active Directory discovery only displays the short names of the discovered computers, and not their fully qualified host names.
Causes
Microsoft Active Directory discovery only detects the information which was defined in the Microsoft Active Directory registry.
Symptoms
No hardware information is returned after running a Microsoft Active Directory discovery against a computer.
Causes
A Microsoft Active Directory discovery only detects the information which was defined in the Microsoft Active Directory registry.
246
Symptoms
An inventory scan on a computer discovered by Microsoft Active Directory discovery fails if the computer does not have Tivoli Common Agent installed.
Causes
The operation fails because the service access point is not defined for this computer.
Discovery of Linux on zSeries is overwriting the record for another Linux on the same host platform in the data model
For Linux on zSeries, all the virtual computers on the same host platform share the same MAC address. The discovery uses the MAC address to identify the discovered computers. If two or more computers share the same MAC address, they are considered as one computer. You can update the MAC for the layer 2 mode device so that the Linux virtual machine is assigned a unique MAC address. The virtual machine MAC address must be unique within the same host platform.
Symptoms
The discovery of a first machine is completed successfully. The discovery of a second machine on the same host platform is completed with a message stating that the machine exists in the data model. All data from the previous discovery is overwritten by the second one.
Causes
The operation fails because the virtual computers on the same host platform have the same MAC address.
247
4. Create an interface configuration file in /ect/sysconfig/network/ifcfg-qeth-bus-ccw-0.0.#: 5. Set the value for parameter LLADDR to the MAC address you want, for example 00:01:02:03:04:05. The following example shows an interface device configuration file:
BOOTPROTO="static" UNIQUE="" STARTMODE="onboot" IPADDR="9.26.177.36" NETMASK="255.255.255.0" NETWORK="9.26.177.0" BROADCAST="9.26.177.255" _nm_name=qeth-bus-ccw-0.0.7858 LLADDR="00:01:02:03:04:05"
7. Restart the system. 8. Use the following commands to change the MAC address to the value you want. a. Stop the network interface:
ifconfig eth0 down
To change the MAC address on Red Hat on zSeries Systems, perform the following steps: 1. Create the configuration file in /etc/sysconfig/network-scripts/ifcfg-eth0:
DEVICE=eth0 BOOTPROTO=static IPADDR=9.26.177.39 NETMASK=255.255.255.0 NETTYPE=qeth ONBOOT=yes PORTNAME=GBEOSA SUBCHANNELS=0.0.7874,0.0.7875,0.0.7876 MACADDR=00:01:02:03:DC:08 OPTIONS="layer2=1"
3. Restart the system. 4. Use the following commands to change the system MAC address to the value you want. a. Stop the network interface:
ifconfig eth0 down
248
Symptoms
Tivoli Common Agent cannot be installed on a computer using Microsoft Active Directory.
Causes
This operation fails because the service access point is not defined for the target computer.
Symptoms
When running a Microsoft Updates discovery on UNIX target computers using Tivoli Provisioning Manager, the operation fails.
5. Install the cabextract utility on the UNIX target computers you want to discover using the Microsoft Updates discovery: a. Download cabextract-1.2.tar.gz from the http://www.cabextract.org.uk/ Web site. b. Perform the following actions to install the cabextract utility: 1) Navigate to the directory where you downloaded the rpm cabextract utility. 2) Run the following command to install the cabextract rpm package:
rpm -ivh RPM_NAME
Perform these steps for AIX-based computers: 1. Download the following packages: v #rpm -ivh gcc-4.2.0-3.aix5.3.ppc.rpm v #rpm -ivh libgcc-4.2.0-3.aix5.3.ppc.rpm v #rpm -ivh libstdcplusplus-4.2.0-3.aix5.3.ppc.rpm v #rpm -ivh libstdcplusplus-devel-4.2.0-3.aix5.3.ppc.rpm v #rpm -ivh gcc-cplusplus-4.2.0-3.aix5.3.ppc.rpm v #/usr/sbin/updtvpkg 2. Click Go To > Administration > Provisioning > Provisioning Global Settings. 3. Click the Variables tab. 4. Create a variable using cabextractcommand as its key.
Chapter 3. Discovering IT resources
249
6. Install the cabextract utility on the AIX target computers you want to discover using the Microsoft Updates discovery: a. Download cabextract-1.2.tar.gz from the http://www.cabextract.org.uk/ Web site. b. Run the following commands to install the cabextract utility: v $ gzip -cd < cabextract-1.2.tar.gz | tar xf v $ cd cabextract-1.2 v $ ./configure v $ make v $ make install
Symptoms
The inventory discovery does not detect the correct locale of Linux computers if Tivoli Common Agent is not installed on them.
Causes
The computer locale is not discovered correctly because the computer locale variables in the etc/environment file are not set.
Symptoms
When running a discovery, some deadlock issues arise.
Causes
The problem might be caused by the following variables:
Table 50. Deadlock issues Global variable AM.Discovery.Thread.Count Description The variable specifies how many threads to use when processing discovery data that is returned from the agent manager during an agent manager discovery run. Default value If no value is specified, then the default value is used, which is 8. The best value to use for this variable is 4.
250
Table 50. Deadlock issues (continued) Global variable DiscoveryConcurrencyLevel Description The variable handles the processing of discovery objects in the data model. Default value If no value is specified, then the default value is used, which is 2. The best value to use for this variable is 4. Note: It is not recommended to set a value bigger than 4.
Symptoms
After discovering a computer with network discovery and then installing the common agent on it, another data model record is created for that computer but it displays a different computer name.
Causes
If the host names specified for the target computer in the DNS and on the operating system do not match, then the network discovery creates two separate data model records are created for the same target computer.
Windows Vista computers cannot be discovered by the network discovery using their IPv6 addresses
A workaround is available if Windows Vista computers cannot be discovered.
Symptoms
Windows Vista target computers cannot be discovered using the discovery wizard provided to perform a network RXA-based discovery.
251
As a workaround for this discovery issue, set up theWindows Vista target computers of your environment as follows: 1. If you are a member of a local administrators group and you use a local user account, complete the following three steps to be able to perform administrative tasks on the target computers: a. Enable the built-in Administrator account and use it to connect. To enable the built-in Administrator account, open the Windows Control Panel and click Administrative Tools > Local Security Policy > Security Settings > Local Policies > Security Options . Then double-click Accounts: Administrator account status and select Enabled. b. Disable the user account control if a different administrator user account is to be used to connect to the Windows Vista computer. To disable the user account control, open the Windows Control Panel and click Administrative Tools > Local Security Policy > Security Settings > Local Policies > Security Options . Then double-click User Account Control: Run all administrators in Admin Approval Mode and select Disabled. Changing this setting requires a reboot of the computer. c. Disable the user account control if you administer a workstation with a local user account (Security Account Manager user account). Otherwise, you will not connect as a full administrator and will not be able to perform administrative tasks. To disable the user account control perform the following steps: 1) Click Start > Run. 2) Type regedit, and press Enter. 3) Locate and click the following registry subkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 4) Right-click LocalAccountTokenFilterPolicy, and click Modify. If the LocalAccountTokenFilterPolicy registry entry does not exist, follow these steps: a) From the Edit menu, click New, and then click DWORD Value. b) Type LocalAccountTokenFilterPolicy, and then press Enter. 5) In Value enter 1 , and click OK. 6) Restart the computer. 2. The target computers must have the Remote Registry service started, which represents the default configuration, in order for Remote Execution and Access (RXA) to connect to the target computer. Verify the service status clicking Administrative Tools > Services and start the Remote Registry service if needed.
Windows 2003 and Windows XP 64-bit computers cannot be discovered using their IPv6 addresses
Windows 2003 and Windows XP 64-bit computers are not discovered if the discovery configuration specifies their IPv6 addresses.
Symptoms
After running the network RXA-based discovery, the discovery might fail and the workflow log might display an error message similar to the following:
CTGRI0001E The application could not establish a connection to 2002:091A:0519:11F5:020D:60FF:FED4:F416.
Causes
If the IPv6 addresses of the computers have been used in the discovery configuration, the Windows 2003 Server Enterprise SP2 and Windows XP 64-bit target computers cannot be reached when doing a network RXA-based discovery.
252
As a workaround for this discovery issue, complete the following steps for each Windows 2003 Server Enterprise SP2 and Windows XP 64-bit target computer in your environment. 1. (Optional) Create the CNAME record for the file server on the appropriate DNS server, if the CNAME record does not exist. 2. Apply the following registry change to the file server: a. Start the Registry Editor (Regedt32.exe). b. Locate and click the following key in the registry:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Smb\Parameters
c. On the Edit menu, click Add Value, and then add the following registry value: DWORD key IPv6Protection Add with hex value 00000014 (0x00000014). DWORD key IPv6EnableOutboundGlobal Add with hex value 1 (0x1). d. Locate and click the following key in the registry:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanmanServer\Parameters
e. On the Edit menu, click Add Value, and then add the following registry value:
Value name: DisableStrictNameChecking Data type: REG_DWORD Radix: Decimal Value: 1
f. Quit the Registry Editor. 3. Restart your Windows target computer. After completing these steps on the target computers, run the network RXA-based discovery again.
Symptoms
After running the RXA-based network discovery against a Windows XP 32-bit computer with only the IPv6 protocol enabled, the computer cannot be discovered.
Causes
The RXA-based discovery uses the Microsoft SMB protocol to communicate with a managed computer. On Windows XP 32-bit computers, SMB only supports IPv4 communication and IPv6 addresses are not supported. This is a known Microsoft limitation.
Wrong version displayed for Web logic 10.X computer discovered from TADDM
Symptoms
When discovering from TADDM a computer with Web logic version 10.0 installed, on the Software tab of the discovered computer the Web logic version displayed is 10.3, even if the actual version is 10.0.
253
Causes
This error is due to the discovered computer which might be created. During the creation of the computer, a security check is performed to verify if the user has access to the new computer. If the user has no access, the exception is thrown.
Note: Error message BMXAA4017E can also occur in the following situation, which is not related to the cause described above: 1. You create a static provisioning group and enable the data model object finder security for a security group. 2. You log out as the MAXADMIN user and log in as a user from the particular security group. 3. You Click Go To > Deployment > Provisioning Computers. 4. You click the New button to create a new computer. 5. You enter a name for the computer and click Save. The error message is displayed. It is displayed for any user who has read/write data model object finder security enabled for a static group of computers. Contact your administrator if you receive the error message in this circumstance.
254
Symptoms
Running a network discovery fails with errors indicating that there are problems with the networking configuration on an AIX WPAR target computer.
Causes
An AIX WPAR virtual server might be missing networking information, or the networking information is not configured correctly.
COPCOM618E error for Windows computers configured with Federal Desktop Core Configuration
If the target computers that you manage have Microsoft Windows XP or Microsoft Windows Vista installed and are configured with Federal Desktop Core Configuration (FDCC), these computer cannot communicate with the provisioning server.
Symptoms
The following message might be displayed in Status of my recent provisioning workflows in the Start Center:
COPCOM618E The network discovery could not find any of the specified resources.
2. Expand Local Computer Policy > Computer Configuration > Administrative Templates > Network Connections > Windows Firewall > Standard Profile. 3. Ensure that Windows Firewall: Do not allow exceptions is Not Configured. 4. Ensure that Windows Firewall: Allow file and printer sharing exception and Windows Firewall: Allow local port exceptions are Enabled. 5. Expand Local Computer Policy > Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options. 6. Ensure that Network security: LAN Manager authentication level is set to Send NTLMv2 response only. 7. Open Windows Firewall in the Control Panel. 8. Add the following port numbers. ClickExceptions > Add port.
9045 9046 9510 9511 9512 9513 9514 9515
255
2. Expand Local Computer Policy > Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options. 3. Ensure that Network security: LAN Manager authentication level is set to Send NTLMv2 response only. 4. Ensure that User Account Control Admin Approval Mode for the Build-in Administrator account is set to Disabled. 5. Expand Local Computer Policy > Computer Configuration > Windows Settings > Security Settings > Windows Firewall with Advanced Security > Windows Firewall with Advanced Security - Local Group Policy Object > Inbound Rules. 6. Create a new inbound File and Print Sharing rule, which will allow SMB inbound traffic. 7. Create a new inbound Protocol and Ports rule for following TCP ports:
9045 9046 9510 9511 9512 9513 9514 9515
Causes
The TADDM server is on a version different from the version enabled by default in Tivoli Provisioning Manager. By default, Tivoli Provisioning Manager 7.2 supports TADDM version 7.2.
1. Log on to Tivoli Provisioning Manager as tioadmin. 2. Stop the Tivoli Provisioning Manager deployment engine by running the following commands: UNIX $TIO_HOME/tio.sh stop tpm Windows %TIO_HOME%\tio.cmd stop tpm 3. Move to the TIO_HOME/lwi/runtime/tpm/eclipse/plugins/TADDMDiscovery directory. 4. Create a directory named lib_7.2. 5. Back up the following files by copying them from the lib directory to the lib_7.2 directory: v platform-model.jar
256
v taddm-api-client.jar 6. Copy the following files from the lib_7.1.2.x directory to the lib directory: v platform-model.jar v taddm-api-client.jar Choose to overwrite the existing files. 7. Start the Tivoli Provisioning Manager deployment engine by running the following commands: UNIX $TIO_HOME/tools/tio.sh start tpm Windows %TIO_HOME%\tools\tio.cmd start tpm Note: To switch back to TADDM version 7.2, the files backed up in the lib_7.2 folder can be copied to the lib folder again.
IP address and host name are not displayed on the Web interface
IP address and host name are not updated on the Web interface after changing the IP address or the host name of a target computer.
Symptoms
When you change the IP address or the host name of a target computer, the new information is not reflected on the Web interface.
257
258
259
v Effective auditing and reporting is required to monitor deployment, verify compliance, and troubleshoot errors. v Operating system images must be kept up-to-date.
Tivoli Provisioning Manager for OS Deployment and Federal Information Processing Standard (FIPS) 140-2
Integration with Tivoli Provisioning Manager for OS Deployment is not supported when FIPS compliance is enabled in Tivoli Provisioning Manager. Tivoli Provisioning Manager for OS Deployment is not compliant with FIPS 140-2. The Tivoli Provisioning Manager for OS Deployment interface is not accessible when FIPS compliance is enabled.
260
261
Process
Set up infrastructure Create the image Configure image properties
No
Yes
Legend
Provisioning Administrator Provisioning Configuration Librarian Deployment Specialist
Operating systems management includes the processes that are detailed later in this section. Roles for each step in the process are noted in brackets. 1. Set up the infrastructure (Provisioning Administrator) v A boot server manages your images and their deployment. The parent boot server is typically installed during Tivoli Provisioning Manager installation. v After the parent boot server is installed, you can select to install additional child servers to distribute the workload. v Ensure that target computers meet requirements for image deployment. 2. Create the image (Deployment Specialist) You can define an unattended setup image with the installation files for the operating system, or you can capture an image of the operating system on a reference computer. 3. Configure image properties (Provisioning Configuration Librarian) These properties are configuration settings that you want to apply to all deployments of the image. For example, you can configure the operating system to use a dynamic IP address or define a site license key for a Windows image deployment. 4. Create software modules that you want to install with the image (Provisioning Configuration Librarian). A software module is software such as an application or a device driver. 5. Bind, or associate, the appropriate software modules with an image or a specific target computer (Provisioning Administrator) 6. Deploy the created image (Deployment Specialist).
262
User roles
You must be assigned to the appropriate user role to perform image management operations.
Table 51. User roles Role Deployment Specialist Description v Deploys images Skills v Server management experience v Familiarity with OS management life cycle Provisioning Configuration Librarian v Manages overall product configuration. v Responsible for setting up the environment to support boot server technologies. Provisioning Administrator v Knowledge of provisioning server configuration and boot server technologies.
v Performs higher level management v Knowledge of boot server of the environment such as technologies. installing or deleting boot servers. v The individual who uses a target computer, typically a notebook, desktop or server. v Basic knowledge of the operating system on the target computer.
End User
Requirements
User roles and requirements on page 279 Target computer requirements: Requirements for Windows target computers on page 556 Requirements for Red Hat Linux target computers on page 560 Requirements for SUSE Linux Enterprise Server (SLES) target computers on page 561 Requirements for AIX target computers on page 562 Requirements for Solaris Operating Environment target computers on page 563 Requirements for HP-UX target computers on page 565 v Hardware requirements on page 281 v Operating system requirements on page 282 v File system requirements on page 283 Server system requirements on page 280
263
Key terms
bare metal computer A computer on which there is nothing reliable but the hardware. It can be coming straight from factory without any data on its hard disk (out of the box) or it can contain a possibly damaged operating system. boot server A system that is required to start other servers. Boot servers are defined to provision workstations or other systems without any installed software. Compare with terminal server. image A representation of a computer program and its related data such as the kernel, file systems, libraries, and programs of the managed system at a given point in time.
target computer The system that is the final destination of a management operation.
Troubleshooting
v os/tcom_troubleshooting.dita v Log files v COPOSD messages v Support information about OS deployment v Contacting Support
Log files
Review the log files in the following topics to recover from problems that you might encounter when deploying operating systems: v Tivoli Provisioning Manager for OS Deployment server log files v Copying log files to the software repository v Recovering from Tivoli Provisioning Manager for OS Deployment or Tivoli Provisioning Manager for Images problems
Resources
To learn more about managing operating systems, refer to one of the following resources: v Tutorial: Managing operating systems on page 301 v Chapter 4, Deploying operating systems, on page 259 v Setting up additional child OS deployment servers on page 283 v Security problems with TPM for OS Deployment
Related links Chapter 4, Deploying operating systems, on page 259 Requirements on page 279 os/tcom_troubleshooting.dita Tutorial: Managing operating systems on page 301
264
You can use Tivoli Provisioning Manager for OS Deployment to perform the following tasks using source servers: v Windows cloning (capturing a golden master image) and unattended setup v AIX unattended setup v Linux cloning (not supported on Linux PPC), and unattended setup v Solaris unattended setup v VMWare ESX unattended setup Using industry standards such as Wake-On-LAN, PXE, ODBC/JDBC, DMI and PCI detection, Microsoft system preparation tool (Sysprep), Kickstart, and Autoyast, Tivoli Provisioning Manager for OS Deployment offers easy to use installation of operating systems and selected software on tens, or even hundreds, of computers simultaneously. The deployment source can be on the network, on a CD-ROM or DVD-ROM, or on a disk partition.
265
into their different groups. The parameters and status of each target can be controlled (for example, when a target requests a remote-boot through PXE). Target-side applications The following target-side applications are installed automatically by the target through the network. The deployment engine The deployment engine is a stand-alone mini-operating system used for all the management tasks that are performed outside of the real operating system, such as the operating system installation. The deployment engine must not be installed manually on target systems, because it is downloaded automatically when the target systems are instructed to boot on the OS deployment server in their DHCP configuration. After the deployment engine is started, it loads a ramdisk that can perform various operations on the targets, such as: v Disk partitions and formatting v Installation of complete operating systems such as Windows or UNIX v Disk wipes The web interface extension The web interface extension is a small program that can run on most operating systems (Windows, AIX, Linux, Solaris), either in the background as a service or as a command-line tool. It provides cross-operating system connectivity to the management platform for targets with an installed operating system. It can be used to collect information from targets, to remotely initiate tasks on a target from the OS deployment server, or to trigger commands on the OS deployment server from a target. The web interface extension can access all files on the hard disk and other drives through the operating system. When running under Microsoft Windows, it can also access the system registry, and all system information published by drivers using the Windows Management Interface (WMI). Also, for all Intel-based operating systems, the web interface extension can install a hook on the boot process to initiate a PXE boot or to start the deployment engine in offline mode, to trigger pre-operating system management tasks such as migration or recovery. The deployment engine and the web interface extension are stand-alone management platforms and do not require an operating system. The web interface side application, typically installed on the server, is the web interface extension, running in background as a service. Optionally, a web interface extension can be installed on targets, so that you can take control of them remotely. The web interface extension is useful, for example, to restart the computer when a deployment starts, or to perform an operating system inventory. Several features of the web interface are not available when the web interface extension is not installed on the server. The web interface extension is a piece of software designed to run as an operating system application (a Windows application or a UNIX application). When you install the product, you install the OS deployment server. The target side is embedded into the server, and sent to computers through a network connection such as a network boot or PXE boot, or through media such as a CD-ROM, a diskette, or a hard disk partition. Note: It is also possible to boot targets over the network without using PXE. See Booting targets without using PXE on page 274 for more information.
266
1. A CD-ROM that contains both the deployment engine and the web interface extension can be created. 2. Computers boot, loading the deployment engine either from the PXE server (OS deployment server) or from the CD-ROM.
Chapter 4. Deploying operating systems
267
3. The deployment engine loads a ramdisk, embedded Linux for Linux targets or WinPE2 for Windows targets. 4. The ramdisk can perform various tasks, including the operating system installation. 5. The targets boot into the operating system (Windows, Linux, Solaris), with the web interface extension optionally running.
Set up infrastructure
No
Yes
Legend
Provisioning Administrator Provisioning Configuration Librarian Deployment Specialist
Operating systems management includes the processes that are detailed later in this section. Roles for each step in the process are noted in brackets. 1. Set up the infrastructure (Provisioning Administrator) v A boot server manages your images and their deployment. The parent boot server is typically installed during Tivoli Provisioning Manager installation. v After the parent boot server is installed, you can select to install additional child servers to distribute the workload. v Ensure that target computers meet requirements for image deployment. 2. Create the image (Deployment Specialist) You can define an unattended setup image with the installation files for the operating system, or you can capture an image of the operating system on a reference computer. 3. Configure image properties (Provisioning Configuration Librarian) These properties are configuration settings that you want to apply to all deployments of the image. For example, you can configure the operating system to use a dynamic IP address or define a site license key for a Windows image deployment.
268
4. Create software modules that you want to install with the image (Provisioning Configuration Librarian). A software module is software such as an application or a device driver. 5. Bind, or associate, the appropriate software modules with an image or a specific target computer (Provisioning Administrator) 6. Deploy the created image (Deployment Specialist).
269
Hardware configuration image Hardware configurations are performed at deployment time through a vendor-dependent environment which is loaded onto the target before operating system installation. Unattended setup image You can use unattended setup to create a deployment system without actively being involved in the process. Note: You cannot capture any kind of image if your target machine (that is, the machine you are capturing from) has Tivoli Common Agent installed. For Tivoli Provisioning Manager for Images, a new image type called TPM for Images Virtual Image has been specifically added for virtual image management support. Tivoli Provisioning Manager (TPM) for Images Virtual Image A virtual representation of a computer program and its related data such as the kernel, file systems, libraries, and programs of the managed system at a particular time.
270
TPM for Images Virtual Image A new image type that was specifically added for virtual image support. For more information about virtual images, see Chapter 5, Managing virtual images, on page 387. Requirements for capturing an image: Information pertaining to source computers Ensure that you have the following information. This is required to perform the task. v The name of the computer that contains the operating system that you want to capture. v The time that you want to capture the image. You can start the capture immediately, or schedule it for a later time. Ensure the source computer has an operating system associated with it The source computer must have an operating system defined on it. This is used to display a list of boot servers that are capable of capturing an image for that operating system and hardware architecture. Managed by Tivoli Provisioning Manager The source computer must be managed by Tivoli Provisioning Manager. The source computer must have at least one of the following defined: v UUID. This is a property of the server object called: computer.uuid v Serial number. This is a property of the server object computer called: computer.serialNumber v A NIC set as netboot enabled with the MAC address of the network interface the source computer starts from. Requirements for installing an image: Information required for installing an image Ensure that you know the time that you want to install the image. You can start the installation immediately, or schedule it for a later time. Target computer capabilities when deploying with Tivoli Provisioning Manager for OS Deployment The target computer must be managed by Tivoli Provisioning Manager and must have at least one of the following defined: v UUID. This is a property of the server object called: computer.uuid v Serial number. This is a property of the server object computer called: computer.serialNumber v A NIC set as netboot enabled with the MAC address of the network interface the target computer starts from. Also, it must meet the minimum hardware requirements to install the operating system.
271
There are three different types of operating systems images you can create. You must consider certain prerequisites (such as which operating systems are supported) as well as your goal when creating an image.
272
Restoring a computer from a software-related problem, such as malware intrusions or operating system failure. Limitations Only supported on Windows Limited in the amount of data they can handle and might fail for machines with large amounts of data Does not scale well. It must not be used as a general backup solution for a set of computers or your entire enterprise.
Network boot
Tivoli Provisioning Manager for OS Deployment (or Tivoli Provisioning Manager for Images) implements a PXE network boot application. There are several ways computers can boot over a network, but the one mandated by PC99 is called PXE. PXE is a type of DHCP extension. Tivoli Provisioning Manager requires that any target computer you want to use for OS or virtual image management (for example, capturing images from or deploying images to) must have its boot order set to boot from the network first. This is a requirement to be able to perform operating system or virtual image management operations in a Tivoli Provisioning Manager environment. Note: Your target computer must be set to boot from the network, and also from the Tivoli Provisioning Manager for OS Deployment boot server. You might need to configure your DHCP server in order to do this: DHCP server requirements and configuration on page 296. A network boot application is different from any other program for a number of reasons: v It is invoked by the BIOS during the initial bootstrap of the computer, before any operating system or disk boot manager. v It depends on the presence of a special chip on the network card, the PXE boot ROM. v It is capable of communicating with a server over the network thanks to a programming interface provided by the bootrom. PXE is the informal standard for this kind of programming interface. v It is downloaded from a special OS deployment server, and does not depend on any local storage device. It can work on computers without hard disk, CD-ROM or diskette devices. If a local storage device is present on the computer, it is accessible to the network boot application. However, a network boot application does not fail if the storage device is corrupted or broken. v It gets its parameters (IP address and other boot parameters) from a central DHCP server. A typical network-boot sequence goes through the following phases: 1. Starting up: A user or a wake-up event starts up the remote-boot computer. 2. Network boot: The BIOS configuration (boot order), a hot key (for example, F12), or the wake-up event instructs the computer to boot on the network. 3. IP address discovery: The remote-boot target computer broadcasts a DHCP request for an IP address. Any DHCP server which knows the target (that is, recognizes its hardware address) or which has a pool of freely distributable dynamic addresses sends an IP address. The target takes the first answer and confirms it to the server. In addition to the IP address, the server gives some other network parameters to the target and information about the boot procedure to follow. 4. OS deployment server discovery: In the case of PXE remote-boot, the target computer then proceeds to the discovery of the OS deployment server. The OS deployment server is responsible for delivering a network boot program to the target. It is not necessarily the same computer as the DHCP server. The target responds to the first OS deployment server which replies and downloads a small program using a simple multicast protocol (MTFTP). 5. Server connection: If the network boot program is the deployment engine, it establishes a secure (encrypted) connection to the provisioning server and receives instructions from the server to determine the name of the program to run.
Chapter 4. Deploying operating systems
273
6. Pre-OS configuration: The deployment engine then downloads from the file server everything required by the OS configuration specified by the system administrator. These file transfers are done using a secure, robust and efficient unicast or multicast protocol. Many actions can be performed at this stage: installing an operating system from scratch, repairing a corrupted operating system, or performing an inventory. 7. OS booting: When instructed by the OS configuration, the deployment engine removes itself from memory and allows the computer to start the operating system, as if the computer is booting normally from the hard disk. This ensures full compatibility with the operating system and avoids all problems of the traditional diskless remote boot. Note: Tivoli Provisioning Manager for OS Deployment features a fault-tolerant server architecture, with the OS deployment server always available to the target. However, in case of severe network failure, targets can be configured to work in offline mode, without network access. In this scenario, the deployment engine is stored on a permanent storage medium, such a hard disk partition or a CD-ROM, and started from that medium instead of being loaded from the network.
274
Procedure 1. Click Go To > Deployment > OS Management > Software Modules. 2. Click Create deployment media. 3. Select Create a network boot USB key to start the USB key wizard. Click Next. 4. Specify the operating system on which to boot the target. Select Optimized for Linux to load an embedded Linux environment or Optimized for Windows to load a WinPE deployment engine. Note: Before clicking Optimized for Windows, ensure that you created the WinPE deployment engine. To determine what WinPE version is required, see the Tivoli Provisioning Manager for OS Deployment documentation. If you have the WinPE deployment engine on the OS deployment server, the WinPE deployment engine starts by default. Otherwise the default is to start embedded Linux. Only when embedded Linux or WinPE is running, does the target connect to the network and try to contact an OS deployment server. 5. If you want to obtain the target IP address through DHCP, select Dynamic IP address with DHCP, and click Next. If you want to use a fixed IP address for your target instead of having it go to the DHCP server, select Static IP address, and click Next. a. Enter the target IP address, gateway, and network mask. b. (Optional) Select Allow IP address override at runtime to be able to modify the target IP address when starting up the target. c. Click Next. 6. Enter the IP address of the OS deployment server. 7. (Optional) Select Allow server IP address override at runtime to be able to modify the IP address of the OS deployment server when starting up the target. 8. Plug your USB key into a machine running the web interface extension, and specify its address. 9. Choose the drive matching your USB key. 10. Click Finish to close the wizard. What to do next Use the USB drive to boot the target. Creating a network boot CD or DVD with the wizard: Procedure 1. Click Go To > Deployment > OS Management > Software Modules. 2. Click Generate media at the bottom of the page. 3. Select Create a network boot CD/DVD and click Next. 4. If you want to obtain the target IP address through DHCP, select Dynamic IP address with DHCP, and click Next. If you want to use a fixed IP address for your target instead of having it go to the DHCP server, select Static IP address, and click Next. a. Enter the target IP address, gateway, and network mask. b. (Optional) Select Allow IP address override at runtime to be able to modify the target IP address when starting up the target. c. Click Next. 5. Specify the operating system on which to boot the target. Select Optimized for Linux to load an embedded Linux environment or Optimized for Windows to load a WinPE deployment engine.
275
Note: Before clicking Optimized for Windows, ensure you created the WinPE deployment engine. To determine what WinPE version is required, see the Tivoli Provisioning Manager for OS Deployment documentation. If you have the WinPE deployment engine on the OS deployment server, the WinPE deployment engine starts by default. Otherwise the default is to start embedded Linux. Only when embedded Linux or WinPE is running, does the target connect to the network and try to contact an OS deployment server. 6. Enter the IP address of the OS deployment server. 7. (Optional) Select Allow server IP address override at runtime to be able to modify the IP address of the OS deployment server when starting up the target. Note: When you create the network boot CD or DVD in a multiserver infrastructure, ensure that the OS deployment servers share the same password and port number. The network boot CD or DVD works only if you specify the IP address of a OS deployment server having the same password and port number of the OS deployment server that generated the ISO file. 8. Click here on the screen to download the ISO file. 9. Click Finish to close the wizard. What to do next The generated ISO file can be burned to create the network boot CD. To start a target computer over the network using your OS deployment server without booting through PXE, start the target on the network boot CD and the target automatically connects to the OS deployment server. Creating a network boot USB drive with command lines: You can create a network boot USB drive, which Tivoli Provisioning Manager for OS Deployment can use when a target cannot boot from the network. Before you begin Install the rbagent, also known as web interface extension, on a Windows target. The USB drive must be formatted as FAT32 or NTFS. Existing files on the USB drive are not deleted. USB keys already filled with a bootable operating system might not work. The command line must be used only when the web interface is either inappropriate or unavailable. Procedure v If you want to obtain the target IP address through DHCP, use this command line:
Windows
rbagent.exe -s <OSD_server_ip_address>:<OSD_server_password> rad-mkbootusb <drive> <USB_OSD_server_ip_address> <USB_OSD_server_password> [allowsrvipoverload] [nowpe|preferwpe] [bootopt nnn] [clearcmos]
where: OSD_server_ip_address Is the IP address of the OS deployment server. OSD_server_password Is the password for the administrative user (typically admin) on your OS deployment server. drive Is a drive letter of the Windows target where you run the rbagent command. The
276
rad-mkbootusb command adds the requested files to the FAT32 or NTFS partition and makes it bootable. The drive must be already formatted. Existing files on the partition are not deleted. USB_OSD_server_ip_address Is the IP address of the OS deployment server that the target must contact, when it boots from the USB drive. USB_OSD_server_password Is the password of the OS deployment server that the target must contact, when it boots from the USB drive. allowsrvipoverload Allows you to choose an OS deployment server later, from the target. nowpe|preferwpe Defines if an embedded Linux environment or WinPE2 environment is loaded from the USB drive, when a target boots from this USB drive, without accessing the network. Only when embedded Linux or WinPE2 is running, does the target connect to the network and try to contact an OS deployment server. If you deploy only Linux, specify prefermcp to skip the WinPE2 deployment engine. You can specify preferwpe only if there is a WinPE2 deployment engine on the OS deployment server. bootopt nnn Allows you to specify additional flags before the boot. clearcmos Resets the CMOS alarm fields if they are in an invalid state. For example:
> C:\TPMfOSd Files\global\http\agents\rbagent.exe -s 10.10.10.10:abcd rad-mkbootusb C: 10.10.10.10 abcd
v If you want to use a fixed IP address for your target instead of having it go to the DHCP server, use this command line: On Windows operating systems:
rbagent.exe -s <OSD_server_ip_address>:<OSD_server_password> rad-mkbootusb <drive> <USB_OSD_server_ip_address> <USB_OSD_server_password> fixed [fixed_ip_address] [fixed_netmask] [fixed_gateway_ip_address] [allowsrvipoverload] [nowpe|preferwpe] [allowipoverload] [bootopt nnn] [clearcmos]
where: OSD_server_ip_address is the IP address of the OS deployment server. OSD_server_password is the password for the administrative user (typically admin) on your OS deployment server. drive is a drive letter of the Windows target where you run the rbagent command. The rad-mkbootusb command adds the requested files to the FAT32 or NTFS partition and makes it bootable. The drive must be already formatted. Existing files on the partition are not deleted.
USB_OSD_server_ip_address Is the IP address of the OS deployment server that the target must contact, when it boots from the USB drive. USB_OSD_server_password Is the password of the OS deployment server that the target must contact, when it boots from the USB drive. fixed_ip_address Is the static IP address of the target you boot using the USB drive.
Chapter 4. Deploying operating systems
277
fixed_netmask Is the netmask of the target you boot using the USB drive. fixed_gateway_ip_address Is the IP address of the gateway that the target uses. nowpe|preferwpe Defines if an embedded Linux environment or WinPE2 is loaded from the USB drive, when a target boots from this USB drive, without accessing the network. Only when embedded Linux or WinPE2 is running, does the target connect to the network and try to contact an OS deployment server. If you deploy only Linux, specify nowpe to skip the WinPE2 software module. You can specify preferwpe only if there is a WinPE2 software module on the OS deployment server. allowipoverload Allows you to define IP settings manually on the target. bootopt nnn Allows you to specify additional flags before the boot. clearcmos Resets the CMOS alarm fields if they are in an invalid state. What to do next You can now boot the target using the network boot USB drive instead of the network card. To use the PXE emulation USB key, insert the USB key into the drive and restart the target. If your machine does not boot from the USB key, check the BIOS boot list to see if your USB drive is included in the boot sequence and is listed before the hard disk. Most machines also allow you to select the temporary boot device without changing the boot sequence in BIOS. Creating a network boot CD or DVD with command lines: This mode must be used only when the web interface is either inappropriate or unavailable. Note: When you create the network boot CD or DVD in a multiserver infrastructure, ensure that the OS deployment servers share the same password and port number. The network boot CD or DVD works only if you specify the IP address of a OS deployment server having the same password and port number of the OS deployment server that generated the ISO file. Procedure v If you want to obtain the target IP address through DHCP, use these command lines:
UNIX Linux
Windows
where: target_ip_address Is the IP address of the OS deployment server. target_password Is the password for the administrative user (typically admin) on your OS deployment server.
278
full_path_to_boot_iso Is the full path to the .iso file you want to create on the target where you run the rbagent command. For example:
> C:\TPMfOSd Files\global\http\agents\rbagent.exe -s 10.10.10.10:abcd rad-mkbootcd C:\boot.iso 10.10.10.10 abcd
This creates a file called boot.iso in c:\ which can be burned onto a CD. v If you want to use a fixed IP address for your target instead of having it go to the DHCP server, use these command lines:
UNIX Linux
Windows
> rbagent.exe -s <target_ip_address>:<target_password> rad-mkbootcd <full_path_to_boot_iso> <target_ip_address> <target_password> [fixed_ip_address] [fixed_netmask] [fixed_gateway_ip_address]
where: fixed_ip_address Is the static IP address of the target you boot using the CD. fixed_netmask Is the netmask of the target you boot using the CD. fixed_gateway_ip_address Is the IP address of the gateway the target uses. What to do next The generated ISO file can be burned to create the network boot CD. To start a target computer over the network using your OS deployment server without booting through PXE, start the target on the network boot CD and the target automatically connects to the OS deployment server.
Requirements
Before you start working with managing operating systems, ensure that you meet all requirements.
279
Table 52. User roles (continued) Role Provisioning Configuration Librarian Description v Manages overall product configuration. v Responsible for setting up the environment to support boot server technologies. Provisioning Administrator Skills v Knowledge of provisioning server configuration and boot server technologies.
v Performs higher level management v Knowledge of boot server of the environment such as technologies. installing or deleting boot servers. v The individual who uses a target computer, typically a notebook, desktop or server. v Basic knowledge of the operating system on the target computer.
End User
Hardware requirements
The minimum recommended configurations for the OS deployment server includes:
Table 53. Hardware requirements for the OS deployment server Processor type Minimum Recommended Dual-Xeon Quad-core or two dual-core Processor speed 2 GHz 2 GHz RAM 1 GB RAM 2 GB RAM Free disk space 10 GB 100 GB
Store Tivoli Provisioning Manager for OS Deployment files on a large hard disk if you plan to create many hard-disk images, and you might want to use a fast processor to minimize the time spent creating these images. The OS deployment server is multithreaded and benefits from computers with multiple processors.
280
Table 54. Server operating systems (continued) Operating system SUSE Linux Enterprise Server (SLES) 10 SUSE Linux Enterprise Server (SLES) 10 SUSE Linux Enterprise Server (SLES) 11 SUSE Linux Enterprise Server (SLES) 11 SUSE Linux Enterprise Server (SLES) 11 Red-Hat Enterprise Linux Server 5 Red-Hat Enterprise Linux Server 5 IBM AIX 6.1 Solaris 10 Update 6 Architecture IBM PowerPC 64 (iSeries and pSeries) IBM System z x86-32 and x86-64 IBM PowerPC 64 (iSeries and pSeries) IBM System z x86-32 and x86-64 IBM PowerPC 64 (iSeries and pSeries) IBM PowerPC 64 (iSeries and pSeries) SPARC 64-bit
Also, Tivoli Provisioning Manager for OS Deployment or Tivoli Provisioning Manager for Images can work with almost any RFC-compliant DHCP server, including Windows 2003 DHCP server, Windows 2000 DHCP server, ISC DHCP server, Solaris DHCP server and the Netware 5 DHCP server.
Hardware requirements
The following are the requirements for x86 and x8664 targets: v Minimal processor: Pentium type level. v Minimal RAM memory: 512 MB. Note: Windows 1 GB might be necessary on some targets to run WinPE2. 1 GB RAM is also necessary on the reference target to capture a golden master or a virtual image. v VESA-compliant (release 2.0 or later) Video BIOS to get "high" resolution (VGA fallback is always possible in case of incompatibility) and to have a user interface on the target. Note: Tivoli Provisioning Manager for OS Deployment can also work on headless computers, in which case all operations have to be performed from the web interface. v Either a legacy ATA drive (with Ultra DMA support if speed is required) or a BIOS-supported hard drive. v DMI support for collecting hardware information, such as model and serial number. Note: Disks with a size equal to or larger than 1 TB are not supported on targets running Linux and on virtual images. To make full use of the Tivoli Provisioning Manager for OS Deployment features, remote-boot x86 and x8664 targets must be equipped with a PXE-compliant bootrom, either version 2.00 or later. Most recent computers with on-board network adapters have built-in PXE support. The network cards that have been shown to work best with Tivoli Provisioning Manager for OS Deployment are Intel adapters. For computers without built-in PXE support, you might consider using a PXE emulation floppy available from various third party sources, creating network boot media, or working offline with deployment media. SUN SPARC targets need a firmware that supports the SUN wanboot method for network booting. Wanboot is the only supported network boot method for SUN SPARC.
281
Tivoli Provisioning Manager for OS Deployment can also deploy operating systems to VMWare virtual machines. Use of the Intel e1000 adapter on VMWare virtual machines requires VMWare ESX 3.0.2 with February 2008 patches, VMWare ESX 3.5 or later, VMWare Workstation 6.0.3 or later, VMWare Server 2.0 or later. Microsoft Virtual PC and Microsoft Virtual Server are not supported.
Windows 7
For image deployment v 10 GB free disk space (32-bit) v 20 GB free disk space (64-bit) v 1 GB RAM
Windows Vista
GA and SP2
For image deployment v 10 GB free disk space (32-bit) v 20 GB free disk space (64-bit) v 1 GB RAM
Windows 2003 Server Windows XP Professional SUSE Linux Enterprise Server (SLES) SUSE Linux Enterprise Server (SLES) SUSE Linux Enterprise Server (SLES) SUSE Linux Enterprise Desktop (SLED)
x86-32 and x86-64 x86-32 and x86-64 x86-32 and x86-64 IBM PowerPC 64 (pSeries) x86-32 and x86-64 x86-32 and x86-64
282
Table 55. Tivoli Provisioning Manager for OS Deployment and Tivoli Provisioning Manager for Images target operating systems (continued) Operating system SUSE Linux Enterprise Server (SLES) Red-Hat Enterprise Linux (RHEL) Server Red-Hat Enterprise Linux (RHEL) Server Red-Hat Desktop Red-Hat Enterprise Linux (RHEL) Server Red-Hat Enterprise Linux (RHEL) Server Red-Hat Desktop Solaris Solaris Solaris IBM AIX 5L IBM AIX 6L VMWare ESX Server VMWare ESX Server VMWare ESX Server
Version 10 SP3 6 (See note) 5, Update 3 5, Update 3 5, Update 3 4, Update 8 4, GA version only 10 Update 6 10 9 (cloning only) 5.3 (setup only) 6.1 (setup only) 4.0 3.5 Update 4 3.0.2
x86-32 and x86-64 x86-32 and x86-64 IBM PowerPC 64 ( pSeries) x86-32 and x86-64 x86-32 and x86-64 SPARC 64-bit SPARC 64-bit SPARC 64-bit IBM PowerPC 64 (pSeries) IBM PowerPC 64 (pSeries) x86-32 x86-32 x86-32
Note: Windows 2008 R2 SP1, Windows 7 SP1, and Red-Hat Enterprise Linux 6 are currently supported with Tivoli Provisioning Manager for OS Deployment version 7.1.1.5.
283
Remember: For Tivoli Provisioning Manager for Images, the procedure to install additional child servers is identical with this one, for Tivoli Provisioning Manager for OS Deployment. If you did not install Tivoli Provisioning Manager for OS Deployment during Tivoli Provisioning Manager installation, you must run the Tivoli Provisioning Manager installation again to install the parent boot server on the provisioning server.
Provisioning server Remote server 1
OS deployment database
Remote server 2
If you install child servers, you can optionally promote a child server to be the parent boot server.
Provisioning server Remote server 1
OS deployment database
Remote server 2
Tivoli Provisioning Manager for OS Deployment can support environments with a large number of target computers by spreading the workload between multiple boot servers. Replication is the means to keep files and information up-to-date between parent and child servers. All images are automatically replicated to the parent server, and from the parent server to all the child servers. The Tivoli Provisioning Manager for OS Deployment database is stored on the provisioning server. Child servers do not have their own databases, but point to the parent database.
284
To successfully deploy a child server, ensure that your target system exposes the Windows cpu.type ( Linux cpu.family) property under hardware resources, otherwise Tivoli Provisioning Manager cannot for Intel, AMD, zSeries, and resolve to the correct ( Windows 32bit or 64bit) installable file ( Linux PowerPC systems). To perform this task: 1. Discover a target computer. See Discovering your target computers on page 568. 2. Discover hardware resources on the target computer. See Discovering hardware using provisioning Inventory discovery on page 164. If a Tivoli Provisioning Manager for OS Deployment boot server was not installed during Tivoli Provisioning Manager installation, you must rerun the Tivoli Provisioning Manager again to install it. For instructions, see the Tivoli Provisioning Manager Installation Guide. To create a child OS deployment server:
Procedure
1. Click Go To > Deployment > OS Management > Boot Server Installation. 2. Select the computer that you want to use as your OS deployment server. 3. Select TPMfOSd for the Boot Server Type. Click OK. 4. Review the information, then click Submit.
Results
You have now installed a child OS deployment server. Uninstalling child OS deployment servers: You can uninstall the child OS deployment servers that you no longer require. To uninstall your OS deployment server: Procedure 1. Click Go To > Deployment > Provisioning Computers. 2. Select the computer that has the OS deployment server installed. 3. Click Select Action > Uninstall > Software Installation and uninstall the OS deployment server installation. Results You have now uninstalled your child OS deployment server.
285
Procedure
1. Click Go To > Deployment > OS Management > Boot Servers. 2. From the Select Action menu, click Promote a child boot server to parent. 3. When prompted, click Yes.
Results
The child server is now a parent server, and the parent server is now a child server.
Types of WinPE2
WinPE2 consists of a group of files that can be loaded as a ramdisk, which enable you to perform operations on a target. WinPE2 deployment engine This WinPE2 is a prerequisite to create Windows images and deploy them. You must store only one WinPE2 deployment engine on your OS deployment server, as it is independent of the architecture or the version of the Windows operating system you work with. However, depending on your hardware, you might have to inject specific drivers in your WinPE2 deployment engine. To create a WinPE2 deployment engine you need a computer running Windows 32-bit, with Windows Automated Installation Kit (WAIK) 1.1 32-bit in English installed, and running the web interface extension. WinPE2 ramdisk This WinPE2 contains the installation files for any Windows Vista/2008/7 operating system. It can be found on the original installation CD/DVD. In the case of a Windows Vista/2008/7 unattended setup creation, the WinPE2 ramdisk software module is automatically created and bound to the image, which ensures your WinPE2 to be of the correct version. For golden master images, you also need a WinPE2 ramdisk if you need to inject drivers into your image. In this case, you might need to create your WinPE2 ramdisk using the Software wizard. To create a WinPE2 ramdisk, you need a computer running Windows 32-bit, with WAIK 1.1 32-bit in English installed, and running the web interface extension. You also need the original Windows Vista/2008/7 installation CD/DVD. Note: A 64-bit WinPE2 ramdisk is required to be able to reuse Windows Vista and Windows 2008 64-bit images created with an earlier version of Tivoli Provisioning Manager for OS Deployment, for example, version 7.1.1. WinPE2 hardware environment This type of WinPE2 is used for hardware configurations.
286
To create a WinPE2 hardware environment, you must start the vendor commands on a computer running Windows 32-bit, with WAIK 1.1 32-bit in English installed, and the web interface extension installed. You must start the vendor commands before you start the web interface extension.
Good practice
If you deploy Windows operating systems, you need to create one WinPE2 deployment engine, and potentially several WinPE2 ramdisks and WinPE2 hardware configurations. For each of these creations, you need a computer running under Windows, with WAIK and the web interface extension installed. The same configuration is also needed to update Windows Vista/2008/7 images, and to inject drivers into the WinPE2 deployment engine. WAIK can be obtained free of charge from Microsoft, but it is rather heavy and cumbersome to install. Therefore, it is good practice to install WAIK and the web interface extension on a target running a Windows operating system and to perform all operations requiring this configuration on this dedicated target.
287
Procedure
1. Navigate to the Software Modules page. Click Go To > Deployment > OS Management > Software Modules. 2. From the contextual menu, click Add a new software. The Software wizard is displayed. 3. Select one of the Windows operating systems as the type of software module to create, and click Next. 4. Select WinPE 2 engine for OS deployment server ramdisk image, and click Next. 5. Specify the address of the computer on which you installed WAIK and the web interface extension, and click Next. 6. Click Finish.
Results
The resulting WinPE2 deployment engine appears as a software module in the WinPE2 Deployment engine specific folder.
What to do next
The created WinPE2 deployment engine might not contain all the necessary drivers depending on the hardware on which you want to use it. If this is the case: Create software modules with the missing drivers. Double-click the WinPE2 deployment engine to view the software details. Click Update drivers. Specify the address of the computer on which you installed WAIK and the web interface extension, and click Next. 5. Select the software modules containing the drivers you need to inject in your WinPE2 deployment engine and click Next. 1. 2. 3. 4. After you created the WinPE2 deployment engine, you can create and deploy Windows images. Note: During the deployment, do not edit the WinPE2 deployment engine that you are using.
Procedure
1. Click Go To > Deployment > OS Management > Software Modules. 2. 3. 4. 5. 6. From the contextual menu, click Add a new software. The Software wizard is displayed. Select A Windows Vista / 2008 / 7 software module, and click Next. Select A custom action on the target computer, and click Next. Select A WinPE 2.0 Ramdisk image for Vista/2008/7, and click Next. Specify the IP address of the computer on which you installed WAIK and the web interface extension.
IBM Tivoli Provisioning Manager Version 7.2.0.2 User Guide
288
7. Specify the location of the Windows Vista/2008/7 installation files (CD-ROM/DVD), and click Next. 8. Click Finish.
What to do next
The WinPE2 ramdisk software module is created. Now, you can bind it to the corresponding Windows Vista/2008/7 golden master or virtual images. Note: For Tivoli Provisioning Manager for Images virtual images, you do not need to create binding rules to bind the WinPE2 ramdisk software module to the Windows Vista/2008/7 virtual images. As long as you have the WinPE2 ramdisk image, Tivoli Provisioning Manager for Images can automatically find it and bind it for you.
Procedure
1. Log into the provisioning web interface. 2. Click Go To > Deployment > OS Management > OS Deployment Engines. Binding drivers: Before you begin Your WinPE deployment engine contains built-in drivers. Use them first. If you encounter problems with the built-in drivers, if some drivers are not bound, or if some drivers are missing, bind other drivers to your WinPE deployment engine. In this offline driver injection process, you can only bind drivers, to your WinPE deployment engine, that are driversoftware modules in your OS deployment server. You must therefore create driver software modules from the drivers that you want to bind to your WinPE deployment engine. The product helps you select appropriate drivers for particular target models. It helps you to predict potential problems and to solve them. It does not guarantee that a specific WinPE deployment engine, with bound drivers, works with a given target.
289
The information used by the OS deployment server to predict the compatibility of a driver with a target model is taken from the content provided by the vendor in its driver. The OS deployment server cannot verify the accuracy of this information. Procedure 1. Check the compatibility of your WinPE deployment engine. To view the details of the deployment engine, you have two options: v Double-click a deployment engine. v Select a deployment engine, and then select View engine details in the contextual menu. 2. Go to the section Network and mass storage drivers. A check is performed while the page is loading. This can take a few minutes. If drivers are missing, or are not bound, or if several drivers are bound for the same device, the following information is provided. Indicates a missing critical driver, or a critical driver of the wrong architecture. Indicates that a missing non-critical driver, or a non-critical driver of the wrong architecture. Indicates that a required driver is present on the OS deployment server, but that it is not bound. Indicates that there are several drivers bound for the same device, or that there is a binding with a driver that is not known as compatible. You can expand the line to get more information. v For drivers missing on the OS deployment server, you find a suggestion of where to look for it, including, if available, a download link and the exact directory within the downloaded archive where the driver can be found. v When drivers are present on the OS deployment server, you find suggestions of which driver to bind, in order of preference. If multiple drivers are known to possibly work for a device, the best choice is listed first. The choice is explained in the advice text, which first recommends the use of device-specific drivers, that is, drivers that have been specifically designed for the given hardware device. Then compatible device drivers, that match the device family, are recommended, even if they are not an exact rebranded variant (for example, as second choice, an Adaptec driver of the same family as an IBM ServerRaid adapter, if it is based on the same chipset). Finally, as third choice, generic drivers, for example, Microsoft generic AHCI driver for any AHCI controller, are recommended. If no error is found, you do not need to modify the bindings. 3. Modify the driver bindings of the WinPE deployment engine. Click Edit engine's driver bindings. There are two ways to perform this. v Use a wizard. a. Click Fix Drivers. b. Follow the instructions in the wizard. After having selected a target model, you must select one of these options: Automatically fix issues that can be fixed for this model. Fixes all issues that can be automatically fixed. Such issues include, for example, a missing binding to an existing driver, multiple bindings for a device, or removing a driver tagged for another operating system. Manually fix issues for this model. Presents you with each issue in turn. Ways to solve the issue, when available, are proposed. Automatically bind drivers for this model. Erases every existing binding. New bindings are then automatically added. Copy driver bindings for this model from a similar engine. Copies all the bindings from a selected source engine to the current engine.
290
Reset all drivers bindings for this model. Erases all the driver bindings, and does not create any new binding. v Edit the bindings manually, using the driver binding grid. Columns represent target models known to the OS deployment server and matching the patterns provided for the WinPE deployment engine. They can be expanded to view their network and mass storage devices, if a PCI inventory has been performed. The first line represents the WinPE deployment engine. Other lines represent software module folders in the OS deployment server. They can be expanded to view individual drivers. If a driver can be used only for 32-bit or 64-bit machines, a superscript x86 or x86-64 mark is written next to the driver name. If you do not find the drivers that you need in the list provided, create software modules for your drivers. a. (Optional) To obtain a summary of the errors and warnings, click the link provided above the grid. This helps you locate the problematic areas in the driver grid. b. Expand the columns of problematic target models to view the individual network and mass storage devices. c. Expand software module folders containing drivers to view the individual drivers.
A cell with a green background indicates that driver information corresponds to the device. The quality of the drivers that can be selected is illustrated by the intensity of the green background: the best drivers are in intense green, the family drivers are in standard green, and the generic drivers are in pale green. A cell with an orange background indicates either that the driver is not a PCI driver, or that there is no compatibility information available for the driver. indicates that the driver is bound to the WinPE deployment A cell with a green check mark engine for use with the specific target model and device. d. Click a green or orange background cell to add or remove bindings. It is not possible to bind or unbind drivers from the WinPE deployment engine itself, because they are built-in drivers.
Chapter 4. Deploying operating systems
291
You should have one, and only one, check mark per column, indicating that you have one and only one driver for each device. e. When you have finished modifying the bindings, click Save. f. To return to the Image details page, click Back. Potential problems with the image are recomputed, allowing you to check if your modifications have solved the detected problems. Results Existing WinPE deployment engines will be displayed. You can view engine details, create new deployment engines, and manage all engines in this application.
Procedure
1. Create a root directory on a volume with enough disk space. For instance: mkdir /export/install. 2. For each version of Solaris to be deployed by the OS deployment server, create a subdirectory of the root directory. For instance: mkdir /export/install/sol10. 3. Insert the appropriate installation CD-ROM or DVD-ROM. 4. Go to the CD-ROM/DVD-ROM directory, which is normally /cdrom/xxxxx where xxxxx is either cdrom0 (a symbolic link to the actual media directory) or media title such as sol_10_606_sparc. Note: A directory listing must show entries of the form s0, s1, s2, and so on. If the installation files are on multiple CD-ROMs, there is only one directory, s0. 5. Copy the content of the CD-ROMs/DVD-ROM into the Solaris installation server directory. a. Go to /cdrom/cdrom0/Solaris_10/Tools. b. Make sure you have at least 5 GB available, for instance under /export/install on your Solaris install server. c. Run ./setup_install_server -w /export/install/sol10-miniroot /export/install/sol10. This operation can take 15 to 30 minutes. d. (Optional) You can delete the sol10-miniroot directory and, if you already have your NFS install server elsewhere, the sol10 directory. Note: The paths given in the substeps are for a Solaris computer which hosts both the Solaris install server and the OS deployment server. These substeps must be performed at least once on an Solaris computer to create the miniroot file. This file can then be copied to any NFS shares. 6. Verify that NFS is started by making sure that nfsd is running. If needed, start /etc/init.d/rpc and start /etc/init.d/nfs.server (for Solaris).
292
7. Export and share the installation root directory as read-only for everyone, with root equivalence. On the Solaris install server, edit /etc/dfs/dfstab and add: share -F nfs -o ro,anon=0 /export/install. 8. Refresh shares with the command shareall. 9. Check that the export succeeded with the command showmount -e.
Results
You have now created the Solaris installation server directory, copied the appropriate content into it, and exported and shared the installation root directory as read-only.
What to do next
For the system profiles you intend to create from the files stored on the Solaris install server to be fully usable, you must: v Copy the files from the actual operating system version you want to create a profile for. If you want to deploy Solaris 10, then you must have the full content of the Solaris 10 CD-ROMs on you Solaris install server. Reusing files from another version might prevent proper OS deployment. v Use the latest available versions of the operating systems to ensure you have the most up to date fixes.
Procedure
1. Create an export directory for Flash Archives: mkdir /export/flars. 2. Share this new directory with read and write permissions: share F nfs o rw,anon=0 /export/flars.
Results
You have now created and shared a Solaris Flash archive directory.
Procedure
1. From the OpenBOOT monitor (Stop-A), type boot net:dhcp. To make this change permanent, type setenv boot-device net:dhcp. Then a simple boot command or restarting the system are enough to boot onto the provisioning server 2. To force a network boot from the operating system, use this command:
/usr/platform/sun4u/sbin/eeprom boot-device=net:dhcp /usr/sbin/reboot
3. Alternatively, you can force a single network boot by using the following special string, that is recognized by the bootstrap code of the provisioning server
/usr/platform/sun4u/sbin/eeprom boot-device="net:dhcp was: disk" /usr/sbin/reboot
Chapter 4. Deploying operating systems
293
Results
You have now configured a Solaris machines so you can have a network boot on it.
DHCP
For detailed information on Dynamic Host Configuration Protocol (DHCP) see DHCP server requirements and configuration on page 296. Note: Microsoft DHCP server does not work well with some PowerPC firmware. Use the IBM recommended DHCP servers.
Booting
For detailed information about bootingIBM System p and booting CellBlades, see Booting IBM System p and Booting CellBlades on page 295.
Procedure
v
AIX SUSE
1. Boot the target. 2. Type 1 to select SMS Menu. 3. Type 5 for Select Boot options. 4. Type 1 for Select Install/Boot Device. 5. Type 6 for Network. 6. Under Select device, select the network interface that you have registered in the OS deployment server. 7. Type 2 for Normal Mode Boot. 8. Type 1 (Yes) to confirm the above. v To install RedHat: 1. Boot the target. 2. Press 8 when booting to reach the Open Firmware prompt. 3. From an Open Firmware prompt, run boot net ks=http://<serverip>:<serverport>/linux/ks.cfg ksdevice=eth0 where <serverip> is the IP address of the OS deployment server, and <serverport> its port. Serverport is typically 8080.
Red Hat
294
Booting CellBlades
CellBlades can be booted on the OS deployment server. To boot on the OS deployment server:
Procedure
1. Boot the target. 2. Press 8 when booting to reach the Open Firmware prompt. 3. From an Open Firmware prompt, run boot net ks=http://<serverip>:<serverport>/linux/ks.cfg ksdevice=eth0 where <serverip> is the IP address of the OS deployment server, and <serverport> its port. Serverport is typically 8080.
Example
If the server IP is 192.168.1.25, and the server HTTP port is 8080, type the following line on the Open Firmware prompt:
boot net ks=http://192.168.1.25:8080/linux/ks.cfg ksdevice=eth0
295
To discover an OS deployment server: Attention: This discovery only discovers Tivoli Provisioning Manager for OS Deployment servers that were installed by Tivoli Provisioning Manager. It does not discover stand-alone Tivoli Provisioning Manager for OS Deployment servers.
Procedure
1. Click Go To > Discovery > Provisioning Discovery > Discovery Configurations. 2. Create a discovery configuration by clicking . 3. Specify a Name for your discovery configuration, select Software Discovery as the category, and TPMfOSD Installation Discovery as the Method, then click OK. 4. Your discovery configuration opens. In the Discovery Parameters section, specify the following information: Password The Java API password used for the Tivoli Provisioning Manager for OS Deployment installation. HTTP Server Port The HTTP server port that you specified for Tivoli Provisioning Manager for OS Deployment during installation. On Windows, the default value is 8080, and on UNIX, it is 8088. . 5. Click Save 6. Click Run Discovery. v If you need to discover your OS deployment server, select your Tivoli Provisioning Manager computer as your Target and click Submit. v If you need to discover images, select the computer where your OS deployment server is installed as your Target and click Submit.
Results
If you were searching for your OS deployment server, an object for it will now exist in the data model. If you need to discover images, the new images imported from the parent OS deployment server are in the Images page (Click Go To > Deployment > OS Management > Images. )
Requirements
There are no special product requirements for the DHCP server. If the DHCP server and the OS deployment server are running on the same target, the DHCP server must support the definition of the Class identifier DHCP option (option 60). Tivoli Provisioning Manager for OS Deployment can work with almost any RFC-compliant DHCP server, including Windows 2003 DHCP server, Windows 2000 DHCP server, ISC DHCP server, Solaris DHCP server, and the Netware 5 DHCP server. Note: 1. Because of the nature of PXE, you cannot run two PXE servers on the same computer. If you have installed another PXE boot tool such as Microsoft ADS, you must disable it before installing Tivoli Provisioning Manager for OS Deployment. 2. Microsoft DHCP server does not work well with some PowerPC firmware. If you have PowerPC targets in your environment, use an IBM recommended DHCP server.
296
Configuration
The DHCP server is used by the PXE bootrom to get its IP address and other basic networking information (including subnet mask, and default gateway). Using Tivoli Provisioning Manager for OS Deployment can require changes to your DHCP configuration. Typically, these changes can be performed automatically during the Tivoli Provisioning Manager for OS Deployment installation. However, in some cases, you might want to verify the changes, or perform them manually. You can configure your DHCP server for one of the following situations: v The DHCP server and the OS deployment server are not running on the same host. v The DHCP server and the OS deployment server are running on the same host. v You already have a PXE 2.0 infrastructure with PXE Boot Server discovery installed, and you want to add Tivoli Provisioning Manager for OS Deployment to the list of servers to discover. Note: v If you have previously configured your DHCP server for another PXE bootstrap, do not reuse your existing DHCP configuration. Remove DHCP options 43 and 60 for the hosts on which you want to run Tivoli Provisioning Manager for OS Deployment, and follow configuration instructions in this section. If you are running Tivoli Provisioning Manager for OS Deployment on the same computer as the DHCP server, you need to set option 60 again. v There are also cases where you must set both DHCP options 43 and 60, for example, when you have two different OS deployment servers.
Note: v If you have previously configured your DHCP server for another PXE bootstrap, do not reuse your existing DHCP configuration. Remove DHCP options 43 and 60 for the hosts on which you want to run Tivoli Provisioning Manager for OS Deployment, and follow the instructions given in this section. If you are running Tivoli Provisioning Manager for OS Deployment on the same host as the DHCP server, you need to set option 60 again. v There are also cases where you must set both DHCP options 43 and 60, for example, when you have two different OS deployment servers. Review the following information, select the case that suits your needs, and then perform the configuration steps. DHCP server and OS deployment server on different targets, with no information about the PXE server location Perform the following: v If DHCP options 43 and 60 are set, remove them. v If the DHCP server is not running on the same target as the OS deployment server, the DHCP configuration does not change. The OS deployment server detects DHCP packets sent over the network by PXE bootroms, and offers PXE parameters without disturbing the standard DHCP negotiation process. This behavior is called DHCPProxy.
297
DHCP server and OS deployment server on different targets, with information about the PXE server location Perform the following: v Set option 60 (Class identifier) to "PXEClient" to inform the target that the location of the PXE server is known. v Set option 43 to indicate that the PXE server does not reside on the same computer as the DHCP server, and to specify the location of the PXE server. DHCP server and OS deployment server on the same target Perform the following: v If DHCP option 43 is set, remove it. v Set option 60 (Class identifier) to "PXEClient" to inform the target that the location of the PXE server is known.
If you plan to run the DHCP server and the OS deployment server on the same target, you must instruct your DHCP server to send DHCP option 60 (Class identifier) to the targets. When option 60 is set to PXEClient, the DHCP server knows the location of the PXE server. If option 43 is not set, the PXE server has the same IP address as the DHCP server.
298
v The OS deployment server responds to all requests, including requests originating from unknown targets. v If the flag Completely ignore unknown targets is set for the server, it only responds to discovery requests originating from known targets. You can specify either the IP address or the Ethernet address in the target list. At this stage, the IP address of the remote-boot target is known.
299
# In the scope/host section: option dhcp-parameter-request-list 60,43; option vendor-class-identifier "PXEClient"; vendor-option-space PXE; option PXE.discovery-control 7; option PXE.boot-menu 15 5 "Rembo"; option PXE.menu-prompt 0 "Rembo";
Example: option 43 for PXE servers on different subnets: In this example, you have targets A and B boot on server 192.10.10.10, and targets C and D boot on server 192.10.11.10, which is on a different subnet (a valid gateway must be set up for C and D in order to locate the PXE server on a different subnet). Note: Server type 15 is translated into 00:0F in hexadecimal. IP address 192.10.10.10 is translated into C0:0A:0A:0A, and 192.10.11.10 is translated into C0:0A:0B:0A. Letters R and B are translated into 52 and 42. The following are the options that must be inserted in the binary buffer and their values: PXE option 6, length 1, value=07 Value 07 means use PXE_BOOT_SERVERS list, disable multicast and broadcast discovery. PXE option 8, length 7, value = 00:0F:01:C0:0A:0A:0A (targets A and B) Only one IP address is used, the address of the PXE server for the target which receives these DHCP options. PXE option 8, length 7, value = 00:0F:01:C0:0A:0B:0A (targets C and D) Only one IP address is used, the address of the PXE server for the target which receives these DHCP options. PXE option 9, length 5, value = 00:0F:02:52:42 There is only one line, displaying RB, and which goes to server type 15 (Tivoli Provisioning Manager for OS Deployment). PXE option A, length 2, value=00:52 The timeout is set to 0 seconds, meaning that one wants to boot using the first line of the boot menu, and the prompt is set to R. Because the timeout is 0, the prompt text is not displayed, but it must be at least one character long. PXE option FF This closes the buffer. The format of the binary buffer is similar to what is used for the DHCP packet itself. The buffer is a list of options, each option starting with its option number (one byte), followed by its length (one byte), and its value (a list of bytes). Here is the transcription of the above example, for targets A and B:
Option 43 = 06:01:07:08:07:00:0F:01:C0:0A:0A:0A:09:05:00:0F:02:52:42:0A:02:00:52:FF
Example: option 43 to create a PXE boot menu: The administrator wants to display two lines in the PXE boot menu, pointing to two separate OS deployment servers. The two servers must use different PXE server type numbers or they will be seen as one server only by the PXE network card.
300
In addition to the standard PXE server type 15, OS deployment servers accept any number between 33008 (80F0 in hexadecimal) and 33280 (8200 in hexadecimal). These new PXE server type numbers are used to differentiate multiple OS deployment servers in the BOOT_SERVERS sub-option of DHCP option 43. In this example, the first server has the address 192.168.1.4 (C0:A8:01:04 in hexadecimal), and the second server 192.168.1.5 (C0:A8:01:05 in hexadecimal). Procedure 1. Assign an OS deployment server type to each of the servers. OS deployment servers accept server type 15, and server types from 33008 to 33280. For this example, 33008 (80F0) is used for the first server, and 33009 (80F1) for the second server. 2. The suboptions of DHCP option 43 must then be configured as follows: PXE option 6, length 1, value=07 Value 07 means use PXE_BOOT_SERVERS list, disable multicast and broadcast discovery PXE option 8, length 14 (0E), value = 80:F0:01:C0:A8:01:04:80:F1:01:C0:A8:01:05 Option 8 defines the two PXE servers. The first server is defined by the first 7 bytes, starting with the OS deployment server type (80:F0, 33008), followed by one IP address: C0:A8:01:04 (192.168.1.4). The second server is defined as follows, using OS deployment server type 80:F1 (33009). PXE option 9, length 22 (16), value = 80:F0:08:53:65:72:76:65:82:20:41:80:F1:08:53:65:72:76:65:82:20:42 Option 9 defines the boot menu that is displayed at boot time. The first 11 bytes correspond to the first line, for the first server. It shows the string Server A, associated with type 80:F0 (first server). The second line shows the string Server B, associated with type 80:F1 (second server). PXE option 9, length 5, value = 00:0F:02:52:42 (targets C and D) Only one IP address is used, the address of the PXE server for the target which receives these DHCP options. PXE option A, length 6, value =0F:53:65:6C:65:63:74 Option 10 (0A) specifies a 15 second timeout and shows the string Select as the boot menu prompt. PXE option FF This closes the buffer The full option 43 reads as follows:
06:01:07:08:0E:80:F0:01:C0:A8:01:04:80:F1:01:C0:A8:01:05: 09:16:80:F0:08:53:65:72:76:65:82:20:41:80:F1:08:53:65:72:76:65:82:20:42: 0A:06:0F:53:65:6C:65:63:74:FF
301
When you use the image management, target computers are connected to the boot server during the start phase and begins installing the operating system through the network. The operating system is installed by using images created from the boot server. This tutorial uses Windows computers to describe image management but the same overall process applies to deployment on Linux on Intel computers.
Learning objectives
The learning objectives for the scenario are: v Learn how to capture an image and configure image properties. v Learn how to create a software module and binding it to an image. v Learn how to install an image.
Considerations
The Tivoli Provisioning Manager for OS Deployment Intel boot server sends PXE responses when there is DHCP traffic between the client computer and the DHCP server. A computer restarted for the first time since the Tivoli Provisioning Manager for OS Deployment boot server is installed is registered to Tivoli Provisioning Manager for OS Deployment with PXE boot option to start on hard-disk if idle. This option is set so that when a computer starts the Tivoli Provisioning Manager for OS Deployment boot server, if there are no pending activities, it starts from the hard disk drive. An isolated network is recommended for testing the Tivoli Provisioning Manager for OS Deployment boot server. An isolated network means that only the computers you are using for this test receives PXE responses from the Tivoli Provisioning Manager for OS Deployment. Consider the following before installing the Tivoli Provisioning Manager for OS Deployment boot server in your production network: v Are there other Intel boot servers deployed on the network? Is it necessary to check with the IT support group first? Both the Tivoli Provisioning Manager for OS Deployment and the other Intel boot server send PXE responses and might cause a conflict if the other Intel boot server has an imaging operation and the Tivoli Provisioning Manager for OS Deployment PXE response is received first to start from hard-disk. v Are there production or important Intel servers on the network that you do not want to interfere with the start by making sure that you have the correct Tivoli Provisioning Manager for OS Deployment configuration?
Prerequisites
Before you start, you need the following: v The Tivoli Provisioning Manager for OS Deployment automation package must be installed. It is installed by default during Tivoli Provisioning Manager installation. If you need to install it manually, see the Tivoli Provisioning Manager Installation Guide. v A DHCP server and a DNS server. For details about these requirements, see the Tivoli Provisioning Manager Installation Guide. The DHCP server is configured to reserve an IP address for the MAC address of the computers for capture and install image. Also, the Tivoli Provisioning Manager for OS Deployment computer, DHCP server, and Tivoli Provisioning Manager for OS Deployment server requires a static IP address assigned to them.
302
The network interface of the Tivoli Provisioning Manager computer does not have the attribute Dynamic IP address set and the IP address matches the DHCP reserved IP address. v A client computer to install the image on, and a computer for installing Tivoli Provisioning Manager for OS Deployment. For more information about the requirements for these computers, see Server system requirements on page 280 and Target system requirements on page 281. v Available ports. By default, the Tivoli Provisioning Manager for OS Deployment boot server uses the following ports for communication: DHCP: port 67 UDP PXE BINL: port 4011 UDP TFTP: port 69 UDP MTFTP: port 4015 UDP NBP: port 4012 UDP FILE: port 4013 UDP and TCP MCAST: port 10000-10500 UDP Address: 239.2.0.1 - 239.2.1.1 On the clients, the default ports are the following: DHCP: port 68 UDP MTFTP: port 8500-8510 UDP Address: 232.1.0.1 MCAST: port 9999 UDP Remote control (Web Interface Extension): port 4014 UDP These ports can all be modified, with one notable exception which is port 69 for TFTP. Port 69 is part of the PXE specifications, independently of the Tivoli Provisioning Manager for OS Deployment product and thus cannot be modified. Any product using PXE boot needs to have this port open to permit PXE boot. Note that this port needs to be open only on the Tivoli Provisioning Manager for OS Deployment boot server, not on the client machines. v Microsoft System Preparation tool (Sysprep). The Microsoft System Preparation file is a tool that helps you to automatically deploy images on multiple computers. Before you actually capture the image from the client computer, the capture image provisioning workflow copies and runs the Sysprep files to prepare the computer for cloning. The install image provisioning workflow uses Sysprep to personalize the target computer by setting Windows attributes. For all Windows platforms, before you proceed with the image capture, you can select the Sysprep check box to enable Tivoli Provisioning Manager to run Sysprep automatically, or you can clear the check box to run Sysprep yourself, manually. See the following options and the Preparing the reference computer on page 311 section for more information about preparing the reference computer:
Windows
Running Sysprep automatically By default, Tivoli Provisioning Manager can run Sysprep automatically on all Windows 2008, Windows 2008R2, Windows 7, and Windows Vista platforms. Running Sysprep manually For Windows platforms that are not supported by Tivoli Provisioning Manager, or if you would like to specify more parameters for running Sysprep, clear the Sysprep check box and then run Sysprep yourself.
303
There are a number of differences between an unattended installation and disk cloning. Creating an unattended installation typically involves creating the image from reference media such as an installation CD. All of the necessary tasks are performed on the server, using the Web interface. In contrast, a captured image requires you to configure a target, prepare it for capture. In this part, you will learn how to: v Synchronize images v Create an unattended setup image v Add an existing Windows WIM or Solaris Flash archive image to the database so that you can manage and deploy it. v Capture a Windows or Linux image v Create a Point-In-Time snapshot The BIOS startup sequence of the computer you capture the image from must first have network and then hard disk for this install task to complete successfully.
Synchronizing images
The Provisioning Configuration Librarian runs an image synchronization periodically, to update the Tivoli Provisioning Manager data model with the latest Tivoli Provisioning Manager for OS Deployment images (golden master, point-in-time snapshot, hardware configuration, unattended setup) or Tivoli Provisioning Manager for Images virtual images. The image synchronization discovers Tivoli Provisioning Manager for OS Deployment images or snapshots of Tivoli Provisioning Manager for Images virtual images and creates image objects for them in the Tivoli Provisioning Manager data model. Once discovered, these images can then be deployed to virtual or physical machines. To synchronize images:
Procedure
1. Click Go To > Deployment > OS Management > Images. 2. Click Select Action > Tivoli Provisioning Manager for OS Deployment > Synchronize images with the boot server. The Provisioning Task Tracking application displays the current status of the task. When the provisioning task has started, you can monitor its progress on this page. From the Select Action menu, click Refresh to update the page.
Results
All the images are now discovered in Tivoli Provisioning Manager, and image objects are added to the data model for them. Note: Before deployment, all imported or discovered virtual images must have SAP and credential information added, so that they can be used on the target computers. For more information, see Adding credentials to virtual images on page 430
304
Vista
2008
v To create an unattended Windows Vista or Windows 2008 image, you must be using a source computer (that is, the computer that contains the OS media you are going to create an image from) with a 32-bit architecture running the web interface extension under one of the following operating systems: Windows Windows Windows Windows 2003 XP Vista 2008
Creating this type of image is not possible on a Windows 2000 operating system. You can, however, use any kind of machine (for example, a Linux operating system machine) to actually create the unattended setup image as long as Tivoli Provisioning Manager for OS Deployment is installed on it. The source computer only needs the web interface extension on it. For instructions on how to manually install the web interface extension see: Installing and uninstalling the web interface extension on page 384 v The web interface extension must be started with local administrator privileges. When you create a hardware environment, the web interface extension must be running from the command line instead of as a Windows service. If you are running the web interface extension as a Windows service, perform the following steps to run it from the command line: 1. At the command line, run the following command to stop the service:
net stop remboagent
2. Change to the Tivoli Provisioning Manager for OS Deployment directory for the web interface extension. The default location is C:\Program Files\Common Files\IBM Tivoli 3. Run the following command to run the web interface extension from the command line:
rbagent -d
v Creating an unattended Windows Vista or Windows 2008 installation image is possible only for users that have separately obtained the MicrosoftWindows Automated Imaging Kit (WAIK) 32-bit and installed it on the computer running the Web interface extension. Reboot your computer after installing the WAIK. The WAIK is licensed to you by the code's owner and not by IBM. v Creating an unattended Windows Vista or Windows 2008 installation image with multiple CD-ROMs is not supported. You are required to use a single DVD-ROM. v You can prepare your image to be ready for Microsoft BitLocker Drive Encryption (BitLocker). You must have at least two partitions: A partition of at least 1.5 GB is necessary to hold BitLocker and to server as a boot partition A second partition holds the operating system Depending on the number of partitions already created, the Profile Wizard offers to reserve one of the existing partitions for BitLocker, or to create a new one.
2003 The Windows 2003 R2 operating system is distributed on two CD-ROMs. To create a fully deployable unattended image of Windows 2003 R2, you must: 1. Create an image using the first CD-ROM only, following the steps in the wizard; 2. Create a software module with the content of the second CD-ROM (see Creating a software module for unattended deployment of Windows 2003 R2 on page 343). 3. Bind this software module (with an automatic binding rule) to the image you just created (see Automatic binding rules on page 347).
To create an unattended setup image: 1. Click Go To > Deployment > OS Management > Unattended Setup Image. 2. Select Unattended setup in the first pane of the wizard and click Next. 3. Select your operating system from the list and click Next.
Chapter 4. Deploying operating systems
305
4. Follow the instructions of the wizard. Note: Do not close the browser when the image is being uploaded. If you do, the upload might be cancelled. 5. You will have to choose the computer where the material to create your unattended setup image can be found and this computer must have the web interface extension installed on it. The web interface extension is automatically installed on all Tivoli Provisioning Manager for OS Deployment servers, however, only the web interface extension on the parent server can be detected. If you have changed the parent server, or you are trying to work with a child server, you must manually install the web interface extension on the source computer before it can be detected. For information on how to do this, see Installing an uninstalling the Web interface extension. You have now created an unattended setup image for Windows. When the wizard closes, the Tasks view will open, and a workflow that discovers the newly created image is run. Note: If the wizard does not exit properly (for example, the browser times out instead of you clicking Finish), the image is still created, but the workflow that discovers the image is not run. In order to discover your images, you must create and run a discovery configuration against your parent OS deployment server: Discovering an OS deployment server on page 295. When your first unattended installation image is created, you can use it to deploy targets. Note: If you want to modify the browser timeout value, follow these steps: Changing the automatic logoff setting. Creating an unattended setup for AIX: An unattended setup allows you to install operating systems using standard installation processes in unattended mode. To create an AIX unattended setup, you must work on an AIX operating system of the same version as the image you want to create. 1. Copy the AIX installation CD-ROM or DVD-ROM on the hard disk. 2. Export the path of the folder in which you have copied the installation files by NFS. This folder must have write permissions. a. Verify that NFS is already running by typing the command lssrc -g nfs. The output must indicate that the nfsd and the rpc.mountd daemons are active. If they are not, you must start the NFS daemons. b. At a command line, enter smit mknfsexp. c. Specify appropriate values in the fields: Pathname of directory to export Mode to export directory, and Export directory now, system restart or both. d. Specify any other optional characteristics you want, or accept the default values by leaving the remaining fields as they are. e. When you have finished making your changes, SMIT updates the /etc/exports file. If the /etc/exports file does not exist, it is created. 3. 4. 5. 6. f. Repeat steps a through e for each directory you want to export. Click Go To > Deployment > OS Management > Unattended Setup Image. Select Unattended setup in the first pane of the wizard and click Next. Select your operating system from the list and click Next. Follow the instructions of the wizard.
306
Note: Do not close the browser when the image is being uploaded. If you do, the upload might be cancelled. You have now created an unattended setup image for AIX. When the wizard closes, the Tasks view will open, and a workflow that discovers the newly created image is run. Note: If the wizard does not exit properly (for example, the browser times out instead of you clicking Finish), the image is still created, but the workflow that discovers the image is not run. In order to discover your images, you must create and run a discovery configuration against your parent OS deployment server: Discovering an OS deployment server on page 295. When your first unattended installation image is created, you can use it to deploy targets. Note: If you want to modify the browser timeout value, follow these steps: Changing the automatic logoff setting. Although the all the files on the installation media were necessary for the image creation, only some are needed at deployment time. If you want to delete superfluous files, make sure NFS_install points to Install/PPC. You can then delete the content of other installation directories. Creating an unattended setup for Linux on Intel: To create an unattended setup image: 1. Click Go To > Deployment > OS Management > Unattended Setup Image. 2. Select Unattended setup in the first pane of the wizard and click Next. 3. Select your operating system from the list and click Next. 4. Follow the instructions of the wizard. Note: Do not close the browser when the image is being uploaded. If you do, the upload might be cancelled. 5. You will have to choose the computer where the material to create your unattended setup image can be found and this computer must have the web interface extension installed on it. The web interface extension is automatically installed on all Tivoli Provisioning Manager for OS Deployment servers, however, only the web interface extension on the parent server can be detected. If you have changed the parent server, or you are trying to work with a child server, you must manually install the web interface extension on the source computer before it can be detected. For information on how to do this, see Installing an uninstalling the Web interface extension. You have now created an unattended setup image for Linux on Intel. When the wizard closes, the Tasks view will open, and a workflow that discovers the newly created image is run. Note: If the wizard does not exit properly (for example, the browser times out instead of you clicking Finish), the image is still created, but the workflow that discovers the image is not run. In order to discover your images, you must create and run a discovery configuration against your parent OS deployment server: Discovering an OS deployment server on page 295. When your first unattended installation image is created, you can use it to deploy targets. Note: If you want to modify the browser timeout value, follow these steps: Changing the automatic logoff setting.
307
Creating an unattended setup image for Linux on PowerPC: To create an unattended setup image: 1. 2. 3. 4. Click Go To > Deployment > OS Management > Unattended Setup Image. Select Unattended setup in the first pane of the wizard and click Next. Select your operating system from the list and click Next. Follow the instructions of the wizard.
Note: Do not close the browser when the image is being uploaded. If you do, the upload might be cancelled. 5. You will have to choose the computer where the material to create your unattended setup image can be found and this computer must have the web interface extension installed on it. The web interface extension is automatically installed on all Tivoli Provisioning Manager for OS Deployment servers, however, only the web interface extension on the parent server can be detected. If you have changed the parent server, or you are trying to work with a child server, you must manually install the web interface extension on the source computer before it can be detected. For information on how to do this, see Installing an uninstalling the Web interface extension. You have now created an unattended setup image for Linux on PowerPC. When the wizard closes, the Tasks view will open, and a workflow that discovers the newly created image is run. Note: If the wizard does not exit properly (for example, the browser times out instead of you clicking Finish), the image is still created, but the workflow that discovers the image is not run. In order to discover your images, you must create and run a discovery configuration against your parent OS deployment server: Discovering an OS deployment server on page 295. When your first unattended installation image is created, you can use it to deploy targets. Note: If you want to modify the browser timeout value, follow these steps: Changing the automatic logoff setting. Creating an unattended setup image for Solaris: For Solaris 9, unattended setup is only supported if you are creating your unattended setup image from a Solaris flash archive. For instructions on how to do this, see: Creating an unattended setup image from a Solaris Flash archive on page 310. To create an unattended setup image: 1. Click Go To > Deployment > OS Management > Unattended Setup Image. 2. Select Unattended setup in the first pane of the wizard and click Next. 3. Select your operating system from the list and click Next. 4. Follow the instructions of the wizard. Note: Do not close the browser when the image is being uploaded. If you do, the upload might be cancelled. 5. You will have to choose the computer where the material to create your unattended setup image can be found and this computer must have the web interface extension installed on it. The web interface extension is automatically installed on all Tivoli Provisioning Manager for OS Deployment servers, however, only the web interface extension on the parent server can be detected. If you have changed the parent server, or you are trying to work with a child server, you must manually install the web interface extension on the source computer before it can be detected. For information on how to do this, see Installing an uninstalling the Web interface extension.
308
You have now created an unattended setup image for Solaris. When the wizard closes, the Tasks view will open, and a workflow that discovers the newly created image is run. Note: If the wizard does not exit properly (for example, the browser times out instead of you clicking Finish), the image is still created, but the workflow that discovers the image is not run. In order to discover your images, you must create and run a discovery configuration against your parent OS deployment server: Discovering an OS deployment server on page 295. When the wizard for a Solaris unattended installation completes, it automatically makes changes to the boot system under /export/install/solxx/Solaris_xx/Tools/Boot (where xx depends on your version of Solaris) to use autoconfiguration. However, the boot system remains fully compatible with the standard Solaris installation process. Any installation not started with rembo.fcode as the boot file name behaves in the traditional Solaris way. When your first unattended installation image is created, you can use it to deploy targets. Note: If you want to modify the browser timeout value, follow these steps: Changing the automatic logoff setting. Creating an unattended setup for VMWare ESX 3.5: To create a unattended setup image for VMWare ESX 3.5, you must download the binary entitled ESX Server 3.5 Update 2 CD image (596 MB). Creating the image from ESX Server 3i U2 Installable (238 MB) will result in a failed deployment. To create an unattended setup image: 1. Click Go To > Deployment > OS Management > Unattended Setup Image. 2. Select Unattended setup in the first pane of the wizard and click Next. 3. Select your operating system from the list and click Next. 4. Follow the instructions of the wizard. Note: Do not close the browser when the image is being uploaded. If you do, the upload might be cancelled. 5. You will have to choose the computer where the material to create your unattended setup image can be found and this computer must have the web interface extension installed on it. The web interface extension is automatically installed on all Tivoli Provisioning Manager for OS Deployment servers, however, only the web interface extension on the parent server can be detected. If you have changed the parent server, or you are trying to work with a child server, you must manually install the web interface extension on the source computer before it can be detected. For information on how to do this, see Installing an uninstalling the Web interface extension. You have now created an unattended setup image for VMWare ESX 3.5. When the wizard closes, the Tasks view will open, and a workflow that discovers the newly created image is run. Note: If the wizard does not exit properly (for example, the browser times out instead of you clicking Finish), the image is still created, but the workflow that discovers the image is not run. In order to discover your images, you must create and run a discovery configuration against your parent OS deployment server: Discovering an OS deployment server on page 295. When your first unattended installation image is created, you can use it to deploy targets.
309
Note: If you want to modify the browser timeout value, follow these steps: Changing the automatic logoff setting. Creating an unattended setup image from a Windows Imaging Format (WIM) image: Windows Imaging Format (WIM) is a file-based disk image format. It can be used to deploy Windows operating systems. You can use the Create Unattended Setup Image wizard to create a WIM image using Tivoli Provisioning Manager for OS Deployment. v To add a Windows WIM image, you must be using a computer with a 32-bit architecture running the web interface extension under Windows XP, Windows 2003, Windows Vista or Windows 2008. The web interface extension must be started with local administrator privileges. Creating this type of image is not possible on Windows 2000. v To deploy a Windows WIM image, a WinPE 32-bit software module, with the same build number as the Windows WIM image, is mandatory. You must bind the software module to your Windows Vista or Windows 2008 profile. If you do not have an WinPE software module on your provisioning server, the profiles wizard guides you to create one now. See Creating a software module for custom actions on Windows on page 341 to create the required software module at a later time. v Creating a Windows WIM image is possible only for users that have separately obtained the Microsoft Windows Automated Imaging Kit (WAIK) 32-bit and installed it on the computer running the web interface extension. The WAIK is licensed to you by the code's owner and not by IBM. v Creating an unattended setup image from a Windows WIM image stored on multiple CD-ROMs is not supported. You are required to use a single DVD-ROM. v You can prepare your profile to be ready for Microsoft BitLocker Drive Encryption (BitLocker). You must have at least two partitions: A partition of at least 1.5 GB is necessary to hold BitLocker and to serve as a boot partition A second partition holds the operating system Depending on the number of partitions already created, the unattended setup wizard offers to reserve one of the existing partitions for BitLocker, or to create a new one. To create an image: 1. Click Go To > Deployment > OS Management > Unattended Setup Image. 2. Select Cloning from a reference image file and click Next. 3. Select Windows Vista/2008 WIM image and click Next. 4. Follow the instruction of the wizard. 5. You will have to choose the computer where the material to create your unattended setup image can be found and this computer must have the web interface extension installed on it. The web interface extension is automatically installed on all Tivoli Provisioning Manager for OS Deployment servers, however, only the web interface extension on the parent server can be detected. If you have changed the parent server, or you are trying to work with a child server, you must manually install the web interface extension on the source computer before it can be detected. For information on how to do this, see Installing an uninstalling the Web interface extension. You have now created an unattended setup image from a WIM image. When the wizard closes, the Tasks view will open, and a workflow that discovers the newly created image is run. Note: If the wizard does not exit properly (for example, the browser times out instead of you clicking Finish), the image is still created, but the workflow that discovers the image is not run. In order to discover your images, you must create and run a discovery configuration against your parent OS deployment server: Discovering an OS deployment server on page 295. Creating an unattended setup image from a Solaris Flash archive:
310
You can create an image from a Solaris Flash archive (a file with a .flar extension). To be able to create your image, you need a Solaris Flash archive on your NFS server and the complete installation files for a Solaris operating system. When you create an image, you will be prompted for the directory in which the operating system installation files are located. The wizard checks for the .cdtoc hidden file before asking you for the exact location of the Flash Archive you want to use for your image. Note: There might be installation specific issues with Flash archives. In particular, some symbolic links might prevent flash archives to be restored properly. As a workaround, remove the symbolic links and copy the actual files in the appropriate directory. Although Tivoli Provisioning Manager for OS Deployment is not involved in the creation of Flash archives, the process is described for convenience. For more information, refer to SUN Solaris documentation. 1. Mount the flash archive directory on the install server. a. Create a local mount point, a directory that you can reference locally.
mkdir /export/flash
3. Restart the computer to make sure that all unnecessary file handles are closed. 4. Check that the new flash archive is created and sent to the Flash directory of the Solaris install server. To create an image: 1. Click Go To > Deployment > OS Management > Unattended Setup Image. 2. Select Cloning from a reference image file and click Next. 3. Select Solaris Flash Archive and click Next. 4. Follow the instruction of the wizard. You have now created an unattended setup image from a Solaris Flash archive. When the wizard closes, the Tasks view will open, and a workflow that discovers the newly created image is run. Note: If the wizard does not exit properly (for example, the browser times out instead of you clicking Finish), the image is still created, but the workflow that discovers the image is not run. In order to discover your images, you must create and run a discovery configuration against your parent OS deployment server: Discovering an OS deployment server on page 295.
311
You must perform this task directly on the source computer that you are using to capture the image. v Delete the temporary Internet cache. v Delete temporary directories and files. v Disconnect network drives and remote printers. v Empty the recycle bin. v If necessary, partition the hard disk or format partitions. When partitioning your hard disk, ensure that there is enough space to store its temporary image files when it is deploying an image. If you ensure that the last partition of your hard disk is at least 1 GB in size, or if you leave a similar amount of free (unpartitioned) space at the end of your hard disk, you must have enough space. Tivoli Provisioning Manager for OS Deployment can store temporary files in both the unpartitioned space at the end of the hard disk and the free space at the end of the last partition. The sum of these areas must be large enough for storing all partition images that will be deployed at the same time on the target computer and must typically be about half of the size of the data on the hard disk (for example, 1 GB if your OS partition contains about 2 GB of data). Additional Windows requirements Sysprep must be run (automatically or manually) for all Windows platforms before an image capture. For more information about this task, see Windows Microsoft System Preparation tool (Sysprep) in Running Sysprep automatically. Linux considerations When preparing a Linux image, there are two main issues: the space for the temporary cache partition and the bootloader. You must ensure that the partitioning scheme provides enough space for the temporary cache partition during deployment. The sum of the space in the last partition and the unpartitioned space must be large enough to hold all partition images. This is the case most of the time, except with a few distributions that put the Linux swap partition at the end of the disk by default. Ensure that your swap partition is not at the end of the disk when preparing a Linux image. The Linux bootloader is also important. Tivoli Provisioning Manager for OS Deployment supports only Grand Unified Bootloader (GNU GRUB). You can install GRUB on the bootsector of the Linux /boot partition or on the root partition. If you plan to use redeployment, it is mandatory to install GRUB in the boot sector of the Linux /boot partition. To start your system correctly with GRUB, ensure that you have a standard MBR on the disk, with the boot partition flagged as bootable. For creating a golden master image, Tivoli Provisioning Manager for OS Deployment automatically installs and runs its own system preparation tool, LinPrep. Running Sysprep automatically: For all Windows platforms, before you proceed with the image capture, you can select the Sysprep check box to enable Tivoli Provisioning Manager to run Sysprep automatically, or you can clear the check box to run Sysprep yourself, manually. By default, Tivoli Provisioning Manager can run Sysprep automatically on all Windows 2008, Windows 2008R2, Windows 7, and Windows Vista platforms. To enable Tivoli Provisioning Manager to run Sysprep automatically on all Windows platforms other than Windows 2008, Windows 2008R2, Windows 7, and Windows Vista, you must first manually copy over the Microsoft Sysprep files to the Tivoli Provisioning Manager repository. The Sysprep tool is located on your Windows version CD-ROM in the Support\Tools\deploy.cab file. A version can also be downloaded for free from the Microsoft Web site. Use the latest service pack level of the operating system release you use. For example, if you have Windows Server 2003 SP1 and SP2
312
computers, then use Sysprep for Windows Server 2003 SP2, if available from Microsoft. After you have found the tool, extract the cab file and place the files sysprep.exe, and setupcl.exe into the %TIO_HOME%/repository/windows-operating-system/Windows_subdirectory. The Windows_subdirectory file name includes the operating system that you are using and the appropriate bit size (32-bit or 64-bit): v win2k/32-bit: Windows 2000 32-bit v win2k/64-bit: Windows 2000 64-bit v win2k3/32-bit: Windows 2003 32-bit v win2k3/64-bit: Windows 2003 64-bit v winxp/32-bit: Windows XP 32-bit v winxp/64-bit: Windows XP 64-bit Note: Check the sizes of files sysprep.exe and setupcl.exe in the Tivoli Provisioning Manager repository subdirectories of win2k, win2k3, and winxp against the source location where you copied these files from. If the incorrect Windows operating system release of these files are copied into a subdirectory, then Sysprep fails to run during capture image with no restarting of the computer for Tivoli Provisioning Manager for OS Deployment to start capturing the image. Running Sysprep on Windows Vista and Windows 2008: Before capturing your image, run Sysprep to prepare the reference computer. Tivoli Provisioning Manager for OS Deployment works with Sysprep to automate the post-cloning reconfiguration. Sysprep cannot be used on targets that are part of a domain. The system profile image must be made on a target that does not belong to a domain. Even if your operating system was part of the domain before you launched Sysprep, Sysprep removes it from the domain. Later, you can automatically join a domain during the deployment process. Before running Sysprep, you must configure your target to use DHCP. If your target uses a static IP address, you have a high risk IP conflicts when the target boots for the first time and it has not yet applied all Sysprep settings. With Windows Vista and Windows 2008, you can run Microsoft System Preparation Tool (Sysprep) on the operating system only three times. After that, the Sysprep tool refuses to start, therefore always start from your original reference image. To work around this issue, you can also use a virtual machine. Sysprep is available on every installed Windows Vista and Windows 2008 operating system. The Sysprep executable file is archived in c:\windows\system32\sysprep\sysprep.exe. To start the Sysprep process, follow these instructions: Important: Tivoli Provisioning Manager for OS Deployment provides a fully automated solution to capture Windows Vista and Windows 2008 images from a reference computer. However, due to various problems in the Sysprep tool, the Tivoli Provisioning Manager for OS Deployment automation package cannot provide a reliable solution to restore an OS configuration to its original state on a reference computer. Since a minimal set of configuration parameters are used inside a sysprep response file, the OS configuration might change on a reference computer. If the OS configuration changes system administrators must manually restore various settings such as: v Network configuration v Domain membership v Windows Firewall configuration v Microsoft Update v Microsoft AntiSpyware tools v User profiles
Chapter 4. Deploying operating systems
313
Configuration of virtual network adapters, virtual drives, and network shares might also be affected by the sysprep tool. Creating a backup of these configurations is highly recommended. 1. Log on as a user with administrator privileges. 2. Close any open applications and type the run command in the Windows Vista or Windows 2008 Start Search command prompt. 3. When the run command prompt opens, browse to the Sysprep executable file and click OK. A System Preparation Tool page opens. 4. 5. 6. 7. From the System Cleanup action menu, select Enter System Out-of-Box Experience (OOBE). Select the Generalize check box. From the Shutdown Options menu, select Shutdown. Click OK. After a few seconds, your system shuts down automatically. Alternatively, you can specify these options when launching Sysprep from the command line prompt by running the command: c:\windows\system32\sysprep\sysprep.exe /oobe /generalize /shutdown. Note: v Sysprep can also be used in audit mode. In audit mode, when the user first boots the deployed machine, the boot process does an Out-Of-Box Experience (OOBE) stage which finalizes the OS configuration taking connected peripherals into account. This OOBE stage takes about 10 minutes. If Sysprep is used in OOBE mode, this stage is performed during deployment without significantly increasing the deployment time. v It is possible to have a partition dedicated to Microsoft BitLocker Drive Encryption (BitLocker). If the reference computer you are cloning is BitLocker ready, running Sysprep prevents it to boot anymore.Tivoli Provisioning Manager for OS Deployment can correct this error and allow the computer to boot again by assigning the operating system partition as boot partition. However, if you want to use BitLocker on the reference target afterward, you need to manually change the boot partition back to the BitLocker partition. Tivoli Provisioning Manager for OS deployment properly configures boot and root partitions on deployed computers. Thus, computers deployed with an image cloned from a BitLocker ready computer are perfectly bootable and BitLocker ready. If the reference computer is not BitLocker ready, running Sysprep does not raise any difficulty. With the Profile Wizard, you can make the cloned image BitLocker ready by assigning or creating a BitLocker partition of at least 1.5 GB. Running Sysprep on Windows XP and Windows 2003: Before capturing your image, run Sysprep to prepare the reference computer. Tivoli Provisioning Manager for OS Deployment works with Sysprep to automate the post-cloning reconfiguration. Sysprep cannot be used on targets that are part of a domain. The system profile image must be made on a target that does not belong to a domain. Even if your operating system was part of the domain before you launched Sysprep, Sysprep removes it from the domain. Later, you can automatically join a domain during the deployment process. Before running Sysprep, you must configure your target to use DHCP. If your target uses a static IP address, you have a high risk IP conflicts when the target boots for the first time and it has not yet applied all Sysprep settings. Depending on how Windows was installed, you might never have logged on as an administrator. If this is the case, log out and log in again as an administrator to ensure that the administrator profile is correctly created. Otherwise, you might not be able to create system snapshots affecting the administrator settings.
314
Sysprep for Windows XP is included on the Windows XP Professional CD-ROM, and archived in the file \Support\Tools\Deploy.cab. To 1. 2. 3. run Sysprep: Copy the Sysprep executable files into a folder named c:\sysprep. Close all your applications. Run the command c:\sysprep\sysprep.exe -mini -forceshutdown -reseal from the Start > Run menu. Alternatively, you can start Sysprep with a graphical user interface by double-clicking on its icon a. Make sure that Mini Setup is checked b. Click Reseal. Your system shuts down automatically after a few seconds. Running Sysprep on Windows 2000: Before capturing your image, run Sysprep to prepare the reference computer. Tivoli Provisioning Manager for OS Deployment works with Sysprep to automate the post-cloning reconfiguration. Sysprep cannot be used on targets that are part of a domain. The system profile image must be made on a target that does not belong to a domain. Even if your operating system was part of the domain before you launched Sysprep, Sysprep removes it from the domain. Later, you can automatically join a domain during the deployment process. Before running Sysprep, you must configure your target to use DHCP. If your target uses a static IP address, you have a high risk IP conflicts when the target boots for the first time and it has not yet applied all Sysprep settings. Sysprep for Windows 2000 is included in Windows 2000 Resource Kit, and is also available for free on the Microsoft Web site. 1. Copy the Sysprep executable files into a folder named c:\sysprep. 2. Close all your applications. 3. Run the command sysprep.exe from the Start > Run menu. Your system shuts down automatically after a few seconds (if it does not, wait a minute or so and then turn it off). Capturing a golden master image: After you have prepared the reference computer, you can capture the image. If the computer that you are capturing the image from does not have the following settings, the capture image provisioning task will fail: v Ensure that the network interface with Dynamic IP Address set has the computer name in DNS, so that the Tivoli Provisioning Manager computer will find the IP address from the DNS server. v The BIOS startup sequence must first have network and then hard disk for this computer. v Ensure that Tivoli Provisioning Manager can manage the target computer (it has credentials and can execute commands) and that the target computer is running. Tivoli Provisioning Manager will restart the target computer. The target computer must be set to boot from the network and it will PXE boot off the Tivoli Provisioning Manager for OS Deployment server. For details, see Network resource discovery on page 154 and Tivoli Provisioning Manager for OS Deployment overview on page 264. Note: v Image capture is not supported on VMWare ESX, AIX, or Linux PPC.
315
v Image capture is also not supported for Solaris computers. Instead, you must create a Flash archive and then create an unattended setup installation using the Flash archive. Creating an unattended setup image from a Solaris Flash archive on page 310 v To prevent errors during the common agent installation on the target machine, ensure that the common agent is not installed and the Tivoli GUID is removed from the computer that you are capturing the image from. For details, see Uninstalling the common agent on page 669. Sysprep must be run (automatically or manually) for all Windows platforms before an image capture. For more information about this task, see Windows Microsoft System Preparation tool (Sysprep) in Tutorial: Managing operating systems on page 301. 1. Click Go To > Deployment > OS Management > Image Capture. 2. In the Task field, specify a description for the provisioning task for the capture. 3. In the Source Computer field, specify your source computer to capture the image from. 4. If required, adjust the timeout period for connecting with a target computer. 5. In the Boot Server Type field, specify TPMfOSd as the boot server technology that you are using to capture the image. Additional fields are displayed. 6. In the Image Details, section specify the following information: a. In the Image field, specify a name for the image. b. Type a description for the image next to the Image field. c. In the Image Type field, select Golden Master. Note: If Tivoli Provisioning Manager for OS Deployment has been upgraded to Tivoli Provisioning Manager for Images, a new type of virtual image, TPM for Images Virtual Image, is available. 7. By default, the image capture process will be started as soon as you submit the provisioning task. If you want to schedule the capture for a specific date or time, click Schedule and specify the date and time. 8. Click Submit to confirm your settings. The Provisioning Task Tracking application displays the current status of the task. When the provisioning task has started, you can monitor its progress on this page. From the Select Action menu, click Refresh to update the page. The image has now been captured. You can now prepare the computer that you will install this image on and then install the captured image. If you want to view the image that you have just captured: Click Go To > Deployment > OS Management > Images. Search for the image name.
316
v Point-In-Time snapshots are only supported on Windows. v The Point-In-Time snapshot does not run or use Sysprep. v Point-In-Time snapshots are limited in the amount of data they can handle. They might fail for machines with large amounts of data (for example, database servers). v Point-In-Time snapshots do not scale well. We do not recommend you use them to back up several computers or a data center. To capture a system snapshot: 1. Click Go To > Deployment > OS Management > Image Capture. 2. In the Task field, specify a description for the provisioning task for the capture. 3. In the Source Computer field, specify your source computer to capture the image from. 4. If required, adjust the timeout period for connecting with a target computer. 5. In the Boot Server Type field, specify TPMfOSd as the boot server technology that you are using to capture the image. Additional fields are displayed. 6. In the Image Details, section specify the following information: a. In the Image field, specify a name for the image. b. Type a description for the image next to the Image field. c. In the Image Type field, select Point-In-Time Snapshot. 7. By default, the image capture process will be started as soon as you submit the provisioning task. If you want to schedule the capture for a specific date or time, click Schedule and specify the date and time. 8. Click Submit to confirm your settings. The Provisioning Task Tracking application displays the current status of the task. When the provisioning task has started, you can monitor its progress on this page. From the Select Action menu, click Refresh to update the page. The Point-In-Time snapshot has now been captured. If you need to restore the image, you can deploy it to the same computer that you captured it from. If you want to view the image that you have just captured: Click Go To > Deployment > OS Management > Images. Search for the image name.
317
5. The ramdisk reboots 6. Tivoli Provisioning Manager for OS Deployment resumes the deployment sequence if any was selected, but hardware configuration can also be run as a separate task There are four types of hardware configuration available: RAID configuration A generic configuration wizard allows you to create the RAID configuration regardless of the vendor, Tivoli Provisioning Manager for OS Deployment builds the specific file. BIOS update Allows you to update the BIOS firmware on the target. BIOS settings Allows you to update the BIOS or BMC (baseboard management controller) settings through an initialization file. Hardware custom configuration Allows you to perform your own configuration, based on tools and a command to be applied to them. Environment overview: To launch hardware configurations, you need to set up a vendor-specific environment containing the related scripting toolkit tools and the necessary drivers to run correctly (for example, network connectivity) on the target. Three environments are supported: v Scripts and tools running in DOS v Scripts and tools running in WinPE 1.x v Scripts and tools running in WinPE 2.x Every environment is very specific to its vendor, and must be prepared with the suitable drivers and scripting toolkit tools. An environment is installed on a target, or possibly run as a ramdisk. However, an environment by itself is not able to perform hardware configurations (RAID configuration, BIOS settings, and so on). It needs to contain drivers and tools for the required configuration changes. When creating a complete environment with OS deployment server, you associate the environment files for one of the three types of environments, with the tools and drivers enabling it to perform hardware configurations on a specific set of target models. Once the hardware configuration is performed, any environment file on the target is written over during the operating system deployment phase, leaving no trace of the environment on the target. Creating a hardware environment: Hardware environments allow you to perform hardware configurations on targets. Before you can create your environment with the wizard, you must prepare the files on the OS deployment server. The provided instructions explain how to prepare files using scripting toolkits for either IBM, Dell, or HP products. It is recommended that you download the latest WinPE2.x compatible scripting tool environments and use the instructions below for that version. However, the instructions for WinPE1.x and DOS are also provided.
318
A hardware environment uses the Windows Imaging Format (WIM). The following limitations of WIM apply: v You must be using a computer with a 32-bit architecture running the web interface extension under Windows XP, Windows 2003, Windows Vista or Windows 2008. Windows 2000 is not supported. v The web interface extension must be started with local administrator privileges. When you create a hardware environment, the web interface extension must be running from the command line instead of as a Windows service. If you are running the web interface extension as a Windows service, perform the following steps to run it from the command line: 1. At the command line, run the following command to stop the service:
net stop remboagent
2. Change to the Tivoli Provisioning Manager for OS Deployment directory for the web interface extension. The default location is C:\Program Files\Common Files\IBM Tivoli. 3. Run the following command to run the web interface extension from the command line:
rbagent -d
v Creating a Windows WIM image is possible only for users that have separately obtained the Microsoft Windows Automated Installation Kit (WAIK) 32-bit and installed it on the computer running the web interface extension. The WAIK is licensed to you by the code's owner and not by IBM. IBM ServerGuide Scripting Toolkit DOS-based 1. Download the latest ServerGuide scripting toolkit from the IBM site. 2. Extract the toolkit into c:\IBM-SGSTK-DOS, for example. Note: DOS tools will be deprecated. They are actually used only to support some older hardware. IBM ServerGuide Scripting Toolkit WinPE 1.x-based 1. Download the latest ServerGuide scripting toolkit from the IBM site. 2. Extract the toolkit into c:\IBM-SGSTK-WinPE1.x, for example. 3. According to the user guide found under c:\IBM-SGSTK-WinPE1.x\sgdeploy\SGTKWinPE\Docs\ UserGuide.pdf, you must then: a. Provide WinPE 2005. b. Run SGTKWinPE.cmd to create a WinPE image with the requested drivers for IBM servers. IBM ServerGuide Scripting Toolkit WinPE 2.x-based 1. Download the latest ServerGuide scripting toolkit from the IBM site 2. Extract it for example into c:\IBM-SGSTK-WinPE2.x 3. According to the user guide found under: c:\IBM-SGSTK-WinPE2.x/sgdeploy/SGTKWinPE/Docs/ UserGuide.pdf you must then a. Download the Windows Automated Installation Kit (AIK) 1.1 for Windows Vista SP1 and Windows Server 2008. Note: Windows Automated Installation Kit for Windows 7 and Windows Server 2008 R2 is not supported. b. Install the Windows AIK. c. Restart your computer. d. According to the user guide found under c:\IBM-SGSTK-WinPE2.x/sgdeploy/SGTKWinPE/ Docs/UserGuide.pdf, you must then: 1) Download the Windows Automated Installation Kit (AIK) 1.0 for Windows Vista SP1 and Windows Server 2008. 2) Install the Windows AIK. 3) Restart your computer.
Chapter 4. Deploying operating systems
319
4) Run SGTKWinPE.cmd to create a WinPE image with the requested drivers for IBM servers. Use the option /Image to exclude ISO, and provide the following properties files to include all RAID and Fibre tools and exclude all network tools. The command finds by itself the location of the WAIK.For 32-bit WinPE:
SGTKWinPE.cmd /Image ScenarioINIs\Local\Raid_Config_Only_x86.ini
A directory that contains the environment tools is created, for example, .\sgdeploy\WinPE_ScenarioOutput\Local_Raid_Config_Only_x86\ISO. Note: From ServerGuide Scripting Toolkit version 2.20 onwards, there are two update zip files in the .\sgdeploy\updates\uxsp directory of the main zip file, which contain the IBM Server Guide Scripting Toolkit (ibm_utl_sep_1.00_winpe_i386.zip and ibm_utl_sep_1.00_winpe_x86-64.zip). These zip files must be manually extracted in the directory where the main IBM ServerGuide Scripting Toolkit was extracted, for example, C:\IBM-SGSTD-WinPE2.x. DELL Scripting Toolkit WinPE 1.x-based Note: Windows PE 2005 must be built from a Windows 2003 server for the Dell tools to work. To set up the Windows PE environment for your Dell servers: 1. You must first obtain a Windows PE 2005 file structure. 2. Copy it to a temporary folder, for example, c:\winpe-dell. 3. The Windows PE 2005 directory structure must contain a directory named I386 or MININT. If it contains a directory named MININT, rename it toI386. 4. Download the Deployment Toolkit from Dell. 5. Run the executable package to extract the toolkit to the disk of the OS deployment server. In the examples, it is assumed that you have extracted the toolkit into c:\DELL-DTK, which implies that you have a folder named C:\DELL-DTK\Dell\Toolkit. 6. To install the appropriate drivers for Dell servers in your WinPE image, follow the instructions of the DTK User Guide (Running Deployment Scripts Using DTK and Windows PE). In a. b. c. particular, you must: Install the drivers with the driverinst.bat script. Modify winpeoem.sif and winbom.ini. Add the RPC DLLs to the Windows PE directory.
Note: Add the RPC DLLs in i386\system32 instead of those in the Tools folder. 7. To verify that the drivers have been installed, check for the existence of the file named c:\temp\winpedell\i386\system32\racsvc.exe. Dell DTK Scripting Toolkit WinPE 2.x based 1. Download the Windows Automated Installation Kit (WAIK) 1.1 32-bit for Windows Vista SP1 and Windows Server 2008. The Windows Automated Installation Kit (WAIK) 1.1 is distributed by Microsoft and is available at Windows Automated Installation Kit (AIK). 2. Install the Windows AIK. 3. Download the latest DTK scripting toolkit from the Dell Web site. The name of the downloaded file should be similar to DTK2.6-WINPE-56.exe. 4. Extract the download file. For example, extract the file to the location c:\ Dell-DTK-2.6 5. 5. According to the Dell user guide, found under C:\Dell-DTK-2.6\Dell\Toolkit\Docs\ DTK25UG.pdf, you must then complete the following tasks:
320
a. Open a command prompt in the directory containing the driver installation batch for WinPE2.x: VPE_driverinst.bat. For example, the directory, C:\ Dell-DTK-2.6\Dell\ Drivers\winpe2.x. b. Launch the file called VPE_driverinst.bat <WINPEPATH> <DTKPATH>, where <WINPEPATH> is the destination path to create the directory structure for Windows PE 2.0, and <DTKPATH> is the path to the Dell drivers in the extracted DTK toolkit. For example, the file might be called VPE_driverinst.bat C:\Dell-DTK-2.6\WinPE2.x_Out C:\Dell-DTK-2.6\Dell\drivers. Launching this file preinstalls the Dell drivers into winpe.wim. 6. Copy and rename the customized C:\Dell-DTK-2.6\WinPE2.x_out\winpe.wim to C:\Dell-DTK-2.6\WinPE2.x_Out\ISO\sources\boot.wim. HP SmartStart Scripting Toolkit WinPE 1.x-based The initial setup for the HP SmartStart Scripting Toolkit is very similar to the setup of the Dell Hardware Toolkit, since both toolkits require Windows PE. Some details are therefore skipped, as you can read the Dell section to complete the information found here. 1. Download the Win32 HP SmartStart Scripting Toolkit version of the toolkit on the HP site. 2. Extract it to the disk of the OS deployment server (for example, to c:\HP-TK). 3. Create a Windows PE 2005 folder for the HP tools: a. Copy a Windows PE file structure to a temporary folder, for example, c:\winpe_hp. b. Install the HP drivers in the Windows PE directory, as explained in the User Guide for the HP Hardware Toolkit. 1) Run the executable under hpDrivers. 2) Give the location of the i386 folder of your Windows PE folder. HP SmartStart Scripting Toolkit WinPE 2.x-based Note: Only versions of the HP SmartStart Scripting Toolkit up to 2.1 c (file SP44695.exe) are currently supported. 1. Download the Windows Automated Installation Kit (WAIK) 1.1 32-bit for Windows Vista SP1 and Windows Server 2008. It is distributed by Microsoft and is available on the Microsoft Web site at Windows Automated Installation Kit (AIK). Note: Windows Automated Installation Kit for Windows 7 and Windows Server 2008 R2 is not supported. 2. Install the Windows AIK. 3. Restart the computer. 4. Download the latest SmartStart Scripting Toolkit from the HP Web site: http:// h18013.www1.hp.com/products/servers/management/toolkit/. The name of the downloaded file should be similar to SP38836.EXE. 5. Extract the file to a directory, for example, C:\HP-TK. 6. According to the HP SmartStart Scripting Toolkit Windows Edition User Guide.pdf found under C:\HP-TK\SWSetup\SP38836\ and the Windows Preinstallation Environment User's Guide (WinPE.chm) contained in the Windows Automated Installation Kit, you must then mount the WinPE2.x base image for specific customization. For example, activate extra packages, add drivers, and so on. a. From the Windows AIK tools folder, run the command to create the Windows PE customization directory. For example: C:\Program Files\Windows AIK\Tools\ PETools>copype.cmd x86 C:\HP-TK\SWSetup\SP38836\WinPE2.x_HP. b. Mount the base image launching imagex from the WinPE2.x_HP folder. For example: imagex /mountrw WinPE.wim 1 .\mount. c. Install the WMI packages in the image: peimg /image=.\mount /install=*WMI*
Chapter 4. Deploying operating systems
321
d. Add the required drivers (.inf files) to the base image using the peimg /inf command.
peimg /inf=<driverpath> .\mount
where <driverpath> is the location of the .inf files found in the extracted drivers within the hpDrivers folder. For example, peimg /inf=c:\HP-TK\SWSetup\SP38836\hpDrivers\ExtrDrivers\nic\b06nd .\mount. e. Repeat step d. for each additional device driver. f. Copy the hpsstkio.sys Toolkit I/O driver (required for the conrep and rbsureset utilities) from the HP driver directory to the Windows driver directory. For example:
copy C:\HP-TK\SWSetup\SP38836\hpDrivers\system\hpsstkio\hpsstkio.sys C:\HP-TK\SWSetup\SP38836\WinPE2.x_HP\mount\Windows\System32\drivers
g. When you finish customizing the image, prepare the environment image by using the peimg /prep command:
peimg /image=.\mount /prep
7. Copy and rename the customized C:\HP-TK\SWSetup\SP38836\WinPE2.x_HP\WinPE.wim file into C:\HP-TK\SWSetup\SP38836\WinPE2.x_HP\ISO\sources\boot.wim. To create your environment with the wizard: 1. Click Go To > Deployment > OS Management > Hardware Configuration Image. 2. Select any option in the first page of the wizard and click Next. 3. On the second page of the wizard, select to create a pre-boot environment. This launches the Hardware Environment Wizard. 4. Follow the steps in the wizard. You must: a. Ensure that the Web interface extension is running on the computer where WAIK and the environment tools have been prepared. b. Provide the path of the folder in which the environment tools are located, that is where you have installed the scripting toolkit, for example, C:\IBM-SGSTK-WinPE-2.x\sgdeploy\ WinPE_ScenarioOutput\Local_Raid_Config_Only\ISO. c. Provide the path of the folder in which the environment material is located, that is the WinPE files, for example, C:\IBM-SGSTK-WinPE-2.x\sgdeploy\WinPE_ScenarioOutput\ Local_Raid_Config_Only\ISO. Click Go To > Deployment > OS Management > Software Modules. Here you can view the created environment under a specific environment folder. Now, you can create hardware configurations using this environment. Creating a hardware configuration: A wizard allows you to effortlessly create hardware configurations. Before you can create a hardware configuration, you must have created the needed environments to be able to later apply the hardware configurations. 1. Click Go To > Deployment > OS Management > Hardware Configuration Image. 2. Select the kind of hardware configuration you want to create. 3. Provide at least one target model and environment pair on which the hardware configuration can apply. 4. For BIOS update, BIOS settings or Hardware custom configuration the specific files or set of files can be downloaded from the specific vendor sites.
322
5. Follow the wizard instructions. Note: Do not close the browser when the image is being uploaded. If you do, the upload might be cancelled. To view or edit a hardware configuration, you need to find the Hardware configuration image information in the Images application. Click Go To > Deployment > OS Management > Images. Then click the Properties tab.
Procedure
1. 2. 3. 4. Click Go To > Deployment > OS Management > Images. In the list of images, click the image that you want to edit. Click the Properties tab. To edit parameters, click Edit on the banner of the corresponding section and enter the values. In the Fixed target properties section, specify parameters that are common to all targets of this image. The web interface displays a number of OS configuration parameters divided into panes sections. You can set the TCP/IP mode of the target being deployed. If the end-user's network supports the DHCP mode, you can set TCP/IP settings to use DHCP. If the TCP/IP mode has been already defined in the Target Details page, the deployment uses the values defined in this page. If you do not set any TCP/IP mode, the Dynamic, use DHCP value is used. Any value entered in Fixed target properties overrides the corresponding value for targets deployed using this OS configuration. In the Fixed user properties section, you can enter the organization name.
Windows In the Windows-specific info section, you can enter a Windows product key if you have an Open License or a similar site license that uses the same product key for all targets. Configuration-related information also includes operating system information (under the section OS deployment), including an operating system version, its architecture, its language, the root of the system installation and boot parameters. In the OS deployment section, you can also specify (for a multi-partition image) partitions that must be excluded from deployment. In the text fields, enter the number of the partitions you want to
323
exclude, keeping in mind that partitions with numbers 1 to 4 are primary partitions, while those with number 5 or above are logical partitions. If you want to exclude more than one partition, separate the partition numbers with commas. For example, 2,5 excludes the second primary partition and the first logical partition. Note: a. This option is valid only for the first physical disk. b. This option is valid only for partitions defined in the image. The partition scheme defined in the image is always written on the disk of the deployed target. Therefore, if your target has two partitions but your image has only one, the deployment always creates the one partition of the image and deletes the second partition of your target. c. Partitions can be preserved only when the target has the same partition scheme as the one defined in the image. The way partition sizes are defined in a image makes it unlikely for a target not previously deployed with this system profile to have the same partition scheme. Some pre-settings can also be specified concerning the local user in the Fixed target properties section. Values in Fixed target properties can contain special keywords that are replaced by dynamic information. For example, [IP] is replaced by the full IP address of the target being deployed, while [MAC] is replaced by the hardware address, also known as Media Access Control (MAC) address. To set target names based on the MAC address, you can enter the following value in the target name field: pc[MAC]. The computer with the MAC address 00:01:02:03:04:05 is named pc000102030405. The following keywords are supported: v [IP]: full IP address (received by DHCP) v [MAC]: hardware address v [SN]: serial number as found in DMI (SMBIOS) v v v v [BOMID]: unique target identifier in the provisioning server database [AT]: DMI asset tag [GRP]: deepest administrative group name to which the target belongs [DHCPNAME]: target name as known to the DHCP server
Every keyword supports a range extension if you want to include only part of the dynamic information. The range starts at value 0. [IP3] corresponds to the last byte of the IP address (in IP addresses, bytes are separated by dots. pc-[IP3] becomes pc-12 if IP address is 192.168.0.12). [IP1-3] corresponds to bytes 1 to 3. [MAC3-5] is replaced by the last three bytes of the MAC address (MAC addresses are typically represented in hexadecimal, with colons to separate the bytes). For AT, GRP, and DHCPNAME, the range corresponds to a substring.
324
Note: You can switch from one method to the other. In the driver specific binding rule method, driver bindings from the standard binding rule method are ignored, and vice-versa. The method described here is the driver specific binding rule method. From version 7.1.1.4 of the product onwards, it is recommended to use the driver specific binding rule method, which is the method by default on all new Windows images. A system profile is a shared object where image data is stored. If you use the driver specific binding rule method, the binding might be shared with other images. Any changes to an image will also apply to images that share the binding grid. For the driver specific binding rule method, the following image types are supported: 1. Golden master images 2. Snapshot images 3. Unattended images The OS deployment server helps you select appropriate drivers for particular target models. It helps you to predict potential problems and to solve them. It does not guarantee that a specific image, with bound drivers, works with a given target. The information used by the OS deployment server to predict the compatibility of a driver with a target model is taken from the content provided by the vendor in its driver. The OS deployment server cannot verify the accuracy of this information.
Procedure
1. Check the compatibility of your image. a. Go to Click Go To > Deployment > OS Management > Images. b. Find the image in the list and click on it to select it. c. On the Driver Binding tab, select the Use Driver Specific Binding Mode to enable to the new mode. d. A check is performed while the page is loading. This may take a few minutes. If drivers are missing, or are not bound, or if several drivers are bound for the same device, the following information is provided. Indicates a missing critical driver, or a critical driver of the wrong architecture. Indicates that a missing non-critical driver, or a non-critical driver of the wrong architecture. Indicates that a required driver is present on the OS deployment server, but that it is not bound. Indicates that there are several drivers bound for the same device, or that there is a binding with a driver that is not known as compatible. You can expand the line to get more information. v For drivers missing on the OS deployment server, you find a suggestion of where to look for it, including, if available, a download link and the exact directory within the downloaded archive where the driver can be found. v When drivers are present on the OS deployment server, you find suggestions of which driver to bind, in order of preference. If multiple drivers are known to possibly work for a device, the best choice is listed first. The choice is explained in the advice text, which first recommends the use of device-specific drivers, that is, drivers that have been specifically designed for the given hardware device. Then compatible device drivers, that match the device family, are recommended, even if they are not an exact rebranded variant (for example, as second choice, an Adaptec
325
driver of the same family as an IBM ServerRaid adapter, if it is based on the same chipset). Finally, as third choice, generic drivers, for example, Microsoft generic AHCI driver for any AHCI controller, are recommended. If no error is found, you do not need to modify the bindings. 2. Modify the driver bindings of the system profile. There are two ways to perform this. v Use a wizard. a. At the bottom of the page, click Fix Drivers. b. Follow the instructions of the wizard. After having selected a target model, you have to select one of these options: Automatically fix issues which can be fixed for this model. Fixes all issues which can be automatically fixed. Such issues include a missing binding to an existing driver, or multiple bindings for a device, for example. Manually fix issues for this model. Presents you with each issue in turn. Ways to solve the issue, when available, are proposed. Automatically bind drivers for this model. Erases every existing binding. New bindings are then automatically added. Copy driver bindings for this model from a similar profile. Copies all the bindings from a selected source system profile to the current one. Reset all drivers bindings for this model. Erases all the driver bindings, and does not create any new binding. v Edit the bindings manually. Columns represent target models known to the OS deployment server. They can be expanded to view their devices, provided an inventory has been performed. The first line represents the system profile. Other lines represent software module folders in the OS deployment server. They can be expanded to view individual drivers. If a driver can be used only for 32-bit or 64-bit machines, a superscript x86 or x86-64 mark is written next to the driver name. If you do not find the drivers that you need in the list provided, you should first create software modules for your drivers. a. (Optional) To obtain a summary of the errors and warnings, click the link provided above the grid. This helps you locate the problematic areas in the driver grid. b. Expand the columns of problematic target models to view individual devices. c. Expand software module folders containing drivers to view the individual drivers.
326
A cell with a green background indicates that driver information corresponds to the device. The quality of the drivers that can be selected is illustrated by the intensity of the green background: the best drivers are in intense green, the family drivers are in standard green, and the generic drivers are in pale green. A cell with an orange background indicates either that the driver is not a PCI driver, or that there is no compatibility information available for the driver. indicates that the driver is bound to the system profile for A cell with a green check mark use with the specific target model and device. d. Click on a green background cell to add or remove bindings. It is not possible to bind or unbind drivers from the system profile itself, because they are built-in drivers. You should have one, and only one, check mark per column, indicating that you have one and only one driver for each device. e. When you are done modifying the bindings, click Save. f. To return to the Profile details page, click Back. Potential problems with the image are recomputed, allowing you to check if your modifications have solved the detected problems.
What to do next
When you have solved all the driver binding issues, you can deploy targets with your system profile.
327
Tivoli Provisioning Manager for OS Deployment merges the information in an the image properties file with the information provided on the web interface. If a value is specified for a parameter in the web interface, the corresponding value in the image properties file is ignored. The following examples show the impact of this behavior: v If the parameter FullName is defined in both the web interface file and in the custom file, the value in the web interface file is used for the deployment. v If a value for the license key is not configured in the web interface file but is configured in the custom file, the value in the custom file is used for the deployment. Creating a single file for all deployments: Before you begin You must have experience in correctly configuring image properties directly in a file. Tivoli Provisioning Manager for OS Deployment does not provide any syntax checking of the file. See the operating system documentation for details about the file format and syntax. Procedure 1. On the Properties tab of the image, open the appropriate file. v v v v
Vista XP Red Hat SUSE 2008 2003
Click Edit custom 'unattend.xml' to edit the file. Click Edit custom 'sysprep.inf' to edit the file.
Click Edit custom 'ks.cfg' to edit the file. Click Edit custom 'autoinst.xml' to edit the file.
Solaris Click Edit custom 'solaris.profile' to edit the file. v v VMWare ESX: Click Edit custom 'ks.cfg' to edit the file to modify the size of the VMFS and VMKcore partitions if needed and to define a custom partitioning scheme when installing VMWare with scripted installation. 2. Type in the parameters and their values in the syntax required by the operating system, or copy and paste it from another editor. 3. Click OK.
Example
Red Hat Here is an example of a custom file which defines a custom partitioning scheme when installing RedHat with scripted installation.
/usr --fstype ext3 --size 4000 /home --fstype ext3 --size 4000 /opt --fstype ext3 --size 20000 /var --fstype ext3 --size 2000 /tmp --fstype ext3 --size 2000
SUSE Here is an example of a config.xml file which adds a new user during setup and defines a custom partitioning scheme when installing SuSE with scripted installation.
<profile xmlns="http://www.suse.com/1.0/yast2ns" xmlns:config="http://www.suse.com/1.0/configns"> <users config:type="list"> <user> <username>jdoe</username> <user_password>tOpsEcreT</user_password> <encrypted config:type="boolean">false</encrypted> <forename>John</forename> <surname>Doe</surname> </user> </users>
328
<partitioning config:type="list"> <drive> <device>/dev/sda</device> <partitions config:type="list"> <partition> <create config:type="boolean">true</create> <filesystem config:type="symbol">ext3</filesystem> <format config:type="boolean">true</format> <mount>/usr</mount> <size>2G</size> <partition> <partition> <create config:type="boolean">true</create> <filesystem config:type="symbol">ext3</filesystem> <format config:type="boolean">true</format> <mount>/home</mount> <size>1024M</size> </partition> </partitions> <use>free</use> </drive> </partitioning> </profile>
Do not omit the xmlns and xmlns:config attributes of the profile tag.
Solaris
By default the deployment provides its own preinstall and postinstall scripts for generating profiles dynamically and installing software modules specified in the database. If you want to add your own code in the preinstall and postinstall scripts, you can do so by adding sections in the custom profile configuration file solaris.profile.
SI_BEGIN: echo This is the preinstall script ... SI_PROFILE: echo This is the profile configuration partitioning explicit filesys rootdisk.s0 free / filesys rootdisk.s1 2048 swap cluster SUNWCpm delete cluster SUNWCpmx delete cluster SUNWCdial delete cluster SUNWCdialx delete cluster SUNWCadm cluster SUNWCcpc SI_FINISH: echo This is the postinstall script ...
VMWare ESX: In the following example, the following partitions are created: v A ext3 partition of 900 KB on the sda disk.
Chapter 4. Deploying operating systems
329
v A vmfs3 partition of 50 MB is created on the sda disk. v A vmkcore partition of 94 KB on the sda disk.
part /var --fstype ext3 --size=900 --ondisk sda part None --fstype vmfs3 --size=50000 --grow --ondisk sda part None --fstype vmkcore --size=94 --ondisk sda
Associating image properties with the software stack: If you want to use specific image properties for individual image deployments instead of applying the same image properties to all deployments, you can use provisioning workflows to assign a customized image properties file at deployment time. Before you begin To perform this task, you must have the following skills: v Experience in correctly configuring image properties directly in a file. Tivoli Provisioning Manager for OS Deployment does not provide any syntax checking of the file. Refer to the operating system documentation for details about the file format and syntax. v If you want to use multiple image properties files for specific deployments of the same image, you must have experience writing provisioning workflows and be familiar with software configuration templates. This task does not explain how to write provisioning workflows to customize settings in asoftware configuration template. A software stack for an image includes a software configuration template with parameters for the image deployment. The parameter CustomConfigFile defines the image properties file name. Note: You must have experience in correctly configuring image properties directly in a file. Tivoli Provisioning Manager for OS Deployment does not provide any syntax checking of the file. See the operating system documentation for details about the file format and syntax. Procedure 1. On the provisioning server, create your custom image properties files in a text editor with the parameters and values that you want to set for specific deployments. For more information about the parameters to configure in the image properties file, refer to the related links at the end of this topic and your operating system documentation. Consider centralizing your custom image properties files in a single directory so that they are easy to reference from a provisioning workflow. 2. The following steps show you where to configure the name of the image properties file in the software catalog. Setting a value on the original software stack has the same effect as creating image properties file from the Properties tab of the image itself. To assign a specific value at deployment time, you must create your own provisioning workflows that change the value of the CustomConfigFile parameter on a clone of the image at deployment time. . a. On the Image tab of the image, locate the software stack for the image. Click b. Under Configuration Templates, locate the Template Parameters section and expand CustomConfigFile. c. In the Parameter Value field, specify the full path and file name for the custom image properties file. For example, c:\imgprop\unattend.xml or /var/imgprop/ks.cfg. d. Save your changes.
330
What to do next To automatically set values in the custom file, you must create provisioning workflows for deploying the image that will set the value of CustomConfigFile at deployment time. Troubleshooting: If the image properties in the deployed operating system are not what you expected, you must examine the parameter files carefully. The image properties are the result of the parameters configured in the web interface, and the parameters in the image properties file that you created.
Vista 2008 To troubleshoot OS configuration parameters after a successful deployment, view the two files Windows/panther/setup.xml and Windows/panther/unattend.xml which are the result of the merge between the default and custom parameter files. To troubleshoot OS configuration parameters after a failed deployment, you must look for the following files in the partition containing the operating system: v user_unattend.xml, which is the file you edited v setup.xml, which results from the merge v unattend.xml, which results from the merge as well
To troubleshoot OS configuration parameters after a failed deployment, follow these steps: v Without rebooting the target:
Red Hat
1. Type Alt+F2 on the target. This opens a shell. 2. In the opened shell, view the file /tmp/anaconda.log. To troubleshoot OS configuration parameters after a failed deployment, follow these steps: v Without rebooting the target: 1. Type Alt+F2 on the target. This opens a shell.
SUSE
331
v Add or delete partitions. Note: Adding or deleting partitions can lead to OS configuration problems, so this feature must only be used very carefully. To provide a better description to your profile, the Comment field allows you to write all necessary details. v Resize a partition by dragging sliders, or by assigning it an absolute or relative size. v Change the file system of a partition. v Assign a mount point to the partition. To change the partition layout:
Procedure
1. 2. 3. 4. Click Go To > Deployment > OS Management > Images. Select your image, then click the Properties tab. Click the Disks tab, then scroll down and click Edit partition layout. To add a partition, click Add a regular partition or Add an extended partition.
5. To resize partitions with the sliders, grab the slider to the right of the partition and drag it. 6. To update all other parameters, select a partition by clicking it, then click Edit, and update the parameters. 7. Click OK.
Results
You have now changed the partition layout.
A Windows Installer (MSI). Packages that comply with the Designed for Windows logo program typically use this type of installer. It guarantees that there is an easy way to perform an
IBM Tivoli Provisioning Manager Version 7.2.0.2 User Guide
332
unattended installation of the software. An MSI package typically contains a file with an .msi extension. If you only have a single .exe file, it is likely to be an archive that you must extract first. For more information, refer to the section. v v
Windows Windows
A Windows HAL to include in a clone deployment. This option must be used only to inject HAL into a Windows cloning profile. For HAL injection in unattended setup profiles, you must create a driver package.
v A custom action on the targets. This includes OS configuration changes such as registry patches, command to be run, and copying sets of files on the target. The process for creating a software module of the common agent is used as an example. v v A Linux application installation, using RPM. A Solaris application installation, using pkgadd
Linux
Procedure
1. Click Go To > Deployment > OS Management > Software Modules. 2. Click New Software to run the software wizard. 3. Select the Windows Vista / 2008 and click Next. 4. Select Language pack and click Next. 5. Follow the instructions of the wizard to create your software module. 6. You will have to choose the computer where the material to create your software module can be found and this computer must have the web interface extension installed on it. The web interface extension is automatically installed on all Tivoli Provisioning Manager for OS Deployment servers, however, only the web interface extension on the parent server can be detected. If you have changed the parent server, or you are trying to work with a child server, you must manually install the web interface extension on the source computer before it can be detected. For information on how to do this, see Installing an uninstalling the Web interface extension.
Results
Parameters of the software module are pre-filled for you but they can be modified in the appropriate step of the software wizard. These parameters include: v A description that identifies the package in the software module tree. v A comment with additional information about the software module. v The stage of the deployment when your software module must be installed: when the OS is installed, or after one or more additional reboot. Most of the time, you must install the package at the same time as the operating system. However, you can decide to install them in a specified order to avoid software-specific conflicts. v A file name to store your image on the provisioning server. Packages typically have a .pkg extension.
333
v The path to where the installation files are restored on the target computer. This path is relative to the system root partition. v An additional command line that might be necessary to install your software module. When possible, the wizard suggests automatically the appropriate command line to run the installation unattended. However, you might need to add some additional parameters to the command.
Procedure
1. Click Go To > Deployment > OS Management > Software Modules. 2. Click New Software to run the software wizard. 3. Select Windows Vista / 2008 and click Next. 4. Select HotFix (MSU) and click Next. 5. Follow the instructions of the wizard to create your software module. 6. You will have to choose the computer where the material to create your software module can be found and this computer must have the web interface extension installed on it. The web interface extension is automatically installed on all Tivoli Provisioning Manager for OS Deployment servers, however, only the web interface extension on the parent server can be detected. If you have changed the parent server, or you are trying to work with a child server, you must manually install the web interface extension on the source computer before it can be detected. For information on how to do this, see Installing an uninstalling the Web interface extension.
Results
Parameters of the software module are pre-filled for you but they can be modified in the appropriate step of the software wizard. These parameters include: v A description that identifies the package in the software module tree. v A comment with additional information about the software module. v The stage of the deployment when your software module must be installed: when the OS is installed, or after one or more additional reboot. Most of the time, you must install the package at the same time as the operating system. However, you can decide to install them in a specified order to avoid software-specific conflicts. v A file name to store your image on the provisioning server. Packages typically have a .pkg extension. v The path to where the installation files are restored on the target computer. This path is relative to the system root partition. v An additional command line that might be necessary to install your software module. When possible, the wizard suggests automatically the appropriate command line to run the installation unattended. However, you might need to add some additional parameters to the command.
334
Windows 1. Create a .lnk.yourfilename file (where yourfilename is the name of your choice) that contains the path to the wanted folder (for example, \\fileserver\export\softs\). 2. In the wizard, enter .lnk.yourfilename preceded by the appropriate path. UNIX Use symlinks.
UNIX
Procedure
1. Click Go To > Deployment > OS Management > Software Modules. 2. Click New Software to run the software wizard. 3. 4. 5. 6. Select Windows Vista / 2008 and click Next. Select A Windows application installation, using Microsoft Installer (MSI) and click Next. Follow the instructions of the wizard to create your software module. You will have to choose the computer where the material to create your software module can be found and this computer must have the web interface extension installed on it. The web interface extension is automatically installed on all Tivoli Provisioning Manager for OS Deployment servers, however, only the web interface extension on the parent server can be detected. If you have changed the parent server, or you are trying to work with a child server, you must manually install the web interface extension on the source computer before it can be detected. For information on how to do this, see Installing an uninstalling the Web interface extension.
Results
Parameters of the software module are pre-filled for you but they can be modified in the appropriate step of the software wizard. These parameters include: v A description that identifies the package in the software module tree. v A comment with additional information about the software module.
335
v The stage of the deployment when your software module must be installed: when the OS is installed, or after one or more additional reboot. Most of the time, you must install the package at the same time as the operating system. However, you can decide to install them in a specified order to avoid software-specific conflicts. v A file name to store your image on the provisioning server. Packages typically have a .pkg extension. v The path to where the installation files are restored on the target computer. This path is relative to the system root partition. v An additional command line that might be necessary to install your software module. When possible, the wizard suggests automatically the appropriate command line to run the installation unattended. However, you might need to add some additional parameters to the command.
Results
Parameters of the software module are pre-filled for you but they can be modified in the appropriate step of the software wizard. These parameters include: v A description that identifies the package in the software module tree. v A comment with additional information about the software module. v The stage of the deployment when your software module must be installed: when the OS is installed, or after one or more additional reboot. Most of the time, you must install the package at the same time as the operating system. However, you can decide to install them in a specified order to avoid software-specific conflicts. v A file name to store your image on the provisioning server. Packages typically have a .pkg extension. v The path to where the installation files are restored on the target computer. This path is relative to the system root partition. v An additional command line that might be necessary to install your software module. When possible, the wizard suggests automatically the appropriate command line to run the installation unattended. However, you might need to add some additional parameters to the command.
Results
Parameters of the software module are pre-filled for you but they can be modified in the appropriate step of the software wizard. These parameters include: v A description that identifies the package in the software module tree. v A comment with additional information about the software module.
336
v The stage of the deployment when your software module must be installed: when the OS is installed, or after one or more additional reboot. Most of the time, you must install the package at the same time as the operating system. However, you can decide to install them in a specified order to avoid software-specific conflicts. v A file name to store your image on the provisioning server. Packages typically have a .pkg extension. v The path to where the installation files are restored on the target computer. This path is relative to the system root partition. v An additional command line that might be necessary to install your software module. When possible, the wizard suggests automatically the appropriate command line to run the installation unattended. However, you might need to add some additional parameters to the command.
Procedure
1. Click Go To > Deployment > OS Management > Software Modules. 2. Click New Software to run the software wizard. 3. Select Windows Vista/2008/7 or Windows 2000/2003/XP and click Next. 4. Select A Windows driver to include in a deployment and click Next. 5. Follow the wizard instructions to create your software module.
Results
When you indicate the directory in which the driver files are located, if several subdirectories contain drivers, the wizard lists all these directories. You must then select one or several directories. Selecting multiple directories allows you to create several driver packages at the same time with common binding rules. In case of multiple driver package creation, you can enter a folder name in which you want to store the new software modules. If the folder does not exist, the wizard creates it. If only one driver package is being created, the wizard presents the characteristics of the driver. This panel is skipped in the wizard in multiple driver package creation, but you can view the information in the software module details once the package has been created. The wizard allows you to create binding rules based on the PCI hardware ID, the baseboard ID, the computer model name, operating system architecture and targeted operating systems. Depending on your selections, the wizard provides steps with easy-to-follow instructions to create the binding rules. PCI hardware ID v If you select Use this driver for the exact same device only, the PCI vendor ID, device ID, and sub-device ID must match. v If you select Use this driver for similar devices, only the PCI vendor ID and the device ID need to match.
Chapter 4. Deploying operating systems
337
Baseboard ID You can either type in a substring of the baseboard name or select baseboard names extracted from the targets known to the provisioning server. Computer model name You can either type in a substring of the computer model name or select model names extracted from the targets known to the provisioning server. OS architecture Select Auto to use the information contained in the driver to define the binding rule. Select 32 bit, 64 bit, or Both if you know the architecture the driver has been designed for. OS targeted Select for which family of Windows operating systems the driver has been written for. The number of rules created vary depending on the selections you made, but very quickly reaches over one hundred if your rules are based on similar PCI device IDs. Parameters of the software module are pre-filled for you but they can be modified in the appropriate step of the software wizard for single driver creation. For multiple driver creation, the parameters do not appear in the wizard. They can be edited in the software details page of each driver package. These parameters include: v A description that identifies the package in the software module tree. v A comment with additional information about the software module. v The stage of the deployment when your software module must be installed: when the OS is installed, or after one or more additional reboots. Most of the time, you must install the package at the same time as the operating system. However, you can choose to install them in a specified order to avoid software-specific conflicts. v A file name to store your image on the provisioning server. Typically, packages have a .pkg extension. v The path where the installation files are restored on the target. This path must start with \drivers, because Windows unattended installation and Sysprep look in C:\drivers when installing new devices. Creating driver packages for Windows target computers: To deploy Windows target computers most efficiently, you need up-to-date drivers which are often not included with operating system installation files. These drivers can be obtained from the vendor of the server. Before you begin Before you can create your driver packages, you need to obtain the proper driver files. IBM drivers For IBM drivers, download the ServerGuide. To locate the ServerGuide, search for ServerGuide download in a search engine. Copy the ServerGuide directory. Note: ServerGuide is different from the ServerGuide Toolkit. HP drivers For HP drivers, download the SmartStart. To locate the SmartStart, search for SmartStart download. Dell Drivers To locate Dell drivers, search for Dell drivers download. The following example assumes that the drivers have been copied into the Files/import directory on your OS deployment server.
338
To create a driver package: Procedure Click Go To > Deployment > OS Management > Software Modules. Click New Software to run the software wizard. Select the relevant operating system and click Next. Select A Windows driver to include in a deployment and click Next. Select On the OS server itself (in the 'import' directory) and click Next. Select the relevant directory. For IBM drivers for a Windows 2003 operating system, this is sguide/w2003drv/$oem$/$1/drv. 7. Select all relevant drivers in the list provided and click Next. Sometimes, several versions of the same driver are available. In this case, follow these guidelines: v Select drivers without alternative, even if the name is misleading. v Select the appropriate Windows version when there are alternatives, for instance select win2003 rather than win2k or winnt for a Windows 2003 driver. 1. 2. 3. 4. 5. 6. v Select server when the alternative is between server and pro. v Avoid selecting drivers with powerpc in their name. v Avoid selecting drivers containing hardware abstraction layer (HAL). v Avoid selecting drivers with another architecture. Note: It is better to have a few extra drivers included in the package than to miss one. 8. Give a meaningful folder name to store your drivers, for instance IBM ServerGuide 2003 32bit, and click Next. 9. Select Yes, create binding rules based on: and PCI hardware ID. Then click Next. 10. Select Use this driver for the exact same device only and click Next. 11. Select the appropriate architecture and the targeted operating system and click Next. 12. Click Finish. Results You have now finished the driver package creation process. What to do next You might have to go through the driver package creation process several times, to create different driver package directories specific for operating systems and their architecture.
Hardware abstraction layer (HAL) might change from one computer to another depending on whether it has a single or multiple processors, whether it uses Advanced Programmable Interrupt Controller (APIC) and Advanced Configuration and Power Interface (ACPI). HAL also depends on the operating system. To create universal images, you might be required to have other HAL versions on your image than the original. To create a HAL software module to be injected on a golden master image during deployment, you must create a HAL software module and bind it to the corresponding images.
339
Procedure
1. 2. 3. 4. Click Go To > Deployment > OS Management > Software Modules. Click New Software to run the software wizard. Select Windows 2000 / 2003/ XP. Select A Windows HAL to include in a clone deployment.
5. Follow the wizard instructions. Different HALs are available on Windows installation CD-ROMs. The wizard offers you to create binding rules for this HAL and pre-fils some of the data to facilitate the rule creation process.
Results
You have now created a HAL software module to be injected on a cloning image during deployment.
What to do next
If you have not used the wizard to create binding rules, it is recommended that you bind your HAL package now to deploy it in appropriate contexts. Creating a software module for HAL injection on an unattended setup: Before you begin HAL injection on an unattended setup image is typically only necessary on some very specific server systems. The server vendor must then provide you with the appropriate HAL. IBM provides HALs for its servers in the ServerGuide CD-ROM To create a HAL software module to be injected on an unattended setup image during deployment, you must create a HAL software module and bind it to the corresponding images. Procedure 1. Click Go To > Deployment > OS Management > Software Modules. 2. Click New Software to run the software wizard. 3. Select Windows 2000 / 2003/ XP. 4. Select A Windows driver to include in a deployment. 5. Follow the wizard instructions. When asked for the driver file location, provide the path to the HAL. Results You have now created HAL injection on an unattended setup image. What to do next If you have not used the wizard to create binding rules, it is recommended that you bind your HAL package now to deploy it in appropriate contexts.
340
Configuration changes are further subdivided. Depending on the operating system, you can: v Copy a single text file. v Execute a single command file. v Boot a floppy disk. The following example shows how to create a software module of the common agent.
Procedure
1. 2. 3. 4. 5. Click Go To > Deployment > OS Management > Software Modules. Click Create to run the software wizard. Select the operating system and click Next. Select A custom action on the target computer and click Next. Follow the instructions of the wizard to create your software module.
Results
Parameters of the software module are pre-filled for you but they can be modified in the appropriate step of the software wizard. These parameters include: v A description that identifies the package in the software module tree. v A comment with additional information about the software module. v The stage of the deployment when your software module must be installed: when the OS is installed, or after one or more additional reboot. Most of the time, you must install the package at the same time as the operating system. However, you can decide to install them in a specified order to avoid software-specific conflicts. v A file name to store your image on the provisioning server. Packages typically have a .pkg extension. v The path to where the installation files are restored on the target computer. This path is relative to the system root partition. v An additional command line that might be necessary to install your software module. When possible, the wizard suggests automatically the appropriate command line to run the installation unattended. However, you might need to add some additional parameters to the command. Repeating custom actions: Some commands must be run every time the target boots during a deployment. This is typically the case if you want to repeatedly mount a network share. This connection is destroyed when rebooting. You can therefore create a single software module to mount the network share and set this software module to run once after each reboot, starting at a specific reboot. This option is available for executing a single command. Procedure 1. Create your software module. 2. Double-click the software module name in the Software components page to display the Software details page 3. Click Edit in the title of the Package information section. 4. Select the installation stage at which the software module must be applied first. 5. Select Run at each software pass until end of deployment and click OK. Creating a software module for custom actions on Windows: Software modules can also contain custom actions to be performed on the target. They are divided into:
Chapter 4. Deploying operating systems
341
Vista
2008
A WinPE 2.0 image (option present only for Windows Vista and Windows 2008
software modules ). Note: To create a WinPE 2.0 image, the Web interface extension must be started with administrator privileges. A WinPE 1.0 Ramdisk image (option present only for Windows 2000/2003/XP software modules). v An OS configuration change to perform on the target. v A set of files to copy on the target. v
XP 2003
Configuration changes are further subdivided into: v v v v v v Copy and execute a single file. Apply a Windows registry change. Apply a Windows .ini file change. Copy a single text file. Execute a single command file. Boot a virtual floppy disk. Note: Virtual floppy disk software modules can only be created from a Windows operating system running the web interface extension. Procedure 1. 2. 3. 4. 5. Click Go To > Deployment > OS Management > Software Modules. Click New Software to run the software wizard. Select the operating system and click Next. Select A custom action on the target and click Next. Follow the instructions of the wizard to create your software module.
6. You will have to choose the computer where the material to create your software module can be found and this computer must have the web interface extension installed on it. The web interface extension is automatically installed on all Tivoli Provisioning Manager for OS Deployment servers, however, only the web interface extension on the parent server can be detected. If you have changed the parent server, or you are trying to work with a child server, you must manually install the web interface extension on the source computer before it can be detected. For information on how to do this, see Installing an uninstalling the Web interface extension. Results Parameters of the software module are pre-filled for you but they can be modified in the appropriate step of the software wizard. These parameters include: v A description that identifies the package in the software module tree. v A comment with additional information about the software module. v The stage of the deployment when your software module must be installed: when the OS is installed, or after one or more additional reboot. Most of the time, you must install the package at the same time as the operating system. However, you can decide to install them in a specified order to avoid software-specific conflicts. v A file name to store your image on the provisioning server. Packages typically have a .pkg extension. v The path to where the installation files are restored on the target computer. This path is relative to the system root partition.
342
v An additional command line that might be necessary to install your software module. When possible, the wizard suggests automatically the appropriate command line to run the installation unattended. However, you might need to add some additional parameters to the command. Example As examples are described the complete step-by-step process of creating a software module with the content of the second CD-ROM of a Windows 2003 R2 distribution (see Creating a software module for unattended deployment of Windows 2003 R2), and of creating a ramdisk from a bootable diskette (see Creating a ramdisk software module from a bootable diskette on page 344). Repeating custom actions: Some commands must be run every time the target boots during a deployment. This is typically the case if you want to repeatedly connect to a network share. This connection is destroyed when rebooting. You can therefore create a single software module with a netuse command to set the network share and set this software module to run once after each reboot, starting at a specific reboot. This option is available for v Windows registry changes. v Copying and executing a single file. v Executing a single command. Procedure 1. Create your software module. 2. Double-click the software module name in the Software components page to display the Software details page 3. Click Edit in the title of the Package information section. 4. Select the installation stage at which the software module must be applied first. 5. Select Run at each software pass until end of deployment and click OK. Creating a software module for unattended deployment of Windows 2003 R2: To prepare an unattended deployment of Windows 2003 R2, you must include some of the content of the second CD-ROM of the distribution in a software module and bind this software module to the image created with the first CD-ROM. Procedure 1. Click Go To > Deployment > OS Management > Software Modules. 2. Click New Software to run the software wizard. 3. Select Windows 2000 / 2003 / XP. 4. Select A custom action on the target. 5. Select A set of files to copy on the target (with an optional command to execute). 6. 7. 8. 9. Indicate on which computer the files of the second CD-ROM are located. Indicate the complete path to find the files in /CMPNENTS/R2, for example D:/CMPNENTS/R2. Verify the proposed description and if necessary, modify it. Optionally, enter a comment. Enter the necessary parameters for this specific software module: v Apply the software module After one additional reboot. v Enter a meaningful package file name, with a .pkg extension. v Use \install\R2 as destination path. v Do not forget the command-line to be run on the target:
Chapter 4. Deploying operating systems
343
where xxxx-xxxx-xxxx-xxxx-xxxx is the product key. 10. Wait during the package generation process and click Finish. What to do next Bind your software module to your Windows 2003 R2 unattended setup image (see Automatic binding rules on page 347). Creating a ramdisk software module from a bootable diskette: Creating a ramdisk software module from a bootable diskette is considered by the software module wizard to be a Configuration change, which itself is included in the Custom action. Procedure 1. Click Go To > Deployment > OS Management > Software Modules. 2. Click New Software to run the software wizard. 3. Select Windows 2000 / 2003 / XP. 4. Select A custom action on the target. 5. Select a Configuration change. 6. Select Boot a virtual floppy disk. 7. Specify which computer the bootable diskette must be read from. This can be either on the local computer or on another computer running the web interface extension. The option On the server itself must not be used. If the diskette drive is added after the web interface extension is started (on the local or remote computer depending on your choice), it might be necessary to stop and restart the web interface extension to enable it to detect the diskette drive. Moreover, the diskette must not be opened by another application (such as Windows Explorer), as this might cause interference. Note: The web interface extension is automatically installed on all Tivoli Provisioning Manager for OS Deployment servers, however, only the web interface extension on the parent server can be detected. If you have changed the parent server, or you are trying to work with a child server, you must manually install the web interface extension on the source computer before it can be detected. For information on how to do this, see Installing an uninstalling the Web interface extension. 8. Insert the bootable diskette that you want to image and run as a ramdisk in the disk drive and click Next. 9. Enter a software module description and click Next. 10. Specify parameters for the package creation and click Next. Results The software module is created. Creating a software module of the common agent: This example shows the steps for creating a software module of the Tivoli Common Agent. v The Agent Manager must be installed on the same server as Tivoli Provisioning Manager. The Agent Manager is installed during Tivoli Provisioning Manager installation. v The following Tivoli common agent installable packages have to be present in the local file repository root path: common_agent_1.4.1.0_200810230654_aix.tar common_agent_1.4.1.0_200810230654_linux_ppc.tar
344
common_agent_1.4.1.0_200810230654_linux.tar common_agent_1.4.1.0_200810230654_solaris.tar common_agent_1.4.1.0_200810230654_windows.exe The local file repository path is: TIO_HOME\repository. v A number of configuration scripts must exist inside the TIO_HOME/tools/prepare_tca_image folder. These scripts are: caInstall.rsp checkDiskSpace.vbs ihscript.vbs install.bat install.sh All of the scripts listed above will be used during an offline installation of the Tivoli Common Agent that will be performed on a target system once an OS image has been successfully deployed. v A script, prepareTCAImage, used for preparation of the Tivoli Common Agent and Tivoli Provisioning Manager subagent installation images must exist inside the tools folder. Either %TIO_HOME%\tools\ prepareTCAImage.cmd or $TIO_HOME/tools/prepareTCAImage.sh. This script will be executed by a workflow code and it will generate a number of Tivoli Common Agent offline, platform specific, installation packages. It also extracts the common agent installation parameters, such as the agent manager registration password, and writes them to a response file, caInstall.rsp. To 1. 2. 3. create a software module: Click Go To > Deployment > OS Management > Boot Servers. In the Select Action menu, select Create Tivoli Common Agent Software Modules. Click Yes when prompted to go to the Provisioning Task Tracking application.
The Provisioning Task Tracking application opens and you can monitor the progress of your software module creation.
345
The command lines and their optional confidentiality markers can be entered either in the Software wizard or when you edit the Package information (Click Go To > Deployment > OS Management > Software Modules. ) Once on the Software Modules page, select the software module that you want to edit.
346
Procedure
1. 2. 3. 4. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Computers. In the list of computers, click the name of the appropriate computer. Click the Deployment Properties tab. Click the Bindings tab, then click Software bindings.
5. Click Edit to modify the bindings. 6. Select the software module to associate with deployment to this computer. 7. Click OK.
Results
You have now bound a software module to a target computer.
What to do next
You can also deselect items to remove their explicit bindings. To remove a binding by rule, you must modify the rule.
Procedure
1. 2. 3. 4. 5. Click Go To > Deployment > OS Management > Software Modules. Select the software module that you want to use for the new binding rule. Click the software module that you want to bind. Details about the software module are displayed. Click New rule. When adding a binding rule to a software module, you can set values for the following criteria: v A deployment scheme v An image v A current OS configuration
347
v One of the system-definable and user-definable fields of the database (only used if you have customized the database) v An operating system type, such as Windows 2000 v An operating system version, such as SP2 v An operating system language v An operating system architecture, such as x86-32 v A computer model name v A BIOS version v A PCI device v A base board v A free-text condition in Rembo-C; syntax For example, to create a binding based on the operating system type between a software module and targets, you must create a rule, click OS type, and select the operating system version that you want to limit this software module to. 6. When adding a binding rule to an OS configuration, you can set a condition on the deployment scheme, and on the computer model name. The next four fields are only used if you have customized your database and want to match specific user categories. 7. Finally, you can enter a free-text condition following the Rembo-C; syntax. Free-text conditions follow a Rembo-C; syntax. They must only be used by advanced users. The conditions determine the applicability of the rule and evaluate to true or false. A condition must be formed using the variables also used for keyword substitutions in software modules, combined with Java-like logical operators, listed by order of priority in the table below:
Table 56. Logical operators for free-text conditions Operator < <= => > == != && || Meaning smaller than smaller than or equal to greater than or equal to greater than equal to not equal to AND operator OR operator
Results
You have now created an automatic binding rule.
348
Installing an image
You can now deploy the image to the target computer. The BIOS startup sequence of this computer must first have network and then hard disk for this installation task to complete successfully. If you are deploying the Tivoli Common Agent with a Linux golden master or unattended setup image, we recommend you have a minimum of 2 GB of swap space for the image. To specify this: Click Go To > Deployment > OS Management > Images. Select your image, then click the Properties tab, then the Disks tab. In this task, you will deploy the image to the target computer. To install the image on the computer: 1. Click Go To > Deployment > OS Management > Image Deployment. 2. Specify a name for the image deployment task or accept the default name. 3. Select the image that you want to install. 4. Select the target computer for the image installation. Note: During an unattended deployment of an ESXi server, you must set the boot setting of the target setting to Kernel free mode. The Kernel free mode only works with the PXE deployment. a. To set boot mode to Kernel free mode, go to Target Details > Edit Boot Mode > Use Kernel free mode. b. Save changes. 5. Choose to schedule the task or run it immediately. 6. Click Submit. The task will be run. Monitor its progress until the task has completed. Click Refresh to see the updated status. a. To view the task progress in detail, click the task name to open the task details page. In the Deployment Request Details column, click Request ID to view the provisioning workflow execution log. b. If the target computer is already managed by Tivoli Provisioning Manager, Tivoli Provisioning Manager will attempt to reboot the machine so that the deployment activity can run. If Tivoli Provisioning Manager cannot restart the machine, then Tivoli Provisioning Manager will schedule the OS deployment activity, and you must boot the machine manually. When the machine boots off the network (and gets picked up by the OS deployment server), it will then run the OS deployment activity. You have now deployed an image to your target computer. After you install an image of Windows 2000 using Tivoli Provisioning Manager for OS Deployment, you must log on to the Windows 2000 computer locally, with the Administrator credentials, for all disk partitions to be created correctly. If you log into the computer remotely for the first time after installing Windows 2000, some disk partitions might not appear in the Windows registry.
2000
Microsoft Sysprep, with Windows 2000 setup, will not configure a static IP network configuration. When you log on to Windows 2000, a network script is executed to configure the network. On the Windows 2000 computer, navigate to Start > Settings > Network and Dial-up Connections. From the menu, select View and then click Refresh to view the network connections configuration changes.
2000
349
The software inventory on the target computer might not be up to date after installing a Tivoli Provisioning Manager for OS Deployment image. We recommend you perform the following discoveries to update the software inventory on the target computer: 1. Install Tivoli Common Agent 2. Tivoli Provisioning Manager inventory discovery You can perform this task by running the Computer Discovery, Common Agent Installation and Inventory Discovery out-of-the-box scenario: Discovering your environment using the ready-to-use network discoveries on page 231.
Security
This section provides the user with information regarding security issues with Tivoli Provisioning Manager for OS Deployment.
350
The target sends broadcast packets to the network requesting a PXE answer. The first PXE server to respond to the request takes control of the target computer. A rogue PXE server answering the request faster than the legitimate Tivoli Provisioning Manager for OS Deployment PXE server can take control of computers booting onto the network. Using PXE in boot discovery mode is a well known security breach, independent from Tivoli Provisioning Manager for OS Deployment. While DHCP discovery must broadcast requests (the target computer does not yet possess any network information), there are ways to prevent the PXE security breach and allow only authorized PXE servers to answer requests from target computers.
On targets, the default ports are the following: v DHCP : port 68 UDP v MTFTP : port 8500-8510 Address: 232.1.0.1 UDP v MCAST : port 9999 UDP v Remote control (web interface extension) : port 4014 UDP All of these ports can be modified, with the exception of port 69 for TFTP. Port 69 is part of the PXE specification, independent from Tivoli Provisioning Manager for OS Deployment, and cannot be modified. Any product using PXE boot needs to have this port open to permit PXE boot. This port needs to be open only on the provisioning server, not on the target computers.
Reference
Reference information supports the tasks that you want to complete.
351
Procedure
1. Select Tivoli for the Product Group. 2. Select the Tivoli Provisioning Manager for OS Deployment or the Tivoli Provisioning Manager for Images product. 3. For the Installed Version, select the build number that matches the number of the Tivoli Provisioning Manager for OS Deployment build that was shipped with Tivoli Provisioning Manager 7.2. 4. Select the platform, and then click Browse to find the required packages and fixes. 5. Click Continue.
Procedure
1. Obtain the new Tivoli Provisioning Manager for OS Deployment or Tivoli Provisioning Manager for Images full build for the platforms used in your environment. If you are unsure, download all platforms. See Obtaining Tivoli Provisioning Manager for Images on page 396. 2. Extract all .exe files (self-extracting Windows 32-bit and 64-bit installables) to obtain the required .msi files. If you want, you can delete the .exe files. 3. Place all the Tivoli Provisioning Manager for OS Deployment or Tivoli Provisioning Manager for Images installables (tar.gz and .msi files) into the $TIO_HOME/repository/tpmfosd folder (for Windows, %TIO_HOME%\repository\tpmfosd). Note: Ensure that permissions for the files placed in the repository are set so that they are owned by tioadmin. 4. Discover the new Tivoli Provisioning Manager for OS Deployment or Tivoli Provisioning Manager for Images installables: a. Click Go To > Discovery > Provisioning Discovery > Discovery Configurations.
352
b. In the Discovery Configuration list, click TPMfOSD Version Discovery, and then click Run. This will discover the Tivoli Provisioning Manager for OS Deployment or Tivoli Provisioning Manager for Images installables that you have placed in the repository, and will also create Tivoli Provisioning Manager software products that represent the new versions of Tivoli Provisioning Manager for OS Deployment or Tivoli Provisioning Manager for Images. 5. Stop Tivoli Provisioning Manager for OS Deployment on all of your servers, except the one running on the local Tivoli Provisioning Manager server. 6. Perform the following: a. In Tivoli Provisioning Manager, run a software product upgrade for Tivoli Provisioning Manager for OS Deployment on the local server: 1) Click Go To > Deployment > Software Management > Software Product Upgrade. 2) On the Software Product Upgrade page, select Tivoli Provisioning Manager for OS Deployment as the software to upgrade.
Windows
Note: For details about the OSD_HOME installation directory, see ../ com.ibm.tivoli.tpm.ins.doc/install/rpath_variables.dita. 3) Select the target computer, which is the local Tivoli Provisioning Manager server, then select Upgrade to a new version as the upgrade method. 4) Click Submit. This will upgrade the local Tivoli Provisioning Manager for OS Deployment server to the new version that you have selected. b.
UNIX Linux For non-Windows Tivoli Provisioning Manager servers, the upgrade of the local Tivoli Provisioning Manager for OS Deployment server must be done manually, as Tivoli Provisioning Manager does not have root access to the local system:
Note: Due to a known limitation, step 6 b is required only for the local Tivoli Provisioning Manager server. For all the other Tivoli Provisioning Manager for OS Deployment servers, only step 6 a is required, regardless of their operating system. 1) Stop Tivoli Provisioning Manager for OS Deployment (stop the rembo, rbagent, and dbgw processes). 2) Untar or gzip the new Tivoli Provisioning Manager for OS Deployment or Tivoli Provisioning Manager for Images installable to the Tivoli Provisioning Manager for OS Deployment installation directory. This will overwrite the old installation file with the new one. 3) Start Tivoli Provisioning Manager for OS Deployment or Tivoli Provisioning Manager for Images. 4) Run the TPMfOSd Version Discovery (Click Go To > Discovery > Provisioning Discovery > Discovery Configurations.) to ensure that Tivoli Provisioning Manager is up-to-date with the new version that you upgraded manually. 7. If you have more than one Tivoli Provisioning Manager for OS Deployment servers in your environment, you must now upgrade your other servers, too. Repeat step 6 a and run the software product upgrade for all the other Tivoli Provisioning Manager for OS Deployment servers in your environment. This can be done for all server types. Note: If the local Tivoli Provisioning Manager server is not the parent server, the parent server must be upgraded before any child servers. Upgrade the Tivoli Provisioning Manager for OS Deployment servers one at a time.
Results
You have finished upgrading your Tivoli Provisioning Manager for OS Deployment to a later version.
353
Most parameters can be modified in the web interface: Click Go To > Deployment > OS Management > Boot Servers. For more details, see: Modifying OS configuration parameters on page 360.
Base parameters
Debug level information GlobalDebugLevel number specifies the level of details that must be placed in the log file. IP address of the backup server Backup ip-addr defines the IP address of a backup server that can be used by the target if the primary server fails. The backup server must have the same Net Password as this server. For the backup recovery system to work, the backup server must also contain an exact copy of the files stored on primary server. Maximum size of the server log files MaxLogSize number limits the size of the log file generated by the provisioning server. The maximum log size is specified in bytes, and applies to all log files created by the provisioning server. If you do not specify this parameter is not set, or set to 0, then log files are not limited in size. If a limit is set, and the server reaches this limit, the current log file is backed up and a new file is created. CountersInterval minutes specifies the interval, in minutes, for the server statistics measures. Network interfaces used by the server Interfaces ip-addr specifies the list of network interfaces that the provisioning server uses when sending and receiving packets to and from targets. If you leave this option unspecified, the server uses the network interface corresponding to the official hostname of the server. The format is a list of IP addresses, separated by spaces.
354
v TCP port for HTTP requests, TCP port for encrypted HTTP requests (SSL) HTTPServerPort port specifies the TCP port used by the Web interface when listening for unencrypted HTTP requests. You can set this parameter to 80 if you want the Web interface to be accessible by typing the server host name in your Web browser. To make the Web interface accessible by typing https followed by the server host name, set this parameter to 443. v Inactivity timeout before a session expires HTTPSessionTimeout minutes specifies the timeout (in minutes) before Web interface users are automatically logged out. A typical value is 5 minutes. Disable HTML contextual menus DisableContextualMenu disables the contextual menu. When you use a right-click in the web interface, you will see the regular contextual menu of your browser. Disable HTML drag-and-drop DisableDragAndDrop disables web interface drag-and-drop operations on selected icons. Drag-and-drop works on most common browsers, but it can be disabled in case of incompatibility. Disable javascript drop-down lists DisableJSDropDown disables enhanced drop-down menus in favor of standard drop-down menus. Standard drop-down menus do not recognize DHTML layers under Internet Explorer, so this parameter can cause problems. Disable the use of cookies DisableCookies disables the use of cookies in the web interface. Disabling cookies does not prevent you from using any essential function of the console. Disable HTTP transfer optimization DisableHTTPOptim disables the optimization of HTTP transfer in the web interface. Set this parameter if you do not want the web interface to group JavaScript, stylesheets, and images into large files to reduce HTTP traffic and enhance the cache process. You must disable this optimization if you are creating console pages.
355
MTFTPStartDelay secs specifies the time, in seconds, to wait before starting a MTFTP transfer. This period is used by target computers to replicate together. The higher the value is, the more replicated the deployment engine is. However, latency is introduced when booting target computers individually. The PXE standard default value is 2. v IP address used by targets for MTFTP MTFTPClients port [:target-port ] specifies the multicast IP address and port used by the provisioning server when sending MTFTP data to target computers. v UDP port for MTFTP requests MTFTPPort port specifies the UDP port used by the provisioning server to receive MTFTP request packets from target computers. The default value is 4015. v Seconds to wait before sending DHCP/BINL answers BootReplyDelay secs specifies the number of seconds to wait before answering DHCP/BINL request packets sent by target computers. If you have more than one provisioning server on the same subnet, target computers use the server with the lowest shortest reply delay. The default value is 0 (no delay). v Max. number of requests per minute (load balancing) BootReplyLimit number specifies the maximum number of DHCP/BINL requests to a provisioning server in one minute. The server discards boot requests coming from target computers when the specified limit is reached. A number of 0 indicates unlimited requests. This parameter can be used to implement load balancing over multiple servers. v UDP port for DHCP/BINL requests BootDiscoveryPort port specifies the UDP port that the provisioning server uses when listening for BINL boot requests. The default port used for a standard target computer is 4011. v Multicast IP address used for BINL requests BootDiscoveryAddress ip-addr specifies the multicast IP address that the provisioning server listens to when waiting for BINL multicast requests coming from target computers. This value must match the value set in the DHCP option 43 sent to targets. v No-boot schedule NoBootSchedule specifies the frequency at which the provisioning server stops providing a PXE boot service. It is used in conjunction with NoBootDuration. Modify this parameter using the web interface only. v No-boot duration in minutes NoBootDuration specifies the duration in minutes during which the provisioning server stops providing a PXE boot service if a no-boot schedule is specified. It is used in conjunction with the parameter NoBootSchedule. Modify this parameter using the web interface only.
356
BaseDir string specifies the base directory for the provisioning server. All paths included in the OS configuration are relative to this base directory. This is a mandatory parameter, and has no default value (if you are using file-based configuration mode, you must set it before starting the provisioning server for the first time). Relative directory for the shared repository SharedDir path specifies the path relative to the server file directory for storing the shared repository internal files. By default, this parameter is set to shared. First multicast IP address used for MCAST transfers FileMCASTAddress ip-addr:port specifies the multicast IP address used when sending packets to target computers. The provisioning server can generate different multicast IP addresses using this parameter as the base for the first address in a range. Number of multicast addressed to use for MCAST transfers FileMCASTAddrCount number specifies the number of multicast addresses that the provisioning server can use when sending multicast data to target computers. This parameter sets the size of the range of multicast addresses that the server can use. This range begins with the address set by the parameter FileMCASTAddress. Maximum number of PCAST connections FileMaxPCASTSessions indicates the maximum number of PCAST sessions that the provisioning server accepts simultaneously. This parameter is relevant if the server is running in UNICAST mode and deploying a group with the UNICAST setting. Port for FILE requests FileServerPort port specifies the UDP port used by the provisioning server to receive transfer protocol control requests. The default value is 4013, but you can change this parameter if port 4013 is already used by an application on your computer. Disable the TCP module DisableTCP disables the TCP component of the provisioning server. Target computers might not be able to boot on this server if you disable the TCP server module.
v Directory for internal files DataDir path specifies the path relative to the provisioning server base directory for storing files accessible to the target computer. By default, this parameter is set to files.
357
Replicated objects
The following objects are replicated between parent and a child OS deployment servers: v Deployment schemes v Hardware configurations v Software modules v Images, including virtual images With a good network connection between your servers and your database, you can choose one of the following replication mechanisms: v Automated, whenever it is needed, using a config.csv file. v Automated, at scheduled times. v Manual, using the web interface or a command line (web interface extension). See the related links for more information about replicating with a schedule or manually, using the web interface or the web interface extension.
Procedure
v For a persistent change, edit the config.csv file to include the new replication schedule. v Otherwise, use the web interface to set up a replication schedule. For each child server in the hierarchy: 1. Click Go To > Deployment > OS Management > Boot Servers. 2. Click the boot server to work with, then click its Replication tab. 3. Click Set up a replication schedule. 4. Enter the start date and time, and the frequency of the replications. As child servers must be replicated after their parents, you must use the same or a lower frequency than the replication schedule on the parent server. 5. Click OK.
Procedure
v With the web interface: 1. Click Go To > Deployment > OS Management > Boot Servers. 2. Click the boot server to work with, then click its Replication tab.
358
3. Select the OS deployment server you want to replicate. 4. Click on the link to replicate the server. The exact wording of the link depends on whether the server needs to replicate, and on the position of the server in the hierarchy. v With a command line and the web interface extension: 1. On the child server, open a command line shell. 2. Go to the directory where rbagent is located. 3. Run rbagent rad-srvsync.
What to do next
Now, you can replicate the children of this OS deployment server. You can also set up a replication schedule.
Status
v On the lower left hand-side of a server icon, the up/down indicator is displayed. The status indicator can take two different values:
A blue circle with a light center, indicating that the OS deployment server is up and running.
A black dot, indicating that the OS deployment server is down. v On the lower right side of a child server icon, the replication status indicator is displayed. The status indicator can take three different values:
A cross in a red dot indicates that the selected child server is not up-to-date with its parent. Files are missing on the child server; the child server must be replicated with its parent before any action is performed.
A yellow triangle with an exclamation point indicates a warning. A discrepancy was discovered between the child and the server files. Some files can have been updated or added on the parent server. Click Object version to view which deployment objects are not up-to-date. If you plan to use any of these objects, you must replicate your server first. This page contains yellow triangles if SSL is not disabled or if the servers are temporarily unresponsive.
A green dot with a white check mark indicates that the child server is up-to-date with its parent. Note: When a server is down, it keeps the replication status indicator it had when it was last running. Replicating while a server is down is not possible.
Chapter 4. Deploying operating systems
359
360
Examples
BaseDir "c:\Program Files\Common Files\IBM Tivoli" BaseDir "/usr/local/tpmfos"
BootDiscoveryAddress Name BootDiscoveryAddress Multicast address used for PXE discovery requests Synopsis BootDiscoveryAddress ip-addr Location v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the Boot module section. v rembo.conf: Beginning of the file. Description If PXE multicast boot discovery is enabled on the provisioning server (see (BootNoMulticastDiscovery)), this option must be set to the multicast IP address used by the remote-boot targets when performing PXE discovery. If this option is not set, Tivoli Provisioning Manager for OS Deployment uses the IP address 232.2.0.1.If the provisioning server is in the same subnet as the DHCP server, PXE discovery is not required because the remote-boot targets know that the PXE server is on the same computer as the DHCP server (option 60 set to PXEClient). If the provisioning server and the DHCP server run on different computers, but are on the same IP subnet, PXE discovery is still not required because the provisioning server intercepts DHCP requests and provides PXE information at the DHCP stage. You only require PXE discovery if the remote-boot targets are not on the same subnet as the provisioning server, or if your existing PXE infrastructure is already setup for PXE discovery. Example
BootDiscoveryAddress 232.5.6.7
BootDiscoveryPort Name BootDiscoveryPort IP port used when listening to PXE discovery requests Synopsis BootDiscoveryPort port Location in the OS configuration v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the Boot module section. v rembo.conf: Beginning of the file. Description This parameter must be set to the port used by remote-targets when sending PXE boot requests (multicast boot discovery, or BINL discovery). The default value works with PXE bootroms which have not been modified, so there is no reason to change this value unless you know what you are doing. If this option is not set, Tivoli Provisioning Manager for OS Deployment uses the IP port 4011. Example
BootDiscoveryPort 5011
Chapter 4. Deploying operating systems
361
BootNoMulticastDiscovery Name BootNoMulticastDiscovery Disables PXE multicast discovery support. Synopsis BootNoMulticastDiscovery yes/no Location v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the Boot module section. v rembo.conf: Beginning of the file. Description If the parameter BootNoMulticastDiscovery (without argument) is present in the configuration file (rembo.conf config), then PXE multicast discovery is disabled on the server. The provisioning server does not answer PXE multicast packets received from remote-boot targets. PXE multicast discovery is used by remote-boot targets if your existing PXE infrastructure is configured to use PXE discovery. Multicast discovery is not needed if the remote-boot targets and the provisioning server are on the same subnet, because the targets use other mechanisms to find the provisioning server (DHCP proxy, or DHCP option 60). If you know that you do not need PXE multicast discovery, you can disable it by setting this parameter to true. This is suggested if you are in a large company or institution where other PXE targets can be configured to use multicast discovery on other subnets, but you do not want your server to reply to these targets. Example
BootNoMulticastDiscovery
BootReplyDelay Name BootReplyDelay Sets the delay before answering discovery requests. Synopsis BootReplyDelay secs Location v web interface: Not available. v rembo.conf: Beginning of the file. Description This parameter sets the number of seconds to wait before answering a PXE discovery request (PXE discovery enabled), or a DHCP request (ProxyDHCP enabled). The default value is 0 (no delay). The only reason to delay a PXE reply is when two or more OS deployment servers are configured to run on the same subnet, with the same list of targets. The parent server can be configured with a delay of 0 seconds (answer immediately), and other servers with a delay of 2 seconds. If the parent server fails, backup servers handle remote-boot target requests. Example
BootReplyDelay 2
362
Synopsis DataDir " path" Location v web interface: Not available v rembo.conf: Beginning of the file. Description The server uses the directory specified by DataDir to store its internal files, in particular all the files stored on its file system. You can use this parameter to specify a new directory for the internal files of the server, for example if you want to store the server files on a new storage device with more space, but you want to keep the executable and configuration files on the original location. All the files stored in the directory specified by DataDir must not be modified, or the provisioning server might not work correctly. If the specified directory does not exists, the server tries to create it. Examples
DataDir "/mnt/morespace/rembo" DataDir "C:/TPMfOS"
DefaultAuthDomain Name DefaultAuthDomain Default authentication domain. Synopsis DefaultAuthDomain " domain" Location in the OS configuration v web interface :Not available v rembo.conf: Beginning of the file. Description This is the name of the default authentication domain to use when a target sends an authentication request to the server to identify a user. This name must match the name of an existing authentication domain as defined in Authentication domains. Example
DefaultAuthDomain "HTTP"
DefaultFileServer Name DefaultFileServer Defines a new server for FILE services. Synopsis DefaultFileServer ip-addr Location in the OS configuration v web interface :Not available v rembo.conf: Beginning of the file. Description This parameter can be used to specify the default IP address of the target serving the NETfs and MCAST protocols. If the you want to use the same provisioning server for all services, you do not have to specify this parameter. The target defined by this parameter must be configured to use the same network password (NetPassword) as the server containing this parameter.
Chapter 4. Deploying operating systems
363
This parameter is applied to all the targets contained in the group. Example
DefaultFileServer 172.16.8.9
DefaultGroup Name DefaultGroup Default group for unknown targets. Synopsis DefaultGroup " name" Location in the OS configuration rembo.conf: Beginning of the file. Description This parameter defines the default administrative group for unknown targets. The "name " argument must be an existing administrative group. Example
DefaultGroup "MyNewHosts"
DefaultLockOut Name DefaultLockOut Locks peripherals on unknown targets. Synopsis DefaultLockOut [ none ] [ , mouse ] [ , keys ] [ , screen ] [ , all ] Location in the OS configuration rembo.conf: Beginning of the file. Description Use this parameter to lock peripherals on the remote-boot targetsduring the time Tivoli Provisioning Manager for OS Deployment is active on the unknown target. You can for example lock the mouse or/and the keyboard so that the user cannot interrupt an automatic image restoration process. Peripherals are automatically unlocked when Tivoli Provisioning Manager for OS Deployment gives the control to the operating system (with a HDBoot, LXBoot, RDBoot or DeviceBoot). Example
DefaultLockOut keys, mouse
DefaultOptions Name DefaultOptions Startup options for the remote target computer. Synopsis DefaultOptions [ admin ] [ , autoboot ] [ , nousb ] [ , novesa ] [ , noapm ] [ , unicast ] [ , noigmp2 ] [ , noudma ] [ , noprotpart ] [ , realmodedisk ] [ , realmodepxe ] [, routepxeirq] Location in the OS configuration rembo.conf: Beginning of the file. Description Twelve different options can be set for targets. These options are used when unknown targets run under Tivoli Provisioning Manager for OS Deployment:
364
v Admin: forces the target to run in administrative mode. Administrative mode adds options in the start menu on the target: Interact, to run the interactive evaluator, and Purge cache to purge the local disk cache. Additionally, functions defined in the admin.rbx plugins are available (File Manager, TextEdit,...). v Autoboot: tells the target to automatically reboot on unrecoverable errors. Unrecoverable errors are low-level errors which cannot be intercepted with the exception mechanisms. By default unrecoverable errors are displayed on the screen and the computer is halted. You can define the autoboot option if you want to reboot on unrecoverable errors. v NoUSB: disables USB devices on the remote-boot target. v NoVESA: disables all the graphical interface on the remote-boot target. v NoAPM: disables advanced power management on the remote-boot target. v Unicast: uses unicast instead of multicast when downloading files from the provisioning server. v NoIGMP2: disables IGMP version 2 to force using IGMP version 1 on the remote-boot target. v NoUDMA: disables UltraDMA support for all IDE hard-disks on the remote-boot target. This can solve problems on poorly designed hardware or buggy chipsets, but at a high cost in terms of performance. v NoProtPart: disables ATA-5 features. v RealModeDisk: disables enhanced disk access. v RealModePXE: disables enhanced PXE access. v RoutePXEIRQ: reroutes network IRQ separately from the disk controller IRQ. Example
DefaultOptions admin
DefaultPXEBootMode Name DefaultPXEBootMode Selects default PXE boot behavior. Synopsis DefaultPXEBootMode { normal | hdboot | ignore } Location in the OS configuration rembo.conf: Beginning of the file. Description This option defines how the provisioning server answers PXE boot requests coming from unknown targets. When mode is normal, the provisioning server processes the boot request. When mode is hdboot, the provisioning server tells the unknown target to immediately boot on the hard disk. When mode is ignore, the provisioning server does not answer the boot request, thus giving the opportunity for another PXE server to answer. Example
DefaultPXEBootMode normal
DefaultResolution Name DefaultResolution Default screen resolution for new targets. Synopsis DefaultResolution " path " Location in the OS configuration v web interface : Not available v rembo.conf: Beginning of the file.
365
Description This parameter defines the default screen resolution for target on a new target. Example
DefaultResolution "800x600"
DisableBOOT Name DisableBOOT Disables PXE services Synopsis DisableBOOT Location in the OS configuration. v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the Boot module section. v rembo.conf: Beginning of the file. Description Use this option to disable the PXE component of the provisioning server. Targets are not able to boot on PXE anymore if this option is included in the configuration file. Use this option if you want to use the provisioning server for remote file access only (for example when setting up the server). Not included in the default configuration. Example
DisableBOOT
DisableContextualMenu Name DisableContextualMenu Disables the specific contextual menus in the web interface. Synopsis DisableContextualMenu Location in the OS configuration v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the web interface section. v rembo.conf: Beginning of the file. Description Add this option to the configuration file if you want to disable the specific contextual menus in the web interface. This can be useful if you want access to the regular contextual menu of your Web browser, in order, for example, to view the source page. Not included in the default configuration. Example
DisableContextualMenu
DisableCookies Name DisableCookies Disables the use of cookies in the web interface. Synopsis DisableCookies Location in the OS configuration
366
v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the web interface section. v rembo.conf: Beginning of the file. Description Add this option to the configuration file if you do not want the web interface to memorize your local preferences such as window positions using local cookies. Disabling cookies does not prevent you to use any essential function of the web interface. Not included in the default configuration. Example
DisableCookies
DisableDHCPProxy Name DisableDHCPProxy Disables answers to DHCP discovers (DHCPProxy). Synopsis DisableDHCPProxy yes/no Note: In rembo.conf configuration, the keyword DisableDHCPProxy is used without argument. If the keyword is present, it is assumed to be set to the value yes automatically. Location in the OS configuration. v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the Boot module section. v rembo.conf: Beginning of the file. Description If this parameter is set to yes, the provisioning server does not send PXE replies to DHCPDISCOVER packets sent by remote-boot targets. You can set this parameter to yes if you do not need this feature because either the DHCP server and the provisioning server are on the same target, or you are using PXE multicast discovery. The default value is false (that is DHCP Proxy is enabled by default). Example
DisableDHCPProxy
DisableDragAndDrop Name DisableDragAndDrop Disables the drag-and.drop feature of the web interface. Synopsis DisableDragAndDrop Location in the OS configuration. v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the web interface section. v rembo.conf: Beginning of the file. Description Add this option to the configuration file if you want to disable the drag-and-drop feature of the web interface. This can be useful in case of severe incompatibility with unsupported browsers. Note that the feature in known to work on most common browsers.
367
DisableFILE Name DisableFILE Disables FILE components of the provisioning server. Synopsis DisableFILE Location in the OS configuration. v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the File access module section. v rembo.conf: Beginning of the file. Description Add this option to the configuration file if you want to disable the FILE component of the provisioning server. This can be useful if you are accessing the server from TCP targets. Note: Do not set this option if targets are booting on this provisioning server. If you set DisableFile, you must also set DisableTCP. Not included in the default configuration. Example
DisableFILE
DisableHTTP Name DisableHTTP Disables the console. Synopsis DisableHTTP Location in the OS configuration. v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the web interface section. v rembo.conf: Beginning of the file. Description Add this option to the configuration file if you want to disable the HTTP component of the provisioning server, that is the web interface. Disabling HTTP is not recommended as it forces you to run the server in command-line only. If you set DisableHTTP, you must run the -c command line option to change server parameters. Note: A full Tivoli Provisioning Manager for OS Deployment server restart is necessary when this parameter is modified. Not included in the default configuration. Example
DisableHTTP
368
Synopsis DisableHTTPOptim Location in the OS configuration. v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the web interface section. v rembo.conf: Beginning of the file. Description Add this option to the configuration file if you want to prevent the web interface to group JavaScript, stylesheet, and image files into large files to reduce HTTP traffic. Note: If you are creating console pages, you must disable set this parameter to disable optimization. Not included in the default configuration. Example
DisableHTTPOptim
DisableJSDropDown Name DisableJSDropDown Disables JavaScript menus in the web interface. Synopsis DisableJSDropDown Location in the OS configuration. v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the web interface section. v rembo.conf: Beginning of the file. Description Add this option to the configuration file if you want to disable enhanced drop-down menus in the web interface, and use standard drop-down selectors instead. Note that standard drop-down selectors do not respect DHMTL layers under Internet Explorer, resulting in strange effects. Not included in the default configuration. Example
DisableJSDropDown
DisableNBP Name DisableNBP Disables NBP services. Synopsis DisableNBP Location in the OS configuration. v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the Network Boot Module section. v rembo.conf: Beginning of the file.
369
Description Including this option in the configuration file causes the NBP component of the provisioning server to stop answering requests coming on the NBP port. Do not set this option if your server is used by targets. Not included in the default configuration. Example
DisableNBP
DisableSSL DisableSSL Disables SSL encryption. Synopsis DisableSSL Location in the OS configuration. v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the web interface section. v rembo.conf: Beginning of the file. Description Add this option to the configuration file if you want to disable the SSL encryption and use unencrypted HTTP connections. This can be useful if you want a faster download time, but it is not as safe. Note: A full Tivoli Provisioning Manager for OS Deployment server restart is necessary when this parameter is modified. Not included in the default configuration. Example
DisableSSL
DisableTCP Name DisableTCP Disables TCP services. Synopsis DisableTCP Location in the OS configuration. v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the File access module section. v rembo.conf: Beginning of the file. Description This option disables the TCP component of the provisioning server. You can include this option with caution if you are not using server replication Note: Do not set this option if targets are booting on this server. If you set DisableTCP, you must also set DisableFile. Not included in the default configuration. Example
DisableTCP
FileMCASTAddress
370
Name FileMCASTAddress Multicast address used for the MCAST protocol. Synopsis FileMCASTAddress ip-addr:port FileMCASTAddrCount number Location in the OS configuration. v web interface: Not available. v rembo.conf: Beginning of the file. Description FileMCASTAddress defines the destination multicast address and destination port used by the provisioning server when sending multicast UDP datagram to targets requesting a file with the MCAST protocol. The default value is 239.2.0.1:10000. FileMCASTAddrCount defines the upper limit of the multicast address range used by the server (that is the number of different multicast addresses used). When combined with FileMCASTAddress, this parameter can control the lower and upper limits of the range of multicast addresses used by the server. The default value is 256 (that is use no more than 256 multicast addresses). The MCAST protocol is used by targets to download large files from the server. This protocol is a proprietary protocol made using multicast UDP. Example To force the provisioning server to use 1000 multicast addresses starting at 232.1.1.1, use:
FileMCASTAddress 232.1.1.1 FileMCASTAddrCount 1000
FileMCASTEncrypt Name FileMCASTEncrypt Encrypts MCAST datagrams. Synopsis FileMCASTEncrypt Location in the OS configuration. v web interface: Not available. v rembo.conf: Beginning of the file. Description If this parameter is present in a rembo.conf configuration file, or set to yes in the web interface, MCAST datagrams exchanged between the provisioning server and the remote-boot targets are encrypted. The MCAST protocol is used by targets to download large files from the server. This protocol is a proprietary protocol made using multicast UDP. MCAST datagrams are not encrypted by default. Example
FileMCASTEncrypt
FileServerPort Name FileServerPort Port used on the server for NETfs and MCAST requests. Synopsis FileServerPort port
371
Location in the OS configuration. v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the File access module section. v rembo.conf: Beginning of the file. Description This value is used by the provisioning server as the port for all file-related requests sent by targets. File-related requests include NETfs requests and MCAST requests. The default value is 4013. The value of this parameter is sent to targets during the NBP phase of the boot process. If you change this parameter, targets automatically use the new value on next boot. Example
FileServerPort 5013
HTTPAdminName Name HTTPAdminName Username of the main administrator of the provisioning server. Synopsis HTTPAdminName " username " Location in the OS configuration. v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the web interface section. v rembo.conf: Beginning of file. Description This is the superuser name intended to be used only by the main provisioning server administrator, in order to get access to the all configuration parameters of the server. There is only one superuser login. Example
HTTPAdminName "Admin"
HTTPRole Name HTTPRole Security roles with access to the web interface console. Synopsis HTTPRole "RoleName"{ Members "membername" [,...] Allowpages "pagename" [,...] Allowgroups "groupname" [,...] Policies "policyname" [,...] } Location in the OS configuration. v web interface: Not available. v rembo.conf: After global parameters. Description An HTTP role allows specific members to access predefined pages on the web interface, as well as preselected administrative groups. One can also define security policies. Parameters are a single string or a list of strings separated by commas. The star * means all, without restriction. Role members can be either individuals or groups defines by the authentication authority. An individual, who does not belong to any role, trying to log on to the web interface is denied access to the console. An individual, belonging to several roles, cumulates the page access
372
rights and administrative group access rights of all the roles s/he belongs to. Security policies are also cumulative, resulting in a more restrictive policy when an individual belongs to several roles. The security policies include: v CONF_RO to deny changes to the server configuration. v HOST_RO to deny addition and removal of targets. To use HTTPRole, you must first have set a local authentication domain named HTTP with ( )AuthLocalDomain. Example
HTTPRole "RestrictedAccess" { Members "rembo" Allowpages "*" AllowGroups "local1", "local2" Policies "HOST_RO" }
HTTPServerPort Name HTTPServerPort TCP port for HTTP requests. Synopsis HTTPServerPort port Location in the OS configuration. v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the web interface section. v rembo.conf: Beginning of the file. Description This is the TCP port used by the web interface when listening for unencrypted HTTP requests. You can set this parameter to 8080 if you want the web interface to be accessible by typing the server hostname in your Web browser. The provisioning server always listens on this port even if connections are encrypted, in order to redirect unencrypted connections to the encrypted TCP port. Note: A full Tivoli Provisioning Manager for OS Deployment server restart is necessary when this parameter is modified. Example
HTTPServerPort 8080
HTTPSServerPort Name HTTPSServerPort TCP port for encrypted HTTP requests (SSL). Synopsis HTTPSServerPort port Location in the OS configuration. v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the web interface section. v rembo.conf: Beginning of the file. Description This is the TCP port used by the web interface when listening for encrypted HTTP requests.
Chapter 4. Deploying operating systems
373
You can set this parameter to 443 if you want the web interface to be accessible by typing the server hostname in your Web browser, prefixed with the https URL syntax. Note: A full Tivoli Provisioning Manager for OS Deployment server restart is necessary when this parameter is modified. Example
HTTPSServerPort 443
HTTPSessionTimeout Name HTTPSessionTimeout Time in minutes before a web interface session expires. Synopsis HTTPSessionTimeout minutes Location in the OS configuration. v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the web interface section. v rembo.conf: Beginning of the file. Description This is the inactivity timeout (in minutes) before web interface users are automatically logged out. A typical safe value is 5 minutes, but you might want to make it longer if you receive the message Session timed out too often and are sure that you will not forget to log out when you leave your computer. Example
HTTPSessionTimeout 30
Interfaces Name Interfaces List of network interfaces used by the provisioning server. Synopsis Interfaces ip-addr1 [ ip-addr2 ] [ ip-addr3... ] Location in the OS configuration. v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the Base Parameters section. v rembo.conf: Beginning of the file. Description You will find this option very useful if you are running on a multihomed computer (that is a target with more than one network card, or with a network card and a dial-up adapter). This option lets you specify the list of network interfaces used by the provisioning server when receiving and sending packets to targets. If you leave this option unset, the server uses the network interface corresponding to the official hostname of the server. You must specify a list of IP addresses to use. Each IP address must correspond to the IP address to one of the network interfaces of the provisioning server. The list must contain at least one address. Note: You are strongly encouraged to set this option if your computer is multihomed. Otherwise the server might not receive the network packets not originating from its official interface.
374
Examples
Interfaces 192.168.1.1 Interfaces 192.168.1.1 192.168.10.1 10.1.1.1
MaxLogSize Name MaxLogSize Maximum size of log files created by the provisioning server. Synopsis MaxLogSize size_in_bytes Location in the OS configuration. v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the Base parameters section. v rembo.conf: Beginning of the file. Description This parameter can be used to limit the size of the log file generated by the provisioning server. The maximal log size must be specified in bytes, and apply to all the log files created by the server (file, nbp, http, tcp, VM, and boot). If you do not specify this parameter, or set the limit to 0, then log files are not limited in size. Example To limit the size of logs to 10MB:
MaxLogSize 10000000
MaxPCASTSessions Name MaxPCASTSessions Maximum number of simultaneous PCAST sessions. Synopsis MaxPCASTSessions number Location in the OS configuration. v web interface > : Not available v rembo.conf: Beginning of the file. Description This is the maximum number of PCAST sessions that the provisioning server accepts simultaneously. This parameter is mostly relevant if the server is running in UNICAST mode and deploying a group with UNICAST setting. The default value is 8. Because each session uses around 16MB of server memory, higher values must be avoided on servers with no more than 256Mb. Example
MaxPCASTSessions 8
MaxTFTPSegSize Name MaxTFTPSegSize Maximum size of a TFTP segment. Synopsis MaxTFTPSegSize number
375
Location in the OS configuration. v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the Boot module section. v rembo.conf: Beginning of the file. Description This is the maximum size of TFTP segment in bytes. This parameter can be used to reduce the size of packets sent by the provisioning server if required by the underlying network. This can be useful for instance when network traffic is encrypted by routers. The default value is 512. Example
MaxTFTPSegSize 256
MTFTPClients Name MTFTPClients The destination address and port used by the MTFTP server. Synopsis MTFTPClients ip-addr [: port ] Location in the OS configuration. v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the Boot module section. v rembo.conf: Beginning of the file. Description This is the destination IP address and port used by the server when sending multicast MTFTP datagrams to boot agents. The IP address must be a valid multicast address and must match the address sent to the target during the DHCP phase. If the deployment engine has received its PXE parameters from the provisioning server during the DHCP phase, this address is automatically included so that the deployment engine always uses the same address/port as the server. The default value is 232.1.0.1:8500. Example
MTFTPClients 232.8.7.6
MTFTPPort Name MTFTPPort The port used by the MTFTP server. Synopsis MTFTPPort port Location in the OS configuration. v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the Boot module section. v rembo.conf: Beginning of the file. Description This is the port used by the server when listening to MTFTP requests. If the remote-boot targets are using the provisioning server to get their PXE parameters, this value is sent in the DHCP/PXE reply so that the remote-boot target always uses the correct port.
376
MTFTPStartDelay Name MTFTPStartDelay The initial delay on target computers before sending first MTFTP request. Synopsis MTFTPStartDelay secs Location in the OS configuration. v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the Boot module section. v rembo.conf: Beginning of the file. Description This is the delay used by remote-boot targets before sending the first MTFTP request to the provisioning server. This delay is used by the target to listen to an existing MTFTP transfer. If the MTFTP file they are about to request is already being sent by the server on the multicast address, then the target does not request the file and listens to the packets. The longer this delay is, the more probability you have that many targets reuse the same MTFTP channel instead of requesting the file. But if you want to have a fast boot process, you must set this value to 1 (the minimum value). The default value is 2 (seconds). Example
MTFTPStartDelay 1
NBPServerPort Name NBPServerPort Port used on the provisioning server for NBP requests. Synopsis NBPServerPort port Location in the OS configuration. v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the Network Boot module section. v rembo.conf: Beginning of the file. Description This value is used by the provisioning server as the port for all NBP requests sent by remote-boot targets. NBP is a protocol used by target computers to get their startup parameters (startup page, groupname,...) and to send authentication requests to the server. The default value is 4012. The value of this parameter is sent to targets as part of the last MTFTP packet when the server sends the initial part to the PXE bootrom. If you change this parameter, targets automatically use the new value on next boot. Example
NBPServerPort 5012
NetPassword
377
Name NetPassword Network password for remote file access. Synopsis NetPassword " password " Location in the OS configuration. v web interface: Not available. v rembo.conf: Beginning of the file. Description This is the password used by the provisioning server to accept or deny network requests coming from a target, the web interface or NetClnt. You must change this option when you install a new provisioning server and select a password to protect your files against unpermitted access. If you are using the Windows version of the server, you are asked to enter the password during the setup. If you are using the web interface, or NetClnt to access the files stored in your provisioning server, the password you enter in NetClnt (or the web interface) must match the word set in NetPassword. Note: This password is an important piece of your security. If you require optimal security, you are strongly encouraged to protect the configuration of the server. By default, this file is created by the installer and the password is stored encrypted in it. Example
NetPassword "mypassword"
NetworkShare Name NetworkShare UNC path of the shared partition directory of the provisioning server. Synopsis NetworkShare "path " Location in the OS configuration. v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the Network Share Module section. v rembo.conf: Beginning of the file. Description This is the path of the shared partition directory of the provisioning server. This parameter can be used to increase the deployment speed of some operating systems. The target computer access the network share directly to retrieve the necessary installation files. You need to have set the partition as read-only for the user entitled to access the network share. Example
NetworkShare "provisioningServer/partition"
NetworkUser Name NetworkUser name of a user entitled to access the network share. Synopsis NetworkUser "name " Location in the OS configuration.
378
v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the Network Share Module section. v rembo.conf: Beginning of the file. Description The name of the user entitled to access the network share, which is given in NetworkShare. If the user is part of a domains, you must use the syntax Domain/User. This user name is used by the targetcomputer to access the network share on the provisioning server. Example
NetworkUser "ClientComputer"
NetworkPasswd Name NetworkPasswd Network password used by the target computer to access the network share. Synopsis NetworkPasswd "password " Location in the OS configuration. v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the Network Share Module section. v rembo.conf: Beginning of the file. Description This is the password used by the target computer to access the network share located on the server, using the NetworkUser user name. The password is stored in the rembo.conf file. Example
NetworkPasswd "clientPassword"
TCPServerPort Name TCPServerPort Defines the TCP port used. Synopsis TCPServerPort port Location in the OS configuration. v web interface: Not available. v rembo.conf: Beginning of the file. Description This option defines the TCP port used by the TCP component of the provisioning server when listening to requests coming from other servers. The default value is 4013. Example
TCPServerPort 2048
379
The hardware listed in Table 57 to Table 65 on page 383 are known to work with Tivoli Provisioning Manager for OS Deployment.
Table 57. IBM servers Machine Type 7971 7972 7981 7996 8853 8832 8843 8839 8850 8886 8835 8848 8486 8480 8482 8485 8647 8649 8648 8671 8841 8685 8865 8673 8836/8849 8849 8676 8837 8670 8840 8863 8870 8872 4347 4362 4363 4364 4365 Model IBM BladeCenter LS21 BladeCenter LS41 BladeCenter HS20 BladeCenter HC10 BladeCenter HS21 BladeCenter HS20 BladeCenter HS20 BladeCenter HS40 BladeCenter LS20 BladeCenter S eServer 325 eServer 326 IBM xSeries 100 xSeries 205 xSeries 206 xSeries 206m xSeries 225 xSeries 225 xSeries 226 xSeries 235 xSeries 236 xSeries 255 xSeries 260 xSeries 305 xSeries 306 xSeries 306m xSeries 335 xSeries 336 xSeries 345 xSeries 346 xSeries 366 xSeries 445 xSeries 460 System x3105 System x3200 System x3200 System x3250 System x3250
IBM Tivoli Provisioning Manager Version 7.2.0.2 User Guide
Tested BIOS level BAJT22A BAJT22A FEE110A DOJT16A BCJT16A BSJT26A BWJT27A SBJT62A BKJT23F BCJT16A M1JT36A M2JT28A IJJT28C JPJT53A KEJT40A PAJT24A OPJT50A OQJT14A PMJT66C GRJT57A NRJT34A AVJT26A ZUJT65A PLJT68A KEJT40A PAJT42A T2JT39A APJT37A GEJT63A KPJT41A ZUJT65A REJT49A ZUJT65A A2JT19A G8JT29A G8JT29A G9JT26A G9JT26A
380
Table 57. IBM servers (continued) Machine Type 7973 7984 7977 7978 7979 7985 8877 8866 8864 8878 Model System x3400 System x3455 System x3500 System x3550 System x3650 System x3655 System x3755 System x3800 System x3850 System x3950* Tested BIOS level SPJT52A C0JT35A SPJT52A GFE29B GGE29B C2JT28A ZYJT29A ZTJT10A ZSJT10A ZTJT13A
Table 59. Lenovo mobile and desktop computers Machine Type ThinkCentre ASI ThinkCentre SSO ThinkPad R52 ThinkPad T30 ThinkPad T41 ThinkPad T42 ThinkPad T60 ThinkPad T60p ThinkPad X31 ThinkPad X60 Table 60. IBM Point of Sale computers Machine Type 4851-514 4810-33H 4838-137 4840544 4800-722 4800-782 4836-132 4846-565 4800-743 IBM SurePOS 500 SurePOS 300 Anyplace Kiosk SurePOS 500 SurePOS 700 SurePOS 700 Anyplace Kiosk SurePOS 500 SurePOS 700
Model 8105, 8107, 8109, 8117, 8119, 8121 8086 1859-B7U 2366-N6G 2373-3JG 2373-FWG 1951-A47 2007-83U 2672-C8G 1706-AA7
Model
Tested BIOS level HHKT130 8BKT120 8AKT111 X7KT100 82KT130 83KT130 8AKT111 X6KT142 85KT027
381
Table 60. IBM Point of Sale computers (continued) Machine Type 4800-723 4838-520 4838-720 Table 61. IBM storage servers Name IBM TotalStorage DS4100 (formerly FAStT100) IBM TotalStorage DS4300 (formerly FAStT600) IBM TotalStorage DS4400 (formerly FAStT700) IBM TotalStorage DS4500 (formerly FAStT900) FAStT EXP500 Storage Expansion Unit Table 62. Ethernet adapters Part number 06P3601 06P3801 08K3124 08L2565, 08L2567 09N3609 09N9774 09N9901 22P4501 22P4701 26P8039 31P6301 31P6401 34L0201 34L1101, 34L1110 34L1201, 34L1210 34L4401 (3DES US) 34L4410 34L4501 (DES non-US) 34L4510 85H9921, 85H9930 85H9921, 85H9930 FRU number 06P3609 06P3809 08K3125 08L2566 09N3609 00N8117 09N9901 22P4509 22P4709 26P8069 31P6309 31P6409 30L5929 34L1109 34L1209 34L4409 not available Name IBM 10/100 Ethernet Server Adapter Intel PRO/100 SP Mobile Combo adapter IBM 10/100 EtherJet Mini PCI adapter with 56K modem (Intel current card) IBM 10/100 EtherJet PCI Adapter with Wake on LAN1 10/100 EtherLink PCI Management Adapter by 3Com IBM 10/100 EtherJet miniPCI adapter with 56K modem by 3Com 10/100 EtherLink Server Adapter by 3Com Intel PRO/100S Desktop Adapter Intel PRO/100S Low Profile Desktop Adapter Ethernet Daughter Card IBM NetXtreme 1000 T Ethernet Adapter IBM NetXtreme 1000 T Dual Port Ethernet Adapter IBM 10/100 EtherJet PCI Adapter with Wake on LAN1 IBM 10/100 EtherJet PCI Adapter with IBM Alert on LAN 2 IBM 10/100 EtherJet PCI Management Adapter IBM 10/100 EtherJet Secure Management Adapter IBM 10/100 EtherJet Secure Management Adapter
WoL Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes No Yes Yes Yes Yes Yes
85H9928 85H9928
IBM 10/100 EtherJet PCI Adapter with Wake on LAN1 IBM 10/100 EtherJet PCI Adapter with Wake on LAN1
Yes Yes
382
Table 62. Ethernet adapters (continued) Part number Ships with system Ships with system Ships with system Ships with system FRU number not available not available 26P8100 not available Name Intel Gigabit Copper (82543) PRO 1000 XT Intel Gigabit Copper (82544) PRO 1000 XT IEEE 1394/LAN Combo Card On board Ethernet Adapter for ThinkPad R30 WoL Yes Yes Yes Yes
Table 63. IBM ServeRAID controllers Name ServeRAID-8i controller ServeRAID-8s controller Winterhaven, MegaRAID 8480 SAS controller ServeRAID-4Mx Ultra160 SCSI controller ServeRAID-4Lx Ultra160 SCSI controller ServeRAID-5i Ultra320 SCSI controller ServeRAID-6M Ultra320 SCSI controller ServeRAID-4H Ultra160 SCSI controller ServeRAID-6i Ultra320 SCSI controller ServeRAID-7k Ultra320 SCSI controller ServeRAID-7t SATA controller ServeRAID-7e (Adaptec HostRAID) controller ServeRAID-8e controller ServeRAID-8k SAS controller LSI MegaRAID SAS 8408E controller LSI 1068 controller Table 64. LSI RAID controllers Name LSI-SAS RAID controller (Sanford) Single Channel LSI Ultra320 SCSI controller Dual Channel LSI Ultra320 SCSI controller LSI MegaRAID IDEal RAID controller Table 65. BladeCenter-related products Name SAS Expander Switch Module SAS 2-port CFFv daughter card Qlogic 4Gb SFF Qlogic 4Gb Std Part number 39Y9192 39Y9187 26R0890 26R0884 FRU number 39Y9193 39Y9188 26R0893 26R0889 25R8060 LSI53C1020 LSI53C1030 LSI MegaRAID IDEal RAID Part number Part number 13N2227 39R8765 39R8850 06P5736 06P5740 25P3492 32P0033 37L6889 71P8595 71P8642 71P8648 n/a n/a 25R8064 39R8850 25R8060 FRU number 13N2233 39R8785 39R8852 06P5737 06P5741 32P0016 02R0985 37L6892 71P8627 71P8644 71P8650 n/a n/a 25R8064 n/a n/a
383
Table 65. BladeCenter-related products (continued) Name Emulex 4Gb SFF Fibre Channel Expansion Card IBM BladeCenter Optical Pass-Thru Module Cisco Gigabit Ethernet Switch module Cisco Fiber Switch Module IBM BladeCenter Advanced Management Module (AMM) IBM BladeCenter PCI Expansion Unit (PEU) IBM BladeCenter HS20 Fibre Channel Expansion Card - Short Form Factor IBM BladeCenter 6-pt Fibre Channel Switch Module Qlogic iSCSI Expansion Card for IBM BladeCenter Nortel Copper L2/L3 Switch Module Nortel Fibre L2/L3 Switch Module QLogic 4 Gb Fibre Channel Switch Module Brocade 20 Port FC switch module IBM BladeCenter HS20 Fibre Channel Expansion Card IBM BladeCenter 2-Port Fibre Channel Switch Module Myrinet Cluster Expansion Card for IBM BladeCenter IBM BladeCenter Copper Pass-Thru Module IBM BladeCenter Gigabit Ethernet Expansion Card Part number 39Y9186 02R9080 13N2281 13N2285 25R5778 25K8373 26K4841 26K6477 26K6487 26K6530 26K6531 26R0883 32R1812 48P7061 48P7062 73P6000 73P6100 73P9030 FRU number n/a 02R9082 13N2285 13N2286 25R5777 32R0753 26K4859 26K6481 26K6490 26K6526 26K6529 26R0888 32R1820 59P6624 59P6621 73P6001 73P6098 13N2306 (replaces 73P9031) 73P9004 90P3776 n/a
Nortel Network Layer 2-7 GbE Switch Module for IBM BladeCenter Intel Copper Switch Module IBM BladeCenter PCI Expansion unit (PEU)
Procedure
1. On the source computer, find the files for the web interface extension, which are located in the OSD_DATADIR\global\http\agents directory, where OSD_DATADIR is the Tivoli Provisioning Manager for OS Deployment data directory you specified, for example: v
Windows
%SYSTEMDRIVE%\tpmfosd files
v v v
Windows Run the rbagent.msi file. Follow the instructions in the wizard to install the web interface extension. AIX Linux
384
Solaris
For all UNIX files, you must transform the downloaded file into an executable (for example, chmod +x rbagent.linux) and then run it. For example, ./rbagent.linux -s <IP>:<password> where IP is the IP address of the OS deployment server to which you want to connect, and password is the password that was specified at the Tivoli Provisioning Manager for OS Deployment installation.
385
386
387
Process
When you deploy an image, the deployment is made up of several steps that are automatically run in sequence without user interaction: 1. Invoke the Image Deployment application. Click Go To > Deployment > OS Management > Image Deployment. 2. Select the target machine and image you want to install. The image deployment workflow will be run. If Tivoli Provisioning Manager can manage the target computer (it has credentials and can execute commands) and the target computer is running, then Tivoli Provisioning Manager will restart the target computer. Since the target computer must be set to boot from the network first (see Network boot on page 273), it will then PXE boot off the Tivoli Provisioning Manager for OS Deployment deployment server. If Tivoli Provisioning Manager cannot manage the target computer, then you must restart the computer yourself. 3. The target determines that it is starting a new deployment and queries the provisioning server for the relevant deployment OS configuration. 4. The target performs hardware discovery through DMI and PCI system calls. 5. The target queries the ODBC/JDBC database for all relevant information regarding the operating system and the software modules to be installed, and dynamically generates a deployment script. 6. If specific hardware configuration software needs to be run early (such as RAID controller configuration), you will have to deploy the hardware configuration image with an image deployment. If you want to install a hardware configuration and then an OS image afterwards, you can create a software stack containing entries for the hardware configuration stack and the OS image (for example, a golden master or unattended setup) stack. After a subsequent reboot, the target resumes the process. 7. The target partitions its hard disk according to the information retrieved from the database. A small bootstrap is also written to the hard disk, so as to be able to take over any subsequent reboot on the hard disk. 8. The target initiates a batch multicast transfer for all files needed during the deployment. The files are downloaded in the order which optimizes the efficiency of the multicast download and stored in a temporary storage location on the hard-disk. 9. When everything is done, the deployment process terminates by starting up the target computer into the operating system. Tivoli Provisioning Manager will also attempt to connect to the machine after the deployment and run an inventory scan.
User roles
You must be assigned to the appropriate user role to perform virtual image management operations.
388
Table 66. User roles Role Provisioning Administrator Description v Upgrades Tivoli Provisioning Manager for OS Deployment to Tivoli Provisioning Manager for Images, to enable the virtual images management. v Installs the web interface extension on hypervisors. v Performs higher level management of the environment such as installing or deleting boot servers. Provisioning Configuration Librarian v Knowledge of provisioning server v Manages overall product configuration, boot server, and configuration. Responsible for virtualization technologies. setting up the environment to support boot server and hypervisor technologies. v Performs virtual image discovery, replication, capture, import, export, and deployment activities. Deployment Specialist v Deploys captured virtual images to v Server and image management target computers. experience. v Knowledge of hypervisor technologies. v Familiarity with OS management life cycle. End User v The individual who uses a target computer, typically a notebook, desktop or server. v Basic knowledge of the operating system on the target computer. Skills v Knowledge of boot server and virtualization technologies.
Requirements
User roles and requirements on page 406 Requirements on page 406 Target computer requirements: Requirements for Windows target computers on page 556 Requirements for Red Hat Linux target computers on page 560 Requirements for SUSE Linux Enterprise Server (SLES) target computers on page 561 Requirements for AIX target computers on page 562 Requirements for Solaris Operating Environment target computers on page 563 Requirements for HP-UX target computers on page 565 v Hypervisor requirements on page 407 v Server system requirements on page 280 v Setting up additional child OS deployment servers on page 283 v Windows Preinstallation Environment (WinPE) on page 286 v Prerequisites for VMware targets on page 295 v DHCP server requirements and configuration on page 296
389
Key terms
bare metal computer A computer on which there is nothing reliable but the hardware. It can be coming straight from factory without any data on its hard disk (out of the box) or it can contain a possibly damaged operating system. boot server A system that is required to start other servers. Boot servers are defined to provision workstations or other systems without any installed software. Compare with terminal server. child server An OS deployment server that is a subordinate of another OS deployment server in a replication tree structure. Only the top-level parent OS deployment server is not a child. hypervisor A program or a portion of Licensed Internal Code that allows multiple instances of operating systems to run simultaneously on the same hardware. Typically, it represents the server that hosts the virtual servers. For ESX, for example, the hypervisor is the actual VMWare ESX server that hosts the virtual servers. image A representation of a computer program and its related data such as the kernel, file systems, libraries, and programs of the managed system at a particular time.
parent server An OS deployment server in a replication tree structure that has at least one dependent OS deployment server. See also child. Preboot Execution Environment (PXE) PXE is an industry standard target/server interface that allows networked computers that are not yet loaded with an operating system to be configured and booted remotely. PXE is based on Dynamic Host Configuration Protocol (DHCP). Using the PXE protocol, targets can request configuration parameter values and startable images from the server. The PXE process consists of the system initiating the protocol by broadcasting a DHCPREQUEST containing an extension that identifies the request as coming from a target that uses PXE. The server sends the target a list of OS deployment servers that contain the operating systems available. The target then selects and discovers an OS deployment server and receives the name of the executable file on the chosen OS deployment server. The target downloads the file using Trivial File Transfer Protocol (TFTP) and runs it, which loads the operating system. target computer The system that is the final destination of a management operation. unattended setup Operating system installation on a target, using original installation files and parameters contained in a script defined on the OS deployment server. Contrast with clone. virtual image A virtual representation of a computer program and its related data such as the kernel, file systems, libraries, and programs of the managed system at a particular time.
Troubleshooting
v Log files v Operating system and virtual image management problems and limitations v Messages v Search the IBM Support Portal v Contacting Support
390
Log files
Review the log files in the following topics to recover from problems that you might encounter when managing virtual images: v Tivoli Provisioning Manager for OS Deployment server log files v Copying log files to the software repository v Recovering from Tivoli Provisioning Manager for OS Deployment or Tivoli Provisioning Manager for Images problems
Resources
To learn more about virtual image management, refer to one of the following resources: v Tutorial: Managing virtual images on page 437 v Components for managing virtual images on page 265 v Installing the web interface extension on page 428 v Virtual image tasks on page 430 v For a description of a field in the interface, click Alt+F1.
Related links Chapter 5, Managing virtual images, on page 387 Requirements on page 406 Troubleshooting virtual images management Tutorial: Managing virtual images on page 437
391
392
through the TCP-to-ODBC/JDBC Gateway service. This database stores Bill of Material (BOM) files for every target, including information about what software modules must be installed. Console-side components The web interface This is a Web-based application that is used to prepare and supervise deployments. Using the web interface, you can configure the OS deployment server, manage objects used during a deployment, and create recovery CDs and DVDs. You can also visualize targets into their different groups. The parameters and status of each target can be controlled (for example, when a target requests a remote-boot through PXE). Target-side applications The following target-side applications are installed automatically by the target through the network. The deployment engine The deployment engine is a stand-alone mini-operating system used for all the management tasks that are performed outside of the real operating system, such as the operating system installation. The deployment engine must not be installed manually on target systems, because it is downloaded automatically when the target systems are instructed to boot on the OS deployment server in their DHCP configuration. After the deployment engine is started, it loads a ramdisk that can perform various operations on the targets, such as: v Disk partitions and formatting v Installation of complete operating systems such as Windows or UNIX v Disk wipes The web interface extension The web interface extension is a small program that can run on most operating systems (Windows, AIX, Linux, Solaris), either in the background as a service or as a command-line tool. It provides cross-operating system connectivity to the management platform for targets with an installed operating system. It can be used to collect information from targets, to remotely initiate tasks on a target from the OS deployment server, or to trigger commands on the OS deployment server from a target. The web interface extension can access all files on the hard disk and other drives through the operating system. When running under Microsoft Windows, it can also access the system registry, and all system information published by drivers using the Windows Management Interface (WMI). Also, for all Intel-based operating systems, the web interface extension can install a hook on the boot process to initiate a PXE boot or to start the deployment engine in offline mode, to trigger pre-operating system management tasks such as migration or recovery. The deployment engine and the web interface extension are stand-alone management platforms and do not require an operating system. The web interface side application, typically installed on the server, is the web interface extension, running in background as a service. Optionally, a web interface extension can be installed on targets, so that you can take control of them remotely. The web interface extension is useful, for example, to restart the computer when a deployment starts, or to perform an operating system inventory. Several features of the web interface are not available when the web interface extension is not installed on the server. The web interface extension is a piece of software designed to run as an operating system application (a Windows application or a UNIX application). When you install the product, you install the OS deployment server. The target side is embedded into the server, and sent to computers through a network connection such as a network boot or PXE boot, or through media such as a CD-ROM, a diskette, or a hard disk partition.
Chapter 5. Managing virtual images
393
Note: It is also possible to boot targets over the network without using PXE. See Booting targets without using PXE on page 274 for more information.
394
1. A CD-ROM that contains both the deployment engine and the web interface extension can be created. 2. Computers boot, loading the deployment engine either from the PXE server (OS deployment server) or from the CD-ROM.
Chapter 5. Managing virtual images
395
3. The deployment engine loads a ramdisk, embedded Linux for Linux targets or WinPE2 for Windows targets. 4. The ramdisk can perform various tasks, including the operating system installation. 5. The targets boot into the operating system (Windows, Linux, Solaris), with the web interface extension optionally running.
Procedure
1. Select Tivoli for the Product Group. 2. Select the Tivoli Provisioning Manager for OS Deployment or the Tivoli Provisioning Manager for Images product. 3. For the Installed Version, select the build number that matches the number of the Tivoli Provisioning Manager for OS Deployment build that was shipped with Tivoli Provisioning Manager 7.2. 4. Select the platform, and then click Browse to find the required packages and fixes. 5. Click Continue.
What to do next
Upgrading Tivoli Provisioning Manager for OS Deployment to Tivoli Provisioning Manager for Images on page 397
396
Upgrading Tivoli Provisioning Manager for OS Deployment to Tivoli Provisioning Manager for Images
To gain access to the virtualization features provided by Tivoli Provisioning Manager for Images, you must upgrade Tivoli Provisioning Manager for OS Deployment (the build provided with Tivoli Provisioning Manager version 7.2) to Tivoli Provisioning Manager for Images.
Procedure
1. Obtain the new Tivoli Provisioning Manager for OS Deployment or Tivoli Provisioning Manager for Images full build for the platforms used in your environment. If you are unsure, download all platforms. See Obtaining Tivoli Provisioning Manager for Images on page 396. 2. Extract all .exe files (self-extracting Windows 32-bit and 64-bit installables) to obtain the required .msi files. If you want, you can delete the .exe files. 3. Place all the Tivoli Provisioning Manager for OS Deployment or Tivoli Provisioning Manager for Images installables (tar.gz and .msi files) into the $TIO_HOME/repository/tpmfosd folder (for Windows, %TIO_HOME%\repository\tpmfosd). Note: Ensure that permissions for the files placed in the repository are set so that they are owned by tioadmin. 4. Discover the new Tivoli Provisioning Manager for OS Deployment or Tivoli Provisioning Manager for Images installables: a. Click Go To > Discovery > Provisioning Discovery > Discovery Configurations. b. In the Discovery Configuration list, click TPMfOSD Version Discovery, and then click Run. This will discover the Tivoli Provisioning Manager for OS Deployment or Tivoli Provisioning Manager for Images installables that you have placed in the repository, and will also create Tivoli Provisioning Manager software products that represent the new versions of Tivoli Provisioning Manager for OS Deployment or Tivoli Provisioning Manager for Images. 5. Stop Tivoli Provisioning Manager for OS Deployment on all of your servers, except the one running on the local Tivoli Provisioning Manager server. 6. Perform the following: a. In Tivoli Provisioning Manager, run a software product upgrade for Tivoli Provisioning Manager for OS Deployment on the local server: 1) Click Go To > Deployment > Software Management > Software Product Upgrade. 2) On the Software Product Upgrade page, select Tivoli Provisioning Manager for OS Deployment as the software to upgrade.
Windows
397
Note: For details about the OSD_HOME installation directory, see ../ com.ibm.tivoli.tpm.ins.doc/install/rpath_variables.dita. 3) Select the target computer, which is the local Tivoli Provisioning Manager server, then select Upgrade to a new version as the upgrade method. 4) Click Submit. This will upgrade the local Tivoli Provisioning Manager for OS Deployment server to the new version that you have selected. b.
UNIX Linux For non-Windows Tivoli Provisioning Manager servers, the upgrade of the local Tivoli Provisioning Manager for OS Deployment server must be done manually, as Tivoli Provisioning Manager does not have root access to the local system:
Note: Due to a known limitation, step 6 b is required only for the local Tivoli Provisioning Manager server. For all the other Tivoli Provisioning Manager for OS Deployment servers, only step 6 a is required, regardless of their operating system. 1) Stop Tivoli Provisioning Manager for OS Deployment (stop the rembo, rbagent, and dbgw processes). 2) Untar or gzip the new Tivoli Provisioning Manager for OS Deployment or Tivoli Provisioning Manager for Images installable to the Tivoli Provisioning Manager for OS Deployment installation directory. This will overwrite the old installation file with the new one. 3) Start Tivoli Provisioning Manager for OS Deployment or Tivoli Provisioning Manager for Images. 4) Run the TPMfOSd Version Discovery (Click Go To > Discovery > Provisioning Discovery > Discovery Configurations.) to ensure that Tivoli Provisioning Manager is up-to-date with the new version that you upgraded manually. 7. If you have more than one Tivoli Provisioning Manager for OS Deployment servers in your environment, you must now upgrade your other servers, too. Repeat step 6 a and run the software product upgrade for all the other Tivoli Provisioning Manager for OS Deployment servers in your environment. This can be done for all server types. Note: If the local Tivoli Provisioning Manager server is not the parent server, the parent server must be upgraded before any child servers. Upgrade the Tivoli Provisioning Manager for OS Deployment servers one at a time.
Results
Your systems are now upgraded to Tivoli Provisioning Manager for Images or to the newer version of Tivoli Provisioning Manager for OS Deployment or Tivoli Provisioning Manager for Images.
398
3. The target determines that it is starting a new deployment and queries the provisioning server for the relevant deployment OS configuration. 4. The target performs hardware discovery through DMI and PCI system calls. 5. The target queries the ODBC/JDBC database for all relevant information regarding the operating system and the software modules to be installed, and dynamically generates a deployment script. 6. If specific hardware configuration software needs to be run early (such as RAID controller configuration), you will have to deploy the hardware configuration image with an image deployment. If you want to install a hardware configuration and then an OS image afterwards, you can create a software stack containing entries for the hardware configuration stack and the OS image (for example, a golden master or unattended setup) stack. After a subsequent reboot, the target resumes the process. 7. The target partitions its hard disk according to the information retrieved from the database. A small bootstrap is also written to the hard disk, so as to be able to take over any subsequent reboot on the hard disk. 8. The target initiates a batch multicast transfer for all files needed during the deployment. The files are downloaded in the order which optimizes the efficiency of the multicast download and stored in a temporary storage location on the hard-disk. 9. When everything is done, the deployment process terminates by starting up the target computer into the operating system. Tivoli Provisioning Manager will also attempt to connect to the machine after the deployment and run an inventory scan.
Network boot
Tivoli Provisioning Manager for OS Deployment (or Tivoli Provisioning Manager for Images) implements a PXE network boot application. There are several ways computers can boot over a network, but the one mandated by PC99 is called PXE. PXE is a type of DHCP extension. Tivoli Provisioning Manager requires that any target computer you want to use for OS or virtual image management (for example, capturing
Chapter 5. Managing virtual images
399
images from or deploying images to) must have its boot order set to boot from the network first. This is a requirement to be able to perform operating system or virtual image management operations in a Tivoli Provisioning Manager environment. Note: Your target computer must be set to boot from the network, and also from the Tivoli Provisioning Manager for OS Deployment boot server. You might need to configure your DHCP server in order to do this: DHCP server requirements and configuration on page 296. A network boot application is different from any other program for a number of reasons: v It is invoked by the BIOS during the initial bootstrap of the computer, before any operating system or disk boot manager. v It depends on the presence of a special chip on the network card, the PXE boot ROM. v It is capable of communicating with a server over the network thanks to a programming interface provided by the bootrom. PXE is the informal standard for this kind of programming interface. v It is downloaded from a special OS deployment server, and does not depend on any local storage device. It can work on computers without hard disk, CD-ROM or diskette devices. If a local storage device is present on the computer, it is accessible to the network boot application. However, a network boot application does not fail if the storage device is corrupted or broken. v It gets its parameters (IP address and other boot parameters) from a central DHCP server. A typical network-boot sequence goes through the following phases: 1. Starting up: A user or a wake-up event starts up the remote-boot computer. 2. Network boot: The BIOS configuration (boot order), a hot key (for example, F12), or the wake-up event instructs the computer to boot on the network. 3. IP address discovery: The remote-boot target computer broadcasts a DHCP request for an IP address. Any DHCP server which knows the target (that is, recognizes its hardware address) or which has a pool of freely distributable dynamic addresses sends an IP address. The target takes the first answer and confirms it to the server. In addition to the IP address, the server gives some other network parameters to the target and information about the boot procedure to follow. 4. OS deployment server discovery: In the case of PXE remote-boot, the target computer then proceeds to the discovery of the OS deployment server. The OS deployment server is responsible for delivering a network boot program to the target. It is not necessarily the same computer as the DHCP server. The target responds to the first OS deployment server which replies and downloads a small program using a simple multicast protocol (MTFTP). 5. Server connection: If the network boot program is the deployment engine, it establishes a secure (encrypted) connection to the provisioning server and receives instructions from the server to determine the name of the program to run. 6. Pre-OS configuration: The deployment engine then downloads from the file server everything required by the OS configuration specified by the system administrator. These file transfers are done using a secure, robust and efficient unicast or multicast protocol. Many actions can be performed at this stage: installing an operating system from scratch, repairing a corrupted operating system, or performing an inventory. 7. OS booting: When instructed by the OS configuration, the deployment engine removes itself from memory and allows the computer to start the operating system, as if the computer is booting normally from the hard disk. This ensures full compatibility with the operating system and avoids all problems of the traditional diskless remote boot. Note: Tivoli Provisioning Manager for OS Deployment features a fault-tolerant server architecture, with the OS deployment server always available to the target. However, in case of severe network failure, targets can be configured to work in offline mode, without network access. In this scenario, the deployment engine is stored on a permanent storage medium, such a hard disk partition or a CD-ROM, and started from that medium instead of being loaded from the network.
400
Procedure
1. Click Go To > Deployment > OS Management > Software Modules. 2. Click Create deployment media. 3. Select Create a network boot USB key to start the USB key wizard. Click Next. 4. Specify the operating system on which to boot the target. Select Optimized for Linux to load an embedded Linux environment or Optimized for Windows to load a WinPE deployment engine. Note: Before clicking Optimized for Windows, ensure that you created the WinPE deployment engine. To determine what WinPE version is required, see the Tivoli Provisioning Manager for OS Deployment documentation. If you have the WinPE deployment engine on the OS deployment server, the WinPE deployment engine starts by default. Otherwise the default is to start embedded Linux. Only when embedded Linux or WinPE is running, does the target connect to the network and try to contact an OS deployment server.
401
5. If you want to obtain the target IP address through DHCP, select Dynamic IP address with DHCP, and click Next. If you want to use a fixed IP address for your target instead of having it go to the DHCP server, select Static IP address, and click Next. a. Enter the target IP address, gateway, and network mask. b. (Optional) Select Allow IP address override at runtime to be able to modify the target IP address when starting up the target. c. Click Next. 6. Enter the IP address of the OS deployment server. 7. (Optional) Select Allow server IP address override at runtime to be able to modify the IP address of the OS deployment server when starting up the target. 8. Plug your USB key into a machine running the web interface extension, and specify its address. 9. Choose the drive matching your USB key. 10. Click Finish to close the wizard.
What to do next
Use the USB drive to boot the target.
402
8. Click here on the screen to download the ISO file. 9. Click Finish to close the wizard.
What to do next
The generated ISO file can be burned to create the network boot CD. To start a target computer over the network using your OS deployment server without booting through PXE, start the target on the network boot CD and the target automatically connects to the OS deployment server.
Procedure
v If you want to obtain the target IP address through DHCP, use this command line:
Windows
rbagent.exe -s <OSD_server_ip_address>:<OSD_server_password> rad-mkbootusb <drive> <USB_OSD_server_ip_address> <USB_OSD_server_password> [allowsrvipoverload] [nowpe|preferwpe] [bootopt nnn] [clearcmos]
where: OSD_server_ip_address Is the IP address of the OS deployment server. OSD_server_password Is the password for the administrative user (typically admin) on your OS deployment server. drive Is a drive letter of the Windows target where you run the rbagent command. The rad-mkbootusb command adds the requested files to the FAT32 or NTFS partition and makes it bootable. The drive must be already formatted. Existing files on the partition are not deleted.
USB_OSD_server_ip_address Is the IP address of the OS deployment server that the target must contact, when it boots from the USB drive. USB_OSD_server_password Is the password of the OS deployment server that the target must contact, when it boots from the USB drive. allowsrvipoverload Allows you to choose an OS deployment server later, from the target. nowpe|preferwpe Defines if an embedded Linux environment or WinPE2 environment is loaded from the USB drive, when a target boots from this USB drive, without accessing the network. Only when embedded Linux or WinPE2 is running, does the target connect to the network and try to
Chapter 5. Managing virtual images
403
contact an OS deployment server. If you deploy only Linux, specify prefermcp to skip the WinPE2 deployment engine. You can specify preferwpe only if there is a WinPE2 deployment engine on the OS deployment server. bootopt nnn Allows you to specify additional flags before the boot. clearcmos Resets the CMOS alarm fields if they are in an invalid state. For example:
> C:\TPMfOSd Files\global\http\agents\rbagent.exe -s 10.10.10.10:abcd rad-mkbootusb C: 10.10.10.10 abcd
v If you want to use a fixed IP address for your target instead of having it go to the DHCP server, use this command line: On Windows operating systems:
rbagent.exe -s <OSD_server_ip_address>:<OSD_server_password> rad-mkbootusb <drive> <USB_OSD_server_ip_address> <USB_OSD_server_password> fixed [fixed_ip_address] [fixed_netmask] [fixed_gateway_ip_address] [allowsrvipoverload] [nowpe|preferwpe] [allowipoverload] [bootopt nnn] [clearcmos]
where: OSD_server_ip_address is the IP address of the OS deployment server. OSD_server_password is the password for the administrative user (typically admin) on your OS deployment server. drive is a drive letter of the Windows target where you run the rbagent command. The rad-mkbootusb command adds the requested files to the FAT32 or NTFS partition and makes it bootable. The drive must be already formatted. Existing files on the partition are not deleted.
USB_OSD_server_ip_address Is the IP address of the OS deployment server that the target must contact, when it boots from the USB drive. USB_OSD_server_password Is the password of the OS deployment server that the target must contact, when it boots from the USB drive. fixed_ip_address Is the static IP address of the target you boot using the USB drive. fixed_netmask Is the netmask of the target you boot using the USB drive. fixed_gateway_ip_address Is the IP address of the gateway that the target uses. nowpe|preferwpe Defines if an embedded Linux environment or WinPE2 is loaded from the USB drive, when a target boots from this USB drive, without accessing the network. Only when embedded Linux or WinPE2 is running, does the target connect to the network and try to contact an OS deployment server. If you deploy only Linux, specify nowpe to skip the WinPE2 software module. You can specify preferwpe only if there is a WinPE2 software module on the OS deployment server. allowipoverload Allows you to define IP settings manually on the target.
404
bootopt nnn Allows you to specify additional flags before the boot. clearcmos Resets the CMOS alarm fields if they are in an invalid state.
What to do next
You can now boot the target using the network boot USB drive instead of the network card. To use the PXE emulation USB key, insert the USB key into the drive and restart the target. If your machine does not boot from the USB key, check the BIOS boot list to see if your USB drive is included in the boot sequence and is listed before the hard disk. Most machines also allow you to select the temporary boot device without changing the boot sequence in BIOS.
Procedure
v If you want to obtain the target IP address through DHCP, use these command lines:
UNIX Linux
Windows
where: target_ip_address Is the IP address of the OS deployment server. target_password Is the password for the administrative user (typically admin) on your OS deployment server. full_path_to_boot_iso Is the full path to the .iso file you want to create on the target where you run the rbagent command. For example:
> C:\TPMfOSd Files\global\http\agents\rbagent.exe -s 10.10.10.10:abcd rad-mkbootcd C:\boot.iso 10.10.10.10 abcd
This creates a file called boot.iso in c:\ which can be burned onto a CD. v If you want to use a fixed IP address for your target instead of having it go to the DHCP server, use these command lines:
UNIX Linux
405
Windows
> rbagent.exe -s <target_ip_address>:<target_password> rad-mkbootcd <full_path_to_boot_iso> <target_ip_address> <target_password> [fixed_ip_address] [fixed_netmask] [fixed_gateway_ip_address]
where: fixed_ip_address Is the static IP address of the target you boot using the CD. fixed_netmask Is the netmask of the target you boot using the CD. fixed_gateway_ip_address Is the IP address of the gateway the target uses.
What to do next
The generated ISO file can be burned to create the network boot CD. To start a target computer over the network using your OS deployment server without booting through PXE, start the target on the network boot CD and the target automatically connects to the OS deployment server.
Requirements
Before you proceed with the virtual images management, ensure that all hardware and software requirements are met.
406
Table 67. User roles (continued) Role Provisioning Configuration Librarian Description Skills
v Knowledge of provisioning server v Manages overall product configuration, boot server, and configuration. Responsible for virtualization technologies. setting up the environment to support boot server and hypervisor technologies. v Performs virtual image discovery, replication, capture, import, export, and deployment activities.
Deployment Specialist
v Deploys captured virtual images to v Server and image management target computers. experience. v Knowledge of hypervisor technologies. v Familiarity with OS management life cycle.
End User
v The individual who uses a target computer, typically a notebook, desktop or server.
/etc/hosts
2003 Vista 2008 Windows 7
C:\WINDOWS\system32\drivers\etc\hosts
Server: C:\WINNT\system32\drivers\etc\hosts
For more information, go to the IBM Tivoli Provisioning Manager for Images information center.
Hypervisor requirements
To take advantage of the interaction with the hypervisor for virtual image management, the following requirements must be met. The hypervisor requirements ensure that Tivoli Provisioning Manager for Images can communicate with the web interface extension (rbagent) installed on your hypervisor. Note: If the requirements are not met, Tivoli Provisioning Manager for Images will treat a virtual machine the same as a physical machine. You will still be able to capture and deploy virtual images, but without taking full advantage of the interaction with the hypervisor.
407
To configure the VMWare ESX 3.5 hypervisor: 1. Disable the active firewall, by running, for example, the following command: etc/init.d/firewall stop. 2. Download the FUSE 2.5.3 library from SourceForge.net and compile it on the VMWare ESX hypervisor. For details, see the INSTALL instruction file in the decompressed library folder. This library is a prerequisite of VDDK. 3. Download VDDK version 1.1 from VMWare Cloud Computing with Virtualization and install it on a VMWare ESX hypervisor. 4. Define the VDDK path in the library path of the user running the rbagent by adding the following line to the /root/.bashrc file and reload it:
export LD_LIBRARY_PATH=$LD_LIBRARY_PATH:/usr/lib/vmware-vix-disklib/lib32/
5. Install libxml2 version 2.6.16 or copy the libxml2.so.2.6.16 file and create the following symbolic link:
ln -s /usr/lib/libxml2.so.2.6.16 /usr/lib/libxml2.so.2
6. After the VDDK installation, reboot the hypervisor. 7. Ensure that the VMWare ESX hypervisor supports the following command:
vmware-cmd -l
8. Before running the full inventory, capture, or deployment of a virtual server, ensure that the virtual server is powered off. 9. Ensure that the web interface extension is running on the VMWare ESX hypervisor with the rad-refreshhypervisor option. To do this on Linux, copy rbagent.linux from the <TPMfOSD_DATA_DIR>\global\http\agents directory of the OS deployment server to the VMWare ESX hypervisor, set the execution permission: chmod +x rbagent.linux, and launch the web interface extension with the following syntax:
./rbagent.linux -d -s <server ip>:<Web_user_interface_administrator_password> rad-refreshhypervisor
Ensure that only one instance of web interface extension is running. Note: Tivoli Provisioning Manager for Images does not support the capture or deployment when the file systems are ReiserFs, LVM. 10. Ensure that the vmware.conf file is located in the same directory where the web interface extension is installed and has the following content:
ESX_HOST=127.0.0.1 ESX_USER=root ESX_PWD=password ESX_PORT=902
The following is an example of a running VMWare ESX hypervisor configuration: v VMWare ESX 3.5 U4 v fuse-2.5.3.tar.gz (compiled by running the configure, make, and make install commands) v VDDK library: VMware-vix-disklib-1.1.0-163495.i386.tar.gz v /usr/lib/vmware-vix-disklib/lib32 defined in the library path v libxml2 version 2.6.16 (with libxml2-2.6.16-1.1.el3.rf.i386.rpm and libxml2-python-2.6.161.1.el3.rf.i386.rpm) or a link between /usr/lib/libxml2.so.2 and /usr/lib/libxml2.so.2.6.16 (ln -s /usr/lib/libxml2.so.2.6.16 /usr/lib/libxml2.so.2)
408
1. Ensure that VMWare ESX 4.0 is installed by running cat /etc/vmware-release. 2. Disable the active firewall, by running, for example, the following command: etc/init.d/firewall stop. 3. Download the FUSE 2.7.4-1 library from SourceForge.net and compile it on the VMWare ESX hypervisor or download an already compiled libfuse.so.2 rpm package such as libfuse-2.7.41.el5.pp.i386.rpm from http://rpm.pbone.net/index.php3/stat/4/idpl/9551006/com/libfuse2.7.4-1.el5.pp.i386.rpm.html. Install FUSE on the hypervisor, for example, by entering the following command:
rpm -ivh libfuse-2.7.4-1.el5.pp.i386.rpm
4. Download VDDK version 1.1.1 (VMware-vix-disklib.*.tar.gz 32bit version) from VMWare Cloud Computing with Virtualization and install it on a VMWare ESX hypervisor. Extract the contents: tar -zxvf VMware-vix-disklib.*.tar.gz and run ./vmware-install.pl to install VDDK 1.1.1. A warning message about a missing libfuse.so.2 library might be displayed even if the library is installed. Proceed with the next configuration steps. 5. After the VDDK installation, reboot the hypervisor. 6. Do not install libxml2 because a supported version is already installed in VMWare ESX 4.0. Check that libxml2-2.6.26 is already present. 7. Define the VDDK path in the library path of the user running the rbagent by adding the following line to the /root/.bashrc file and reload it:
export LD_LIBRARY_PATH=:/usr/lib/vmware-vix-disklib/lib32
8. Ensure that the VMWare ESX hypervisor supports the following command:
vmware-cmd -l
9. Create vmware.conf in the same directory where the web interface extension is installed and ensure that it has the following content:
ESX_HOST=127.0.0.1 ESX_USER=root ESX_PWD=password ESX_PORT=902
10. Ensure that the web interface extension is running on the VMWare ESX hypervisor with the rad-refreshhypervisor option. To do this on Linux, copy rbagent.linux from the <TPMfOSD_DATA_DIR>\global\http\agents directory of the OS deployment server to the VMWare ESX hypervisor, set the execution permission: chmod +x rbagent.linux, and launch the web interface extension with the following syntax:
./rbagent.linux -d -s <server ip>:<Web_user_interface_administrator_password> rad-refreshhypervisor
Ensure that only one instance of web interface extension is running. Note: Tivoli Provisioning Manager for Images does not support the capture or deployment when the file systems are ReiserFs, LVM. The following is an example of a running VMWare ESX hypervisor configuration: v VMWare ESX 4.0 v libfuse-2.7.4-1.el5.pp.i386.rpm (compiled by running the configure, make, and make install commands) v VDDK library: VMware-vix-disklib.*.tar.gz v /usr/lib/vmware-vix-disklib/lib32 defined in the library path v libxml2 version 2.6.26
409
Note: The image deployment is supported on the KVM hypervisor, only if you boot from a network boot CD or DVD. Before starting a hypervisor discovery, the web interface extension checks if the libvirt library is installed otherwise the discovery mechanism uses the virsh commands on each hypervisor. To ensure that the libvirt library is correctly installed, check that the libvirt.so file, used by the web interface extension to detect libvirt installation, is defined in the hypervisor library path. If the libvirt.so file does not exist, you must create it as a symbolic link pointing to the libvirt library file. For example, you can enter the following command:
ln -s /usr/lib/libvirt.so.0 /usr/lib/libvirt.so
In this way libvirt.so points to the libvirt.so.0 libvirt library. KVM native commands: If you want to use the virsh commands, ensure that the following command:
capabilities
runs correctly from a virsh shell. KVM discovery works with objects defined in libvrt: The web interface extension runs the KVM discovery only on objects that are defined in the libvirt library. Additional requirements: Before running the full inventory, capture, or deployment of a virtual machine, ensure that the virtual machine is powered off. KVM hypervisor machine must be 64 bit. KVM hypervisor must have CPU with virtualization extension (check for vmx, svm flags under /proc/cpuinfo as follows: egrep (vmx|svm) /proc/cpuinfo) This command looking for either vmx or svm and outputs where it finds them. KVM guests must run under a KVM engine, not under QEMU (check this by running the following command: virsh dumpxml <kvm_guest_name>, the output must contain the following information <domain type=kvm id=xx>) Ensure that the web interface extension is running on the KVM hypervisor with the radrefreshhypervisor option. To do this on Linux, copy rbagent.linux from the <TPMfOSD_DATA_DIR>\ global\http\agents directory of the OS deployment server to the KVM hypervisor, set the execution permission: chmod +x rbagent.linux, and launch the web interface extension with the following syntax:
./rbagent.linux -d -s <server ip>:<Web_user_interface_administrator_password> rad-refreshhypervisor
Ensure that only one instance of web interface extension is running. The raw disk is the only virtual disk format supported. Note: Tivoli Provisioning Manager for Images does not support the capture or deployment when the filesystems are ReiserFs, LVM.
410
Hardware requirements
The minimum recommended configurations for the OS deployment server includes:
Table 68. Hardware requirements for the OS deployment server Processor type Minimum Recommended Dual-Xeon Quad-core or two dual-core Processor speed 2 GHz 2 GHz RAM 1 GB RAM 2 GB RAM Free disk space 10 GB 100 GB
Store Tivoli Provisioning Manager for OS Deployment files on a large hard disk if you plan to create many hard-disk images, and you might want to use a fast processor to minimize the time spent creating these images. The OS deployment server is multithreaded and benefits from computers with multiple processors.
Also, Tivoli Provisioning Manager for OS Deployment or Tivoli Provisioning Manager for Images can work with almost any RFC-compliant DHCP server, including Windows 2003 DHCP server, Windows 2000 DHCP server, ISC DHCP server, Solaris DHCP server and the Netware 5 DHCP server.
411
Hardware requirements
The following are the requirements for x86 and x8664 targets: v Minimal processor: Pentium type level. v Minimal RAM memory: 512 MB. Note: Windows 1 GB might be necessary on some targets to run WinPE2. 1 GB RAM is also necessary on the reference target to capture a golden master or a virtual image. v VESA-compliant (release 2.0 or later) Video BIOS to get "high" resolution (VGA fallback is always possible in case of incompatibility) and to have a user interface on the target. Note: Tivoli Provisioning Manager for OS Deployment can also work on headless computers, in which case all operations have to be performed from the web interface. v Either a legacy ATA drive (with Ultra DMA support if speed is required) or a BIOS-supported hard drive. v DMI support for collecting hardware information, such as model and serial number. Note: Disks with a size equal to or larger than 1 TB are not supported on targets running Linux and on virtual images. To make full use of the Tivoli Provisioning Manager for OS Deployment features, remote-boot x86 and x8664 targets must be equipped with a PXE-compliant bootrom, either version 2.00 or later. Most recent computers with on-board network adapters have built-in PXE support. The network cards that have been shown to work best with Tivoli Provisioning Manager for OS Deployment are Intel adapters. For computers without built-in PXE support, you might consider using a PXE emulation floppy available from various third party sources, creating network boot media, or working offline with deployment media. SUN SPARC targets need a firmware that supports the SUN wanboot method for network booting. Wanboot is the only supported network boot method for SUN SPARC. Tivoli Provisioning Manager for OS Deployment can also deploy operating systems to VMWare virtual machines. Use of the Intel e1000 adapter on VMWare virtual machines requires VMWare ESX 3.0.2 with February 2008 patches, VMWare ESX 3.5 or later, VMWare Workstation 6.0.3 or later, VMWare Server 2.0 or later. Microsoft Virtual PC and Microsoft Virtual Server are not supported.
412
Table 70. Tivoli Provisioning Manager for OS Deployment and Tivoli Provisioning Manager for Images target operating systems Operating system Windows Server 2008 Version GA, R2, R2-SP1 (See note) Architecture x86-32 and x86-64 Disk and memory requirements For image deployment v 10 GB free disk space (32-bit) v 20 GB free disk space (64-bit) v 1 GB RAM For image capture v 1 GB RAM
Windows 7
For image deployment v 10 GB free disk space (32-bit) v 20 GB free disk space (64-bit) v 1 GB RAM
Windows Vista
GA and SP2
For image deployment v 10 GB free disk space (32-bit) v 20 GB free disk space (64-bit) v 1 GB RAM
Windows 2003 Server Windows XP Professional SUSE Linux Enterprise Server (SLES) SUSE Linux Enterprise Server (SLES) SUSE Linux Enterprise Server (SLES) SUSE Linux Enterprise Desktop (SLED) SUSE Linux Enterprise Server (SLES) Red-Hat Enterprise Linux (RHEL) Server Red-Hat Enterprise Linux (RHEL) Server Red-Hat Desktop Red-Hat Enterprise Linux (RHEL) Server
SP2/R2 SP3 11 11 10 SP3 10 SP3 10 SP3 6 (See note) 5, Update 3 5, Update 3 5, Update 3
x86-32 and x86-64 x86-32 and x86-64 x86-32 and x86-64 IBM PowerPC 64 (pSeries) x86-32 and x86-64 x86-32 and x86-64 IBM PowerPC 64 (pSeries) x86-32 and x86-64
413
Table 70. Tivoli Provisioning Manager for OS Deployment and Tivoli Provisioning Manager for Images target operating systems (continued) Operating system Red-Hat Enterprise Linux (RHEL) Server Red-Hat Desktop Solaris Solaris Solaris IBM AIX 5L IBM AIX 6L VMWare ESX Server VMWare ESX Server VMWare ESX Server Version 4, Update 8 4, GA version only 10 Update 6 10 9 (cloning only) 5.3 (setup only) 6.1 (setup only) 4.0 3.5 Update 4 3.0.2 Architecture x86-32 and x86-64 x86-32 and x86-64 SPARC 64-bit SPARC 64-bit SPARC 64-bit IBM PowerPC 64 (pSeries) IBM PowerPC 64 (pSeries) x86-32 x86-32 x86-32 Disk and memory requirements
Note: Windows 2008 R2 SP1, Windows 7 SP1, and Red-Hat Enterprise Linux 6 are currently supported with Tivoli Provisioning Manager for OS Deployment version 7.1.1.5.
414
Provisioning server
Remote server 1
OS deployment database
Remote server 2
If you install child servers, you can optionally promote a child server to be the parent boot server.
Provisioning server Remote server 1
OS deployment database
Remote server 2
Tivoli Provisioning Manager for OS Deployment can support environments with a large number of target computers by spreading the workload between multiple boot servers. Replication is the means to keep files and information up-to-date between parent and child servers. All images are automatically replicated to the parent server, and from the parent server to all the child servers. The Tivoli Provisioning Manager for OS Deployment database is stored on the provisioning server. Child servers do not have their own databases, but point to the parent database.
415
2. Discover hardware resources on the target computer. See Discovering hardware using provisioning Inventory discovery on page 164. If a Tivoli Provisioning Manager for OS Deployment boot server was not installed during Tivoli Provisioning Manager installation, you must rerun the Tivoli Provisioning Manager again to install it. For instructions, see the Tivoli Provisioning Manager Installation Guide. To create a child OS deployment server:
Procedure
1. 2. 3. 4. Click Go To > Deployment > OS Management > Boot Server Installation. Select the computer that you want to use as your OS deployment server. Select TPMfOSd for the Boot Server Type. Click OK. Review the information, then click Submit.
Results
You have now installed a child OS deployment server. Uninstalling child OS deployment servers: You can uninstall the child OS deployment servers that you no longer require. To uninstall your OS deployment server: Procedure 1. Click Go To > Deployment > Provisioning Computers. 2. Select the computer that has the OS deployment server installed. 3. Click Select Action > Uninstall > Software Installation and uninstall the OS deployment server installation. Results You have now uninstalled your child OS deployment server.
Procedure
1. Click Go To > Deployment > OS Management > Boot Servers. 2. From the Select Action menu, click Promote a child boot server to parent. 3. When prompted, click Yes.
416
Results
The child server is now a parent server, and the parent server is now a child server.
Types of WinPE2
WinPE2 consists of a group of files that can be loaded as a ramdisk, which enable you to perform operations on a target. WinPE2 deployment engine This WinPE2 is a prerequisite to create Windows images and deploy them. You must store only one WinPE2 deployment engine on your OS deployment server, as it is independent of the architecture or the version of the Windows operating system you work with. However, depending on your hardware, you might have to inject specific drivers in your WinPE2 deployment engine. To create a WinPE2 deployment engine you need a computer running Windows 32-bit, with Windows Automated Installation Kit (WAIK) 1.1 32-bit in English installed, and running the web interface extension. WinPE2 ramdisk This WinPE2 contains the installation files for any Windows Vista/2008/7 operating system. It can be found on the original installation CD/DVD. In the case of a Windows Vista/2008/7 unattended setup creation, the WinPE2 ramdisk software module is automatically created and bound to the image, which ensures your WinPE2 to be of the correct version. For golden master images, you also need a WinPE2 ramdisk if you need to inject drivers into your image. In this case, you might need to create your WinPE2 ramdisk using the Software wizard. To create a WinPE2 ramdisk, you need a computer running Windows 32-bit, with WAIK 1.1 32-bit in English installed, and running the web interface extension. You also need the original Windows Vista/2008/7 installation CD/DVD. Note: A 64-bit WinPE2 ramdisk is required to be able to reuse Windows Vista and Windows 2008 64-bit images created with an earlier version of Tivoli Provisioning Manager for OS Deployment, for example, version 7.1.1. WinPE2 hardware environment This type of WinPE2 is used for hardware configurations. To create a WinPE2 hardware environment, you must start the vendor commands on a computer running Windows 32-bit, with WAIK 1.1 32-bit in English installed, and the web interface extension installed. You must start the vendor commands before you start the web interface extension.
417
Good practice
If you deploy Windows operating systems, you need to create one WinPE2 deployment engine, and potentially several WinPE2 ramdisks and WinPE2 hardware configurations. For each of these creations, you need a computer running under Windows, with WAIK and the web interface extension installed. The same configuration is also needed to update Windows Vista/2008/7 images, and to inject drivers into the WinPE2 deployment engine. WAIK can be obtained free of charge from Microsoft, but it is rather heavy and cumbersome to install. Therefore, it is good practice to install WAIK and the web interface extension on a target running a Windows operating system and to perform all operations requiring this configuration on this dedicated target.
Procedure
1. Navigate to the Software Modules page. Click Go To > Deployment > OS Management > Software Modules. 2. From the contextual menu, click Add a new software. The Software wizard is displayed. 3. Select one of the Windows operating systems as the type of software module to create, and click Next.
418
4. Select WinPE 2 engine for OS deployment server ramdisk image, and click Next. 5. Specify the address of the computer on which you installed WAIK and the web interface extension, and click Next. 6. Click Finish.
Results
The resulting WinPE2 deployment engine appears as a software module in the WinPE2 Deployment engine specific folder.
What to do next
The created WinPE2 deployment engine might not contain all the necessary drivers depending on the hardware on which you want to use it. If this is the case: 1. Create software modules with the missing drivers. 2. Double-click the WinPE2 deployment engine to view the software details. 3. Click Update drivers. 4. Specify the address of the computer on which you installed WAIK and the web interface extension, and click Next. 5. Select the software modules containing the drivers you need to inject in your WinPE2 deployment engine and click Next. After you created the WinPE2 deployment engine, you can create and deploy Windows images. Note: During the deployment, do not edit the WinPE2 deployment engine that you are using.
Procedure
1. 2. 3. 4. Click Go To > Deployment > OS Management > Software Modules. From the contextual menu, click Add a new software. The Software wizard is displayed. Select A Windows Vista / 2008 / 7 software module, and click Next. Select A custom action on the target computer, and click Next.
5. Select A WinPE 2.0 Ramdisk image for Vista/2008/7, and click Next. 6. Specify the IP address of the computer on which you installed WAIK and the web interface extension. 7. Specify the location of the Windows Vista/2008/7 installation files (CD-ROM/DVD), and click Next. 8. Click Finish.
419
What to do next
The WinPE2 ramdisk software module is created. Now, you can bind it to the corresponding Windows Vista/2008/7 golden master or virtual images. Note: For Tivoli Provisioning Manager for Images virtual images, you do not need to create binding rules to bind the WinPE2 ramdisk software module to the Windows Vista/2008/7 virtual images. As long as you have the WinPE2 ramdisk image, Tivoli Provisioning Manager for Images can automatically find it and bind it for you.
Procedure
1. Log into the provisioning web interface. 2. Click Go To > Deployment > OS Management > OS Deployment Engines. Binding drivers: Before you begin Your WinPE deployment engine contains built-in drivers. Use them first. If you encounter problems with the built-in drivers, if some drivers are not bound, or if some drivers are missing, bind other drivers to your WinPE deployment engine. In this offline driver injection process, you can only bind drivers, to your WinPE deployment engine, that are driversoftware modules in your OS deployment server. You must therefore create driver software modules from the drivers that you want to bind to your WinPE deployment engine. The product helps you select appropriate drivers for particular target models. It helps you to predict potential problems and to solve them. It does not guarantee that a specific WinPE deployment engine, with bound drivers, works with a given target. The information used by the OS deployment server to predict the compatibility of a driver with a target model is taken from the content provided by the vendor in its driver. The OS deployment server cannot verify the accuracy of this information.
420
Procedure 1. Check the compatibility of your WinPE deployment engine. To view the details of the deployment engine, you have two options: v Double-click a deployment engine. v Select a deployment engine, and then select View engine details in the contextual menu. 2. Go to the section Network and mass storage drivers. A check is performed while the page is loading. This can take a few minutes. If drivers are missing, or are not bound, or if several drivers are bound for the same device, the following information is provided. Indicates a missing critical driver, or a critical driver of the wrong architecture. Indicates that a missing non-critical driver, or a non-critical driver of the wrong architecture. Indicates that a required driver is present on the OS deployment server, but that it is not bound. Indicates that there are several drivers bound for the same device, or that there is a binding with a driver that is not known as compatible. You can expand the line to get more information. v For drivers missing on the OS deployment server, you find a suggestion of where to look for it, including, if available, a download link and the exact directory within the downloaded archive where the driver can be found. v When drivers are present on the OS deployment server, you find suggestions of which driver to bind, in order of preference. If multiple drivers are known to possibly work for a device, the best choice is listed first. The choice is explained in the advice text, which first recommends the use of device-specific drivers, that is, drivers that have been specifically designed for the given hardware device. Then compatible device drivers, that match the device family, are recommended, even if they are not an exact rebranded variant (for example, as second choice, an Adaptec driver of the same family as an IBM ServerRaid adapter, if it is based on the same chipset). Finally, as third choice, generic drivers, for example, Microsoft generic AHCI driver for any AHCI controller, are recommended. If no error is found, you do not need to modify the bindings. 3. Modify the driver bindings of the WinPE deployment engine. Click Edit engine's driver bindings. There are two ways to perform this. v Use a wizard. a. Click Fix Drivers. b. Follow the instructions in the wizard. After having selected a target model, you must select one of these options: Automatically fix issues that can be fixed for this model. Fixes all issues that can be automatically fixed. Such issues include, for example, a missing binding to an existing driver, multiple bindings for a device, or removing a driver tagged for another operating system. Manually fix issues for this model. Presents you with each issue in turn. Ways to solve the issue, when available, are proposed. Automatically bind drivers for this model. Erases every existing binding. New bindings are then automatically added. Copy driver bindings for this model from a similar engine. Copies all the bindings from a selected source engine to the current engine. Reset all drivers bindings for this model. Erases all the driver bindings, and does not create any new binding. v Edit the bindings manually, using the driver binding grid.
Chapter 5. Managing virtual images
421
Columns represent target models known to the OS deployment server and matching the patterns provided for the WinPE deployment engine. They can be expanded to view their network and mass storage devices, if a PCI inventory has been performed. The first line represents the WinPE deployment engine. Other lines represent software module folders in the OS deployment server. They can be expanded to view individual drivers. If a driver can be used only for 32-bit or 64-bit machines, a superscript x86 or x86-64 mark is written next to the driver name. If you do not find the drivers that you need in the list provided, create software modules for your drivers. a. (Optional) To obtain a summary of the errors and warnings, click the link provided above the grid. This helps you locate the problematic areas in the driver grid. b. Expand the columns of problematic target models to view the individual network and mass storage devices. c. Expand software module folders containing drivers to view the individual drivers.
A cell with a green background indicates that driver information corresponds to the device. The quality of the drivers that can be selected is illustrated by the intensity of the green background: the best drivers are in intense green, the family drivers are in standard green, and the generic drivers are in pale green. A cell with an orange background indicates either that the driver is not a PCI driver, or that there is no compatibility information available for the driver. indicates that the driver is bound to the WinPE deployment A cell with a green check mark engine for use with the specific target model and device. d. Click a green or orange background cell to add or remove bindings. It is not possible to bind or unbind drivers from the WinPE deployment engine itself, because they are built-in drivers. You should have one, and only one, check mark per column, indicating that you have one and only one driver for each device. e. When you have finished modifying the bindings, click Save.
422
f. To return to the Image details page, click Back. Potential problems with the image are recomputed, allowing you to check if your modifications have solved the detected problems. Results Existing WinPE deployment engines will be displayed. You can view engine details, create new deployment engines, and manage all engines in this application.
Requirements
There are no special product requirements for the DHCP server. If the DHCP server and the OS deployment server are running on the same target, the DHCP server must support the definition of the Class identifier DHCP option (option 60). Tivoli Provisioning Manager for OS Deployment can work with almost any RFC-compliant DHCP server, including Windows 2003 DHCP server, Windows 2000 DHCP server, ISC DHCP server, Solaris DHCP server, and the Netware 5 DHCP server. Note:
423
1. Because of the nature of PXE, you cannot run two PXE servers on the same computer. If you have installed another PXE boot tool such as Microsoft ADS, you must disable it before installing Tivoli Provisioning Manager for OS Deployment. 2. Microsoft DHCP server does not work well with some PowerPC firmware. If you have PowerPC targets in your environment, use an IBM recommended DHCP server.
Configuration
The DHCP server is used by the PXE bootrom to get its IP address and other basic networking information (including subnet mask, and default gateway). Using Tivoli Provisioning Manager for OS Deployment can require changes to your DHCP configuration. Typically, these changes can be performed automatically during the Tivoli Provisioning Manager for OS Deployment installation. However, in some cases, you might want to verify the changes, or perform them manually. You can configure your DHCP server for one of the following situations: v The DHCP server and the OS deployment server are not running on the same host. v The DHCP server and the OS deployment server are running on the same host. v You already have a PXE 2.0 infrastructure with PXE Boot Server discovery installed, and you want to add Tivoli Provisioning Manager for OS Deployment to the list of servers to discover. Note: v If you have previously configured your DHCP server for another PXE bootstrap, do not reuse your existing DHCP configuration. Remove DHCP options 43 and 60 for the hosts on which you want to run Tivoli Provisioning Manager for OS Deployment, and follow configuration instructions in this section. If you are running Tivoli Provisioning Manager for OS Deployment on the same computer as the DHCP server, you need to set option 60 again. v There are also cases where you must set both DHCP options 43 and 60, for example, when you have two different OS deployment servers.
Note: v If you have previously configured your DHCP server for another PXE bootstrap, do not reuse your existing DHCP configuration. Remove DHCP options 43 and 60 for the hosts on which you want to run Tivoli Provisioning Manager for OS Deployment, and follow the instructions given in this section. If you are running Tivoli Provisioning Manager for OS Deployment on the same host as the DHCP server, you need to set option 60 again. v There are also cases where you must set both DHCP options 43 and 60, for example, when you have two different OS deployment servers. Review the following information, select the case that suits your needs, and then perform the configuration steps. DHCP server and OS deployment server on different targets, with no information about the PXE server location Perform the following: v If DHCP options 43 and 60 are set, remove them.
424
v If the DHCP server is not running on the same target as the OS deployment server, the DHCP configuration does not change. The OS deployment server detects DHCP packets sent over the network by PXE bootroms, and offers PXE parameters without disturbing the standard DHCP negotiation process. This behavior is called DHCPProxy. DHCP server and OS deployment server on different targets, with information about the PXE server location Perform the following: v Set option 60 (Class identifier) to "PXEClient" to inform the target that the location of the PXE server is known. v Set option 43 to indicate that the PXE server does not reside on the same computer as the DHCP server, and to specify the location of the PXE server. DHCP server and OS deployment server on the same target Perform the following: v If DHCP option 43 is set, remove it. v Set option 60 (Class identifier) to "PXEClient" to inform the target that the location of the PXE server is known. If you plan to run the DHCP server and the OS deployment server on the same target, you must instruct your DHCP server to send DHCP option 60 (Class identifier) to the targets. When option 60 is set to PXEClient, the DHCP server knows the location of the PXE server. If option 43 is not set, the PXE server has the same IP address as the DHCP server.
425
v Remove any occurrences of option space PXE; if you were running another PXE application. Note: v The OS deployment server responds to all requests, including requests originating from unknown targets. v If the flag Completely ignore unknown targets is set for the server, it only responds to discovery requests originating from known targets. You can specify either the IP address or the Ethernet address in the target list. At this stage, the IP address of the remote-boot target is known.
426
option PXE.boot-menu code 9 = { unsigned integer 16, unsigned integer 8, text}; option PXE.menu-prompt code 10 = { unsigned integer 8, text }; # In the scope/host section: option dhcp-parameter-request-list 60,43; option vendor-class-identifier "PXEClient"; vendor-option-space PXE; option PXE.discovery-control 7; option PXE.boot-menu 15 5 "Rembo"; option PXE.menu-prompt 0 "Rembo";
Example: option 43 for PXE servers on different subnets: In this example, you have targets A and B boot on server 192.10.10.10, and targets C and D boot on server 192.10.11.10, which is on a different subnet (a valid gateway must be set up for C and D in order to locate the PXE server on a different subnet). Note: Server type 15 is translated into 00:0F in hexadecimal. IP address 192.10.10.10 is translated into C0:0A:0A:0A, and 192.10.11.10 is translated into C0:0A:0B:0A. Letters R and B are translated into 52 and 42. The following are the options that must be inserted in the binary buffer and their values: PXE option 6, length 1, value=07 Value 07 means use PXE_BOOT_SERVERS list, disable multicast and broadcast discovery. PXE option 8, length 7, value = 00:0F:01:C0:0A:0A:0A (targets A and B) Only one IP address is used, the address of the PXE server for the target which receives these DHCP options. PXE option 8, length 7, value = 00:0F:01:C0:0A:0B:0A (targets C and D) Only one IP address is used, the address of the PXE server for the target which receives these DHCP options. PXE option 9, length 5, value = 00:0F:02:52:42 There is only one line, displaying RB, and which goes to server type 15 (Tivoli Provisioning Manager for OS Deployment). PXE option A, length 2, value=00:52 The timeout is set to 0 seconds, meaning that one wants to boot using the first line of the boot menu, and the prompt is set to R. Because the timeout is 0, the prompt text is not displayed, but it must be at least one character long. PXE option FF This closes the buffer. The format of the binary buffer is similar to what is used for the DHCP packet itself. The buffer is a list of options, each option starting with its option number (one byte), followed by its length (one byte), and its value (a list of bytes). Here is the transcription of the above example, for targets A and B:
Option 43 = 06:01:07:08:07:00:0F:01:C0:0A:0A:0A:09:05:00:0F:02:52:42:0A:02:00:52:FF
427
The administrator wants to display two lines in the PXE boot menu, pointing to two separate OS deployment servers. The two servers must use different PXE server type numbers or they will be seen as one server only by the PXE network card. In addition to the standard PXE server type 15, OS deployment servers accept any number between 33008 (80F0 in hexadecimal) and 33280 (8200 in hexadecimal). These new PXE server type numbers are used to differentiate multiple OS deployment servers in the BOOT_SERVERS sub-option of DHCP option 43. In this example, the first server has the address 192.168.1.4 (C0:A8:01:04 in hexadecimal), and the second server 192.168.1.5 (C0:A8:01:05 in hexadecimal). Procedure 1. Assign an OS deployment server type to each of the servers. OS deployment servers accept server type 15, and server types from 33008 to 33280. For this example, 33008 (80F0) is used for the first server, and 33009 (80F1) for the second server. 2. The suboptions of DHCP option 43 must then be configured as follows: PXE option 6, length 1, value=07 Value 07 means use PXE_BOOT_SERVERS list, disable multicast and broadcast discovery PXE option 8, length 14 (0E), value = 80:F0:01:C0:A8:01:04:80:F1:01:C0:A8:01:05 Option 8 defines the two PXE servers. The first server is defined by the first 7 bytes, starting with the OS deployment server type (80:F0, 33008), followed by one IP address: C0:A8:01:04 (192.168.1.4). The second server is defined as follows, using OS deployment server type 80:F1 (33009). PXE option 9, length 22 (16), value = 80:F0:08:53:65:72:76:65:82:20:41:80:F1:08:53:65:72:76:65:82:20:42 Option 9 defines the boot menu that is displayed at boot time. The first 11 bytes correspond to the first line, for the first server. It shows the string Server A, associated with type 80:F0 (first server). The second line shows the string Server B, associated with type 80:F1 (second server). PXE option 9, length 5, value = 00:0F:02:52:42 (targets C and D) Only one IP address is used, the address of the PXE server for the target which receives these DHCP options. PXE option A, length 6, value =0F:53:65:6C:65:63:74 Option 10 (0A) specifies a 15 second timeout and shows the string Select as the boot menu prompt. PXE option FF This closes the buffer The full option 43 reads as follows:
06:01:07:08:0E:80:F0:01:C0:A8:01:04:80:F1:01:C0:A8:01:05: 09:16:80:F0:08:53:65:72:76:65:82:20:41:80:F1:08:53:65:72:76:65:82:20:42: 0A:06:0F:53:65:6C:65:63:74:FF
428
computer for your virtual image does not have Tivoli Provisioning Manager for OS Deployment installed, you can also install the web interface extension manually on it. When the web interface extension is running on a target, it can be used by the OS deployment server to perform actions on and gather information from the target. When browsing the web interface from a computer which is not the OS deployment server, the web interface extension allows the computer on which the web interface is running to exchange information with the OS deployment server. In the absence of the web interface extension, several features of the web interface will also be disabled.
Procedure
1. On the source computer, find the files for the web interface extension, which are located in the OSD_DATADIR\global\http\agents directory, where OSD_DATADIR is the Tivoli Provisioning Manager for OS Deployment data directory you specified, for example: v
Windows
%SYSTEMDRIVE%\tpmfosd files
v v v v
Windows Run the rbagent.msi file. Follow the instructions in the wizard to install the web interface extension. AIX Linux Solaris
Run the rbagent.aix file. Run the rbagent.linux file. Run the rbagent.solaris file.
For all UNIX files, you must transform the downloaded file into an executable (for example, chmod +x rbagent.linux) and then run it. For example, ./rbagent.linux -s <IP>:<password> where IP is the IP address of the OS deployment server to which you want to connect, and password is the password that was specified at the Tivoli Provisioning Manager for OS Deployment installation.
429
Synchronizing images
The Provisioning Configuration Librarian runs an image synchronization periodically, to update the Tivoli Provisioning Manager data model with the latest Tivoli Provisioning Manager for OS Deployment images (golden master, point-in-time snapshot, hardware configuration, unattended setup) or Tivoli Provisioning Manager for Images virtual images. The image synchronization discovers Tivoli Provisioning Manager for OS Deployment images or snapshots of Tivoli Provisioning Manager for Images virtual images and creates image objects for them in the Tivoli Provisioning Manager data model. Once discovered, these images can then be deployed to virtual or physical machines. To synchronize images:
Procedure
1. Click Go To > Deployment > OS Management > Images. 2. Click Select Action > Tivoli Provisioning Manager for OS Deployment > Synchronize images with the boot server. The Provisioning Task Tracking application displays the current status of the task. When the provisioning task has started, you can monitor its progress on this page. From the Select Action menu, click Refresh to update the page.
Results
All the images are now discovered in Tivoli Provisioning Manager, and image objects are added to the data model for them. Note: Before deployment, all imported or discovered virtual images must have SAP and credential information added, so that they can be used on the target computers. For more information, see Adding credentials to virtual images
Procedure
1. 2. 3. 4. Click Go To > Deployment > OS Management > Images. Click the virtual image you want to work with, then click its Credentials tab. Click Add Credentials, then select SSH and SCP for a Linux image, or RXA for a Windows image. On the Add Credential Pair dialog, ensure that the Create Password Credential box is selected.
5. Enter the following password credential information: a. For Search Key, enter master.
430
b. Enter the login User Name and Password for the image. c. Confirm the password. 6. Click OK. 7. Assign the corresponding SSH_HOST or RXA_HOST to the Use feedback loop to check system status field. 8. Click Save.
Results
You have finished adding the required SAP and password credentials to the selected virtual image. You can now deploy the virtual image to the target computer.
3. Enter the following command: mkinitrd /boot/initrd-<kernelversion>.img <kernelversion> v You cannot clone, capture an image, or perform direct image replication from a target with unformatted partitions or partitions formatted using an unsupported proprietary file system. Such partitions should be either deleted, or formatted using a supported file system before cloning, capturing, or replicating an image to another computer. Restriction: A captured image that has four primary partitions cannot be deployed. The fourth partition must be a logical partition. Also, you cannot deploy an image in which the OS partition follows the data partition. You can capture an image of a physical or virtual computer and store it on the Tivoli Provisioning Manager for Images server. For capturing an image online, a process is run on the source machine that selectively reads all the relevant data from the hard disks and saves it optimally to a virtual image, de-fragmenting all files. Note: Unlike the capture of Tivoli Provisioning Manager for OS Deployment golden master images, the capture of Tivoli Provisioning Manager for Images virtual images does not require sysprep for Windows targets. To capture a virtual image:
Procedure
1. Click Go To > Deployment > OS Management > Image Capture.
431
2. Select the source computer from which you want to capture the image. It can be either a physical or a virtual machine. Note: Ensure that the source computer: v Is powered on. v Can be managed by Tivoli Provisioning Manager (has credentials and can execute commands). Tivoli Provisioning Manager will restart the computer. The computer must be set to boot off first from the network, so it can PXE boot off the Tivoli Provisioning Manager for Images server. 3. Click TPMfOSd for the Boot Server Type. 4. Enter the image name and, optionally, an image description. 5. Select TPM for Images Virtual Image for the Image Type. Other image types available are: v Golden Master - standard profile v Point-in-Time Snapshot 6. Click Submit. Tivoli Provisioning Manager will log into the computer and will attempt to reboot it (if it is a known virtual machine, Tivoli Provisioning Manager will restart it). Then, the computer will boot off the Tivoli Provisioning Manager for Images server. For doing this, you must have the computer set to either boot first off the network and PXE boot off the Tivoli Provisioning Manager for Images server, or possibly boot off a network boot CD-ROM which will also boot it off the Tivoli Provisioning Manager for Images server.
Results
The image of the computer, hypervisor, or virtual machine that you selected has been captured. The capture process creates an OVF file and some disk files in the OS deployment server format. The creation of the virtual image might be slower than the standard profile creation.
What to do next
You can now see the details of the captured image. Click Go To > Deployment > OS Management > Images. Select the captured image and then click the Properties tab.
432
Procedure
1. 2. 3. 4. 5. Click Go To > Deployment > OS Management > Image Deployment. Specify a name for the image deployment task or accept the default name. Select the virtual image that you want to install. Select the target computer to install the image on. Choose to schedule the task or run it immediately.
6. Click Submit. The Provisioning Task Tracking application displays the current status of the task. When the provisioning task has started, you can monitor its progress on this page. From the Select Action menu, click Refresh to update the page. a. To view the task progress in detail, click the task name to open the task details page. In the Deployment Request Details column, click Request ID to view the provisioning workflow execution log. b. If the target computer is already managed by Tivoli Provisioning Manager, Tivoli Provisioning Manager will attempt to reboot the machine so that the deployment activity can run. If Tivoli Provisioning Manager cannot restart the machine, then Tivoli Provisioning Manager will schedule the OS deployment activity, and you must boot the machine manually. When the machine boots off the network (and gets picked up by the Tivoli Provisioning Manager for OS Deployment server), it will then run the OS deployment activity.
Results
The virtual image has been installed on the specified target computer.
What to do next
2000 After you install a Windows 2000 image using Tivoli Provisioning Manager for OS Deployment, you must log on to the Windows 2000 computer locally, with Administrator credentials, for all disk partitions to be created correctly. If you log into the computer remotely for the first time after installing Windows 2000, some disk partitions might not appear in the Windows registry.
Microsoft Sysprep, with Windows 2000 setup, will not configure a static IP network configuration. When you log on to Windows 2000, a network script is executed to configure the network. On the Windows 2000 computer, navigate to Start > Settings > Network and Dial-up Connections. From the menu, select View and then click Refresh to view the network connections configuration changes.
2000
The software inventory on the target computer might not be up to date after installing a Tivoli Provisioning Manager for OS Deployment image. We recommend you perform the following discovery activities to update the software inventory on the target computer: 1. Install Tivoli Common Agent 2. Tivoli Provisioning Manager inventory discovery You can do this task by running the Computer Discovery, Common Agent Installation and Inventory Discovery out-of-the-box scenario: Discovering your environment using the ready-to-use network discoveries on page 231.
433
Procedure
1. Click Go To > Deployment > OS Management > Images. 2. Select the virtual image that you want to replicate. Tip: To verify the location of the image that you are about to replicate, click its Properties tab, and review the information in the Image locations section. 3. Click Select Action > Tivoli Provisioning Manager for OS Deployment > Replicate Virtual Image. The Image Replication Wizard is displayed. 4. Specify the IP address of the OS deployment server where you want to replicate the virtual image, then click OK. 5. Click Next to start the replication process. The replication wizard is launched. 6. When the image replication is complete, click Finish.
Results
The selected virtual image has been successfully replicated.
What to do next
You can now see the new location of the virtual image. Click Go To > Deployment > OS Management > Images. Select the image that you have just replicated, click the Properties tab, then go to Image locations.
434
2 GB, on a FAT16 filesystem 4 GB, on a FAT32 filesystem On an NTFS filesystem, the only image size limit is the available hard disk space. v (Optional) Ensure that the web interface extension (rbagent) is installed and running on the hypervisor. Without the rbagent on the hypervisor,Tivoli Provisioning Manager for Images will manage the virtual machine as a physical machine. If you want to export to a VMDK format, install the web interface extension in its 32-bit version, to be compatible with VDDK. To export a virtual image to the OVF format:
Procedure
1. Click Go To > Deployment > OS Management > Images. 2. Select the virtual image to export. 3. Click Select Action > Tivoli Provisioning Manager for OS Deployment > Export Virtual Image. The OVF Export Wizard is displayed. Click Next. 4. Select the target where you want to export the OVF image. You can select the local computer if it has the web interface extension installed, the OS deployment server, or any computer with the web interface extension installed. Click Next. 5. In the Folder box, specify the OVF file. Important: It is recommended that you use a unique directory for each OVF export, to make it easier to keep track of all of your files. If you select the OS deployment server, the default path is OSD_DATADIR\vimages, where OSD_DATADIR is the default directory for the Tivoli Provisioning Manager for OS Deployment data files: v v
Windows UNIX
%SYSTEMDRIVE%\tpmfosd files
Linux
/opt/tpmfosd_files
A virtual image in OVF format consists of a file with the .ovf extension, and a set of virtual disk image files. Click OK, then click Next. 6. Specify the format for the virtual disk image files, depending on the format supported by the tool used to reimport the image later. The available options are: v VHD format (Microsoft Hyper-V) v VMDK format (VMWare ESX) v Raw sparse format (not recommended) Note: If the selected virtual disk image format is VMDK, before exporting the image ensure that: v You installed the VDDK library on the machine where the VMDK file will be located. A reboot is required after the VDDK installation. v You defined the VDDK path in the library path of the machine root user. v You run the web interface extension application (rbagent.exe) in its 32-bit version to be compatible with VDDK 1.1, which is a 32-bit application. Before using the VMDK file on a VMWare ESX Server, you must run the following command on the hypervisor:
vmkfstools -i <source_bytpmfosd> <output_for_esx>
where: <source_bytpmfosd> Specifies the name of the VMDK file created by using Tivoli Provisioning Manager for Images.
Chapter 5. Managing virtual images
435
<output_for_esx> Specifies the name of the destination VMDK file to run on the VMWare ESX Server. For example:
vmkfstools -i ./OVFSLES10_OM.vmdk ./SLES10_CONVERTED/OVFSLES10_OM_CONVERTED.vmdk
Using the generated <output_for_esx> file you can run the new virtual machine on the VMWare ESX Server. 7. Click Next to start the export process. The export wizard is launched. 8. When the image export is complete, click Finish.
Results
The virtual image has been successfully exported to the specified target in the OVF format.
What to do next
You can now use the new image on the targets. Note: If the virtual images are exported to OVF in a format different from the format of the source hypervisor, they might be unusable on the target hypervisor. This is due to the different hardware emulation. To avoid this problem, use the standard process of capturing and deploying images to virtual machines, as this process rebuilds the system according to different hardware.
Procedure
1. Click Go To > Deployment > OS Management > Images. 2. Click Select Action > Tivoli Provisioning Manager for OS Deployment > Import Virtual Image. The OVF Import Wizard is displayed. Click Next. 3. Select the computer where the OVF image is located. You can select the local computer if it has the web interface extension installed, the OS deployment server (in the OSD_DATADIR\import directory), or any computer with the web interface extension installed. Click Next. 4. In the OVF File box, specify the OVF file, then click Next. The import wizard is launched.
436
5. When the image import is complete, click Finish. Tivoli Provisioning Manager will then run a discovery to discover the imported image.
Results
The virtual image has been imported in the OVF format from the specified computer.
What to do next
You can now deploy the imported image to targets. Note: Before deployment, all imported or discovered virtual images must have SAP and credential information added, so that they can be used on the target computers. For more information, see Adding credentials to virtual images on page 430
Learning objectives
The learning objectives for the tutorial are: v Learn how to set up the environment for virtual image management. v Learn how to create and manage virtual images. v Learn how to create software modules and binding them to images. v Learn how to install virtual images on virtual or physical machines.
Considerations
The Tivoli Provisioning Manager for OS Deployment Intel boot server sends PXE responses when there is DHCP traffic between the client computer and the DHCP server. A computer restarted for the first time since the Tivoli Provisioning Manager for OS Deployment boot server is installed is registered to Tivoli Provisioning Manager for OS Deployment with PXE boot option to start on hard-disk if idle. This option is set so that when a computer starts the Tivoli Provisioning Manager for OS Deployment boot server, if there are no pending activities, it starts from the hard disk drive.
437
An isolated network is recommended for testing the Tivoli Provisioning Manager for OS Deployment boot server. An isolated network means that only the computers you are using for this test receives PXE responses from the Tivoli Provisioning Manager for OS Deployment. Consider the following before installing the Tivoli Provisioning Manager for OS Deployment boot server in your production network: v Are there other Intel boot servers deployed on the network? Is it necessary to check with the IT support group first? Both the Tivoli Provisioning Manager for OS Deployment and the other Intel boot server send PXE responses and might cause a conflict if the other Intel boot server has an imaging operation and the Tivoli Provisioning Manager for OS Deployment PXE response is received first to start from hard-disk. v Are there production or important Intel servers on the network that you do not want to interfere with the start by making sure that you have the correct Tivoli Provisioning Manager for OS Deployment configuration?
Prerequisites
Before you start, you need the following: v The Tivoli Provisioning Manager for OS Deployment version provided with Tivoli Provisioning Manager version 7.2 already installed. v The license for Tivoli Provisioning Manager for Images purchased. v A DHCP server and a DNS server. For details about these requirements, see the Tivoli Provisioning Manager Installation Guide. The DHCP server is configured to reserve an IP address for the MAC address of the computers for capture and install image. Also, the Tivoli Provisioning Manager for OS Deployment computer, DHCP server, and Tivoli Provisioning Manager for OS Deployment server requires a static IP address assigned to them. The network interface of the Tivoli Provisioning Manager computer does not have the attribute Dynamic IP address set and the IP address matches the DHCP reserved IP address. v Available ports. By default, the Tivoli Provisioning Manager for OS Deployment boot server uses the following ports for communication: DHCP: port 67 UDP PXE BINL: port 4011 UDP TFTP: port 69 UDP MTFTP: port 4015 UDP NBP: port 4012 UDP FILE: port 4013 UDP and TCP MCAST: port 10000-10500 UDP Address: 239.2.0.1 - 239.2.1.1 On the clients, the default ports are the following: DHCP: port 68 UDP MTFTP: port 8500-8510 UDP Address: 232.1.0.1 MCAST: port 9999 UDP Remote control (Web Interface Extension): port 4014 UDP These ports can all be modified, with one notable exception which is port 69 for TFTP. Port 69 is part of the PXE specifications, independently of the Tivoli Provisioning Manager for OS Deployment product and thus cannot be modified. Any product using PXE boot needs to have this port open to permit PXE boot. Note that this port needs to be open only on the Tivoli Provisioning Manager for OS Deployment boot server, not on the client machines.
438
Learning objectives
In this part, you will learn to: v Obtain the required build packages and upgrade to Tivoli Provisioning Manager for Images. v Discover the host platform and virtual machines, using a host platform discovery configuration. v Install the web interface extension on the hypervisor. v Discover the virtual machines in Tivoli Provisioning Manager.
439
3. For the Installed Version, select the build number that matches the number of the Tivoli Provisioning Manager for OS Deployment build that was shipped with Tivoli Provisioning Manager 7.2. 4. Select the platform, and then click Browse to find the required packages and fixes. 5. Click Continue. Upgrading to Tivoli Provisioning Manager for Images: Ensure that all requirements for your operating system are met. To upgrade to Tivoli Provisioning Manager for Images: 1. Obtain the new Tivoli Provisioning Manager for OS Deployment or Tivoli Provisioning Manager for Images full build for the platforms used in your environment. If you are unsure, download all platforms. See Obtaining Tivoli Provisioning Manager for Images on page 396. 2. Extract all .exe files (self-extracting Windows 32-bit and 64-bit installables) to obtain the required .msi files. If you want, you can delete the .exe files. 3. Place all the Tivoli Provisioning Manager for OS Deployment or Tivoli Provisioning Manager for Images installables (tar.gz and .msi files) into the $TIO_HOME/repository/tpmfosd folder (for Windows, %TIO_HOME%\repository\tpmfosd). Note: Ensure that permissions for the files placed in the repository are set so that they are owned by tioadmin. 4. Discover the new Tivoli Provisioning Manager for OS Deployment or Tivoli Provisioning Manager for Images installables: a. Click Go To > Discovery > Provisioning Discovery > Discovery Configurations. b. In the Discovery Configuration list, click TPMfOSD Version Discovery, and then click Run. This will discover the Tivoli Provisioning Manager for OS Deployment or Tivoli Provisioning Manager for Images installables that you have placed in the repository, and will also create Tivoli Provisioning Manager software products that represent the new versions of Tivoli Provisioning Manager for OS Deployment or Tivoli Provisioning Manager for Images. 5. Stop Tivoli Provisioning Manager for OS Deployment on all of your servers, except the one running on the local Tivoli Provisioning Manager server. 6. Perform the following: a.
Windows In Tivoli Provisioning Manager, run a software product upgrade for Tivoli Provisioning Manager for OS Deployment on the local server: 1) Click Go To > Deployment > Software Management > Software Product Upgrade. 2) On the Software Product Upgrade page, select Tivoli Provisioning Manager for OS Deployment as the software to upgrade.
Note: For details about the OSD_HOME installation directory, see ../ com.ibm.tivoli.tpm.ins.doc/install/rpath_variables.dita. 3) Select the target computer, which is the local Tivoli Provisioning Manager server, then select Upgrade to a new version as the upgrade method. 4) Click Submit. This will upgrade the local Tivoli Provisioning Manager for OS Deployment server to the new version that you have selected. b.
UNIX Linux For non-Windows Tivoli Provisioning Manager servers, the upgrade of the local Tivoli Provisioning Manager for OS Deployment server must be done manually, as Tivoli Provisioning Manager does not have root access to the local system:
440
Note: Due to a known limitation, step 6 b is required only for the local Tivoli Provisioning Manager server. For all the other Tivoli Provisioning Manager for OS Deployment servers, only step 6 a is required, regardless of their operating system. 1) Stop Tivoli Provisioning Manager for OS Deployment (stop the rembo, rbagent, and dbgw processes). 2) Untar or gzip the new Tivoli Provisioning Manager for OS Deployment or Tivoli Provisioning Manager for Images installable to the Tivoli Provisioning Manager for OS Deployment installation directory. This will overwrite the old installation file with the new one. 3) Start Tivoli Provisioning Manager for OS Deployment or Tivoli Provisioning Manager for Images. 4) Run the TPMfOSd Version Discovery (Click Go To > Discovery > Provisioning Discovery > Discovery Configurations.) to ensure that Tivoli Provisioning Manager is up-to-date with the new version that you upgraded manually. 7. If you have more than one Tivoli Provisioning Manager for OS Deployment servers in your environment, you must now upgrade your other servers, too. Repeat step 6 a and run the software product upgrade for all the other Tivoli Provisioning Manager for OS Deployment servers in your environment. This can be done for all server types. Note: If the local Tivoli Provisioning Manager server is not the parent server, the parent server must be upgraded before any child servers. Upgrade the Tivoli Provisioning Manager for OS Deployment servers one at a time.
441
Note: In the absence of the rbagent on the hypervisor, Tivoli Provisioning Manager for Images will manage virtual machines as physical machines. To install the web interface extension on your hypervisor: Note: For the purpose of this tutorial, the VMWare ESX 4.0 hypervisor technology is used as an example. For details about a different hypervisor technology, see Hypervisor requirements on page 407. 1. Ensure that VMWare ESX 4.0 is installed by running cat /etc/vmware-release. 2. Disable the active firewall, by running, for example, the following command: etc/init.d/firewall stop. 3. Download the FUSE 2.7.4-1 library from SourceForge.net and compile it on the VMWare ESX hypervisor or download an already compiled libfuse.so.2 rpm package such as libfuse-2.7.41.el5.pp.i386.rpm from http://rpm.pbone.net/index.php3/stat/4/idpl/9551006/com/libfuse2.7.4-1.el5.pp.i386.rpm.html. Install FUSE on the hypervisor, for example, by entering the following command:
rpm -ivh libfuse-2.7.4-1.el5.pp.i386.rpm
4. Download VDDK version 1.1.1 (VMware-vix-disklib.*.tar.gz 32bit version) from VMWare Cloud Computing with Virtualization and install it on a VMWare ESX hypervisor. Extract the contents: tar -zxvf VMware-vix-disklib.*.tar.gz and run ./vmware-install.pl to install VDDK 1.1.1. A warning message about a missing libfuse.so.2 library might be displayed even if the library is installed. Proceed with the next configuration steps. 5. After the VDDK installation, reboot the hypervisor. 6. Do not install libxml2 because a supported version is already installed in VMWare ESX 4.0. Check that libxml2-2.6.26 is already present. 7. Define the VDDK path in the library path of the user running the rbagent by adding the following line to the /root/.bashrc file and reload it:
export LD_LIBRARY_PATH=:/usr/lib/vmware-vix-disklib/lib32
8. Ensure that the VMWare ESX hypervisor supports the following command:
vmware-cmd -l
9. Create vmware.conf in the same directory where the web interface extension is installed and ensure that it has the following content:
ESX_HOST=127.0.0.1 ESX_USER=root ESX_PWD=password ESX_PORT=902
10. Ensure that the web interface extension is running on the VMWare ESX hypervisor with the rad-refreshhypervisor option. To do this on Linux, copy rbagent.linux from the <OSD_DATADIR>\global\http\agents directory of the OS deployment server to the VMWare ESX hypervisor, set the execution permission: chmod +x rbagent.linux, and run the web interface extension with the following syntax:
./rbagent.linux -d -s <server ip>:<Web_user_interface_administrator_password> rad-refreshhypervisor
11. Ensure that only one instance of web interface extension is running. Note: Tivoli Provisioning Manager for Images does not support the capture or deployment when the file systems are ReiserFs, LVM. The web interface extension is now installed on your hypervisor.
442
The Tivoli Provisioning Manager TPMfOSD_Hardware_Discovery discovers information about the new virtual servers and creates new data model objects for these computers. You can now run an image synchronization, to ensure that all the snapshot images in Tivoli Provisioning Manager for Images are discovered and added to the Tivoli Provisioning Manager data model.
Learning objectives
In this part, you will learn to: v Run an image synchronization, to make any Tivoli Provisioning Manager for Images images known to Tivoli Provisioning Manager. This requires the web interface extension be installed and running on the hypervisor. v Capture a virtual image. v Import a virtual image. v Replicate a virtual image. v Export a virtual image.
Synchronizing images
You run an image synchronization to update the Tivoli Provisioning Manager image library with the latest Tivoli Provisioning Manager for Images virtual images. The image synchronization discovers snapshot virtual images that are known to Tivoli Provisioning Manager for Images and creates image objects in the Tivoli Provisioning Manager data model for them. To synchronize images: 1. Click Go To > Deployment > OS Management > Images. 2. Click Select Action > Tivoli Provisioning Manager for OS Deployment > Synchronize images with the boot server. The Provisioning Task Tracking application displays the current status of the task. When the provisioning task has started, you can monitor its progress on this page. From the Select Action menu, click Refresh to update the page. After the new images are discovered, they can be deployed to other virtual machines or physical machines. Note: Before deployment, all imported or discovered virtual images must have SAP and credential information added, so that they can be used on the target computers. For more information, see Adding credentials to virtual images on page 430
443
Note: v Unlike the capture of Tivoli Provisioning Manager for OS Deployment golden master images, the capture of Tivoli Provisioning Manager for Images virtual images does not require sysprep for Windows targets. v To prevent errors during the common agent installation on the target machine, ensure that the common agent is not installed and the Tivoli GUID is removed from the computer that you are capturing the image from. For details, see Uninstalling the common agent on page 669. To capture a virtual image: 1. Click Go To > Deployment > OS Management > Image Capture. 2. Select the source machine from which you want to capture the image. It can be either a physical or a virtual machine. Note: Ensure that the source machine: v Can be managed by Tivoli Provisioning Manager (has credentials and can execute commands). Tivoli Provisioning Manager will restart the computer. The computer must be set to boot off first from the network, so it can PXE boot off the Tivoli Provisioning Manager for Images server. 3. Click TPMfOSd for the Boot Server Type. 4. Enter the image name and, optionally, an image description. 5. Select TPM for Images Virtual Image for the Image Type. 6. Click Submit. Tivoli Provisioning Manager will log into the computer and will attempt to reboot it (if it is a known virtual machine, Tivoli Provisioning Manager will restart it). Then, the computer will boot off the Tivoli Provisioning Manager for Images server. For doing this, you must have the computer set to either boot first off the network and PXE boot off the Tivoli Provisioning Manager for Images server, or possibly boot off a network boot CD-ROM which will also boot off the Tivoli Provisioning Manager for Images server. You have finished capturing the virtual image. In Tivoli Provisioning Manager, you can configure the image properties, replicate it, or perform other tasks with it.
444
3. Select the computer where the OVF image is located. You can select the local computer if it has the web interface extension installed, the OS deployment server (in the OSD_DATADIR\import directory), or any computer with the web interface extension installed. Click Next. 4. In the OVF File box, specify the OVF file, then click Next. The import wizard is launched. 5. When the image import is complete, click Finish. Tivoli Provisioning Manager will then run a discovery to discover the imported image. The virtual image is now successfully imported in OVF format. Note: Before deployment, all imported or discovered virtual images must have SAP and credential information added, so that they can be used on the target computers. For more information, see Adding credentials to virtual images on page 430
445
To 1. 2. 3.
%SYSTEMDRIVE%\tpmfosd files
Linux
/opt/tpmfosd_files
A virtual image in OVF format consists of a file with the .ovf extension, and a set of virtual disk image files. Click OK, then click Next. 6. Specify the format for the virtual disk image files, depending on the format supported by the tool used to reimport the image later. The available options are: v VHD format (Microsoft Hyper-V) v VMDK format (VMWare ESX) v Raw sparse format (not recommended) Note: If the selected virtual disk image format is VMDK, before exporting the image ensure that: v You installed the VDDK library on the machine where the VMDK file will be located. A reboot is required after the VDDK installation. v You defined the VDDK path in the library path of the machine root user. v You run the web interface extension application (rbagent.exe) in its 32-bit version to be compatible with VDDK 1.1, which is a 32-bit application. Before using the VMDK file on a VMWare ESX Server, you must run the following command on the hypervisor:
vmkfstools -i <source_bytpmfosd> <output_for_esx>
where:
446
<source_bytpmfosd> Specifies the name of the VMDK file created by using Tivoli Provisioning Manager for Images. <output_for_esx> Specifies the name of the destination VMDK file to run on the VMWare ESX Server. For example:
vmkfstools -i ./OVFSLES10_OM.vmdk ./SLES10_CONVERTED/OVFSLES10_OM_CONVERTED.vmdk
Using the generated <output_for_esx> file you can run the new virtual machine on the VMWare ESX Server. 7. Click Next to start the export process. The export wizard is launched. 8. When the image export is complete, click Finish. The virtual image has been successfully exported to the specified target in the OVF format.
Windows A Windows Installer (MSI). Packages that comply with the Designed for Windows logo program typically use this type of installer. It guarantees that there is an easy way to perform an unattended installation of the software. An MSI package typically contains a file with an .msi extension. If you only have a single .exe file, it is likely to be an archive that you must extract first. For more information, refer to the section. Windows
v v
Windows A Windows HAL to include in a clone deployment. This option must be used only to inject HAL into a Windows cloning profile. For HAL injection in unattended setup profiles, you must create a driver package.
447
v A custom action on the targets. This includes OS configuration changes such as registry patches, command to be run, and copying sets of files on the target. The process for creating a software module of the common agent is used as an example. v
Linux
Procedure
1. Click Go To > Deployment > OS Management > Software Modules. 2. Click New Software to run the software wizard. 3. 4. 5. 6. Select the Windows Vista / 2008 and click Next. Select Language pack and click Next. Follow the instructions of the wizard to create your software module. You will have to choose the computer where the material to create your software module can be found and this computer must have the web interface extension installed on it. The web interface extension is automatically installed on all Tivoli Provisioning Manager for OS Deployment servers, however, only the web interface extension on the parent server can be detected. If you have changed the parent server, or you are trying to work with a child server, you must manually install the web interface extension on the source computer before it can be detected. For information on how to do this, see Installing an uninstalling the Web interface extension.
Results
Parameters of the software module are pre-filled for you but they can be modified in the appropriate step of the software wizard. These parameters include: v A description that identifies the package in the software module tree. v A comment with additional information about the software module. v The stage of the deployment when your software module must be installed: when the OS is installed, or after one or more additional reboot. Most of the time, you must install the package at the same time as the operating system. However, you can decide to install them in a specified order to avoid software-specific conflicts. v A file name to store your image on the provisioning server. Packages typically have a .pkg extension. v The path to where the installation files are restored on the target computer. This path is relative to the system root partition. v An additional command line that might be necessary to install your software module. When possible, the wizard suggests automatically the appropriate command line to run the installation unattended. However, you might need to add some additional parameters to the command.
448
machine (for example, a Linux operating system machine) to actually create the software module as long as Tivoli Provisioning Manager for OS Deployment is installed on it. For instructions on how to manually install the web interface extension on a source computer, see Installing and uninstalling the web interface extension on page 384. The directory containing the HotFix files must contain a file with a .msu extension.
Procedure
1. 2. 3. 4. Click Go To > Deployment > OS Management > Software Modules. Click New Software to run the software wizard. Select Windows Vista / 2008 and click Next. Select HotFix (MSU) and click Next.
5. Follow the instructions of the wizard to create your software module. 6. You will have to choose the computer where the material to create your software module can be found and this computer must have the web interface extension installed on it. The web interface extension is automatically installed on all Tivoli Provisioning Manager for OS Deployment servers, however, only the web interface extension on the parent server can be detected. If you have changed the parent server, or you are trying to work with a child server, you must manually install the web interface extension on the source computer before it can be detected. For information on how to do this, see Installing an uninstalling the Web interface extension.
Results
Parameters of the software module are pre-filled for you but they can be modified in the appropriate step of the software wizard. These parameters include: v A description that identifies the package in the software module tree. v A comment with additional information about the software module. v The stage of the deployment when your software module must be installed: when the OS is installed, or after one or more additional reboot. Most of the time, you must install the package at the same time as the operating system. However, you can decide to install them in a specified order to avoid software-specific conflicts. v A file name to store your image on the provisioning server. Packages typically have a .pkg extension. v The path to where the installation files are restored on the target computer. This path is relative to the system root partition. v An additional command line that might be necessary to install your software module. When possible, the wizard suggests automatically the appropriate command line to run the installation unattended. However, you might need to add some additional parameters to the command.
449
The directory containing MSI files must contain a file with a .msi extension. If the MSI file is located on the provisioning server, you must have placed it in a subdirectory of the import directory. Note: If the folder you are looking for is not on the local computer, the provisioning server, or on another computer running the web interface extension, you might still be able to access the wanted resource using the following procedure:
Windows
Windows 1. Create a .lnk.yourfilename file (where yourfilename is the name of your choice) that contains the path to the wanted folder (for example, \\fileserver\export\softs\). 2. In the wizard, enter .lnk.yourfilename preceded by the appropriate path. UNIX Use symlinks.
UNIX
Procedure
1. Click Go To > Deployment > OS Management > Software Modules. 2. Click New Software to run the software wizard. 3. Select Windows Vista / 2008 and click Next. 4. Select A Windows application installation, using Microsoft Installer (MSI) and click Next. 5. Follow the instructions of the wizard to create your software module. 6. You will have to choose the computer where the material to create your software module can be found and this computer must have the web interface extension installed on it. The web interface extension is automatically installed on all Tivoli Provisioning Manager for OS Deployment servers, however, only the web interface extension on the parent server can be detected. If you have changed the parent server, or you are trying to work with a child server, you must manually install the web interface extension on the source computer before it can be detected. For information on how to do this, see Installing an uninstalling the Web interface extension.
Results
Parameters of the software module are pre-filled for you but they can be modified in the appropriate step of the software wizard. These parameters include: v A description that identifies the package in the software module tree. v A comment with additional information about the software module. v The stage of the deployment when your software module must be installed: when the OS is installed, or after one or more additional reboot. Most of the time, you must install the package at the same time as the operating system. However, you can decide to install them in a specified order to avoid software-specific conflicts. v A file name to store your image on the provisioning server. Packages typically have a .pkg extension. v The path to where the installation files are restored on the target computer. This path is relative to the system root partition. v An additional command line that might be necessary to install your software module. When possible, the wizard suggests automatically the appropriate command line to run the installation unattended. However, you might need to add some additional parameters to the command.
450
3. Select Linux and click Next. 4. Select A Linux application installation, using RPM and click Next. 5. Follow the instructions of the wizard to create your software module.
Results
Parameters of the software module are pre-filled for you but they can be modified in the appropriate step of the software wizard. These parameters include: v A description that identifies the package in the software module tree. v A comment with additional information about the software module. v The stage of the deployment when your software module must be installed: when the OS is installed, or after one or more additional reboot. Most of the time, you must install the package at the same time as the operating system. However, you can decide to install them in a specified order to avoid software-specific conflicts. v A file name to store your image on the provisioning server. Packages typically have a .pkg extension. v The path to where the installation files are restored on the target computer. This path is relative to the system root partition. v An additional command line that might be necessary to install your software module. When possible, the wizard suggests automatically the appropriate command line to run the installation unattended. However, you might need to add some additional parameters to the command.
Procedure
1. Click Go To > Deployment > OS Management > Software Modules. 2. 3. 4. 5. Click New Software to run the software wizard. Select the relevant operating system and click Next. Select A Windows driver to include in a deployment and click Next. Select On the OS server itself (in the 'import' directory) and click Next.
Chapter 5. Managing virtual images
451
6. Select the relevant directory. For IBM drivers for a Windows 2003 operating system, this is sguide/w2003drv/$oem$/$1/drv. 7. Select all relevant drivers in the list provided and click Next. Sometimes, several versions of the same driver are available. In this case, follow these guidelines: v Select drivers without alternative, even if the name is misleading. v Select the appropriate Windows version when there are alternatives, for instance select win2003 rather than win2k or winnt for a Windows 2003 driver. v v v v Select server when the alternative is between server and pro. Avoid selecting drivers with powerpc in their name. Avoid selecting drivers containing hardware abstraction layer (HAL). Avoid selecting drivers with another architecture.
Note: It is better to have a few extra drivers included in the package than to miss one. 8. Give a meaningful folder name to store your drivers, for instance IBM ServerGuide 2003 32bit, and click Next. 9. Select Yes, create binding rules based on: and PCI hardware ID. Then click Next. 10. Select Use this driver for the exact same device only and click Next. 11. Select the appropriate architecture and the targeted operating system and click Next. 12. Click Finish.
Results
You have now finished the driver package creation process.
What to do next
You might have to go through the driver package creation process several times, to create different driver package directories specific for operating systems and their architecture.
Hardware abstraction layer (HAL) might change from one computer to another depending on whether it has a single or multiple processors, whether it uses Advanced Programmable Interrupt Controller (APIC) and Advanced Configuration and Power Interface (ACPI). HAL also depends on the operating system. To create universal images, you might be required to have other HAL versions on your image than the original. To create a HAL software module to be injected on a golden master image during deployment, you must create a HAL software module and bind it to the corresponding images.
Procedure
1. 2. 3. 4. 5. Click Go To > Deployment > OS Management > Software Modules. Click New Software to run the software wizard. Select Windows 2000 / 2003/ XP. Select A Windows HAL to include in a clone deployment. Follow the wizard instructions. Different HALs are available on Windows installation CD-ROMs. The wizard offers you to create binding rules for this HAL and pre-fils some of the data to facilitate the rule creation process.
452
Results
You have now created a HAL software module to be injected on a cloning image during deployment.
What to do next
If you have not used the wizard to create binding rules, it is recommended that you bind your HAL package now to deploy it in appropriate contexts. Creating a software module for HAL injection on an unattended setup: Before you begin HAL injection on an unattended setup image is typically only necessary on some very specific server systems. The server vendor must then provide you with the appropriate HAL. IBM provides HALs for its servers in the ServerGuide CD-ROM To create a HAL software module to be injected on an unattended setup image during deployment, you must create a HAL software module and bind it to the corresponding images. Procedure 1. Click Go To > Deployment > OS Management > Software Modules. 2. Click New Software to run the software wizard. 3. Select Windows 2000 / 2003/ XP. 4. Select A Windows driver to include in a deployment. 5. Follow the wizard instructions. When asked for the driver file location, provide the path to the HAL. Results You have now created HAL injection on an unattended setup image. What to do next If you have not used the wizard to create binding rules, it is recommended that you bind your HAL package now to deploy it in appropriate contexts.
453
Procedure
1. 2. 3. 4. Click Go To > Deployment > OS Management > Software Modules. Click Create to run the software wizard. Select the operating system and click Next. Select A custom action on the target computer and click Next.
Results
Parameters of the software module are pre-filled for you but they can be modified in the appropriate step of the software wizard. These parameters include: v A description that identifies the package in the software module tree. v A comment with additional information about the software module. v The stage of the deployment when your software module must be installed: when the OS is installed, or after one or more additional reboot. Most of the time, you must install the package at the same time as the operating system. However, you can decide to install them in a specified order to avoid software-specific conflicts. v A file name to store your image on the provisioning server. Packages typically have a .pkg extension. v The path to where the installation files are restored on the target computer. This path is relative to the system root partition. v An additional command line that might be necessary to install your software module. When possible, the wizard suggests automatically the appropriate command line to run the installation unattended. However, you might need to add some additional parameters to the command. Repeating custom actions: Some commands must be run every time the target boots during a deployment. This is typically the case if you want to repeatedly mount a network share. This connection is destroyed when rebooting. You can therefore create a single software module to mount the network share and set this software module to run once after each reboot, starting at a specific reboot. This option is available for executing a single command. Procedure 1. Create your software module. 2. Double-click the software module name in the Software components page to display the Software details page 3. Click Edit in the title of the Package information section. 4. Select the installation stage at which the software module must be applied first. 5. Select Run at each software pass until end of deployment and click OK. Creating a software module for custom actions on Windows: Software modules can also contain custom actions to be performed on the target. They are divided into: v
Vista 2008
A WinPE 2.0 image (option present only for Windows Vista and Windows 2008
software modules ). Note: To create a WinPE 2.0 image, the Web interface extension must be started with administrator privileges. v
XP 2003
A WinPE 1.0 Ramdisk image (option present only for Windows 2000/2003/XP
software modules).
454
v An OS configuration change to perform on the target. v A set of files to copy on the target. Configuration changes are further subdivided into: v Copy and execute a single file. v Apply a Windows registry change. v Apply a Windows .ini file change. v Copy a single text file. v Execute a single command file. v Boot a virtual floppy disk. Note: Virtual floppy disk software modules can only be created from a Windows operating system running the web interface extension. Procedure 1. Click Go To > Deployment > OS Management > Software Modules. 2. Click New Software to run the software wizard. 3. Select the operating system and click Next. 4. Select A custom action on the target and click Next. 5. Follow the instructions of the wizard to create your software module. 6. You will have to choose the computer where the material to create your software module can be found and this computer must have the web interface extension installed on it. The web interface extension is automatically installed on all Tivoli Provisioning Manager for OS Deployment servers, however, only the web interface extension on the parent server can be detected. If you have changed the parent server, or you are trying to work with a child server, you must manually install the web interface extension on the source computer before it can be detected. For information on how to do this, see Installing an uninstalling the Web interface extension. Results Parameters of the software module are pre-filled for you but they can be modified in the appropriate step of the software wizard. These parameters include: v A description that identifies the package in the software module tree. v A comment with additional information about the software module. v The stage of the deployment when your software module must be installed: when the OS is installed, or after one or more additional reboot. Most of the time, you must install the package at the same time as the operating system. However, you can decide to install them in a specified order to avoid software-specific conflicts. v A file name to store your image on the provisioning server. Packages typically have a .pkg extension. v The path to where the installation files are restored on the target computer. This path is relative to the system root partition. v An additional command line that might be necessary to install your software module. When possible, the wizard suggests automatically the appropriate command line to run the installation unattended. However, you might need to add some additional parameters to the command. Example As examples are described the complete step-by-step process of creating a software module with the content of the second CD-ROM of a Windows 2003 R2 distribution (see Creating a software module for unattended deployment of Windows 2003 R2 on page 343), and of creating a ramdisk from a bootable diskette (see Creating a ramdisk software module from a bootable diskette on page 344).
Chapter 5. Managing virtual images
455
Repeating custom actions: Some commands must be run every time the target boots during a deployment. This is typically the case if you want to repeatedly connect to a network share. This connection is destroyed when rebooting. You can therefore create a single software module with a netuse command to set the network share and set this software module to run once after each reboot, starting at a specific reboot. This option is available for v Windows registry changes. v Copying and executing a single file. v Executing a single command. Procedure 1. Create your software module. 2. Double-click the software module name in the Software components page to display the Software details page 3. Click Edit in the title of the Package information section. 4. Select the installation stage at which the software module must be applied first. 5. Select Run at each software pass until end of deployment and click OK. Creating a software module for unattended deployment of Windows 2003 R2: To prepare an unattended deployment of Windows 2003 R2, you must include some of the content of the second CD-ROM of the distribution in a software module and bind this software module to the image created with the first CD-ROM. Procedure 1. 2. 3. 4. 5. 6. 7. 8. 9. Click Go To > Deployment > OS Management > Software Modules. Click New Software to run the software wizard. Select Windows 2000 / 2003 / XP. Select A custom action on the target. Select A set of files to copy on the target (with an optional command to execute). Indicate on which computer the files of the second CD-ROM are located. Indicate the complete path to find the files in /CMPNENTS/R2, for example D:/CMPNENTS/R2. Verify the proposed description and if necessary, modify it. Optionally, enter a comment. Enter the necessary parameters for this specific software module: v Apply the software module After one additional reboot. v Enter a meaningful package file name, with a .pkg extension. v Use \install\R2 as destination path. v Do not forget the command-line to be run on the target:
cmd /c \install\R2\setup2.exe /q /a /p:xxxx-xxxx-xxxx-xxxx-xxxx /cs
where xxxx-xxxx-xxxx-xxxx-xxxx is the product key. 10. Wait during the package generation process and click Finish. What to do next Bind your software module to your Windows 2003 R2 unattended setup image (see Automatic binding rules on page 347).
456
Creating a ramdisk software module from a bootable diskette: Creating a ramdisk software module from a bootable diskette is considered by the software module wizard to be a Configuration change, which itself is included in the Custom action. Procedure 1. 2. 3. 4. 5. 6. 7. Click Go To > Deployment > OS Management > Software Modules. Click New Software to run the software wizard. Select Windows 2000 / 2003 / XP. Select A custom action on the target. Select a Configuration change. Select Boot a virtual floppy disk. Specify which computer the bootable diskette must be read from. This can be either on the local computer or on another computer running the web interface extension. The option On the server itself must not be used. If the diskette drive is added after the web interface extension is started (on the local or remote computer depending on your choice), it might be necessary to stop and restart the web interface extension to enable it to detect the diskette drive. Moreover, the diskette must not be opened by another application (such as Windows Explorer), as this might cause interference.
Note: The web interface extension is automatically installed on all Tivoli Provisioning Manager for OS Deployment servers, however, only the web interface extension on the parent server can be detected. If you have changed the parent server, or you are trying to work with a child server, you must manually install the web interface extension on the source computer before it can be detected. For information on how to do this, see Installing an uninstalling the Web interface extension. 8. Insert the bootable diskette that you want to image and run as a ramdisk in the disk drive and click Next. 9. Enter a software module description and click Next. 10. Specify parameters for the package creation and click Next. Results The software module is created. Creating a software module of the common agent: This example shows the steps for creating a software module of the Tivoli Common Agent. v The Agent Manager must be installed on the same server as Tivoli Provisioning Manager. The Agent Manager is installed during Tivoli Provisioning Manager installation. v The following Tivoli common agent installable packages have to be present in the local file repository root path: common_agent_1.4.1.0_200810230654_aix.tar common_agent_1.4.1.0_200810230654_linux_ppc.tar common_agent_1.4.1.0_200810230654_linux.tar common_agent_1.4.1.0_200810230654_solaris.tar common_agent_1.4.1.0_200810230654_windows.exe The local file repository path is: TIO_HOME\repository. v A number of configuration scripts must exist inside the TIO_HOME/tools/prepare_tca_image folder. These scripts are: caInstall.rsp checkDiskSpace.vbs
Chapter 5. Managing virtual images
457
ihscript.vbs install.bat install.sh All of the scripts listed above will be used during an offline installation of the Tivoli Common Agent that will be performed on a target system once an OS image has been successfully deployed. v A script, prepareTCAImage, used for preparation of the Tivoli Common Agent and Tivoli Provisioning Manager subagent installation images must exist inside the tools folder. Either %TIO_HOME%\tools\ prepareTCAImage.cmd or $TIO_HOME/tools/prepareTCAImage.sh. This script will be executed by a workflow code and it will generate a number of Tivoli Common Agent offline, platform specific, installation packages. It also extracts the common agent installation parameters, such as the agent manager registration password, and writes them to a response file, caInstall.rsp. To create a software module: 1. Click Go To > Deployment > OS Management > Boot Servers. 2. In the Select Action menu, select Create Tivoli Common Agent Software Modules. 3. Click Yes when prompted to go to the Provisioning Task Tracking application. The Provisioning Task Tracking application opens and you can monitor the progress of your software module creation.
458
1. Windows language packs, Windows HotFixes, and Windows drivers are always deployed right after the operating system. Their ordering cannot be modified. Therefore, they do not appear in the Software application order window. 2. Solaris software modules are always applied right after operating system installation. Reboots are not handled under Solaris. To schedule the application of software modules, click Reorder software at the bottom of the software modules page. This opens a dialog window that allows you to order the different software modules stored on your provisioning server. The dialog shows the different steps of a deployment with disk partitioning (in green), OS installation (in purple) and reboots (in red). Software components can be installed in between all of these steps, where they are placed inside the expandable installation stages (in yellow). You can add, move, and delete reboot sequences by using the buttons at the bottom of the dialog window. You can also rename software installation stages. You can expand the software installation stages to view their content by clicking on the + icon. You can then move individual software modules from one stage to another by drag-and-drop. The destination stage does not need to be expanded. Note: Drag-and-drop is limited to the Software Application Order window. The software modules are not ordered within an installation stage. If you want a software module to be installed before another between two specific reboots, create two distinct installation stages between the reboots. For example, if your first software module copies files on the target and the second one runs a command on these files, you must place the first software module in an installation stage which occurs before the one in which you run the command software module. Typical application locations for software modules include: v For virtual floppy-disk used as ramdisk: before disk partitioning and OS installation, in order to allow for the configuration of low-level hardware devices controlling the hard disk, such as RAID controllers. v For virtual floppy-disk images: in between disk partitioning and OS installation, in order to flash devices early. v Sysprep and unattended setup processes are automatically run during the OS installation phase, if required. v For system snapshots: right after OS installation, to deploy the software nearly at the same time as the operating system image (the most efficient). Before OS installation is forbidden, as a system snapshot needs an installed OS. v For other software: when the OS is installed or after additional reboots, depending on the software module needs.
459
Procedure
1. 2. 3. 4. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Computers. In the list of computers, click the name of the appropriate computer. Click the Deployment Properties tab. Click the Bindings tab, then click Software bindings.
5. Click Edit to modify the bindings. 6. Select the software module to associate with deployment to this computer. 7. Click OK.
Results
You have now bound a software module to a target computer.
What to do next
You can also deselect items to remove their explicit bindings. To remove a binding by rule, you must modify the rule.
Procedure
1. Click Go To > Deployment > OS Management > Software Modules. 2. Select the software module that you want to use for the new binding rule. 3. Click the software module that you want to bind. Details about the software module are displayed. 4. Click New rule. 5. When adding a binding rule to a software module, you can set values for the following criteria: v A deployment scheme v An image v A current OS configuration v One of the system-definable and user-definable fields of the database (only used if you have customized the database) v An operating system type, such as Windows 2000 v An operating system version, such as SP2 v An operating system language v v v v v An operating system architecture, such as x86-32 A computer model name A BIOS version A PCI device A base board
IBM Tivoli Provisioning Manager Version 7.2.0.2 User Guide
460
v A free-text condition in Rembo-C; syntax For example, to create a binding based on the operating system type between a software module and targets, you must create a rule, click OS type, and select the operating system version that you want to limit this software module to. 6. When adding a binding rule to an OS configuration, you can set a condition on the deployment scheme, and on the computer model name. The next four fields are only used if you have customized your database and want to match specific user categories. 7. Finally, you can enter a free-text condition following the Rembo-C; syntax. Free-text conditions follow a Rembo-C; syntax. They must only be used by advanced users. The conditions determine the applicability of the rule and evaluate to true or false. A condition must be formed using the variables also used for keyword substitutions in software modules, combined with Java-like logical operators, listed by order of priority in the table below:
Table 71. Logical operators for free-text conditions Operator < <= => > == != && || Meaning smaller than smaller than or equal to greater than or equal to greater than equal to not equal to AND operator OR operator
Results
You have now created an automatic binding rule.
461
Note: Before deployment, all imported or discovered virtual images must have SAP and credential information added, so that they can be used on the target computers. For more information, see Adding credentials to virtual images on page 430. To 1. 2. 3. 4. 5. install the virtual image on the target computer: Click Go To > Deployment > OS Management > Image Deployment. Specify a name for the image deployment task or accept the default name. Select the virtual image that you want to install. Select the target computer to install the image on. Choose to schedule the task or run it immediately.
6. Click Submit. The task will be executed. Monitor its progress until the task has completed. Click Refresh to see the updated status. a. To view the task progress in detail, click the task name to open the task details page. In the Deployment Request Details column, click Request ID to view the provisioning workflow execution log. b. If the target computer is already managed by Tivoli Provisioning Manager, Tivoli Provisioning Manager will attempt to reboot the machine so that the deployment activity can run. If Tivoli Provisioning Manager cannot restart the machine, then Tivoli Provisioning Manager will schedule the OS deployment activity, and you must boot the machine manually. When the machine boots off the network (and gets picked up by the Tivoli Provisioning Manager for OS Deployment server), it will then run the OS deployment activity. You have finished deploying the virtual image to the specified target computer.
Reference
Reference information supports the tasks that you want to complete.
Procedure
1. Select Tivoli for the Product Group. 2. Select the Tivoli Provisioning Manager for OS Deployment or the Tivoli Provisioning Manager for Images product.
462
3. For the Installed Version, select the build number that matches the number of the Tivoli Provisioning Manager for OS Deployment build that was shipped with Tivoli Provisioning Manager 7.2. 4. Select the platform, and then click Browse to find the required packages and fixes. 5. Click Continue.
Procedure
1. Obtain the new Tivoli Provisioning Manager for OS Deployment or Tivoli Provisioning Manager for Images full build for the platforms used in your environment. If you are unsure, download all platforms. See Obtaining Tivoli Provisioning Manager for Images on page 396. 2. Extract all .exe files (self-extracting Windows 32-bit and 64-bit installables) to obtain the required .msi files. If you want, you can delete the .exe files. 3. Place all the Tivoli Provisioning Manager for OS Deployment or Tivoli Provisioning Manager for Images installables (tar.gz and .msi files) into the $TIO_HOME/repository/tpmfosd folder (for Windows, %TIO_HOME%\repository\tpmfosd). Note: Ensure that permissions for the files placed in the repository are set so that they are owned by tioadmin. 4. Discover the new Tivoli Provisioning Manager for OS Deployment or Tivoli Provisioning Manager for Images installables: a. Click Go To > Discovery > Provisioning Discovery > Discovery Configurations. b. In the Discovery Configuration list, click TPMfOSD Version Discovery, and then click Run. This will discover the Tivoli Provisioning Manager for OS Deployment or Tivoli Provisioning Manager for Images installables that you have placed in the repository, and will also create Tivoli Provisioning Manager software products that represent the new versions of Tivoli Provisioning Manager for OS Deployment or Tivoli Provisioning Manager for Images. 5. Stop Tivoli Provisioning Manager for OS Deployment on all of your servers, except the one running on the local Tivoli Provisioning Manager server. 6. Perform the following: a. In Tivoli Provisioning Manager, run a software product upgrade for Tivoli Provisioning Manager for OS Deployment on the local server: 1) Click Go To > Deployment > Software Management > Software Product Upgrade.
Windows
2) On the Software Product Upgrade page, select Tivoli Provisioning Manager for OS Deployment as the software to upgrade. Note: For details about the OSD_HOME installation directory, see ../ com.ibm.tivoli.tpm.ins.doc/install/rpath_variables.dita. 3) Select the target computer, which is the local Tivoli Provisioning Manager server, then select Upgrade to a new version as the upgrade method. 4) Click Submit. This will upgrade the local Tivoli Provisioning Manager for OS Deployment server to the new version that you have selected. b. For non-Windows Tivoli Provisioning Manager servers, the upgrade of the local Tivoli Provisioning Manager for OS Deployment server must be done manually, as Tivoli Provisioning Manager does not have root access to the local system:
UNIX Linux
463
Note: Due to a known limitation, step 6 b is required only for the local Tivoli Provisioning Manager server. For all the other Tivoli Provisioning Manager for OS Deployment servers, only step 6 a is required, regardless of their operating system. 1) Stop Tivoli Provisioning Manager for OS Deployment (stop the rembo, rbagent, and dbgw processes). 2) Untar or gzip the new Tivoli Provisioning Manager for OS Deployment or Tivoli Provisioning Manager for Images installable to the Tivoli Provisioning Manager for OS Deployment installation directory. This will overwrite the old installation file with the new one. 3) Start Tivoli Provisioning Manager for OS Deployment or Tivoli Provisioning Manager for Images. 4) Run the TPMfOSd Version Discovery (Click Go To > Discovery > Provisioning Discovery > Discovery Configurations.) to ensure that Tivoli Provisioning Manager is up-to-date with the new version that you upgraded manually. 7. If you have more than one Tivoli Provisioning Manager for OS Deployment servers in your environment, you must now upgrade your other servers, too. Repeat step 6 a and run the software product upgrade for all the other Tivoli Provisioning Manager for OS Deployment servers in your environment. This can be done for all server types. Note: If the local Tivoli Provisioning Manager server is not the parent server, the parent server must be upgraded before any child servers. Upgrade the Tivoli Provisioning Manager for OS Deployment servers one at a time.
Results
You have finished upgrading your Tivoli Provisioning Manager for Images to a later version.
Base parameters
Debug level information GlobalDebugLevel number specifies the level of details that must be placed in the log file. IP address of the backup server Backup ip-addr defines the IP address of a backup server that can be used by the target if the
464
primary server fails. The backup server must have the same Net Password as this server. For the backup recovery system to work, the backup server must also contain an exact copy of the files stored on primary server. Maximum size of the server log files MaxLogSize number limits the size of the log file generated by the provisioning server. The maximum log size is specified in bytes, and applies to all log files created by the provisioning server. If you do not specify this parameter is not set, or set to 0, then log files are not limited in size. If a limit is set, and the server reaches this limit, the current log file is backed up and a new file is created. CountersInterval minutes specifies the interval, in minutes, for the server statistics measures. Network interfaces used by the server Interfaces ip-addr specifies the list of network interfaces that the provisioning server uses when sending and receiving packets to and from targets. If you leave this option unspecified, the server uses the network interface corresponding to the official hostname of the server. The format is a list of IP addresses, separated by spaces.
465
DisableHTTPOptim disables the optimization of HTTP transfer in the web interface. Set this parameter if you do not want the web interface to group JavaScript, stylesheets, and images into large files to reduce HTTP traffic and enhance the cache process. You must disable this optimization if you are creating console pages.
466
BootDiscoveryAddress ip-addr specifies the multicast IP address that the provisioning server listens to when waiting for BINL multicast requests coming from target computers. This value must match the value set in the DHCP option 43 sent to targets. v No-boot schedule NoBootSchedule specifies the frequency at which the provisioning server stops providing a PXE boot service. It is used in conjunction with NoBootDuration. Modify this parameter using the web interface only. v No-boot duration in minutes NoBootDuration specifies the duration in minutes during which the provisioning server stops providing a PXE boot service if a no-boot schedule is specified. It is used in conjunction with the parameter NoBootSchedule. Modify this parameter using the web interface only.
467
DisableTCP disables the TCP component of the provisioning server. Target computers might not be able to boot on this server if you disable the TCP server module. v Directory for internal files DataDir path specifies the path relative to the provisioning server base directory for storing files accessible to the target computer. By default, this parameter is set to files.
Replicated objects
The following objects are replicated between parent and a child OS deployment servers: v Deployment schemes v Hardware configurations v Software modules v Images, including virtual images With a good network connection between your servers and your database, you can choose one of the following replication mechanisms: v Automated, whenever it is needed, using a config.csv file. v Automated, at scheduled times. v Manual, using the web interface or a command line (web interface extension). See the related links for more information about replicating with a schedule or manually, using the web interface or the web interface extension.
468
Important: The replication schedule for each server is determined by the config.csv file at the Tivoli Provisioning Manager for OS Deployment start time. If you change the replication schedule in the web interface (on the Replication tab), it will not be saved after restarting; the values from the config.csv file will be used instead. For a persistent change to the replication schedule, you must edit the config.csv file.
Procedure
v For a persistent change, edit the config.csv file to include the new replication schedule. v Otherwise, use the web interface to set up a replication schedule. For each child server in the hierarchy: 1. Click Go To > Deployment > OS Management > Boot Servers. 2. Click the boot server to work with, then click its Replication tab. 3. Click Set up a replication schedule. 4. Enter the start date and time, and the frequency of the replications. As child servers must be replicated after their parents, you must use the same or a lower frequency than the replication schedule on the parent server. 5. Click OK.
Procedure
v With the web interface: 1. Click Go To > Deployment > OS Management > Boot Servers. 2. Click the boot server to work with, then click its Replication tab. 3. Select the OS deployment server you want to replicate. 4. Click on the link to replicate the server. The exact wording of the link depends on whether the server needs to replicate, and on the position of the server in the hierarchy. v With a command line and the web interface extension: 1. On the child server, open a command line shell. 2. Go to the directory where rbagent is located. 3. Run rbagent rad-srvsync.
What to do next
Now, you can replicate the children of this OS deployment server. You can also set up a replication schedule.
Status
v On the lower left hand-side of a server icon, the up/down indicator is displayed. The status indicator can take two different values:
A blue circle with a light center, indicating that the OS deployment server is up and running.
Chapter 5. Managing virtual images
469
A black dot, indicating that the OS deployment server is down. v On the lower right side of a child server icon, the replication status indicator is displayed. The status indicator can take three different values:
A cross in a red dot indicates that the selected child server is not up-to-date with its parent. Files are missing on the child server; the child server must be replicated with its parent before any action is performed.
A yellow triangle with an exclamation point indicates a warning. A discrepancy was discovered between the child and the server files. Some files can have been updated or added on the parent server. Click Object version to view which deployment objects are not up-to-date. If you plan to use any of these objects, you must replicate your server first. This page contains yellow triangles if SSL is not disabled or if the servers are temporarily unresponsive.
A green dot with a white check mark indicates that the child server is up-to-date with its parent. Note: When a server is down, it keeps the replication status indicator it had when it was last running. Replicating while a server is down is not possible.
470
v The backup must be configured to use the same UDP ports as this server for the NBP, FILE, MCAST and PCAST services (that is for all specific services); v Its file system must be strictly identical to the file system of this server, so that boot agents can switch from one server to the other in the middle of a file transfer; v Ideally, the backup must be configured to answer DHCP discovers and PXE discovers for the same targets as this server, but with a higher delay (see BootReplyDelay). This ensures that the remote-target boots on the backup server on the next boot. BaseDir Name BaseDir Directory for all provisioning server files. Synopsis BaseDir " directory" Location v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the File Access Module section. v rembo.conf: Beginning of the file. Description By default under Windows, DataDir points to c:\Program Files\Common Files\IBM Tivoli. You must set this parameter to the directory where you have installed the provisioning server executable. If you are using the Windows version the BaseDir parameter is automatically configured during the setup process. BaseDir contains a subdirectory named packages which holds the .pak server extensions. Note: Always use forward slashes (/) in all path names you enter in the text-based configuration file. Examples
BaseDir "c:\Program Files\Common Files\IBM Tivoli" BaseDir "/usr/local/tpmfos"
BootDiscoveryAddress Name BootDiscoveryAddress Multicast address used for PXE discovery requests Synopsis BootDiscoveryAddress ip-addr Location v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the Boot module section. v rembo.conf: Beginning of the file. Description If PXE multicast boot discovery is enabled on the provisioning server (see (BootNoMulticastDiscovery)), this option must be set to the multicast IP address used by the remote-boot targets when performing PXE discovery. If this option is not set, Tivoli Provisioning Manager for OS Deployment uses the IP address 232.2.0.1.If the provisioning server is in the same subnet as the DHCP server, PXE discovery is not required because the remote-boot targets know that the PXE server is on the same computer as the DHCP server (option 60 set to PXEClient). If the provisioning server and the
Chapter 5. Managing virtual images
471
DHCP server run on different computers, but are on the same IP subnet, PXE discovery is still not required because the provisioning server intercepts DHCP requests and provides PXE information at the DHCP stage. You only require PXE discovery if the remote-boot targets are not on the same subnet as the provisioning server, or if your existing PXE infrastructure is already setup for PXE discovery. Example
BootDiscoveryAddress 232.5.6.7
BootDiscoveryPort Name BootDiscoveryPort IP port used when listening to PXE discovery requests Synopsis BootDiscoveryPort port Location in the OS configuration v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the Boot module section. v rembo.conf: Beginning of the file. Description This parameter must be set to the port used by remote-targets when sending PXE boot requests (multicast boot discovery, or BINL discovery). The default value works with PXE bootroms which have not been modified, so there is no reason to change this value unless you know what you are doing. If this option is not set, Tivoli Provisioning Manager for OS Deployment uses the IP port 4011. Example
BootDiscoveryPort 5011
BootNoMulticastDiscovery Name BootNoMulticastDiscovery Disables PXE multicast discovery support. Synopsis BootNoMulticastDiscovery yes/no Location v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the Boot module section. v rembo.conf: Beginning of the file. Description If the parameter BootNoMulticastDiscovery (without argument) is present in the configuration file (rembo.conf config), then PXE multicast discovery is disabled on the server. The provisioning server does not answer PXE multicast packets received from remote-boot targets. PXE multicast discovery is used by remote-boot targets if your existing PXE infrastructure is configured to use PXE discovery. Multicast discovery is not needed if the remote-boot targets and the provisioning server are on the same subnet, because the targets use other mechanisms to find the provisioning server (DHCP proxy, or DHCP option 60).
472
If you know that you do not need PXE multicast discovery, you can disable it by setting this parameter to true. This is suggested if you are in a large company or institution where other PXE targets can be configured to use multicast discovery on other subnets, but you do not want your server to reply to these targets. Example
BootNoMulticastDiscovery
BootReplyDelay Name BootReplyDelay Sets the delay before answering discovery requests. Synopsis BootReplyDelay secs Location v web interface: Not available. v rembo.conf: Beginning of the file. Description This parameter sets the number of seconds to wait before answering a PXE discovery request (PXE discovery enabled), or a DHCP request (ProxyDHCP enabled). The default value is 0 (no delay). The only reason to delay a PXE reply is when two or more OS deployment servers are configured to run on the same subnet, with the same list of targets. The parent server can be configured with a delay of 0 seconds (answer immediately), and other servers with a delay of 2 seconds. If the parent server fails, backup servers handle remote-boot target requests. Example
BootReplyDelay 2
DataDir Name DataDir Directory for internal files. Synopsis DataDir " path" Location v web interface: Not available v rembo.conf: Beginning of the file. Description The server uses the directory specified by DataDir to store its internal files, in particular all the files stored on its file system. You can use this parameter to specify a new directory for the internal files of the server, for example if you want to store the server files on a new storage device with more space, but you want to keep the executable and configuration files on the original location. All the files stored in the directory specified by DataDir must not be modified, or the provisioning server might not work correctly. If the specified directory does not exists, the server tries to create it. Examples
DataDir "/mnt/morespace/rembo" DataDir "C:/TPMfOS"
DefaultAuthDomain
473
Name DefaultAuthDomain Default authentication domain. Synopsis DefaultAuthDomain " domain" Location in the OS configuration v web interface :Not available v rembo.conf: Beginning of the file. Description This is the name of the default authentication domain to use when a target sends an authentication request to the server to identify a user. This name must match the name of an existing authentication domain as defined in Authentication domains. Example
DefaultAuthDomain "HTTP"
DefaultFileServer Name DefaultFileServer Defines a new server for FILE services. Synopsis DefaultFileServer ip-addr Location in the OS configuration v web interface :Not available v rembo.conf: Beginning of the file. Description This parameter can be used to specify the default IP address of the target serving the NETfs and MCAST protocols. If the you want to use the same provisioning server for all services, you do not have to specify this parameter. The target defined by this parameter must be configured to use the same network password (NetPassword) as the server containing this parameter. This parameter is applied to all the targets contained in the group. Example
DefaultFileServer 172.16.8.9
DefaultGroup Name DefaultGroup Default group for unknown targets. Synopsis DefaultGroup " name" Location in the OS configuration rembo.conf: Beginning of the file. Description This parameter defines the default administrative group for unknown targets. The "name " argument must be an existing administrative group. Example
DefaultGroup "MyNewHosts"
DefaultLockOut
474
Name DefaultLockOut Locks peripherals on unknown targets. Synopsis DefaultLockOut [ none ] [ , mouse ] [ , keys ] [ , screen ] [ , all ] Location in the OS configuration rembo.conf: Beginning of the file. Description Use this parameter to lock peripherals on the remote-boot targetsduring the time Tivoli Provisioning Manager for OS Deployment is active on the unknown target. You can for example lock the mouse or/and the keyboard so that the user cannot interrupt an automatic image restoration process. Peripherals are automatically unlocked when Tivoli Provisioning Manager for OS Deployment gives the control to the operating system (with a HDBoot, LXBoot, RDBoot or DeviceBoot). Example
DefaultLockOut keys, mouse
DefaultOptions Name DefaultOptions Startup options for the remote target computer. Synopsis DefaultOptions [ admin ] [ , autoboot ] [ , nousb ] [ , novesa ] [ , noapm ] [ , unicast ] [ , noigmp2 ] [ , noudma ] [ , noprotpart ] [ , realmodedisk ] [ , realmodepxe ] [, routepxeirq] Location in the OS configuration rembo.conf: Beginning of the file. Description Twelve different options can be set for targets. These options are used when unknown targets run under Tivoli Provisioning Manager for OS Deployment: v Admin: forces the target to run in administrative mode. Administrative mode adds options in the start menu on the target: Interact, to run the interactive evaluator, and Purge cache to purge the local disk cache. Additionally, functions defined in the admin.rbx plugins are available (File Manager, TextEdit,...). v Autoboot: tells the target to automatically reboot on unrecoverable errors. Unrecoverable errors are low-level errors which cannot be intercepted with the exception mechanisms. By default unrecoverable errors are displayed on the screen and the computer is halted. You can define the autoboot option if you want to reboot on unrecoverable errors. v NoUSB: disables USB devices on the remote-boot target. v NoVESA: disables all the graphical interface on the remote-boot target. v NoAPM: disables advanced power management on the remote-boot target. v Unicast: uses unicast instead of multicast when downloading files from the provisioning server. v NoIGMP2: disables IGMP version 2 to force using IGMP version 1 on the remote-boot target. v NoUDMA: disables UltraDMA support for all IDE hard-disks on the remote-boot target. This can solve problems on poorly designed hardware or buggy chipsets, but at a high cost in terms of performance. v NoProtPart: disables ATA-5 features. v RealModeDisk: disables enhanced disk access. v RealModePXE: disables enhanced PXE access. v RoutePXEIRQ: reroutes network IRQ separately from the disk controller IRQ.
Chapter 5. Managing virtual images
475
Example
DefaultOptions admin
DefaultPXEBootMode Name DefaultPXEBootMode Selects default PXE boot behavior. Synopsis DefaultPXEBootMode { normal | hdboot | ignore } Location in the OS configuration rembo.conf: Beginning of the file. Description This option defines how the provisioning server answers PXE boot requests coming from unknown targets. When mode is normal, the provisioning server processes the boot request. When mode is hdboot, the provisioning server tells the unknown target to immediately boot on the hard disk. When mode is ignore, the provisioning server does not answer the boot request, thus giving the opportunity for another PXE server to answer. Example
DefaultPXEBootMode normal
DefaultResolution Name DefaultResolution Default screen resolution for new targets. Synopsis DefaultResolution " path " Location in the OS configuration v web interface : Not available v rembo.conf: Beginning of the file. Description This parameter defines the default screen resolution for target on a new target. Example
DefaultResolution "800x600"
DisableBOOT Name DisableBOOT Disables PXE services Synopsis DisableBOOT Location in the OS configuration. v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the Boot module section. v rembo.conf: Beginning of the file. Description Use this option to disable the PXE component of the provisioning server. Targets are not able to boot on PXE anymore if this option is included in the configuration file. Use this option if you want to use the provisioning server for remote file access only (for example when setting up the server). Not included in the default configuration.
476
Example
DisableBOOT
DisableContextualMenu Name DisableContextualMenu Disables the specific contextual menus in the web interface. Synopsis DisableContextualMenu Location in the OS configuration v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the web interface section. v rembo.conf: Beginning of the file. Description Add this option to the configuration file if you want to disable the specific contextual menus in the web interface. This can be useful if you want access to the regular contextual menu of your Web browser, in order, for example, to view the source page. Not included in the default configuration. Example
DisableContextualMenu
DisableCookies Name DisableCookies Disables the use of cookies in the web interface. Synopsis DisableCookies Location in the OS configuration v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the web interface section. v rembo.conf: Beginning of the file. Description Add this option to the configuration file if you do not want the web interface to memorize your local preferences such as window positions using local cookies. Disabling cookies does not prevent you to use any essential function of the web interface. Not included in the default configuration. Example
DisableCookies
DisableDHCPProxy Name DisableDHCPProxy Disables answers to DHCP discovers (DHCPProxy). Synopsis DisableDHCPProxy yes/no Note: In rembo.conf configuration, the keyword DisableDHCPProxy is used without argument. If the keyword is present, it is assumed to be set to the value yes automatically. Location in the OS configuration.
Chapter 5. Managing virtual images
477
v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the Boot module section. v rembo.conf: Beginning of the file. Description If this parameter is set to yes, the provisioning server does not send PXE replies to DHCPDISCOVER packets sent by remote-boot targets. You can set this parameter to yes if you do not need this feature because either the DHCP server and the provisioning server are on the same target, or you are using PXE multicast discovery. The default value is false (that is DHCP Proxy is enabled by default). Example
DisableDHCPProxy
DisableDragAndDrop Name DisableDragAndDrop Disables the drag-and.drop feature of the web interface. Synopsis DisableDragAndDrop Location in the OS configuration. v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the web interface section. v rembo.conf: Beginning of the file. Description Add this option to the configuration file if you want to disable the drag-and-drop feature of the web interface. This can be useful in case of severe incompatibility with unsupported browsers. Note that the feature in known to work on most common browsers. Not included in the default configuration. Example
DisableDragAndDrop
DisableFILE Name DisableFILE Disables FILE components of the provisioning server. Synopsis DisableFILE Location in the OS configuration. v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the File access module section. v rembo.conf: Beginning of the file. Description Add this option to the configuration file if you want to disable the FILE component of the provisioning server. This can be useful if you are accessing the server from TCP targets. Note: Do not set this option if targets are booting on this provisioning server. If you set DisableFile, you must also set DisableTCP. Not included in the default configuration.
478
Example
DisableFILE
DisableHTTP Name DisableHTTP Disables the console. Synopsis DisableHTTP Location in the OS configuration. v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the web interface section. v rembo.conf: Beginning of the file. Description Add this option to the configuration file if you want to disable the HTTP component of the provisioning server, that is the web interface. Disabling HTTP is not recommended as it forces you to run the server in command-line only. If you set DisableHTTP, you must run the -c command line option to change server parameters. Note: A full Tivoli Provisioning Manager for OS Deployment server restart is necessary when this parameter is modified. Not included in the default configuration. Example
DisableHTTP
DisableHTTPOptim Name DisableHTTPOptim Disables the web interface. Synopsis DisableHTTPOptim Location in the OS configuration. v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the web interface section. v rembo.conf: Beginning of the file. Description Add this option to the configuration file if you want to prevent the web interface to group JavaScript, stylesheet, and image files into large files to reduce HTTP traffic. Note: If you are creating console pages, you must disable set this parameter to disable optimization. Not included in the default configuration. Example
DisableHTTPOptim
479
Synopsis DisableJSDropDown Location in the OS configuration. v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the web interface section. v rembo.conf: Beginning of the file. Description Add this option to the configuration file if you want to disable enhanced drop-down menus in the web interface, and use standard drop-down selectors instead. Note that standard drop-down selectors do not respect DHMTL layers under Internet Explorer, resulting in strange effects. Not included in the default configuration. Example
DisableJSDropDown
DisableNBP Name DisableNBP Disables NBP services. Synopsis DisableNBP Location in the OS configuration. v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the Network Boot Module section. v rembo.conf: Beginning of the file. Description Including this option in the configuration file causes the NBP component of the provisioning server to stop answering requests coming on the NBP port. Do not set this option if your server is used by targets. Not included in the default configuration. Example
DisableNBP
DisableSSL DisableSSL Disables SSL encryption. Synopsis DisableSSL Location in the OS configuration. v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the web interface section. v rembo.conf: Beginning of the file. Description Add this option to the configuration file if you want to disable the SSL encryption and use unencrypted HTTP connections. This can be useful if you want a faster download time, but it is not as safe.
480
Note: A full Tivoli Provisioning Manager for OS Deployment server restart is necessary when this parameter is modified. Not included in the default configuration. Example
DisableSSL
DisableTCP Name DisableTCP Disables TCP services. Synopsis DisableTCP Location in the OS configuration. v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the File access module section. v rembo.conf: Beginning of the file. Description This option disables the TCP component of the provisioning server. You can include this option with caution if you are not using server replication Note: Do not set this option if targets are booting on this server. If you set DisableTCP, you must also set DisableFile. Not included in the default configuration. Example
DisableTCP
FileMCASTAddress Name FileMCASTAddress Multicast address used for the MCAST protocol. Synopsis FileMCASTAddress ip-addr:port FileMCASTAddrCount number Location in the OS configuration. v web interface: Not available. v rembo.conf: Beginning of the file. Description FileMCASTAddress defines the destination multicast address and destination port used by the provisioning server when sending multicast UDP datagram to targets requesting a file with the MCAST protocol. The default value is 239.2.0.1:10000. FileMCASTAddrCount defines the upper limit of the multicast address range used by the server (that is the number of different multicast addresses used). When combined with FileMCASTAddress, this parameter can control the lower and upper limits of the range of multicast addresses used by the server. The default value is 256 (that is use no more than 256 multicast addresses). The MCAST protocol is used by targets to download large files from the server. This protocol is a proprietary protocol made using multicast UDP. Example To force the provisioning server to use 1000 multicast addresses starting at 232.1.1.1, use:
Chapter 5. Managing virtual images
481
FileMCASTEncrypt Name FileMCASTEncrypt Encrypts MCAST datagrams. Synopsis FileMCASTEncrypt Location in the OS configuration. v web interface: Not available. v rembo.conf: Beginning of the file. Description If this parameter is present in a rembo.conf configuration file, or set to yes in the web interface, MCAST datagrams exchanged between the provisioning server and the remote-boot targets are encrypted. The MCAST protocol is used by targets to download large files from the server. This protocol is a proprietary protocol made using multicast UDP. MCAST datagrams are not encrypted by default. Example
FileMCASTEncrypt
FileServerPort Name FileServerPort Port used on the server for NETfs and MCAST requests. Synopsis FileServerPort port Location in the OS configuration. v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the File access module section. v rembo.conf: Beginning of the file. Description This value is used by the provisioning server as the port for all file-related requests sent by targets. File-related requests include NETfs requests and MCAST requests. The default value is 4013. The value of this parameter is sent to targets during the NBP phase of the boot process. If you change this parameter, targets automatically use the new value on next boot. Example
FileServerPort 5013
HTTPAdminName Name HTTPAdminName Username of the main administrator of the provisioning server. Synopsis HTTPAdminName " username " Location in the OS configuration.
482
v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the web interface section. v rembo.conf: Beginning of file. Description This is the superuser name intended to be used only by the main provisioning server administrator, in order to get access to the all configuration parameters of the server. There is only one superuser login. Example
HTTPAdminName "Admin"
HTTPRole Name HTTPRole Security roles with access to the web interface console. Synopsis HTTPRole "RoleName"{ Members "membername" [,...] Allowpages "pagename" [,...] Allowgroups "groupname" [,...] Policies "policyname" [,...] } Location in the OS configuration. v web interface: Not available. v rembo.conf: After global parameters. Description An HTTP role allows specific members to access predefined pages on the web interface, as well as preselected administrative groups. One can also define security policies. Parameters are a single string or a list of strings separated by commas. The star * means all, without restriction. Role members can be either individuals or groups defines by the authentication authority. An individual, who does not belong to any role, trying to log on to the web interface is denied access to the console. An individual, belonging to several roles, cumulates the page access rights and administrative group access rights of all the roles s/he belongs to. Security policies are also cumulative, resulting in a more restrictive policy when an individual belongs to several roles. The security policies include: v CONF_RO to deny changes to the server configuration. v HOST_RO to deny addition and removal of targets. To use HTTPRole, you must first have set a local authentication domain named HTTP with ( )AuthLocalDomain. Example
HTTPRole "RestrictedAccess" { Members "rembo" Allowpages "*" AllowGroups "local1", "local2" Policies "HOST_RO" }
HTTPServerPort Name HTTPServerPort TCP port for HTTP requests. Synopsis HTTPServerPort port Location in the OS configuration.
Chapter 5. Managing virtual images
483
v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the web interface section. v rembo.conf: Beginning of the file. Description This is the TCP port used by the web interface when listening for unencrypted HTTP requests. You can set this parameter to 8080 if you want the web interface to be accessible by typing the server hostname in your Web browser. The provisioning server always listens on this port even if connections are encrypted, in order to redirect unencrypted connections to the encrypted TCP port. Note: A full Tivoli Provisioning Manager for OS Deployment server restart is necessary when this parameter is modified. Example
HTTPServerPort 8080
HTTPSServerPort Name HTTPSServerPort TCP port for encrypted HTTP requests (SSL). Synopsis HTTPSServerPort port Location in the OS configuration. v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the web interface section. v rembo.conf: Beginning of the file. Description This is the TCP port used by the web interface when listening for encrypted HTTP requests. You can set this parameter to 443 if you want the web interface to be accessible by typing the server hostname in your Web browser, prefixed with the https URL syntax. Note: A full Tivoli Provisioning Manager for OS Deployment server restart is necessary when this parameter is modified. Example
HTTPSServerPort 443
HTTPSessionTimeout Name HTTPSessionTimeout Time in minutes before a web interface session expires. Synopsis HTTPSessionTimeout minutes Location in the OS configuration. v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the web interface section. v rembo.conf: Beginning of the file. Description This is the inactivity timeout (in minutes) before web interface users are automatically logged
484
out. A typical safe value is 5 minutes, but you might want to make it longer if you receive the message Session timed out too often and are sure that you will not forget to log out when you leave your computer. Example
HTTPSessionTimeout 30
Interfaces Name Interfaces List of network interfaces used by the provisioning server. Synopsis Interfaces ip-addr1 [ ip-addr2 ] [ ip-addr3... ] Location in the OS configuration. v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the Base Parameters section. v rembo.conf: Beginning of the file. Description You will find this option very useful if you are running on a multihomed computer (that is a target with more than one network card, or with a network card and a dial-up adapter). This option lets you specify the list of network interfaces used by the provisioning server when receiving and sending packets to targets. If you leave this option unset, the server uses the network interface corresponding to the official hostname of the server. You must specify a list of IP addresses to use. Each IP address must correspond to the IP address to one of the network interfaces of the provisioning server. The list must contain at least one address. Note: You are strongly encouraged to set this option if your computer is multihomed. Otherwise the server might not receive the network packets not originating from its official interface. Examples
Interfaces 192.168.1.1 Interfaces 192.168.1.1 192.168.10.1 10.1.1.1
MaxLogSize Name MaxLogSize Maximum size of log files created by the provisioning server. Synopsis MaxLogSize size_in_bytes Location in the OS configuration. v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the Base parameters section. v rembo.conf: Beginning of the file. Description This parameter can be used to limit the size of the log file generated by the provisioning server. The maximal log size must be specified in bytes, and apply to all the log files created by the server (file, nbp, http, tcp, VM, and boot). If you do not specify this parameter, or set the limit to 0, then log files are not limited in size. Example
Chapter 5. Managing virtual images
485
MaxPCASTSessions Name MaxPCASTSessions Maximum number of simultaneous PCAST sessions. Synopsis MaxPCASTSessions number Location in the OS configuration. v web interface > : Not available v rembo.conf: Beginning of the file. Description This is the maximum number of PCAST sessions that the provisioning server accepts simultaneously. This parameter is mostly relevant if the server is running in UNICAST mode and deploying a group with UNICAST setting. The default value is 8. Because each session uses around 16MB of server memory, higher values must be avoided on servers with no more than 256Mb. Example
MaxPCASTSessions 8
MaxTFTPSegSize Name MaxTFTPSegSize Maximum size of a TFTP segment. Synopsis MaxTFTPSegSize number Location in the OS configuration. v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the Boot module section. v rembo.conf: Beginning of the file. Description This is the maximum size of TFTP segment in bytes. This parameter can be used to reduce the size of packets sent by the provisioning server if required by the underlying network. This can be useful for instance when network traffic is encrypted by routers. The default value is 512. Example
MaxTFTPSegSize 256
MTFTPClients Name MTFTPClients The destination address and port used by the MTFTP server. Synopsis MTFTPClients ip-addr [: port ] Location in the OS configuration.
486
v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the Boot module section. v rembo.conf: Beginning of the file. Description This is the destination IP address and port used by the server when sending multicast MTFTP datagrams to boot agents. The IP address must be a valid multicast address and must match the address sent to the target during the DHCP phase. If the deployment engine has received its PXE parameters from the provisioning server during the DHCP phase, this address is automatically included so that the deployment engine always uses the same address/port as the server. The default value is 232.1.0.1:8500. Example
MTFTPClients 232.8.7.6
MTFTPPort Name MTFTPPort The port used by the MTFTP server. Synopsis MTFTPPort port Location in the OS configuration. v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the Boot module section. v rembo.conf: Beginning of the file. Description This is the port used by the server when listening to MTFTP requests. If the remote-boot targets are using the provisioning server to get their PXE parameters, this value is sent in the DHCP/PXE reply so that the remote-boot target always uses the correct port. The default value is 4015. Example
MTFTPPort 5015
MTFTPStartDelay Name MTFTPStartDelay The initial delay on target computers before sending first MTFTP request. Synopsis MTFTPStartDelay secs Location in the OS configuration. v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the Boot module section. v rembo.conf: Beginning of the file. Description This is the delay used by remote-boot targets before sending the first MTFTP request to the provisioning server. This delay is used by the target to listen to an existing MTFTP transfer. If the MTFTP file they are about to request is already being sent by the server on the multicast address, then the target does not request the file and listens to the packets. The longer this
Chapter 5. Managing virtual images
487
delay is, the more probability you have that many targets reuse the same MTFTP channel instead of requesting the file. But if you want to have a fast boot process, you must set this value to 1 (the minimum value). The default value is 2 (seconds). Example
MTFTPStartDelay 1
NBPServerPort Name NBPServerPort Port used on the provisioning server for NBP requests. Synopsis NBPServerPort port Location in the OS configuration. v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the Network Boot module section. v rembo.conf: Beginning of the file. Description This value is used by the provisioning server as the port for all NBP requests sent by remote-boot targets. NBP is a protocol used by target computers to get their startup parameters (startup page, groupname,...) and to send authentication requests to the server. The default value is 4012. The value of this parameter is sent to targets as part of the last MTFTP packet when the server sends the initial part to the PXE bootrom. If you change this parameter, targets automatically use the new value on next boot. Example
NBPServerPort 5012
NetPassword Name NetPassword Network password for remote file access. Synopsis NetPassword " password " Location in the OS configuration. v web interface: Not available. v rembo.conf: Beginning of the file. Description This is the password used by the provisioning server to accept or deny network requests coming from a target, the web interface or NetClnt. You must change this option when you install a new provisioning server and select a password to protect your files against unpermitted access. If you are using the Windows version of the server, you are asked to enter the password during the setup. If you are using the web interface, or NetClnt to access the files stored in your provisioning server, the password you enter in NetClnt (or the web interface) must match the word set in NetPassword. Note: This password is an important piece of your security. If you require optimal security, you are strongly encouraged to protect the configuration of the server. By default, this file is created by the installer and the password is stored encrypted in it.
488
Example
NetPassword "mypassword"
NetworkShare Name NetworkShare UNC path of the shared partition directory of the provisioning server. Synopsis NetworkShare "path " Location in the OS configuration. v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the Network Share Module section. v rembo.conf: Beginning of the file. Description This is the path of the shared partition directory of the provisioning server. This parameter can be used to increase the deployment speed of some operating systems. The target computer access the network share directly to retrieve the necessary installation files. You need to have set the partition as read-only for the user entitled to access the network share. Example
NetworkShare "provisioningServer/partition"
NetworkUser Name NetworkUser name of a user entitled to access the network share. Synopsis NetworkUser "name " Location in the OS configuration. v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the Network Share Module section. v rembo.conf: Beginning of the file. Description The name of the user entitled to access the network share, which is given in NetworkShare. If the user is part of a domains, you must use the syntax Domain/User. This user name is used by the targetcomputer to access the network share on the provisioning server. Example
NetworkUser "ClientComputer"
NetworkPasswd Name NetworkPasswd Network password used by the target computer to access the network share. Synopsis NetworkPasswd "password " Location in the OS configuration. v web interface: Click Go To > Deployment > OS Management > Boot Servers.. Then click the Tivoli Provisioning Manager for OS Deployment boot server you want to work with, click the Configuration tab and click Edit in the Network Share Module section. v rembo.conf: Beginning of the file.
Chapter 5. Managing virtual images
489
Description This is the password used by the target computer to access the network share located on the server, using the NetworkUser user name. The password is stored in the rembo.conf file. Example
NetworkPasswd "clientPassword"
TCPServerPort Name TCPServerPort Defines the TCP port used. Synopsis TCPServerPort port Location in the OS configuration. v web interface: Not available. v rembo.conf: Beginning of the file. Description This option defines the TCP port used by the TCP component of the provisioning server when listening to requests coming from other servers. The default value is 4013. Example
TCPServerPort 2048
Tested BIOS level BAJT22A BAJT22A FEE110A DOJT16A BCJT16A BSJT26A BWJT27A SBJT62A BKJT23F BCJT16A M1JT36A M2JT28A IJJT28C JPJT53A KEJT40A PAJT24A
490
Table 72. IBM servers (continued) Machine Type 8647 8649 8648 8671 8841 8685 8865 8673 8836/8849 8849 8676 8837 8670 8840 8863 8870 8872 4347 4362 4363 4364 4365 7973 7984 7977 7978 7979 7985 8877 8866 8864 8878 Model xSeries 225 xSeries 225 xSeries 226 xSeries 235 xSeries 236 xSeries 255 xSeries 260 xSeries 305 xSeries 306 xSeries 306m xSeries 335 xSeries 336 xSeries 345 xSeries 346 xSeries 366 xSeries 445 xSeries 460 System x3105 System x3200 System x3200 System x3250 System x3250 System x3400 System x3455 System x3500 System x3550 System x3650 System x3655 System x3755 System x3800 System x3850 System x3950* Tested BIOS level OPJT50A OQJT14A PMJT66C GRJT57A NRJT34A AVJT26A ZUJT65A PLJT68A KEJT40A PAJT42A T2JT39A APJT37A GEJT63A KPJT41A ZUJT65A REJT49A ZUJT65A A2JT19A G8JT29A G8JT29A G9JT26A G9JT26A SPJT52A C0JT35A SPJT52A GFE29B GGE29B C2JT28A ZYJT29A ZTJT10A ZSJT10A ZTJT13A
Table 73. IBM workstations Machine Type 6225 9229 Model IBM IntelliStation M Pro IntelliStation M Pro FIJT41A GVJT26A Tested BIOS level
491
Table 74. Lenovo mobile and desktop computers Machine Type ThinkCentre ASI ThinkCentre SSO ThinkPad R52 ThinkPad T30 ThinkPad T41 ThinkPad T42 ThinkPad T60 ThinkPad T60p ThinkPad X31 ThinkPad X60 Table 75. IBM Point of Sale computers Machine Type 4851-514 4810-33H 4838-137 4840544 4800-722 4800-782 4836-132 4846-565 4800-743 4800-723 4838-520 4838-720 Table 76. IBM storage servers Name IBM TotalStorage DS4100 (formerly FAStT100) IBM TotalStorage DS4300 (formerly FAStT600) IBM TotalStorage DS4400 (formerly FAStT700) IBM TotalStorage DS4500 (formerly FAStT900) FAStT EXP500 Storage Expansion Unit Table 77. Ethernet adapters Part number 06P3601 06P3801 08K3124 FRU number 06P3609 06P3809 08K3125 Name IBM 10/100 Ethernet Server Adapter Intel PRO/100 SP Mobile Combo adapter IBM 10/100 EtherJet Mini PCI adapter with 56K modem (Intel current card) WoL Yes Yes Yes 1724-100 1722-1RU 1742-1RU 1742-90U 3560-1RU Model number IBM SurePOS 500 SurePOS 300 Anyplace Kiosk SurePOS 500 SurePOS 700 SurePOS 700 Anyplace Kiosk SurePOS 500 SurePOS 700 SurePOS 700 AnyPlace Kiosk AnyPlace Kiosk Model Tested BIOS level HHKT130 8BKT120 8AKT111 X7KT100 82KT130 83KT130 8AKT111 X6KT142 85KT027 85KT027 8DKT100 8DKT100 Model 8105, 8107, 8109, 8117, 8119, 8121 8086 1859-B7U 2366-N6G 2373-3JG 2373-FWG 1951-A47 2007-83U 2672-C8G 1706-AA7
492
Table 77. Ethernet adapters (continued) Part number 08L2565, 08L2567 09N3609 09N9774 09N9901 22P4501 22P4701 26P8039 31P6301 31P6401 34L0201 34L1101, 34L1110 34L1201, 34L1210 34L4401 (3DES US) 34L4410 34L4501 (DES non-US) 34L4510 85H9921, 85H9930 85H9921, 85H9930 Ships with system Ships with system Ships with system Ships with system FRU number 08L2566 09N3609 00N8117 09N9901 22P4509 22P4709 26P8069 31P6309 31P6409 30L5929 34L1109 34L1209 34L4409 not available Name IBM 10/100 EtherJet PCI Adapter with Wake on LAN1 10/100 EtherLink PCI Management Adapter by 3Com IBM 10/100 EtherJet miniPCI adapter with 56K modem by 3Com 10/100 EtherLink Server Adapter by 3Com Intel PRO/100S Desktop Adapter Intel PRO/100S Low Profile Desktop Adapter Ethernet Daughter Card IBM NetXtreme 1000 T Ethernet Adapter IBM NetXtreme 1000 T Dual Port Ethernet Adapter IBM 10/100 EtherJet PCI Adapter with Wake on LAN1 IBM 10/100 EtherJet PCI Adapter with IBM Alert on LAN 2 IBM 10/100 EtherJet PCI Management Adapter IBM 10/100 EtherJet Secure Management Adapter IBM 10/100 EtherJet Secure Management Adapter WoL Yes Yes Yes Yes Yes Yes Yes Yes No Yes Yes Yes Yes Yes
IBM 10/100 EtherJet PCI Adapter with Wake on LAN1 IBM 10/100 EtherJet PCI Adapter with Wake on LAN1 Intel Gigabit Copper (82543) PRO 1000 XT Intel Gigabit Copper (82544) PRO 1000 XT IEEE 1394/LAN Combo Card On board Ethernet Adapter for ThinkPad R30
Table 78. IBM ServeRAID controllers Name ServeRAID-8i controller ServeRAID-8s controller Winterhaven, MegaRAID 8480 SAS controller ServeRAID-4Mx Ultra160 SCSI controller ServeRAID-4Lx Ultra160 SCSI controller ServeRAID-5i Ultra320 SCSI controller ServeRAID-6M Ultra320 SCSI controller ServeRAID-4H Ultra160 SCSI controller ServeRAID-6i Ultra320 SCSI controller Part number 13N2227 39R8765 39R8850 06P5736 06P5740 25P3492 32P0033 37L6889 71P8595 FRU number 13N2233 39R8785 39R8852 06P5737 06P5741 32P0016 02R0985 37L6892 71P8627
Chapter 5. Managing virtual images
493
Table 78. IBM ServeRAID controllers (continued) Name ServeRAID-7k Ultra320 SCSI controller ServeRAID-7t SATA controller ServeRAID-7e (Adaptec HostRAID) controller ServeRAID-8e controller ServeRAID-8k SAS controller LSI MegaRAID SAS 8408E controller LSI 1068 controller Table 79. LSI RAID controllers Name LSI-SAS RAID controller (Sanford) Single Channel LSI Ultra320 SCSI controller Dual Channel LSI Ultra320 SCSI controller LSI MegaRAID IDEal RAID controller Table 80. BladeCenter-related products Name SAS Expander Switch Module SAS 2-port CFFv daughter card Qlogic 4Gb SFF Qlogic 4Gb Std Emulex 4Gb SFF Fibre Channel Expansion Card IBM BladeCenter Optical Pass-Thru Module Cisco Gigabit Ethernet Switch module Cisco Fiber Switch Module IBM BladeCenter Advanced Management Module (AMM) IBM BladeCenter PCI Expansion Unit (PEU) IBM BladeCenter HS20 Fibre Channel Expansion Card - Short Form Factor IBM BladeCenter 6-pt Fibre Channel Switch Module Qlogic iSCSI Expansion Card for IBM BladeCenter Nortel Copper L2/L3 Switch Module Nortel Fibre L2/L3 Switch Module QLogic 4 Gb Fibre Channel Switch Module Brocade 20 Port FC switch module IBM BladeCenter HS20 Fibre Channel Expansion Card IBM BladeCenter 2-Port Fibre Channel Switch Module Myrinet Cluster Expansion Card for IBM BladeCenter IBM BladeCenter Copper Pass-Thru Module IBM BladeCenter Gigabit Ethernet Expansion Card Part number 39Y9192 39Y9187 26R0890 26R0884 39Y9186 02R9080 13N2281 13N2285 25R5778 25K8373 26K4841 26K6477 26K6487 26K6530 26K6531 26R0883 32R1812 48P7061 48P7062 73P6000 73P6100 73P9030 FRU number 39Y9193 39Y9188 26R0893 26R0889 n/a 02R9082 13N2285 13N2286 25R5777 32R0753 26K4859 26K6481 26K6490 26K6526 26K6529 26R0888 32R1820 59P6624 59P6621 73P6001 73P6098 13N2306 (replaces 73P9031) 25R8060 LSI53C1020 LSI53C1030 LSI MegaRAID IDEal RAID Part number Part number 71P8642 71P8648 n/a n/a 25R8064 39R8850 25R8060 FRU number 71P8644 71P8650 n/a n/a 25R8064 n/a n/a
494
Table 80. BladeCenter-related products (continued) Name Nortel Network Layer 2-7 GbE Switch Module for IBM BladeCenter Intel Copper Switch Module IBM BladeCenter PCI Expansion unit (PEU) Part number 73P9057 90P3686 90P3721 FRU number 73P9004 90P3776 n/a
495
496
v Create a computer. The master image must contain hardware resources and software resources. v Deploy on an existing computer. The master image contains only software resources.
497
Process
Master images contain the hardware configuration and software resources required to fully provision a computer, while saved images are backups of various states of your virtual server. To learn about the differences between master images and saved images, see the comparison table in Chapter 6, Managing images in the image library, on page 497. For more information about the Master images and Saved images process, see v Master images on page 504 v Saved Images on page 517
User roles
You must be assigned to the appropriate user role to use the image library.
Table 82. User roles Role Provisioning Administrator Description v Publishes and unpublishes master images and saved images. Skills v Knowledge of boot server technologies. v Knowledge of virtualization technologies. For example, VMware, KVM, PowerVM, and VMControl. Deployment Specialist v Deploys master images. v Restores saved images to re-create deleted virtual servers. v Restores saved images to return an existing virtual server to a previous state. v Deploys OVF images. v Server management experience v Familiarity with operating system management life cycle
498
Table 82. User roles (continued) Role Provisioning Configuration Librarian Description v Registers master images to the image library by capturing the images, importing the images, or running discovery. v Synchronizes the image library with the image repositories. v Creates and deletes saved images. v Deletes virtual servers. v Edits the configuration of master images. Skills Knowledge of provisioning server configuration and boot server technologies.
Requirements
v User roles and requirements on page 501 v Configuring an image repository on page 502 v Software prerequisites for composite images on page 511
499
Key terms
composite image An image that contains multiple member images. host platform server A physical server that has hosting capabilities for virtual servers. image A representation of a computer program and its related data, such as the kernel, file systems, libraries, and programs of the managed system at a particular time.
image repository The managed system where the image is physically located. Each repository has a synchronization operation which updates the entries in the image library. image revisions Identifies versions of the same master image. When you change an instance image, or capture a master image from that instance, a revision of the original master image that was used to create that instance image is created. You can use the revision to update the existing instances to the new version. instance image A deployment of a master image or a saved image. Hardware and software properties are customized during the deployment process. The instance image references the customized values. There is a direct association between an instance image and a provisioning computer in the database. The instance image reflects any changes made to the initial virtual server configuration. master image A depersonalized image that acts as a template containing both hardware and software configurations. Use a master image to deploy multiple virtual servers. Master images can be simple or composite. A simple image is an individual image. A composite image is an image that contains multiple member images. member image An image that is included in a composite image. mount point The association between a repository and a host platform server. This relationship is used to filter out the repositories that are unavailable for a specific host platform server OVF (Open Virtualization Format) A platform independent open standard for packaging and distributing virtual appliances. saved image Saved images are backups of a state of a virtual server at a given point in time. Use saved images to restore the actual content of the virtual server, as it was defined at the time when the saved image was created. You can have multiple saved images for a virtual server. Saved images are saved in groups. If a virtual server is deleted, use a saved image to restore it to the desired state. software stack A list of software products, organized in the required installation order. A software stack can contain individual pieces of software and other software stacks. virtual server A server that shares its resources with other servers to support applications. virtual server template A template on which a virtual server is based. The virtual server is allocated using the hardware requirements of the template.
500
Troubleshooting
v Log files on page 522 v Troubleshooting image library management on page 522 v Messages v Search the IBM Support Portal v Contacting support
Log files
Follow the steps below and review the indicated log files to recover from problems that you might encounter when managing entries in the image library: v Problems with saved images v Image repository problems on page 523 v Master image problems on page 523
Resources
To learn more about managing image entries in the image library, refer to one of the following resources: v Master images on page 504 v Composite images on page 510 v Saved Images on page 517 v Publishing an image on page 520 v For a description of a field in the interface, click Alt+F1.
Related links Chapter 6, Managing images in the image library, on page 497 Requirements Troubleshooting image library management on page 522
Requirements
Before you begin using the image library, ensure that the image repositories are configured and synchronized.
501
Table 83. User roles (continued) Role Deployment Specialist Description v Deploys master images. v Restores saved images to re-create deleted virtual servers. v Restores saved images to return an existing virtual server to a previous state. v Deploys OVF images. Provisioning Configuration Librarian v Registers master images to the image library by capturing the images, importing the images, or running discovery. v Synchronizes the image library with the image repositories. v Creates and deletes saved images. v Deletes virtual servers. v Edits the configuration of master images. Knowledge of provisioning server configuration and boot server technologies. Skills v Server management experience v Familiarity with operating system management life cycle
502
For VMware, the image repository is created when you run the VMware Virtual Center Discovery. The information discovered from the datastores in the VirtualCenter populates the image repository. Similarly for VMControl, the image repository is created during the discovery process. For a KVM file-based boot server, the image repository is automatically created when you install the boot server. This image repository is only master images enabled by default. If you need to create an image repository which is saved images enabled or instance images enabled, you must create it manually. To manually create a PowerVM or KVM image repository, complete these steps:
Procedure
1. Click Go To > IT Infrastructure > Image Library > Image Repositories. 2. From the Select Action menu, select PowerVM or KVM as the type of image repository that you want to create. 3. Type a name for the Repository. You can also add a Description. 4. Optional Type a value for the Available Space and Total Space. These values represent the deallocated space and total space on the image repository. 5. Select which type of image you want to save in this repository. If you want to save all types of images, select all of the check boxes: v Master Images Enabled v Saved Images Enabled v Instance Images Enabled If you do not select all of the image types, only the image type that you enable can be added to the image repository. When you create an image, the repository options are filtered by the type of images that you have enabled. 6. Click Submit to save your changes and create the image repository. 7. From the List tab, select the repository that you created. 8. On the Repository tab, click New Repository Location. and select the computer, or (only for PowerVM repository) the managed system ID of the 9. Click NIM boot server, where the images will be physically located. Click OK. 10. For KVM, VMFS, and VMControl image repositories, a section called Mount Points is present. PowerVM does not use mount points. The mount point is the association between the repository and the host platform server. The location can be on any accessible remote managed system that can store the virtual files. The mount points for VMFS are automatically configured by the VMware Virtual Center Discovery. The mount point for VMControl is also automatically configured by its discovery process. For file-based KVM boot server, the mount point is automatically associated to the image repository with the file-based boot server. For KVM-OVF and the KVM image repository that is manually created, the mount point must be manually configured. Click New Mount Point. 11. In the Mount Point field, type the path to the mount point. The path value is the path to the managed system from your local computer. Note: Ensure that you specify a different directory from where your KVM virtual servers are created. Sharing a directory structure for virtual servers and master images is not supported.
Results
The image repository is now created and configured.
What to do next
The next step is to synchronize the image repository.
Chapter 6. Managing the image library
503
Master images
Master images contain the hardware configuration and software resources required to fully provision a computer. Master images can be thought of as templates. They can be created in the following ways: 1. Captured from existing computers in the provisioning database (non-native images). 2. Discovered from the virtualization technology (native images). For example, VMware templates are created in the VirtualCenter and are discovered by the provisioning server and added to the image library as master images. 3. With Tivoli Provisioning Manager for OS Deployment, creating an unattended image using installation media such as CDs or DVDs. 4. Importing an OVF package. An important feature of master images is the ability to create versions. Whenever you capture a master image, a version is assigned to the image. Each new image that you capture can be associated to the original master image in a parent-child relationship, or you can start a new version sequence. This diagram illustrates the functionality of the version feature.
Server 1
Capture 1
Capture 2
Create revision?
Yes
No
Deploy
Capture 3
Server 2
504
1. Capture 1. A master image is captured from Server 1. It is the first master image of Server 1, so version 1.1 is assigned to the master image. 2. Capture 2. A second master image is captured from Server 1. A decision is required on whether you want to create a revision of master image 1. v Create revision: If you create a revision of master image 1, version 1.2 is assigned to the new image and a parent-child relationship is created between the two images. v Do not create revision: If you choose not to create a revision, a new master image version 1.1 is created. The new master image does not replace the original master image 1.1 from Capture 1. 3. Deploy. Master image 1.1 is deployed to create Server 2. This is a new physical or virtual server. 4. Capture 3. A master image is captured from Server 2. Each time you create a master image, decide if you want to create a revision of the original master image. In this example, the user has decided to create a revision and has chosen master image 1.1 as the ancestor. Version 1.1.2.1 is assigned to the new master image. This is because a revision was already created of master image 1.1. If master image 1.2 did not exist, the revised master image of Capture 3 would have been called version 1.2. The version number 1.1.2.1 might seem strange at first, but the additional digits do have a meaning. The first three digits, 1.1.2, represent a new branch in the revision history of the image with version 1.1. The fourth digit represents the first version on that branch. So the version "1.1.2.1" can be read as first version of the branch 1.1.2 of the image with version 1.1."
505
1. Add: Master images that are in the repository but are not in the image library are added to the library. 2. Remove: Master images that are in the image library but are not in the repository are removed from the library. The following types of repositories are supported: v VMFS v KVM v PowerVM v VMControl Follow these steps to synchronize the image repositories:
Procedure
1. Click Go To > IT Infrastructure > Image Library > Image Repositories. 2. Click an image repository . 3. On the Repository tab, click Synchronize Repository.
Results
All of the master images in the provisioning database that are identified as that repository type, are synchronized and added to the Image Repositories application.
What to do next
After you synchronize to add master images as entries in the image library, you can review the image information about the Master Image tab for each image. If master images are discovered, a virtual server template might not be associated to the image. This is the case for pSeries master images that are discovered by the IBM AIX NIM Discovery that runs when you click Synchronize Repository. Add a virtual server template to the master image if it does not have one.
Procedure
1. From the Master Images application, select the master image. > Select Value. 2. On the Master Image tab, beside Virtual Server Template, click 3. Select the virtual server template that you want to add to the master image. Important: Virtual server templates that are manually associated to a master image that is discovered are deleted if the master image record is deleted. Create a duplicate of the virtual server template before you associate the template to the master image. To duplicate the virtual server template, click Go To > IT Infrastructure > Provisioning Inventory > Virtual Server Templates. Select the virtual server template from the list. From the Select Action menu, click Duplicate Virtual Server Template. When the template has been duplicated, return to the Master Images application and associate the virtual server template to the master image.
506
Procedure
1. Click Go To > IT Infrastructure > Image Library > Master Images. 2. From the Select Action menu, click Capture Image. 3. In the Capture New Image window, type a name for the Provisioning Task or accept the default name. 4. Select the Source Computer from which to capture the image by clicking 5. In the Image field, type a name for the new master image. .
. There are three types of boot servers: NIM (LPAR), 6. Select the Boot Server Type by clicking File-Based (KVM), and IBM Tivoli Provisioning Manager for OS Deployment. The provisioning server matches the boot server type to the operating system of the source computer. The Tivoli Provisioning Manager for OS Deployment type is available for all computers, and is the only option available if the source computer does not have an operating system. 7. 8. 9. 10. . There are three types of images: Select the Image Type by clicking Accept the default Timeout value or type a new value. Click Select Boot Server and click the boot server that you want to use to capture the image. To schedule the new master image to be created, click Schedule. Accept the default value, Run Now, to create the master image immediately, or select Scheduled Start and then click the calendar button to specify the date and time that you want the virtual server to be created. Click OK. The provisioning task is launched. At the prompt, you can jump to the Provisioning Task Tracking application to monitor the task.
11.
Results
The image is captured and listed as a master image. The instance image of the source computer is updated to reflect its relationship with this new master image. Now you can use the image to deploy new provisioning computers or virtual servers, or deploy it to an existing system.
507
Master images can be deployed on physical or virtual servers. Every master image can be deployed in two ways: 1. As a new computer, which creates a new virtual server on an existing host platform server. 2. As a software image deployed on an existing computer. Using a native host platform operation, for example, creating a virtual server using a VMware template. Follow these steps to provision a new computer:
Procedure
1. 2. 3. 4. Click Go To > IT Infrastructure > Image Library > Master Images. Select the master image that you want to deploy. From the Select Action menu, click Deploy Master Image. Select Create Server.
5. In the Virtual Server field, type a name for the new virtual server. and select a host platform server from the list. The list of 6. In the Host Platform field, click available host platform servers is determined by the existence of a software image on the master image. a. If there is a software image, the available host platforms are listed based on the guest operating system type. b. If there is no software image, the Hypervisor type is used to retrieve the list of available host platform servers. to select the Repository where the virtual server will be created. 7. Optional Click 8. Optional Type the Repository Relative Path. Important: VMware: Use the following format for the repository path:
/<Datacenter_name>/vm/<Folder_name>
If you do not include the vm reference between the Datacenter_name and Folder_name, an error occurs. 9. For OVF only, click the Map Networks tab. To specify the Host Platform Network, beside Bridge, and select the Host Platform Network. click 10. Click Edit Virtual Hardware. The minimum required hardware configurations are shown. Update the recommended values for deployment as needed. The changes to these values cannot go below the minimum value or exceed the available resources. If the resources values are changed, they are saved as a clone of the recommended virtual server template. Note: For OVF, the network interface card (NIC) cannot be changed in the Edit Virtual Hardware tab. Change are made on the Edit Software tab. See the next step for details. The Edit Virtual Hardware and Edit Software tabs do not apply to VMware master images. The hardware and software of a VMware template cannot be changed. 11. Click Edit Software. The software stack associated with the master image is cloned and displayed. If you want to change the software that is included on the master image, click software that you want to add to the image. Click OK. Tip: For OVF, to change the NIC, click ConfigNet. To change the root password, click ConfigPWD_ROOT . and select the
508
12. Click Scheduling and click Schedule to select when the master image will be deployed. Click OK.
Results
The master image is deployed to the new computer. To change the computer resources, select the computer and go to the Provisioning Computers application. To view the computers that have been provisioned using this master image, click the Instances tab. Each deployed computer is an instance of this master image. Instance images help you to understand how images are being used; you can view all the instances of a particular master image. It also helps you to see and track the master image versioning. By viewing the instance images, you can see what computer was deployed with which version of the master image. If you are recapturing that computer, you know that you can give it a new version. Instance images also help with impact analysis. If an image has a problem, you can see what instances in your provisioning database have that image.
What to do next
After the image is deployed and the computer or virtual server is used in your business environment, there will typically be some changes made to the computer, for example, additional software or patches and upgrades will be installed on the computer. After you change the computer, you can recapture an image of the changes. The new version of the image will contain these changes and can be used to deploy to more new or existing computers with the latest changes.
Procedure
1. Click Go To > IT Infrastructure > Image Library > Master Images. 2. From the Select Action menu, click Capture Image. 3. In the Capture New Image window, type a name for the Provisioning Task or accept the default name. 4. Select the Source Computer from which to capture the image by clicking 5. In the Image field, type a name for the new master image. 6. Select the Boot Server Type by clicking . .
. 7. Select the Image Type by clicking 8. Select Create Revision to verify that this image is a version of an earlier image. to select the image that you are creating a version of. The 9. Beside Ancestor Master Image, click image that you select will be the parents of this new revised child image. The version number is automatically assigned to the new image. 10. Accept the default Timeout value or type a new value. 11. Click Select Boot Server and click the boot server that you want to use to capture the image.
509
12. To schedule the new master image to be created, click Schedule. Accept the default value, Run Now, to create the master image immediately, or select Scheduled Start and then click the calendar button to choose the date and time that you want the virtual server to be created. Click OK. 13. The provisioning task is launched. At the prompt, you can jump to the Provisioning Task Tracking application to monitor the task.
Results
When the provisioning task finishes, a new version of the image is created. The instance image of the source computer is updated to reflect its relationship with this new master image. Also, the revision number of the newly captured image will be set to reflect whether it is the beginning of a new line of images (for example, version 1.1), or it is a revision of another master image (for example, version 1.2 or higher). To see the relationship between the image versions, select the parent image and click the Version tab. All of the child versions of the parent image will be listed.
What to do next
The next step is installing a new version on an existing provisioning computer or virtual server.
Procedure
1. Click Go To > IT Infrastructure > Image Library > Master Images. 2. Select the master image that you want to deploy. 3. From the Select Action menu, click Deploy Master Image. 4. Clear Create Server. and select a computer from the list. 5. Beside Target Computer, click 6. In the Instance field, type the name of the new image instance. and select 7. Click Edit Software. To change the software that is included on the master image, click the software that you want to add to the image. Click OK. 8. Click Scheduling and click the Schedule button to select when the master image will be deployed. Click OK.
Results
The software resources of the computer are replaced by the master image.
Composite images
Capture and deploy composite images to create several virtual servers in a single operation.
510
A composite image is a set of images captured from two or more computers, in cases where you would like to deal with the set as a logical single entity. Typically, the set of computers would collectively provide an application service: for example, a WebSphere Application Server with a deployed J2EE application on one computer, that uses a DB2 database installed on a second computer. Composite images are treated as a single entity for the following image management operations: 1. 2. 3. 4. Capturing master images Deploying an instance of a master image Capturing a version of a deployed master image instance Publishing master images
511
Procedure
1. Click Go To > IT Infrastructure > Image Library > Master Images. 2. From the Select Action menu, click Capture Composite Image. 3. In the Capture Composite Image window, type a name for the Provisioning Task or accept the default name. 4. To select the virtual servers to capture the images from, click Select, and select the virtual servers that you want to include in the composite image. Click OK. 5. Select the Repository where the image will be located. 6. Type the Relative Path of the repository location. This is the relative path to the root location of that repository where the captured image will be saved. 7. In the Composite Image field, type a name for the new master image, or accept the default name.
512
8. To schedule the new composite master image to be created, click Schedule. Accept the default value, Run Now, to create the master image immediately, or select Scheduled Start and then click the calendar button to specify the date and time that you want the virtual server to be created. Click OK. 9. The provisioning task is launched. At the prompt, you can jump to the Provisioning Task Tracking application to monitor the task.
Results
The composite image is captured and listed as a master image. to To view all of the images that are included in the composite master image, click View Details expand the composite image. In the Member Images table, you can see all of the images. To view specific details about each image, click on the name of the member image. The instance image of the source computer is updated to reflect its relationship with this new composite master image. Now you can use the image to deploy new virtual servers.
Procedure
1. Click Go To > IT Infrastructure > Image Library > Master Images. 2. 3. 4. 5. From the Select Action menu, click Import Master Image. Type a name for the Provisioning Task, or accept the default name. Select the Source Computer, the computer where the OVF package is located. Type the Source Path, the name of the directory containing your OVF file.
513
6. Select the Destination Repository where the OVF file will be imported. Click Select Value and select the KVM or VMware repository. Master images must be enabled on the repository to be able to import the OVF package to that repository. 7. Type the Repository Relative Path for the location in the repository where the master image will reside. 8. Type an Image Name for the master image. 9. Specify a Timeout or accept the default value. 10. Select Import revision of existing master image if the master image will be a new version of an existing image library entry. and select the 11. If the master image is a revision, beside Ancestor Image Name, click Select Value appropriate master image from the list. 12. Click Schedule to schedule the provisioning task to import the master image. 13. Click Submit. 14. If you scheduled the master image to be imported immediately, the provisioning task will begin.
Results
When the master image is imported, it will display in the Master Images application. Click on the image to view the image details.
What to do next
The images can be deployed as new virtual servers.
Procedure
1. 2. 3. 4. Click Go To > IT Infrastructure > Image Library > Master Images. Select the composite image that you want to deploy. From the Select Action menu, click Deploy Master Image. If licence agreements for the software on the image is required, a Licence Agreements tab will be shown. Click on each licence listed and read the agreement. Click Agree if you agree to the licence conditions. 5. When all of the licences have been agreed to, click Configure Composite Instance. On this tab, type a Composite Instance Name. You can also type a description for the new composite image in the opposite field.
IBM Tivoli Provisioning Manager Version 7.2.0.2 User Guide
514
6. Click Configure Member Instances. 7. Each member of the composite master image must be configured before the image can be deployed. Click on the first member in the composite. 8. On the Configure Member Instance tab, enter the required information: a. Type a name for the New Virtual Server that will be created by deploying this image. You can also type a description for the new virtual server in the opposite field. b. Beside Host Platform, click Select Value virtual server will be created on. and select the host platform server that the new
and select the repository for the new instance image. c. Beside Repository, click Select Value Instance images are created when master images are deployed. Only repositories associated with the selected host platform server will be displayed. When you select the host platform, the repository fields will be shown. Also, only repositories that are enabled for instance images can be selected. The instance enabled flag is an attribute of the repository and can be set for the repository in the Image Repositories application. d. Type the Repository Relative Path. This is the relative path to the repository location where the new instance image will reside. The repository location is the root path on an image repository and can be configured in the Image Repositories application. For example, if /deploy is the repository location, the Repository Relative Path for deploying the image will be relative to /deploy. If the images will be located in my_vm_path, the absolute path where the image files will be found is going to be /deploy/my_vm_path. To avoid potential problems, ensure that you do not use any special characters. Deploying a composite master image on VMware might fail if there are special characters in the Repository Relative Path because using non-ASCII characters can cause problems with VMware software. For more information about this issue, see the VMware Knowledge Base article number KB 1003866. 9. On the Map Networks tab, all of the networks on the host platform server are displayed. Click Select Value connected to. and choose the network on the host platform server that the virtual server will be
10. Optional. On the Edit Virtual Hardware tab, the CPU and Memory resources can be updated. Only the Virtual Quantity column applies to these resources. Edit the values in the Variables table, if required. 11. On the Edit Software tab, enter the required information for each of the following software resource templates. a. Select the ConfigSystem software resource template. Click the hostname parameter. In the Value field type the host name of the new virtual server. Verify that all other parameters are configured correctly, and make changes as required. b. Select the ConfigNetworkPort software resource template. Ensure that the value for the usedhcp parameter is the same value that is displayed in the ConfigSystem template. Review the values of the other listed parameters. Make changes as required. Tip: The domain name should not include the leading apostrophe character ('). c. Select the ConfigPWD_ROOT software resource template. If the user name of the virtual server can be changed, the username parameter will be displayed. Expand the parameter and make any required changes. To set the password, expand the password parameter and type the new password in the Parameter Value field. Type the password again in the Confirm Value field Other configuration templates might be listed, depending on the software on the captured image. Review the parameters and values and make changes if required.The member master image is now configured. The Configured check box will be selected. If the check box is not checked and you are unsure of what remains to be configured, click another member in the table. A validation message will be prompted that will indicate the what field requires input and on what tab.
515
12. Complete steps 8 to 12 for each master image in the composite image. All of the master images must be configured before you can deploy the composite image. 13. Click Scheduling and click Schedule to select when the composite images will be deployed. Click OK. 14. When all of the master images have been configured, the OK button will be enabled. Click OK. 15. If the deployment was scheduled to start immediately, the provisioning task begins.
Results
The composite image is deployed to the selected host platform servers and the virtual servers are created. To view the virtual servers that have been provisioned using this composite image, click the Instances tab. Each composite instance represents a collections of virtual servers that have been deployed from this composite image. The member instances give information about the individual virtual servers. Instance images help you to understand how images are being used; you can view all the instances of a particular master image. It also helps you to see and track the master image versioning. By viewing the instance images, you can see what virtual server was deployed with which version of the master image. If you are recapturing that virtual server, you can give it a new version number. Instance images also help with impact analysis. If an image has a problem, you can see what instances in your provisioning database have that image. To make changes to the virtual server resources, click the new virtual server and go to the Provisioning Computers application.
What to do next
After the image is deployed and the virtual servers are used in your business environment, there will typically be some changes made to the virtual servers, for example, additional software or patches and upgrades will be installed on the computer. After you change the virtual server, you can recapture an image of the changes. The new version of the image will contain these changes and can be used to deploy to more virtual servers with the latest changes.
Procedure
1. Click Go To > IT Infrastructure > Image Library > Master Images. 2. Select the composite master image that you want to capture. 3. From the Select Action menu, click Capture Master Image Revision. 4. In the Capture Master Image Revision window, type a name for the Provisioning Task or accept the default name. 5. Click Select Server Collection to select the server collection that represents the instance of the composite master image that you want to capture. Click OK. 6. Select the Repository where the image will be located. 7. Type the Relative Path of the repository location. This is the relative path to the root location of that repository where the captured image will be saved. 8. In the Composite Image field, type a name for the new master image, or accept the default name.
516
9. To schedule the new version of the composite master image to be created, click Schedule. Accept the default value, Run Now, to create the master image immediately, or select Scheduled Start and then click the calendar button to specify the date and time that you want the new version of the master image to be created. Click OK. 10. The provisioning task is launched. At the prompt, you can jump to the Provisioning Task Tracking application to monitor the task.
Results
When the provisioning task finishes, a new version of the composite master image is created. The revision number of the newly captured image will be set to reflect whether it is the beginning of a new line of images (for example, version 1.1), or it is a revision of another master image (for example, version 1.2 or higher). To see the relationship between the image versions, select the parent image and click the Version tab. All of the child versions of the parent image will be listed.
Saved Images
Saved images are backups of various states of your virtual server. Use saved images to replace an existing virtual server, or to restore a deleted virtual server. The Saved Images application is only applicable for virtual server. Note: VMControl virtual servers are not supported by the Saved Images application. Each image that you save, of a single virtual server, becomes a member of a provisioning group associated with the virtual server. The provisioning group does not require any maintenance; it is maintained automatically by the actions in the Saved Images application. For example, Saving and Removing images adds and removes the saved images from the provisioning group. The images in the group are associated with the virtual server that the saved image was created from. The saved images remain in the image library, even if the original virtual server is deleted. Saved images are different from master images. To learn about the differences between master images and saved images, see the comparison table in Chapter 6, Managing images in the image library, on page 497. This diagram illustrates the typical flow of saving images.
517
Yes
No
Create saved image Save an image of an existing virtual server. Update virtual server This step in the process represents the typical actions for a virtual server in your environment. Updating can mean installing patches, or adding software to the virtual server. Create saved image Any time a change is made to the virtual server, you might want to create a saved image of the changed state of the virtual server. You can have multiple saved images for the various states of your virtual server. Delete virtual server If a virtual server is deleted from your provisioning environment, the saved images of the virtual server remain. You can restore the virtual server using any of the saved images of that virtual server. Restore virtual server You can restore a virtual server using a saved image. Restoring the virtual server completely replaces the existing virtual server. Or, if the virtual server has been deleted from your provisioning environment, it will be recreated on an existing host platform server.
518
To learn more about creating and restoring saved images, see the documentation in this section.
Saving images
Saved images are used to restore or replace a virtual server. You can create multiple images of a virtual server so that you can have images for different states.
Procedure
1. Click Go To > IT Infrastructure > Image Library > Saved Images. 2. From the Select Action menu, click Save Computer. 3. Type a name for the Provisioning Task or accept the default name. , and select the virtual server that you want to save an image of. 4. Beside Source Computer click Multiple virtual servers can be selected. Click OK. 5. The Saved Image name and description are created. Accept the name or type a new name. and select the repository where this image will be saved. If multiple 6. Beside Repository, click virtual servers are selected, expand each Source Computer to specify the required information in the Details section. Specify the required information for each type of image that you are saving: v KVM: Repository and Relative Path. v VMware: Repository only. v PowerVM: Repository only. If you specify a relative path for the saved image, it must be a unique path so that the saved images are not overwritten on the repository. 7. The task is defaulted to run immediately. Accept the default, or to schedule the task to run later, click Schedule > Scheduled Start and then click the calendar button to specify the date and time that you want the saved image to be created. Click OK. 8. Click Submit. 9. The provisioning task is launched. At the prompt, you can jump to the Provisioning Task Tracking application to monitor the provisioning task.
Results
The saved image is created and is now an object in the provisioning database. You can create multiple images of the same virtual server. Any time that you change the state of the virtual server, save an image of the state so that you can roll back to that state, if required. The following actions also occur for the saved images: v The saved image is added to a provisioning group associated to the virtual server. To view the saved images in the provisioning group, navigate to the Provisioning groups application. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Groups. All of the saved images for the virtual server are contained in the same provisioning group. v The saved image is added to the image repository that is associated to the host platform server.
Chapter 6. Managing the image library
519
Procedure
1. 2. 3. 4. Click Go To > IT Infrastructure > Image Library > Saved Images. From the Select Action menu, click Restore Computer. A default name for the Provisioning Task is created. Accept the default name or type a new name. Decide where the virtual server will be restored. If you want to specify a different host platform server, clear Restore to Original Host Platform?. and select a host
5. If you are specifying a new host platform server, beside Host Platform click platform server. 6. Beside Repository, click located.
and select the repository where the new virtual server will be physically
7. The task is defaulted to run immediately. Accept the default, or to schedule the task to run later, click Schedule > Scheduled Start and then click the calendar button to specify the date and time that you want the virtual server to be created. Click OK. 8. Click Submit. 9. The provisioning task is launched. At the prompt, you can jump to the Provisioning Task Tracking application to monitor the task.
Results
When the provisioning task completes, the virtual server is created and added to the provisioning database. To view the virtual server details, navigate to the Provisioning Computers application and search for the virtual server name.
Publishing an image
By default, master images and saved images are available for all users to view. To secure these images, you can publish images to a specific provisioning group. All users can see all images in the Image Library. There might be situations where users do not require access to use, or even to view images. You can restrict access to images by publishing images to specific provisioning groups and then setting the group permissions to allow the access only to specific users. A common configuration is to define a group for each team of users that will share their own images among the team. The administrator, TPADMIN, is the only user that can publish images. To publish images, follow these steps:
Procedure
1. Click Go To > IT Infrastructure > Image Library > Master Images. Or, to publish a saved image, navigate to the Saved Images application. Click Go To > IT Infrastructure > Image Library > Saved Images. The remaining steps will use master images as an example. The same steps can be duplicated in the Saved Images application to publish saved images.
520
2. From the Select Action menu, click Publish Master Image. 3. Choose the images that you want to publish. Click Select Master Images. Select all of the images that will be published to the provisioning group. If composite images are selected, all of the members of the composite will be published. Publishing composite members individually is not supported. Note: If you clicked Select Action > Publish Master Image from one of the detail pages of a specific master image, then there is no need to select the master image again. 4. To publish the image to a provisioning group, choose whether you want to publish to an existing provisioning group or if you want to create a new provisioning group. Existing provisioning groups for master images are listed in the Selected Provisioning Groups section. v If you select Use an existing provisioning group, click Select Provisioning Groups. From the list, select the provisioning group, or groups, that you would like the image to be added to and click OK. v If you select Create a new provisioning group, type a name for the new provisioning group and click OK. 5. Click OK.
Results
The master image is published to the specified provisioning groups. Only users that belong to the security group that is associated to the provisioning group, will have access to that master image now. To verify that the master image has been published, view the image details on the Master Image tab. After an image is published to a provisioning group, on the image details page, the Unpublish Image option will be available from the Select Action menu.
What to do next
If the provisioning group is not associated to a security group, create the association so that the appropriate users can access the published master image.
Procedure
1. Click Go To > Security > Security Group. 2. Search the security group that you want to associate to the provisioning group that you published the images to. Click on the name of the security group to select it. 3. On the Provisioning Permissions tab, click Add Read-only Permissions or Add Read/Write Permissions. 4. Select the provisioning group of images Click OK. 5. Click OK.
Results
The provisioning group is now associated to the security group with the type of provisioning permissions that you chose, either read-only or read/write.
Chapter 6. Managing the image library
521
You can associate a provisioning group to multiple security groups, if different types of users require access to the same images.
Unpublishing images
If images no longer need to be secured, you can unpublish them to remove them from the groups that they have been published to with a single operation.
Procedure
1. Click Go To > IT Infrastructure > Image Library > Saved Images. Or, to unpublish a master image, navigate to the Master Images application. Click Go To > IT Infrastructure > Image Library > Master Images. 2. Select the image that you want to remove from the provisioning group. 3. From the Select Action menu, click Unpublish Saved Image. Or, from the master images application, click Select Action > Unpublish Master Image.
Results
The image is removed from all the provisioning groups to which it was published. Note: Images are only unpublished from provisioning groups that they are specifically published to. If a user has manually added an image to a provisioning group, the image will remain in that group. If you want to unpublish a master image only from a specific group, click the Master Image tab to to delete the row related to the group in the Published to display the image details and click Provisioning Groups table.
Procedure
1. Check the interface and log files for error messages. See the Log files topic for details. 2. If there is an error message with a message ID, search the Tivoli Provisioning Manager Information Center for a description of the error message. 3. Check the Tivoli Provisioning Manager release notes or the latest available fix pack readme file for information about known issues or updates to the documentation.
Log files
Log files help in diagnosing problems and recording commands. v Problems with saved images v Image repository problems on page 523 v Master image problems on page 523 Note: The log files mentioned in the following tables are located in the TEMP directory: v v
Windows UNIX
%TEMP%. For the full address, see the Environment variables document.
Linux
/tmp/
Check errors in: v Provisioning workflow log v web interface error messages
Log files v HostPlatform.DeleteSavedImage v No log file - for more information about the error message, see Messages. v No log file - for more information about the error message, see Messages. v No log file - for more information about the error message, see Messages. v Hostplatform.SaveImage v No log file - for more information about the error message, see Messages. v Hostplatform.RestoreImage v No log file - for more information about the error message, see Messages. v No log file - for more information about the error message, see Messages. v No log file - for more information about the error message, see Messages.
Restoring saved images v Provisioning workflow log v web interface error messages Saving saved images v Provisioning workflow log v web interface error messages Publishing saved images Unpublishing saved images v web interface error messages v web interface error messages
523
Log files v No log file - for more information about the error message, see Messages. v VApp_DeployVirtualAppliance: creating a virtual server and the image is OVF v HostPlatform.CreateVirtualServerAndSoftwareStack: creating a virtual server and the image is NOT OVF v SoftwareModule.Install: deploying on existing server v No log file - for more information about the error message, see Messages.
Deleting master images v web interface error messages Deploying master images v Provisioning workflow log v web interface error messages
v BootServer.DeleteImage v No log file - for more information about the error message, see Messages. v BootServer.CaptureImage if golden master, BootServer.CaptureScriptedImage if scripted image, BootServer.CaptureBackupImage if snapshot v No log file - for more information about the error message, see Messages. v No log file - for more information about the error message, see Messages. v No log file - for more information about the error message, see Messages. v No log file - for more information about the error message, see Messages. v No log file - for more information about the error message, see Messages.
Publishing master images Unpublishing master images Creating a revision Deleting instance images
v web interface error messages v web interface error messages v web interface error messages v web interface error messages
Symptoms
The following error occurs when you try to remove a VMware master image:
COPSWD087E - This action is not supported
Causes
The error message is expected. Only image library entries that have software resources associated can be removed.
524
If the VMware master image is no longer required, delete the image from the VMwareVirtualCenter. After the image is deleted, run the VMware Virtual Center Discovery from the provisioning server. The discovery synchronizes the image library with the VirtualCenter and removes the master image from the image library.
Symptoms
After you synchronize to add OVF master images to the image library, any updates made to the data on the images will not be updated the next time you synchronize the repository.
Causes
This behavior is expected. Support for OVF is only for new master images. Any new master images or data that is added to the existing OVF image is not synchronized.
Symptoms
The following error occurs when you select a SLES 10 master image and try to deploy a new VMware virtual server:
COPDEX123E A ConnectionInfoTimeout exception occurred. The exception was caused by the following problem: IBM Tivoli Provisioning Manager was NOT able to determine the IP of the VM for connectivity. Make sure the VMware Template has VMware tools installed and is set to DHCP.
Causes
This is a known VMware issue. The error can happen for a number of reasons. For example, if a virtual server has been cloned and VMware tools have not been installed into a VMware virtual server.
Symptoms
The following error occurs when you are running a provisioning task, for example, synchronizing a KVM repository:
java.net.ConnectException: Connection refused: connect
525
Causes
The error occurs because the SSH daemon is not configured and started on the provisioning server.
Environment
This error can also occur if you have manually installed Cygwin instead of installing it with Tivoli Provisioning Manager installer.
A KVM virtual server entry cannot be deleted from the agent manager
To use a KVM virtual server with the Tivoli Common Agent, the virtual server must have a full host name as the Computer name.
Symptoms
Running the provisioning workflow, TCA_DeleteServerFromAM, to remove the virtual server entry from the agent manager fails.
Causes
The Computer name of the KVM virtual server is not a full host name.
Symptoms
After successfully restoring a virtual server that has been deleted with a saved image that includes the Tivoli Common Agent, the provisioning workflow TCA_pingAgent fails. A management IP address is required, but the virtual server does not have one. The agent is not running on the restored virtual server.
Causes
The original virtual server was deleted from the provisioning database and then the saved image was used to restore the virtual server. However, the original virtual server was not deleted from the agent
526
manager. It must be removed because it has the old information of the virtual server. When a saved image is used to restore a virtual server, new information is given to the virtual server.
Symptoms
Trying to capture an image of a KVM computer fails with the following error:
com.jcraft.jsch.JSchException: session is down
Causes
The target computer is low on memory.
527
528
529
Process
The following diagram illustrates the high-level architecture of the scalable distribution infrastructure:
Provisioning Server
Operator/Administrator Console
Agent Manager
Region A
Branch Office 1
Target
Branch Office 2
Target
Region B
Branch Office 3
Target
Software deployment using the scalable distribution infrastructure includes the following processes: v v v v Setting up scalable distribution infrastructure on page 538 Publishing software to depot servers on page 543 Distributing and installing software on page 582 Installing software products on page 607
530
User roles
You must be assigned to the appropriate user role to perform software deployment.
Table 85. User roles for software distribution through the scalable distribution infrastructure Role Provisioning Administrator Description of Role Responsible for: v The management of the provisioning server itself. v Setting up the scalable distribution infrastructure. v Configuring the deployed core components to work with the provisioning server environment. Deployment Specialist Responsible for managing entities in v Intermediate knowledge of the a data center. Uses Tivoli Tivoli Provisioning Manager Provisioning Manager to manage system. these entities and has all the required v Intermediate knowledge of the access permissions to the software distribution process corresponding devices. through the scalable distribution infrastructure. Skills v Advanced knowledge of the Tivoli Provisioning Manager system. v Advanced knowledge of the architecture and functions of the scalable distribution infrastructure.
Requirements
User roles and requirements on page 546 Target computer requirements: Requirements for Windows target computers on page 556 Requirements for Red Hat Linux target computers on page 560 Requirements for SUSE Linux Enterprise Server (SLES) target computers on page 561 Requirements for AIX target computers on page 562 Requirements for Solaris Operating Environment target computers on page 563 Requirements for HP-UX target computers on page 565 v Requirements for common agent installation on page 547 v Installation media for software distribution on page 566
531
Key terms
depot server The component that stores files for distribution. Files are uploaded to a depot server using a client and stored in a directory that is specified when the depot server is installed. Depot servers can replicate files to other depot servers. Target computers can download files from depot servers or peers. distribute To disperse software packages, software patches, and software stacks to be installed over one or more targets. distribution infrastructure A framework for software distribution supporting software management tasks including configuration, distribution, installation, and asset inventory management. job A separately executable unit of work.
logical management operation A generic function supported by a set of devices. For example, configuring an IP address on a network interface is a logical management operation supported by all operating systems. Although this is logically the same function, the steps for performing this function on each operating system are different. These steps are supported by provisioning workflows for that operating system. provisioning group A group of computers, software definitions, file repositories, and so on. An administrator can create provisioning groups to organize systems into meaningful categories, and to facilitate deployment of software to multiple computers. provisioning task An action that runs a deployment job on one or more target computers. A deployment job can include one or more job items that correspond to provisioning workflows. provisioning workflow A program that is used to manage an environment. The program consists of a sequential series of steps that are performed to accomplish a particular provisioning task. publish To enable faster download and software distribution to target computers, you can publish software products, software patches, or files in a specified repository to selected depot servers, in advance of when they are needed on the computers. The files published on depot servers can then be downloaded by the target computers. scalable distribution infrastructure A solution that ensures fast and reliable software distribution to large numbers of target computers in a variety of topologies. It enables central management of software distribution, and relies on core services such as Tivoli Common Agent services, the dynamic content delivery, and device manager service to perform the actual software distribution and federated job management operations. software package block (SPB) A file or set of files that can be included in a particular software deployment. Examples include an installation package, installation files for a patch downloaded from the vendor website, or a software image. software resource template (SRT) A set of parameters that define configuration options and software resources to create on a managed system during software installation. software signature The set of unique information that identifies a software application, such as the name, version, and file size of an application.
532
Troubleshooting
v Troubleshooting software distribution on page 751 v Log files on page 761 v Software deployment problems and limitations on page 763 v Messages v Support information about the scalable distribution infrastructure v Contacting Support
Log files
The following are common troubleshooting problems with scalable distribution infrastructure. Check the log files and the workflow logs to determine the problem: v Recovering from software resource problems v Recovering from software product problems v Recovering from software stack problems v Recovering from file problems v Recovering from agent installation problems v Recovering from patch problems
Resources
To learn more about software deployment using the scalable distribution infrastructure, refer to one of the following resources: v Tutorial: Software deployment on page 567 v Distributing and installing software on page 582 v Simple software product distribution on page 618 v Uninstalling software on page 626 v Installing Tivoli Common Agent Services on page 628 v Administering installed software on page 689 v For a description of a field in the web interface, press Alt+F1.
Related links Chapter 7, Deploying software, on page 529 Requirements on page 546 Tutorial: Software deployment on page 567
533
Provisioning Server
Operator/Administrator Console
Agent Manager
Region A
Branch Office 1
Target
Branch Office 2
Target
Region B
Branch Office 3
Target
Software deployment using the scalable distribution infrastructure includes the following processes: v Setting up scalable distribution infrastructure on page 538 v Publishing software to depot servers on page 543 v Distributing and installing software on page 582 v Installing software products on page 607
Components
The scalable distribution infrastructure includes the following management elements and distribution elements. Each management element maintains a record data set for its type of data (jobs or bulk data). The distribution elements (job managers, depot managers) maintain a working data set which is a cache of the management data set. To enhance performance, the management elements implement a cache pre-fill strategy in which data is distributed to the branch elements in advance of when it is needed.
534
Provisioning server The provisioning server is the server on which Tivoli Provisioning Manager is installed. The following components of the scalable distribution infrastructure are installed on the provisioning server: The dynamic content delivery management center The dynamic content delivery management center provides centralized control of the upload, replication, and download of files. It also monitors the state of depot servers and stores file data and download statistics. The dynamic content delivery management center implements a distribution policy that sends bulk data to some or all the distributed depot servers in advance of when it is needed. A device manager federator The federator is installed on the provisioning server and is configured to act as a federated server. The federator implements a job distribution policy that pushes incoming jobs to all the regional agents. Agent Manager Tivoli Provisioning Manager uses the Tivoli Common Agent Services for software distribution and compliance. Tivoli Common Agent Services provides an infrastructure for managing the computer systems in your environment. Agent Manager is the server component of the Tivoli Common Agent Services that provides functions that clients can use to get information about agents and resource managers. It enables secure connections between the target computers, maintains the database information about the targets and plug-ins installed on the agent, and processes queries against that database from resource managers. It also includes a registration service, which handles security certificates, registration, tracking of common agents and resource managers, and status collection and forwarding. Distribution servers The provisioning server connects to distribution servers, or directly to target computers. The distribution servers contain the following components: A device manager federated agent Agents are installed on distribution servers and are configured to communicate with the federator to get command jobs and to distribute them to the set of clients installed on the target computers. The agents on the distribution server periodically communicate with the federator and detect when there is network connectivity. A dynamic content delivery depot Depots communicate with the management server, particularly the dynamic content delivery management center, to provide status information and during download requests from the agents.
535
Depot Server
OSGi
Common Agent
Tivoli Common Agent target computers Target computers connect to the distribution servers. The targets contain the following components: A device manager subagent Clients are installed as device manager subagents on all the targets and are used for receiving jobs from the Device Management Service and sending results from the agents to the Device Management Service. A dynamic content delivery subagent Subagents are installed on all the managed systems or targets to download files from depot servers or from other clients. Tivoli Common Agent client The Tivoli Common Agent client is installed on the target computers and acts as a common container for all the subagents. The deployed agent software collects data from and performs operations on managed resources on behalf of a Tivoli management application. It provides shared system resources and secure connectivity.
536
Target Computer
OSGi
Common Agent
The following diagram illustrates the interaction between the components of the scalable distribution infrastructure:
537
Provisioning Server
Operator/Administrator Console
Agent Manager
Region A
Branch Office 1
Target
Branch Office 2
Target
Region B
Branch Office 3
Target
The management elements of the infrastructure are installed on the provisioning server. The branch elements ensure a two-way communication between the management elements and the clients installed on the target computers in the branch offices. The branch elements communicate with the management elements to get data requested by the targets at the branch. When the targets receive the requested data, results are returned to the regional elements, which in turn, communicate them back to the management elements.
538
v The dynamic content delivery management center The following diagram illustrates all of the elements that constitute the scalable distribution infrastructure:
Scalable Distribution Infrastructure
Provisioning server
Dynamic Content Delivery Service Management Center
Agent Manager
...
2 1
- Common Agent
The following postinstallation configuration tasks must be performed to properly set up the distribution elements of the infrastructure to interact and communicate with the management elements so that all supported operations can be successfully performed: Install the depot servers The installation of the dynamic content delivery depot servers can be done using the web
Chapter 7. Deploying software
539
interface. Regions, depots, and zones can also be created, updated, or deleted using the DcdAdmin automation package. If you need to create several zones, use the DcdAdmin automation package CLI or workflows to create them. For more information, see the Automation package for management of large numbers of regions, zones, and depot servers on page 821 and Adding depot servers on page 819 topics. Install the common agent on target computers The common agent installation can be performed either using the provisioning server or outside of it. For more information, see the Installing the common agent on page 541 topic.
540
You cannot have a preferred upload server in a zone with "Minimize traffic in and out of zone" set to enabled or incoming-blocked. A publish to this preferred upload server will fail. v Define the number of concurrent activities included in each activity plan when publishing software and patches. When you publish software products or patches to a depot, Provisioning Manager generates an activity plan. By default the activity plan contains five concurrent activities. If you want to change the number of concurrent activities, perform the following steps: 1. Click Go To > Administration > Provisioning > Provisioning Global Settings. 2. Click Variables. 3. Click New Row and add the following settings: Variable Type Publish software activity concurrency level Component Entire System Value Type the value of the property with the required number of concurrent activities. The default value is five. Tip: To view information about depot server status from the Start Center, expand the Depot status portlet. Running the dynamic content delivery depot as LOCAL_SYSTEM: To run the dynamic content delivery depot as LOCAL_SYSTEM, set the value of the Windows_Run_Service_As_SYSTEM parameter to true in the TCA default.<dcmId> configuration template for the CDS_Depot_Stack. The default value is false. To run the dynamic content delivery depot as LOCAL_SYSTEM: Procedure 1. Click Go To > IT Infrastructure > Software Catalog > Software Stacks. 2. Click CDS_Depot_Stack. 3. Expand Configuration Templates to locate Default Template and click the TCA default..<dcmId> configuration template. 4. In the Template Parameters list, the Windows_Run_Service_As_SYSTEM parameter is sorted onto the next page. Advance the parameter list page by clicking the right arrow in the Template Parameters header bar. 5. Set the value of the Windows_Run_Service_As_SYSTEM parameter to true. The default value is false. Results Setting the value of the Windows_Run_Service_As_SYSTEM parameter to true enables the credentials specified for the local system account to be used instead of the local user credentials.
Preinstallation information
Before installing the common agent using the following methods, review the following information: v Requirements for common agent installation on page 547
541
v Installing the common agent on the provisioning server, where the agent manager is also installed, is not supported. If you want to revert to the previous version of a common agent for compatibility with other products that require the older product level, you must remove the agent and then reinstall it using the installation package included with the other product. Installing the common agent does not affect any other agents that are already installed. v Version 1.4.2.1 of the common agent is installed with the current version of the provisioning server. Note: The common agent installation does not support RSA credentials for Windows target computers. When the network discovery is performed using the RSA credentials, a set of password credentials for SMB must also be used to discover the Windows target computers.
Installation methods
There are two main ways to install the common agent: Using Tivoli Provisioning Manager You can use the Common Agent Installation page to install the common agent on an existing managed system. This option installs the common agent with default options. The following service access points (SAP) are created on the target computer during the common agent installation: v Agent-Server (IPv4 / CommonAgent) v SDI-SAP (IPv4/Scalable Distribution Infrastructure) v RXA-Server (IPv4/RXA) Note: The RXA SAP is created only if you provide credentials and there is no default SAP assigned to the device. The TCA.Create.EO.SAP configuration parameter determines if the SDI SAP is created as part of the agent installation. This parameter is set to true by default. To modify this parameter, go to Provisioning Global Settings->Variables. For more information, see Installing the common agent on managed systems on page 640. Outside of Tivoli Provisioning Manager The common agent can also be installed using an installation image, which provides all the required common agent installers, and their configuration. Restriction: The standalone installation does not support the installation of the dynamic content delivery depot subagent. For more information, see Installing the common agent and subagents using a stand-alone installation on page 641. The default common agent installation path is: v Windows: C:\Program Files\Tivoli\ep v Solaris or Linux: /opt/tivoli/ep v AIX or HP-UX: /usr/tivoli/ep
542
Important: You can specify values for the polling interval in two places, in the software definition, and in the software stack. If you are using the prepareTCAImage script to complete a stand-alone common agent installation, the properties for the polling interval from the software definition are used by default. You can change this behavior by setting the TCA.Standalone.Stack.Name variable and specifying a software stack to use. The prepareTCAImage command searches for a global variable called TCA.Standalone.Stack.Name. If the variable exists and points to an existing stack, it uses the properties from the stack specified in the variable. If the variable does not exist or points to a nonexistent stack, the properties from the software definition are used for the default polling interval. You can change the polling interval in the TCA-Subagent JES configuration template, available in both the Tivoli Common Agent Stack and CDS_Depot_Stack configuration templates. Each stack contains its own unique copy of the PollingInterval template parameter. If a change is required in both places, the procedure must be performed in both stacks. The following procedure describes how to change the polling interval where the properties from the software stack are used to define the polling interval. If you are using the prepareTCAImage script for common agent installations, the following procedure does not change the default polling interval unless you have set the TCA.Standalone.Stack.Name variable and specified the software stack to use for the polling interval. If you are using the properties from the software stack, complete the following steps to change the polling interval:
Procedure
1. Click Go To > IT Infrastructure > Software Catalog > Software Stacks. 2. Find the software stack called Tivoli Common Agent Stack or CDS_Depot_Stack and click it. 3. Under Configuration Templates, expand the TCA-TPM-Base Feature default template. 4. Select TCA-JES Default. 5. Click the icon for the PollingInterval parameter and type the new interval in the Value field. For example, if you want to set it to 10 minutes, enter 00:10.
Results
You are now ready to install the common agent and the depot server. The default polling interval is reset to the specified value.
What to do next
After the polling interval is reset to the specified value, you can install the common agent and the depot server.
543
Before you publish a file, determine which users will download the file and their location on the network. This affects the target lists or regions to which you replicate the file. To minimize network traffic and download time, publish the file to depot servers that are near the users who need the file. Files uploaded to a depot server are stored in a directory that is specified when the depot server is installed. Depot servers can replicate the uploaded files to other depot servers to optimize the efficiency of network traffic. The computers download the published files for installation.
Procedure
1. 2. 3. 4. Click Go To > Deployment > Software Management > Software Product Publishing. Select the Encrypt File check box if you want to enable encryption of the software installable. Click Select Software and select the software modules to be published, then click OK. Click Select Depots and select one or more depot servers for the provisioning task, then click OK. Tip: The default path for publishing can be customized. v The default path is C:\Program Files\Tivoli\ep\runtime\agent\subagents\cds\depot\. v The relative path variable is \data. v The system creates subdirectories \files\1 under C:\Program Files\Tivoli\ep\runtime\agent\ subagents\cds\depot\data\. To publish to a specific subdirectory, for example, abcd, change the relative path. The files will be published at C:\Program Files\Tivoli\ep\runtime\agent\subagents\cds\depot\ abcd\files\1\. 5. Click Schedule to run the task now or to specify the date and time on which the provisioning task is scheduled to start. 6. Under Notification, specify notification settings for the task. 7. Click Submit.
Results
The publishing task is either run immediately or saved and run at the specified time. You can track the provisioning task status on the Provisioning Task Tracking page.
Publishing patches
To publish software patches to depot servers:
Procedure
1. Click Go To > Deployment > Patch Management > Patch Publishing. 2. Click Select Patches to select the patches that you want to publish, then click OK.
Windows To search for a particular patch, enter the patch name in the Patch field, for example KB921823. If multiple software definitions are available for that patch number, for example, Security Update for Windows Server 2003 and Security Update for Windows XP, select all the software definitions that match the patch number, and the provisioning server will publish them to the depots. 3. Click Select Depots and select one or more depot servers for the provisioning task, then click OK.
544
v The default path is C:\Program Files\Tivoli\ep\runtime\agent\subagents\cds\depot\. v The relative path variable is \data. v The system creates subdirectories \files\1 under C:\Program Files\Tivoli\ep\runtime\agent\ subagents\cds\depot\data\. To publish to a specific subdirectory, for example, abcd, change the relative path. The files will be published at C:\Program Files\Tivoli\ep\runtime\agent\subagents\cds\depot\ abcd\files\1\. 4. Click Schedule to run the task now or to specify the date and time on which the provisioning task is scheduled to start. 5. Click Submit.
Results
The publishing task is either run immediately or saved and run at the specified time. You can track the provisioning task status on the Provisioning Task Tracking page.
Procedure
1. Click Go To > Deployment > Software Management > Software Product Unpublishing. 2. Type a relevant name for the provisioning task. You can use this name to view the provisioning task status on the Provisioning Task Tracking page. 3. Under Select Installables, specify the software modules for the provisioning task: a. From Views, select a software view to filter the list of software products. b. The Software Products type is selected by default. The Available Software table lists all available software modules that have at least one installation file. c. Select the software installation files for the provisioning task. The Selected Installables table lists the selected files. 4. Click Schedule to run the task now or to specify the date and time on which the provisioning task is scheduled to start. 5. Click Submit.
Results
The publishing task is either run immediately or saved and run at the specified time. You can track the provisioning task status on the Provisioning Task Tracking page.
Unpublishing patches
To unpublish software patches from depot servers, follow these steps:
Procedure
1. Click Go To > Deployment > Patch Management > Patch Unpublishing.
Chapter 7. Deploying software
545
2. Type a relevant name for the provisioning task. You can use this name to view the provisioning task status on the Provisioning Task Tracking page. 3. Under Select Installables, specify the software patch-installation file pairs for the provisioning task: a. From Views, select a software view to filter the list of software patches. b. The Software Patches type is selected by default. The Available Software table lists all available software patches that have at least one installation file. c. Select the software installation files for the provisioning task. The Selected Installables table lists the installation files selected for the provisioning task. 4. Click Schedule to run the task now or to specify the date and time on which the provisioning task is scheduled to start. 5. Click Submit.
Results
The publishing task is either run immediately or saved and run at the specified time. You can track the provisioning task status on the Provisioning Task Tracking page.
Unpublishing files
Files in a specified file repository, which are not associated with any installables, can also be unpublished from depot servers. To unpublish files from depot servers, follow these steps:
Procedure
1. Click Go To > Deployment > Software Management > File Unpublishing. 2. Click Unpublish > Files. 3. Type a relevant name for the provisioning task. You can use this name to view the provisioning task status on the Provisioning Task Tracking page. 4. Under Select Files, specify the files for the provisioning task: a. Select the file repository for the files to be unpublished. b. Search for and select the files for the provisioning task. The Selected Files table lists the files selected for the provisioning task. 5. Click Schedule to run the task now or to specify the date and time on which the provisioning task is scheduled to start. 6. Click Submit.
Results
The publishing task is either run immediately or saved and run at the specified time. You can track the provisioning task status on the Provisioning Task Tracking page.
Requirements
Before you proceed with the software deployment using the scalable distribution infrastructure, ensure that all software, hardware, and access rights requirements are met.
546
Table 86. User roles for software distribution through the scalable distribution infrastructure Role Provisioning Administrator Description of Role Responsible for: v The management of the provisioning server itself. v Setting up the scalable distribution infrastructure. v Configuring the deployed core components to work with the provisioning server environment. Deployment Specialist Responsible for managing entities in v Intermediate knowledge of the a data center. Uses Tivoli Tivoli Provisioning Manager Provisioning Manager to manage system. these entities and has all the required v Intermediate knowledge of the access permissions to the software distribution process corresponding devices. through the scalable distribution infrastructure. Skills v Advanced knowledge of the Tivoli Provisioning Manager system. v Advanced knowledge of the architecture and functions of the scalable distribution infrastructure.
General requirements
Target computers must already be configured with the software required for administration with the provisioning server. In addition to the requirements in this topic, verify the requirements: v Windows requirements for common agent installation on page 550 v UNIX requirements for common agent installation on page 552 v Linux requirements for common agent installation on page 554
547
Table 87. Footprint requirements on Windows targets Requirement Footprint on Windows targets Details
Windows The amount of disk and memory space required by the common agent and subagents to work correctly on Windows targets is estimated as follows: XP
2003
Windows 2003 Enterprise Edition and Windows 2003 Data Center Edition v Disk: 190 MB v Memory: 50 MB
Vista
2008
Windows Server 2008 Standard Edition and Windows Server 2008 Enterprise v Disk: 270 MB v Memory: 50 MB
Edition
Windows 7
548
Table 88. Footprint requirements on UNIX targets Requirement Footprint on UNIX targets Details
UNIX On UNIX platforms, the disk and memory footprint for the common agent and subagents is estimated as follows: Linux
Red Hat
SUSE
AIX
Solaris
HP UX
Table 89. General footprint requirements Requirement General footprint requirements Details Added to the base footprint specified previously, the following factors can increase the size of the common agent footprint on the target computer: v The signature files and output XML files for Common Inventory Technology (CIT): 20 MB v The log files for the common agent: default 2 MB, configurable. v The cache used for peering (turned on by default): up to 2 GB, configurable. For more information about how to configure the default peering cache, see Configuring the default peering cache on page 655.
549
Table 90. Other general requirements Requirement Credentials Details You can optionally define service access points (SAP) for the Device.ExecuteCommand and Device.CopyFile commands. v If no default service access points (RXA or SSH) are defined, an RXA service access point is created for the target computer when you install the common agent from the Install Common Agent page and specify a user name and a password. v If default service access points are already defined for the Device.ExecuteCommand and Device.CopyFile commands on targets, they are used to install the common agent. If you want to use predefined default SAPs to install the common agent, the operating system of the targets must also be configured. You can run the TCA_Set_Platform_Capabilities provisioning workflow on the targets to add the operating system information. You can create a provisioning workflow task to run the specified provisioning workflow on selected targets. Firewall access rule Host name resolution An access rule must be created on the Access Control List (ACL) for the firewall during or before the installation of the common agent. If host names are used, DNS or hosts files must be configured so that the common agent can resolve the fully qualified domain name of the agent manager server, and the provisioning server can resolve the host names of target computers. The default configuration is communication using host names. You can verify the current configuration by looking at the value of the global variable SDI.Use.Hostname. A value of true means that communication with host names is configured. A value false means that IP address communication is configured. If you want to use host names to resolve to a configured IPv6 address on a target computer, enable IPv6 support for the scalable distribution infrastructure. JRE version Access control Date and time requirements IBM JRE 1.5 is bundled as a private JRE with the agent, and does not interfere with other JREs installed on the same system. To install the common agent, the provisioning administrator role must be assigned to your user account. When the common agent starts for the first time, it connects to the agent manager to register itself. The date and time on the managed system must be set within 24 hours of the date and time on the agent manager server for successful registration. The values are compared in coordinated universal time (UTC), so the systems can be in different time zones.
Windows requirements for common agent installation: Before installing the common agent on Windows, verify the following prerequisites. Windows requirements The following additional requirements apply to Windows target computers. You can use either a local administrator account or a domain administrator account for the agent installation on Windows. Windows Installer Windows Installer Version 2.0 or higher is required to install the common agent. It is included with Windows 2003 Server. If you are installing the agent on a target with a previous version of Windows Installer, you can obtain Version 2.0 from the Microsoft Web site. Internet Connection Firewall (ICF)
550
Windows XP includes a built-in firewall called the Internet Connection Firewall (ICF). By default, ICF is not available on Windows XP systems. Windows XP Service Pack 2 (SP2) comes with the Windows Firewall enabled by default. If either firewall is enabled on a Windows XP target system, it blocks attempted accesses by RXA. On Windows XP SP2, you can select the File and Printer Sharing box in the Exceptions page of the Windows Firewall configuration to enable the access. IBM Tivoli Remote Execution and Access (RXA) prerequisites If RXA is used to communicate with the target computers, the following RXA prerequisites must be met: v Ensure that the service Remote Registry Service is enabled and running, so that the RXA service access point can run commands and scripts. v The default hidden administrative disk shares (such as C$ and D$) are required. v On Windows XP Professional, Simple File Sharing must be disabled for RXA. Simple Networking forces all logins to authenticate as guest. A guest login does not have the authorizations necessary for RXA to work. To disable Simple File Sharing: 1. In a Windows Explorer window, click Tools > Folder Options, and then click the View tab. 2. In the Advanced settings list, clear the Simple File Sharing check box. 3. Click Apply and OK. v On Windows Vista and Windows Server 2008, share must be shared for the Guest or Everyone accounts, and password protected sharing must be disabled. To disable password protected sharing: 1. Click Control Panel > Networking and Internet > Sharing and Discovery. 2. Click the down arrow next to Password protected sharing. 3. Click Turn off password protected sharing. 4. Click Apply, and exit the Control Panel. v On Windows 2003 and XP, both ports 135 (RPC) and 445 (TCP) must be enabled on the target computers, to ensure successful communication using RXA. RXA first tries port 445 and, if 445 is disabled, it uses port 139 (NetBIOS over TCP/IP). v Additionally, on Windows Vista and Windows Server 2008, you might need to modify the registry entry to disable User Account Control when you administer a workstation with a local user account (Security Account Manager user account). Otherwise, you will not connect as a full administrator and will not be able to perform administrative tasks. To disable User Account Control, perform the following steps: 1. Click Start. 2. Click Run and type regedit. Press Enter. 3. In the left pane, browse to the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ Policies\system\ folder. 4. Right-click a blank area in the right pane. 5. Click New. 6. 7. 8. 9. 10. 11. Click DWORD Value. Type LocalAccountTokenFilterPolicy. Double-click the item that you created. Type 1 in the box. Click OK. Restart your computer.
551
Alternatively, you can modify the registry entry manually by typing the following command line: cmd /c reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\ system /v LocalAccountTokenFilterPolicy /t REG_DWORD /d 1 /f v Review the local security policies on the computer. Check for any policies that are blocking required ports and modify them so that traffic is allowed on those ports. 1. Open the Windows Control Panel and double-click Administrative Tools. 2. Double-click Local Security Policy. 3. Click IP Security Policies on Local Computer. If Microsoft Active Directory is installed, click IP Security Policies on Active Directory. 4. Click Actions > Manage IP filter lists and filter actions. 5. Check each filter for the required ports. 6. If required ports are defined with a filter, review each of the defined IP security policies and ensure that none of the policies are configured to block traffic on the required ports. RXA uses an internal run timeout value for internal commands during connection attempts and most remote communications. v For UNIX targets, the default value is set to five seconds. v For Windows targets, the default value is set to zero, which is an infinite timeout. In most cases, the default settings must not be changed. However, if the default timeout for your UNIX targets needs to be increased or set to zero, you can set it at system level, by completing the following steps: 1. Click Go To > Administration > Provisioning > Provisioning Global Settings. 2. 3. 4. 5. Click the Variables tab. Click New Row. Add a variable named rxa.internalruntimeout and set the required value in milliseconds. Create the same variable for the target computer's RXA SAP.
The RXA SSH service access point (SAP) is used during the RXA SSH discovery. UNIX requirements for common agent installation: Before installing the common agent on UNIX, verify the following prerequisites. The following additional requirements apply to UNIX target computers. The Java XMLEncoder/Decoder classes depend on libawt. Your operating system environment might not have the particular package that includes all of the libraries needed by libawt. Install the missing required packages, if any.
552
Details v On many UNIX systems, the response to the su (switch user) command includes a standard message of the day. Because the provisioning server cannot distinguish the message of the day from the command prompt, the message of the day can cause an error when you install the common agent from the Install Common Agent page. To address this problem, create a $HOME/.hushlogin file with a length of 0 bytes in the directory for the user associated with the Common Agent service access point. You can create this file by running the command touch .hushlogin in the appropriate user directory. On HP-UX, adding the .hushlogin file does not prevent the message of the day from interfering with the common agent upgrade. Instead, perform the following operations: 1. Remove /etc/motd if it exists, or comment out the motd line in the global profile /etc/profile 2. Comment out the copyright line in the global profile/etc/profile 3. Edit the .profile file for root. Remove all lines but leave any lines with path information. For example, PATH=/usr/sbin:$PATH:/sbin:/home/root. v You can install the common agent on UNIX target computers using a non-root user. Perform the following steps: 1. Manually create a non-root user account on the target computer with system administrator privileges. 2. Discover the target computer using SSH using the account information of the non-root user, or manually add it to the data model. If the computer is manually added, use the TCA_Manage_Platform_Capabilities.wkf provisioning workflow to populate the discovery information. Use the following parameters in the provisioning workflow: DeviceID Target computer ID osFamily One of the following values: Linux, AIX, HP, Windows architecture One of the following values: s390, powerpc, intel 3. Follow the instructions in Installing the common agent on page 570 for -su and -sudo installations. 4. You can now install the common agent using a non-root user. No further credentials are required when you run the common agent installation. Note: A root password is required to install and run the agent. Non-root installation is not supported and is not recommended. If required you can use the workflows to provide a non-root account with which to log into the target for audit/tracking purposes.
AIX
v On AIX 5.2 target computers, the runtime code, which is a prerequisite of GSKit7, is required. The xlC.rte 6.0 runtime code can be downloaded as a fix from the AIX Web site at http://www-933.ibm.com/support/fixcentral/. v The minimum AIX version to run Java5 is AIX 5.2 ML7 or above (IBM System p 64-bit) 32-bit emulation and AIX 5.3 with ML3. v On AIX target computers, install the X11 file sets. Specifically, install X11.base.rte to obtain file libgair4.a. This file is a prerequisite for the Java XML Encoder/Decoder classes.
553
Details v The OS Patch-ID# 112438-03 patch is required. v You might get the following error message if the patch is not installed. COPCOM123E A shell command error occurred: Exit code=137, Error stream=" ld.so.1: tar: fatal: libc.so.1: version `SUNW_1.22 not found (required by file tar) Killed ", Output stream="".
HP UX
v The PHCO_34275 HP-UX cumulative patch is required. Obtain the patch from the HP Support Web site, at http://www2.itrc.hp.com/service/home/home.do. v For HP-UX Itanium, the image file required for the common agent installation is provided separately, on Disk 6 (TPM_TIO_V71_Disk3_unix.tar.gz). Before attempting to install the common agent on this platform, manually copy the common_agent_1.4.1.0_hpux_IA64_full_200711070832.tar file from Disk 6 to the $TIO_HOME/repository folder. v Ensure that the kernel parameter max_thread_proc is set to at least 128. The default value is 64.
Linux requirements for common agent installation: Before installing the common agent on Linux, verify the following prerequisites. The following additional requirements apply to Linux target computers. The Java XMLEncoder/Decoder classes depend on libawt. Your operating system environment might not have the particular package that includes all of the libraries needed by libawt. Install the missing required packages, if any.
554
Details v On RHEL target computers, the 32-bit versions of all the required compatibility packages must be installed, in the specified order. All Red Hat Enterprise Linux 4.0 operating systems compat-libstdc++-33-3.2.3-47.3.i386.rpm xorg-x11-deprecated-libs-6.8.1-23.EL.i386.rpm Red Hat Enterprise Linux 4.0 64-bit operating systems On Red Hat Enterprise Linux 4.0 64-bit operating systems, the following 32-bit compatibility packages are required: libgcc-3.4.3-9 compat-libstdc++-33 v On RHEL and SUSE Linux Enterprise Server target computers, verify that you can run the ping localhost command successfully. If you receive an error, there might be a problem with the format of your hosts file. The file must include: The IP address, fully qualified domain name, and host name of the computer where you are running the installer as the first entry The IP address 127.0.0.1, the fully qualified domain name localhost.localdomain, and the host name localhost The following example shows settings for a computer with the host name river: #IP address 10.0.0.12 127.0.0.1 Fully Qualified Domain Name river.example.com localhost.localdomain Short Name river localhost
Note: Linux installations differentiate between the IP address for the localhost host name and the actual host name of the computer. Ensure that your /etc/hosts file includes the static IP address for both localhost and the actual host name of the computer. v On RHEL, version 6 and 5 target computers, the following compatibility packs are required: libgcc compat-libstdc++-33 libXtst-1.0.1-3.1.i386.rpm libXt-1.0.2-3.1.fc6.i386.rpm libXp-1.0.0-8.1.el5.i386.rpm libXmu-1.0.2-5.i386.rpm libXext-1.0.1-2.1.i386.rpm libSM-1.0.1-3.1.i386.rpm libICE-1.0.1-2.1.i386.rpm v On RHEL, (x86 32 and 64-bit) version 6 and 5 target computers, ensure that enhanced security is disabled and there is no firewall. To install the common agent: 1. Run the getenforce command to determine if a firewall is enabled. 2. Run the setenforce 0 command to disable it. 3. Install the common agent. 4. Run he setenforce 1 command to re-enable it. 5. Ensure no other firewall is enabled.
555
Table 92. Linux requirements (continued) Requirement Details You can install the common agent on Linux target computers using a non-root user. Perform the following steps: 1. Manually create a non-root user account on the target computer with system administrator privileges. 2. Discover the target computer using SSH using the account information of the non-root user, or manually add it to the data model. If the computer is manually added, use the TCA_Manage_Platform_Capabilities.wkf provisioning workflow to populate the discovery information. Use the following parameters in the provisioning workflow: DeviceID Target computer ID osFamily One of the following values: Linux, AIX, HP, Windows architecture One of the following values: s390, powerpc, intel 3. Follow the instructions in Installing the common agent on page 570 for -su and -sudo installations. 4. You can now install the common agent using a non-root user. No further credentials are required when you run the common agent installation. Note: A root password is required to install and run the agent. Non-root installation is not supported and is not recommended. If required you can use the workflows to provide a non-root account with which to log into the target for audit/tracking purposes.
556
v Additionally, on Windows Vista and Windows Server 2008, you might need to modify the registry entry: 1. Click Start. 2. Type regedit, and press Enter. 3. In the left pane, browse to the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ Policies\system\ folder. 4. Right-click a blank area in the right pane. 5. Click New. 6. Click DWORD Value. 7. Type LocalAccountTokenFilterPolicy. 8. Double-click the item that you created. 9. Type 1 in the box. 10. Click OK. 11. Restart your computer. v If Windows Scripting Host (WSH) or the WMI service is disabled on the target, or if VBScript is otherwise disabled, some Windows Protocol methods do not work. For all Windows target computers, after you meet all requirements, ensure that the Remote Registry Service is enabled and started. The default startup type for the Remote Registry service is manual. The Remote Registry service must be running to enable RXA. To check if the Remote Registry service is enabled and started, perform the following steps: 1. In the Start search box, enter services.msc and press ENTER. 2. In the console pane of the Microsoft Management Console, ensure that the service status is started. If not, right-click Remote Registryand click Start. To avoid problems with the manual startup, set the Remote Registry service startup type to automatic. If you want to automatically start the service after the server boot, perform the following steps: 1. Right-click Remote Registry and select Properties. 2. In the Startup type option, choose Automatic. 3. Click Apply and OK. When the system starts, Remote Registry starts automatically.
557
v You can use either a local administrator account or a domain administrator account for the agent installation on Windows. On Windows Server 2008 you might need to disable User Account Control. See the section on Windows Vista to learn how to disable User Account Control. v On Windows Server 2008 disk shares must be shared for the Guest or Everyone accounts, and password protected sharing must be disabled. To disable password protected sharing on Windows Server 2008, perform the following steps: 1. Click Control Panel and select Network and Sharing Center. 2. Click Advanced Sharing Settings. 3. Click Turn off password protected sharing. 4. Click Save Changes.
558
2. Type regedit, 3. Press ENTER. 4. Locate and then click the following registry subkey:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\ CurrentVersion\Policies\System
5. If the LocalAccountTokenFilterPolicy registry entry does not exist, follow these steps: a. On the Edit menu, click New ->DWORD Value. b. Type LocalAccountTokenFilterPolicy, and then press ENTER. c. Right-click LocalAccountTokenFilterPolicy, and then click Modify. d. In the Value data box, type 1, and click OK. e. Restart your computer. 6. Alternatively, you can modify the registry entry manually by using the following command line:
cmd /c reg add HKLM\SOFTWARE\Microsoft\Windows \CurrentVersion\Policies\ system /v LocalAccountTokenFilterPolicy /t REG_DWORD /d 1 /f
The RXA SSH service access point (SAP) is used during the RXA SSH discovery.
Protocols
IPv4 is the protocol supported by the provisioning server.
559
If you do not plan to install the common agent on the target computers, consider configuring OpenSSH and OpenSSL to secure communication between the provisioning server and the targets. Note: If you are using OpenSSH: v Use version 4.4 or higher. Version 4.3 has a known issue that can cause Expect scripts that the provisioning server runs on target computers to fail. v Ensure that you use password authentication to secure communication between the provisioning server and the targets. For more information, see Requirements for common agent installation on page 547.
560
Table 93. Requirements for Red Hat Linux (continued) Requirement Compatibility packages Details On all supported Red Hat Enterprise Linux 4.0 operating systems, the 32-bit versions of all the required compatibility packages must be installed in the specified order: All Red Hat Enterprise Linux 4.0 operating systems compat-libstdc++-33-3.2.3-47.3.i386.rpm xorg-x11-deprecated-libs-6.8.1-23.EL.i386.rpm Red Hat Enterprise Linux 4.0 64-bit operating systems libgcc-3.4.3-9 compat-libstdc++-33 Compatibility packages are required on Red Hat Enterprise Linux 6 and 5 for installing the common agent. For more information, see Requirements for common agent installation on page 547. Package locations The location of the shells or script interpreters is also important because scripts that are run must include this information about the first line of the script. Ensure that the packages are installed in the following locations: v Bash locations: /bin/bash v Expect Locations: /usr/bin/expect v Perl : /usr/bin/perl v Python: /usr/bin/python Note: The Expect installation is only required to be installed on a target computer if a certain provisioning automation package workflow runs expect code on the target computer itself. This installation is optional depending on the requirements. TCP port Ensure that TCP port 9510 is open on the target computers.
561
Table 94. Requirements for SUSE Linux Enterprise Server (SLES) (continued) Requirement Packages and locations Details v perl 5.8 v expect 5.34 v bash 2.05 The location of the shells or script interpreters is also important because scripts that are run must include this information about the first line of the script. Ensure that the packages are installed in the following locations: v Bash locations: /bin/bash v Expect Locations: /usr/bin/expect v Perl : /usr/bin/perl Note: The Expect installation is only required to be installed on a target computer if a certain provisioning automation package workflow runs expect code on the target computer itself. This installation is optional depending on the requirements. TCP port Ensure that TCP port 9510 is open on the target computers.
562
Table 95. Requirements for AIX (continued) Requirement Package locations Details The location of the shells or script interpreters is important because scripts that are run must include this information about the first line of the script. Ensure that the packages are installed in the following locations. v Bash location: /usr/bin/bash v Expect location: /usr/bin/expect v Perl location: /usr/bin/perl Note: Expect is only required to be installed on a target computer if a certain automation package runs expect code on the target computer itself. This installation is optional depending on the requirements. The runtime code, which is a The xlC.rte 6.0 runtime code can be downloaded as a fix from the AIX Support site prerequisite of GSKit7 on at: https://techsupport.services.ibm.com/server/aix.fdc. AIX 5.2.
For additional prerequisites for the common agent installation, see Requirements for common agent installation on page 547.
Table 96. Requirements for Solaris Requirement Command prompt Details When running scriptlets, the provisioning server expects that the command prompt ends in $, #, or >. The PS1 environment variable governs the appearance of the prompt. If you change this variable on your target computer (managed-to) or provisioning server (managed-from), you might run into problems running provisioning workflows. The following examples show command prompts you can use: command$ $ command# # command> >
563
Table 96. Requirements for Solaris (continued) Requirement Required packages Details Solaris 8 v SUNWlibc v SUNWxcu4 Solaris 9 v bash-2.05 v perl-5.8.4 v OpenSSL v openssh 4.4 or higher v zlib v wget-1.9.1 v libgcc-3.3 v expect-5.40 v gzip-1.3[1] v tcl-8.4.6-sol9 v tk-8.4.6-sol9 v SUNWxcu4 Solaris 10 v bash-3.2 (default shell) v openssl v opensshopenssh 4.4 or higher v wget-1.10.2 v expect-5.43.0 v gzip-1.3.5.10 v tcl-8.4.9 v tk-8.4.9 v SUNWmfrun v SUNWbrg v SUNWbrgr v SUNWzoner v SUNWzoneu v SUNWxcu4 v SUNWxwdv v SUNWxwice v SUNWxwfnt v SUNWxwrtl v SUNWxwplr v SUNWxwplt v SUNWctpls v SUNWj5rt v SUNWpool v SUNWpoolr
564
Table 96. Requirements for Solaris (continued) Requirement SUNWxcu4 package Details Note: To install the Solaris SUNWxcu4 package needed for Tivoli Common Agent: 1. Copy the "SUNWxcu4" package from Solaris install media and put it under /tmp 2. cd /tmp 3. pkgadd -d <package> 4. edit /etc/profile with the following lines PATH=/usr/xpg4/bin:/usr/ local/bin:/usr/sbin:/usr/binexport PATH Package locations The location of the shells or script interpreters is also important because scripts that are run must include this information about the first line of the script. Ensure that the packages are installed in the following locations: v Bash locations: /bin/bash v Expect Locations: /usr/bin/expect Note: The Expect install is only required to be installed on a target computer if a certain provisioning automation package workflow executes expect code on the target computer itself. This install is optional depending on the requirements. Patch required for common agent installation On Solaris target computers, the OS Patch-ID# 112438-03 patch is required for the successful installation of the common agent.
565
Table 97. Requirements for HP-UX (continued) Requirement Required packages Details HP-UX 11i v bash-3.2 bash requires the following packages: libiconv termcap gettext v expect-5.43.0 v openssl v openssh 4.4 or higher v zlib v libgcc-3.3 v gzip-1.3.5.10 v perl-5.8.7 v wget-1.10.2 Package locations The location of the shells or script interpreters is also important because scripts that are run must include this information about the first line of the script. Ensure that the packages are installed in the following locations: v Bash: /bin/bash v Expect: /usr/bin/expect v Perl: /usr/bin/perl v Sh: /usr/bin/sh Note: The Expect installation is only required to be installed on a target computer if a certain provisioning automation package workflow runs expect code on the target computer itself. This installation is optional depending on the requirements. Patch required for the common agent installation On HP-UX target computers, the PHCO_34275 HP-UX cumulative patch is required for the successful installation of the common agent. You can obtain the patch from the HP Support Web site, at http://www2.itrc.hp.com/ service/home/home.do.
566
Learning objectives
In this tutorial you will: v Learn how to discover computers. v Learn how to create a provisioning group. v Learn how to install the common agent on the target computers in the provisioning group, and how to configure them. v v v v v v Learn Learn Learn Learn Learn Learn how how how how how how to to to to to to define regions, zones, and depot servers for the scalable software distribution. set up and run a Tivoli Provisioning Manager inventory scan. run the common agent discovery and health status report. save software package blocks to the Tivoli Provisioning Manager local file repository. create and correlate a software signature with a software module. publish, distribute, and install a software package block on a group of computers.
v Learn how to validate the software installation. v Learn how to run software inventory reports to verify the successful software installation. Allow 90 minutes to discover your target computers, set up the infrastructure, configure the targets, and publish, distribute, and install the software on them.
Prerequisites
Ensure that you meet all requirements described in Requirements on page 546. The following additional requirements apply to this scenario: Before you start, you need the following: v A provisioning server. v One Windows depot server. v One or more Windows target computers to install software on.
567
Restriction: The depot server and the target computer must not be the same.
Part 1: Discovery
Discovery provides a way to find out or discover new devices. The discovered devices are added to the Tivoli Provisioning Manager data model. The data model is a centralized repository, which contains all the physical and logical assets that Tivoli Provisioning Manager can manage.
2. 3. 4. 5.
Tip: You can also specify subnetworks that you want to discover. If, for example, all the target computers that you want to discover are in a LAN, click the Subnetworks tab and specify the IP address and mask for the LAN. After specifying each subnetwork, click New Row. 6. Click the Credentials tab. 7. Click New Row. 8. Type the user ID and password. After each set of credentials, click New Row. If you specify more than one set of credentials, they will be attempted on each target computer in the order that they are listed. If the logon attempt on a target computer is successful, the computer is added to the data model. Notes: v The system will attempt to connect to each IP address using each user name and password provided until it finds a user name and password that can be used to connect successfully. This might cause user accounts to be locked out, depending on the security policy enforced on the target computers. v You might need to increase the default timeout value if you are on a slower network or you are attempting to discover slower computers. 9. 10. 11. 12. . Click Save Click Run Discovery. Type a name for the discovery task and click Submit. On the Provisioning Task Tracking page, click Refresh to update the task status until the task is completed.
IBM Tivoli Provisioning Manager Version 7.2.0.2 User Guide
568
You have created a discovery configuration and run it to discover your targets. These target computers are now part of the data model.
6. Click Save
The provisioning group is created and listed on the Provisioning Groups page. You are ready to define the global configuration settings for the common agent installation.
569
Configuring the common agent installation options is required only once, and is done at the software configuration template level. Installation options such as such as the JES polling interval, the dynamic content delivery peering, or the maximum dynamic content delivery cache size can be configured. Defining the global agent configuration can include: v Changing the common agent default port number on page 651 v Overriding the default common agent installation path on page 653 v Changing the default polling interval on page 542 v Configuring the default peering cache on page 655
Enabling su to obtain root permissions for the installation 1. Manually create a non-root user account on the target computer with system administrator privileges. 2. Manually set the umask value to 002 for the root user on the target computer. To do so, make the following changes:
Table 98. Umask updates required Shell used by root Korn Bash AIX Required setting In the home folder for root, add umask 002 to the .profile file. In the home folder for root, add umask 002 to the .bash_profile and .bashrc files. In the file /etc/security/user, change the umask setting for root to 002.
If a umask setting already exists, change the value to 002. You can return the setting to its original value after installation. 3. Run the TCA_Manage_No_root_SSH_SAP workflow to populate the root password in the credentials of the target SAP. Use the following parameters in the TCA_Manage_No_root_SSH_SAP workflow:
Table 99. Parameters Parameter DeviceID userName userPassword rootPassword Description The target computer ID. The non-root username you created in step 1. The non-root user password you created in step 1. The root account password. If the su - command does not require a password, enter unspecified for the rootPassword parameter. If no SAP is present, one is created with the non-root user and password that you provide.
Enabling sudo to obtain root permissions for installation 1. Manually create a non-root user account on the target computer with system administrator privileges.
570
2. Configure the /etc/sudoers file on the target computers to allow the non-root user to run the following commands as root:
df test -d * rm -rf /tmp/tcatemp rm -rf ep* /tmp/tcatemp/tcainstall.sh /tmp/tcatemp/setup.* [UNIX/Linux] /opt/tivoli/ep/_uninst/uninstall [AIX] /usr/tivoli/ep/_uninst/uninstall
Note: The commands or scripts in the list above must be configured in the /etc/sudoers file with full path information. Only those provided by Tivoli Provisioning Manager include the full path information. The full path to the remaining entries is not included because it varies from one UNIX distribution to the next. Provide this information for your particular system when you configure them in your /etc/sudoers file. For Linux operating systems, comment out or delete the line containing Defaults requiretty:
#Defaults requiretty
3. Sudo must be configured to either prompt for the password of the current user, or not require a password. If it prompts for a password using a non-default password prompt, see Enabling custom password prompts using sudo. 4. You can change the Install_Using_Sudo parameter in the TCA default configuration template, available in both the Tivoli Common Agent Stack and the CDS_Depot_Stack configuration templates. Each stack contains its own unique copy of the Install_Using_Sudo template parameter. If a change is required in both places, perform the procedure in both stacks. Use the following parameters in the TCA_Manage_No_root_SSH_SAP workflowTo use sudo for the current task only, perform step 5 on page 572 in the following procedure. Otherwise, to use sudo for all common agent installation tasks, perform the following procedure: a. Click Go To > IT Infrastructure > Software Catalog > Software Stacks. b. Click Tivoli Common Agent Stack or CDS_Depot_Stack. c. Under Configuration Templates, click TCA default. <number>. d. Under Template Parameters, click the Install_Using_Sudo parameter icon. e. Set the Parameter Value to true. f. Click Save. The following is a sample of the /etc/sudoers file, where the non-root user is peter and the hostname of the target computer where the TCA is to be installed is nc117093:
# sudoers file. # # This file MUST be edited with the visudo command as root. # Failure to use visudo may result in syntax or file permission errors # that prevent sudo from running. # # See the sudoers man page for the details on how to write a sudoers file. # # Host alias specification Cmnd_Alias INSTALL_TPM_AGENT=/usr/bin/df,/usr/ bin/test -d *,/bin/rm -rf /tmp/tcatemp,/bin/rm -rf ep*,/tmp/tcatemp/tcainstall. sh,/tmp/tcatemp/setup.*,/usr/tivoli/ep/_ uninst/uninstall,/usr/bin/s cp # User alias specification # Cmnd alias specification # Defaults specification # Runas alias specification # User privilege specification root ALL=(ALL) ALL peter nc117093=(root) NOPASSWD: INSTALL_TPM_AGENT # Uncomment to allow people in group wheel to run all commands # %wheel ALL=(ALL) ALL # Same thing without a password
Chapter 7. Deploying software
571
# # # #
%wheel ALL=(ALL) NOPASSWD: ALL Samples %users ALL=/sbin/mount /cdrom,/sbin/umount /cdrom %users localhost=/sbin/shutdown -h now
The common agent can be installed one time on each target computer. After the common agent is installed on a target computer, subsequent subagents can be deployed on the existing common agent. To install the common agent on all the target computers in your provisioning group: 1. Click Go To > Deployment > Software Management > Common Agent Installation. 2. Under Common Agent Stacks, select the common agent software stack to install on the target computers. The default software stack is Tivoli Common Agent Stack. 3. Click Select > Groups and select the provisioning group that you want to work with, for example, Test group, then click OK. 4. Clear the Create Credentials check box. No credentials are required, as they were added to your target computers during discovery. 5. If you are using sudo to install the common agent with a non-root user: a. Click the Advanced tab. b. Under Configuration Templates, click TCA default. <number>.
UNIX
c. Under Template Parameters, click the Install_Using_Sudo parameter icon. d. Set the Parameter Value to true. 6. Click Schedule to specify the date and time when you want the task to start. 7. Click Submit. When you submit the task, the Provisioning Task Tracking page is displayed. You can click the task name to see details about its status and monitor its progress until the task has completed. Click Refresh to see an update on its status. You have installed the common agent on all the computers in your provisioning group. Tip: To view the status of agent installations from the Start Center, expand the Agents status portlet. You are ready to configure the target computers for software distribution using the scalable distribution infrastructure.
Part 2: Configuration
The configuration tasks ensure that the infrastructure for a scalable distribution infrastructure exists and all of the target computers are properly configured to use this infrastructure. Inventory and common agent discovery scans determine what hardware and software is installed on the target computers, and provide agent status information that enables you to evaluate the health status of the common agent on the target computers.
572
1. 2. 3. 4.
Click Go To > Administration > Provisioning > Dynamic Content Delivery Configuration. Click the Regions tab. Click New Row. Type a name and a description for the new region. .
5. Click Save
The newly created region is now listed on the Regions page. After you have defined the region, you can add the depot server that will be used for software distribution. Adding a depot server: A depot server is a system that stores files for distribution. Distribution files are uploaded to a depot server using a client. Depot servers can replicate uploaded files to other depot servers to optimize the efficiency of network traffic. The target computers download the files from the depot server. To add a new depot server: 1. Click Go To > Administration > Provisioning > Dynamic Content Delivery Configuration. 2. Click the Depots tab. 3. Click New Row. 4. Type a name for the depot server. 5. In the Region field, select the region that you have just created. This is region the new depot server will be assigned to. 6. In the Computer field, search for and select the name of the target computer that you want to configure as a depot server. The depot server must not be included in your group. 7. In the IP Address field, specify the IP address of the depot server. 8. In the Fully qualified host name field, type the fully qualified domain name of the depot server that has already been discovered using the SMB discovery. 9. Select the Install the depot agent services check box and specify the credentials to install the depot agent services. If you do not select this option, the depot is only added to the data model. 10. Select the Preferred upload server check box. If using multiple depot server, at least one depot must be selected as a preferred upload server. 11. Leave all of the other default options unchanged. 12. Click Save .
The depot is added. If you selected the Install the depot agent services check box, a task for adding the new depot server is created. You can click the task name to see details about its status and monitor its progress until the task has completed. Click Refresh to see an update on its status. The newly added depot server with the specified properties is now listed on the Depots tab. Creating a zone: Use a zone to logically group systems within regions by defining an IP range or domain name. A region is generic if no zones are defined for it, or specific if zones are used to define domain names within it. To create a zone: 1. Click Go To > Administration > Provisioning > Dynamic Content Delivery Configuration. 2. Click the Zones tab.
Chapter 7. Deploying software
573
3. 4. 5. 6.
Click New Row. Type a name and a description for the new zone. In the Regions field, select the region that you have just created for the zone. Select Domain Name, and then specify the domain that your depot server and target computers are in. 7. Leave all of the other default options unchanged. 8. Click Save .
The newly created zone is now listed on the Zones tab. You are now ready to run a Tivoli Provisioning Manager inventory scan on the target computers to find out what hardware and software is already installed on them.
574
4. Click Submit. 5. On the Provisioning Task Tracking page, click Refresh to update the task status until the task is completed. The discovery task is displayed with a status of Success on the Provisioning Task Tracking page. Running the common agent health status report: You can run a health status report, to display the common agent status information generated during the common agent discovery scan. Tip: To view agent status information from the Start Center, expand the Agents status portlet. To generate a common agent health status report: 1. Click Go To > Administration > Reporting > Report Administration. 2. Find the report with the file name tp_endpoints.rptdesign and click its name. 3. Click Generate Request Page. 4. After the report is generated, click Close. The report lists agent status parameters such as the status, last contact time, last boot time, agent start time, last attempt time, last error message for each of the target computers, which allows you to assess the current health status of the common agent installed on the target computers. Note: Currently, only the following columns in the report are populated with data: Computer ID, Computer Name, Agent Name, Description, and Agent Check-In Time. 5. Click Preview and in the window that is displayed click Submit. The following Agent states and explanations are shown in the report: 1. Running: The Agent is running. 2. Stopped: The Agent has been stopped. 3. Uninstalled: The agent was installed on the system and it has been uninstalled outside of Tivoli Provisioning Manager. 4. Offline: The Agent is offline. Next, you will open an existing software package block (SPB) in Software Package Editor, and then save it to the Tivoli Provisioning Manager local file repository. This will create the software module that is required for the software distribution. You will also create a software signature for the software module, so that the software module can be discovered using a Tivoli Provisioning Manager inventory scan.
575
Package Editor, and then save it to the Tivoli Provisioning Manager local file repository. Before opening the software package block for the first time, ensure you configured the Software Package Editor. Then, you can create a software signature for the software module associated with the software package block. To speed up the download and software distribution, you can publish the software to a depot server before distributing and installing it on the target computers. You can perform the software publication, distribution, and installation using any one of the following methods: v For flexibility, you can perform separate tasks for software publication, distribution, and installation: 1. Create and run a software publication task first, which uploads the software to a depot server. 2. Create and run a software distribution task, which distributes the software to the target computers in your group. 3. Create and run a software installation task, which installs the already distributed software on the target computers. v If you have not published and distributed the software yet, you can directly start with the installation task that will perform all of these operations seamlessly. If the software has not been published and distributed, the installation task will perform a software publication to the depot server first, followed by a software distribution to selected target computers, and then a software installation on the target computers.
576
To be able to publish the software package block to the depot server and then distribute it to the target computers, you must ensure that a software module exists for the software package block. A correlation between a software signature and this software module can be created, and will be used to discover the software module with a Tivoli Provisioning Manager inventory scan using software signatures. To test a software package block deployment on a Windows target computer, you can use the sample software package block, testwinspb.spb, available in TIO_HOME\repository\SWDiscCli. If the deployment is successful, a file test.txt will be created in a test directory on the target computer under $(temp_dir). To save the software package block to the local file repository: 1. Click Go To > IT Infrastructure > Software Catalog > Software Products. 2. 3. 4. 5. From the Select Action menu, click Start SPE. On the Software Package Editor window, click File > Open > Open from local file system. Browse to the TPM51_OS_Management_Viewlet.spb file on your local system, and then click Open. Click File > Save > Save to repository, and then select Local File Repository. Note: A warning message is displayed saying that the software package block is not editable. If you want to edit the software package block, save it as a software package definition (.spd) file, open the .spd file and edit it as required, and then save it as a software package block (.spb) file to the local file repository. When the software package block is saved to the Tivoli Provisioning Manager local file repository, a software module and installable file for it are automatically created. The software package block can be saved to any custom file repository as well. Next, you will create the software signature to be associated with the software module.
7. In the Associated Software Definition field, click Detail Menu that you have imported previously. 8. Click Save .
The software signature that you have created is now associated with the software module. You can now manage the software package block, because its signature is associated with the software module.
577
You are now ready to publish the software package block to the depot server and then distribute it and install it on the target computers. Note: If you import software package blocks containing an inventory signature or a software signature stanza with the user interface, add the signature files manually. To add the signature files automatically, the software package block must be saved to the repository with the Software Package Editor.
Note: If you encounter an error message COPDEX040E when publishing a software package, go to http://www.ibm.com/developerworks/forums/thread.jspa?threadID=191892&tstart=30 to find information to help you troubleshoot the problem. Next, you will distribute the published software package blocks to the target computers in your group.
578
4. Click Schedule and specify if you want to run the software distribution task immediately, or schedule it to run at a specified date and time. 5. Under Notification, select the appropriate notification options. 6. Click Submit. When you submit the task, the Provisioning Task Tracking page is displayed. You can click the task name to see details about its status and monitor its progress until the task has completed. Click Refresh to see an update on its status. The software package block is now distributed to the target computers. You can install it on all of the target computers in your group.
579
Note: While running a software installation or upgrade task, there are workflow parameters which list the priority of the task only when user changes it before running the task. When priority is not listed in the workflow parameters, the task runs with the priority that is defined in the global variable. 5. Under Notification, select the appropriate notification options. 6. Click Submit.. When you submit the task, the Provisioning Task Tracking page is displayed. You can click the task name to see details about its status and monitor its progress until the task has completed. Click Refresh to see an update on its status. The software package block is now installed on all of the target computers in your group. To verify that the software package block is upgraded, click Go To > Deployment > Provisioning Computers. Find one of the target computers in your group and click the computer name. Click the Software tab. The software module that you have created is listed as installed software.
Setting a time out value for installing software package blocks in a DE infrastructure
You can set a specific time out value for installing software package block (SPB) files on target computers using the Deployment Engine (DE) infrastructure, because the default time out value might not be sufficient for transferring SPB files larger than 4 GB. Specify an appropriate time out value for installing software package block (SPB) files on target computers by setting a parameter in the Software Definition page of the SPB file you want to install using the Deployment Engine (DE) infrastructure. The default value of the time out parameter is 600 seconds. If you do not set a specific time out value, the default value is used during the software package block installation workflow. To set a specific time out value, perform these steps:
Procedure
1. Click Go To > IT Infrastructure > Software Catalog > Software Products. 2. Select the software product you want to install from the list. 3. In the Software Definition page, in the Template Parameters section of the page, identify the SPB_DE_COPY_TIMEOUT_SEC parameter. 4. Specify a value for this parameter depending on the size of your SPB files. The value must be specified in seconds. 5. Click Save .
Results
When you install this software product on the target computers using a DE infrastructure, the installation workflow will use the time out value you specified for the SPB_DE_COPY_TIMEOUT_SEC parameter.
580
2. Find one of the target computers in your group and click its name. 3. Click the Software tab. 4. Under Software Installations, find the software that you have just installed and, in that row, click Mark Row for Delete . 5. Click Go To > Discovery > Provisioning Discovery > Discovery Configurations. 6. Find the Tivoli Provisioning Manager Inventory Discovery configuration and click its name. 7. Click Run Discovery. 8. Click Select > Computers, and select the name of the target computer from which you have just deleted the software installation, then click OK. 9. Click Schedule and select Run Now to run the discovery task immediately, or schedule it to run at a specified date and time. 10. Under Notification, select the appropriate notification options. 11. Click Submit. 12. On the Provisioning Task Tracking page, click Refresh to monitor the discovery task until it is completed. 13. Go to the Software tab of the target computer for which you have deleted the software installation. The Tivoli Provisioning Manager inventory scan detected that the SPB is still installed on the target computer, and put the software installation back on the Software Installations list. The name of the restored software installation is the name of the software signature that you have previously created for the SPB. You have validated the software installation on the selected target computer. Next, you can run an inventory report to display the software installed on each of the target computers.
5. Click Preview and in the window that is displayed click Submit. The report lists all the computers and all the software installed on each computer. The software package block is displayed in the installed software list for each target computer. Currently, all the target computers in your group have the software package block installed.
581
3. Under Selected Depots table, select the depot that you want to remove from the depot server. 4. Under Schedule, click Run Now to run the task immediately, or schedule it to run at a specified date and time. Select the appropriate notification options. 5. Click Submit. When you submit the task, the Provisioning Task Tracking page is displayed. You can click the task name to see details about its status and monitor its progress until the task has completed. Click Refresh to see an update on its status. The software package block is now unpublished from the depot server. Next, you will uninstall the common agent from all of the target computers.
582
Restriction: Distribution of software packages performed as a separate provisioning task is not recommended. Unlike software package blocks, install and distribute software packages in one step. If you want to distribute and install software in two separate provisioning tasks, use software package blocks rather than software packages. You can perform distribution and installation provisioning tasks immediately or schedule them for a specific date and time. if a configuration template is associated with the software, you can also select and customize it so that the software is configured correctly for the target environment. The default time frame for a successful file distribution to target computers is set to two hours. A file distribution that has not successfully completed within two hours can be considered failed. If required, you can customize this interval to accommodate the file distribution of larger files to larger numbers of targets. For more information, see the Overriding the default distribution time interval on page 605 topic. When a provisioning task is canceled, by default, its job is canceled on the provisioning server only. Agents that have already started processing the job continue processing it. For an optional configuration parameter that allows the cancellation of distributions, see Canceled task does not cancel jobs in progress on page 793
Procedure
1. Click Go To > Deployment > Software Management > Software Product Distribution. 2. Click Select Software and select the software products that you want to distribute, then click OK. 3. Click Select > Computers and select the target computers where you want to copy the software, then click OK. Important: Note the following points when selecting software and computers on the Software Product Distribution page: v If no software product is selected in the Selected Software section, the list of target computers under Selected Targets displays only the computers that have either a scalable distribution infrastructure-SAP defined. v If one or more software products that do not have the SoftwareInstallable.Distribute logical management operation implemented are selected, then only the computers that have a scalable distribution infrastructure-SAP defined are listed. v If one or more software products that all have the SoftwareInstallable.Distribute logical management operation implemented are selected, then all the target computers are listed, regardless of whether they are enabled for the scalable distribution infrastructure or not. 4. Click Schedule to specify when you want to distribute the software.
Chapter 7. Deploying software
583
5. Under Notification, specify when you want to be notified about the status of the distribution. 6. Click Submit.
Results
If you chose to install the software immediately, the provisioning server starts the installation. If you scheduled the installation, the installation occurs at the specified date and time. You can view installation progress and status on the Provisioning Task Tracking page.
584
management data set. To enhance performance, the management elements implement a cache pre-fill strategy in which data is distributed to the branch elements in advance of when it is needed. The scalable distribution infrastructure includes the following main components: Provisioning server The provisioning server is the server on which Tivoli Provisioning Manager is installed. The following components of the scalable distribution infrastructure are installed on the provisioning server: Agent Manager Tivoli Provisioning Manager uses theTivoli Common Agent Services for software distribution and compliance. Tivoli Common Agent Services provides an infrastructure for managing the computer systems in your environment. Agent Manager is the server component of the Tivoli Common Agent Services that provides functions that clients can use to get information about agents and resource managers. It enables secure connections between managed target computers running the common agent, maintains the database information about the target computers and the software running on them, and processes queries against that database from resource managers. It also includes a registration service, which handles security certificates, registration, tracking of common agents and resource managers, and status collection and forwarding. The device manager federator The federator is installed on the provisioning server at the enterprise and is configured to act as a federated server. The federator implements a job distribution policy that delivers incoming jobs to all of the regional federated agents that are configured to communicate with it. Currently, a two-tiered federated environment is supported. The dynamic content delivery management center Provides centralized control of the upload, replication, and download of files, and implements a distribution policy that sends bulk data to some or all of the distributed depot servers, in advance of when it is needed. It also monitors the state of depot servers and stores file data and download statistics. Distribution servers The provisioning server connects to distribution servers, or directly to target computers. The distribution servers contain the following components: A device manager federated agent The federated agent can be installed on distribution servers and can be configured to communicate with the device manager federator to get command jobs which are distributed to the clients installed on the targets in the branch. The federated agent on the distribution server periodically communicates with the federator and detects when there is network connectivity. A dynamic content delivery depot Regional dynamic content delivery depot servers ensure the communication between the management server and the clients or subagents installed on the target computers. The regional depot servers communicate with the management server to get data that will be distributed to targets upon request.
585
Depot Server
OSGi
Common Agent
Tivoli Common Agent target computers Distribution servers connect to the target computers. The targets contain the following components: A device manager subagent Clients are installed as device manager subagents on the target computers at the branch and are used for receiving tasks from and returning results to the federated agents. A dynamic content delivery client subagent Clients installed as dynamic content delivery subagents on all the managed systems or targets at the regional branch office, to download files from depot servers or from other clients.
Target Computer
OSGi
Common Agent
Tivoli Common Agent The common agent is installed on the target computers and acts as a common container for all the subagents. The common agent collects data from subagents and uses them to
586
perform operations on managed resources on behalf of a Tivoli management application. It provides shared system resources and secure connectivity. The following diagram illustrates the interactions between the components of the scalable distribution infrastructure:
587
Provisioning Server
Operator/Administrator Console
Agent Manager
Region A
Branch Office 1
Target
Branch Office 2
Target
Region B
Branch Office 3
Target
As you can see, the management elements of the infrastructure are installed on the provisioning server. The branch elements ensure a two-way communication between the management elements and the clients installed on the target computers in the branch offices. The branch elements communicate with the
588
management elements to get data requested by the targets at the branch. When the targets receive the requested data, results are returned to the regional elements, which in turn, communicate them back to the management elements. Setting up scalable distribution infrastructure: After the provisioning server is successfully installed, a number of postinstallation configurations tasks must be performed to set up the scalable distribution infrastructure. The Tivoli Provisioning Manager installer silently installs the following management elements of the scalable distribution infrastructure on the provisioning server: v The Tivoli agent manager v The device manager federator v The dynamic content delivery management center The following diagram illustrates all of the elements that constitute the scalable distribution infrastructure:
589
Agent Manager
...
2 1
- Common Agent
The following postinstallation configuration tasks must be performed to properly set up the distribution elements of the infrastructure to interact and communicate with the management elements so that all supported operations can be successfully performed: Install the depot servers The installation of the dynamic content delivery depot servers can be done using the web interface. Regions, depots, and zones can also be created, updated, or deleted using the DcdAdmin automation package. If you need to create several zones, use the DcdAdmin automation package CLI or workflows to create them. For more information, see the Automation package for management of large numbers of regions, zones, and depot servers on page 821 and Adding depot servers on page 819 topics.
590
Install the common agent on target computers The common agent installation can be performed either using the provisioning server or outside of it. For more information, see the Installing the common agent on page 541 topic. Manual setup of the device manager federated agents: A number of manual configuration tasks can be performed to enable the communication between the device manager federated agents, the device manager federator installed on the provisioning server, and the device manager subagents installed on the target computers at the branch office. The federated agent needs to be configured to communicate with the federator, and the subagents on the targets can be configured to communicate with the federated agent. Tip: An automation package, eDMS_LWI.tcdriver, is also provided so that most of the following tasks can be performed automatically. The following manual configuration tasks are required: v Installing IBM JRE, version 1.5 manually v Installing the lightweight device manager federated agent v Configuring the device manager federated agent on page 593 v Configuring the device manager subagents on page 596 Installing IBM JRE, version 1.5 manually: You must extract the required files for IBM JRE from the common agent package provided with Tivoli Provisioning Manager. To manually install IBM JRE: Procedure 1. On the provisioning server, locate the following files: Windows common_agent_<version_number>_<build_date>_<OS_name>.exe, in the %TIO_HOME%\repository directory. UNIX common_agent_<version_number>_<build_date>__<OS_name>.tar, in the $TIO_HOME/repository directory. where <OS_name> is the operating system running on the target computer. 2. Extract the files to a specified location on the target computer. You must use the <tca_installer> -is:extract option to extract the installer files, then create a self extracting archive of JRE ibm-java2-jre-50sr6-win-i386.exe which can be extracted with the -d option. On UNIX, use the GNU tar utility to extract the files in the .tar archives, instead of using Windows-specific utilities such as Winzip. 3. Add a java directory to the location where the lightweight device manager federated agent is to be installed on the target computer. For example, <eDMS_install_dir>\java (Windows) or <eDMS_install_dir>/java (UNIX). 4. After extracting the files in step 2, copy the jre subfolder to the java directory created in step 3. No files or subfolders other than jre are required after extracting the files in step 2, so that you can delete them all. Installing the lightweight device manager federated agent:
Chapter 7. Deploying software
591
Before you begin Ensure that JRE, version 1.5 is already installed, as described in the Installing IBM JRE, version 1.5 manually on page 591 procedure. To manually install the lightweight device manager federated agent: Procedure 1. On the provisioning server, locate the following files: On Windows The following files can be found in the %TIO_HOME%\repository\edms_lwi directory: v 0628A_53lwi700.zip v com.tivoli.eDMS_1.8.0.20060720D2.zip v com.tivoli.eDMS_TPM_Mediator_1.8.0.20060720D2.zip On UNIX The following files can be found in the $TIO_HOME/repository/edms_lwi directory: v 0628A_53lwi700.tar.gz v com.tivoli.eDMS_1.8.0.20060720D2.tar.gz v com.tivoli.eDMS_TPM_Mediator_1.8.0.20060720D2.tar.gz 2. Extract the files to the <eDMS_install_dir> directory. The archive names are as follows: On Windows 0628A_53lwi700.zip On UNIX 0628A_53lwi700.tar.gz 3. Extract the files as follows: On Windows Extract the files in the com.tivoli.eDMS_1.8.0.20060720D2.zip archive to <eDMS_install_dir>\apps\eclipse\plugins On UNIX Extract the files in the com.tivoli.eDMS_1.8.0.20060720D2.tar.gz archive to <eDMS_install_dir>/apps/eclipse/plugins 4. Extract the files as follows: On Windows Extract the files in the com.tivoli.eDMS_TPM_Mediator_1.8.0.20060720D2.zip archive to <eDMS_install_dir>\apps\eclipse\plugins On UNIX Extract the files in the com.tivoli.eDMS_TPM_Mediator_1.8.0.20060720D2.tar.gz archive to <eDMS_install_dir>/apps/eclipse/plugins Results The lightweight device manager federated agent is now installed on the target computer. Installing the lightweight device manager federated agent from the GUI: To manually install the lightweight device manager federated agent from the GUI:
592
Procedure 1. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Computers. 2. Select the computer on which you want to install the lightweight device manager federated agent. 3. From the Select Action menu, select Install > Software Product. The Install Software dialog is displayed. 4. Click Select Software and specify eDMS_lwi. 5. Click Select Computer and specify the computer on which you want to install the lightweight device manager federated agent. 6. Click OK > Submit. Results The lightweight device manager federated agent is now installed on the target computer. Configuring the device manager federated agent: To manually configure the device manager federated agent to communicate with the device manager federator on the provisioning server: Procedure 1. Edit the config.ini file, located in the <eDMS_install_dir>\conf directory (Windows) or <eDMS_install_dir>/conf (UNIX), as follows. Add the following lines just before the end of the file marker:
# eDMS configuration stuff... # The next 2 parms set eDMS to be a Federated Server(Enterprise) and a Branch Server # For the enterprise server, set WAS_DMS_ENABLE_FEDERATED_SERVER=true # For a Branch Office server (which is NOT also the enterprise server), set WAS_DMS_ENABLE_FEDERATED_SERVER=false # The sample below is for an enterprise server which is federating itself. For a # branch office server # WAS_DMS_FEDERATED_AGENT_SERVER_ADDRESS=http://<hostnameOrIPAddrOfEnterpriseServer> :<EnterpriseServerPort> WAS_DMS_ENABLE_FEDERATED_SERVER=true WAS_DMS_FEDERATED_AGENT_SERVER_ADDRESS= https://<fully qualified hostname of TPM Manifest server>:9045 # Note: In default TPM, two way secure port (client/server auth) defaults to 9046, so the URL in that environment would be: # WAS_DMS_FEDERATED_AGENT_SERVER_ADDRESS=https://localhost:9046 # # # # *******IMPORTANT NOTE FOR DEMOS********* Post 2/10/2009 builds support the new (optional) configuration parameter WAS_DMS_FEDERATED_AGENT_POLL_INTERVAL_IN_MINUTES The default is set to 10 minutes. For improved response time for demos, set it to 1
WAS_DMS_FEDERATED_AGENT_POLL_INTERVAL_IN_MINUTES = 10 # # Set WAS_DMS_USE_DETECTED_DMS_SERVER_IF_AVAILABLE and # WAS_DMS_USE_CONFIGURED_DMS_SERVER_IF_DETECTED_SERVER_UNAVAILABLE # as described below depending on the desired behaviour. # # To use the proxy and fall back on the configured URL if the service (or the gateway or associated gateway software # itself) is unavailable # WAS_DMS_USE_DETECTED_DMS_SERVER_IF_AVAILABLE=true # WAS_DMS_USE_CONFIGURED_DMS_SERVER_IF_DETECTED_SERVER_UNAVAILABLE=true # # To disable the proxy and just use the configured server (i.e., the way it worked before this - this is the DEFAULT)
Chapter 7. Deploying software
593
# # # # # # # # #
WAS_DMS_USE_DETECTED_DMS_SERVER_IF_AVAILABLE=false WAS_DMS_USE_CONFIGURED_DMS_SERVER_IF_DETECTED_SERVER_UNAVAILABLE=true To use the service and only the configured service WAS_DMS_USE_DETECTED_DMS_SERVER_IF_AVAILABLE=true WAS_DMS_USE_CONFIGURED_DMS_SERVER_IF_DETECTED_SERVER_UNAVAILABLE=false To disable JMS initialization (JMS is not supported for eDMS) WAS_DMS_ENABLE_JMS_COMMUNICATION=false
# # Hostname and port of CAS Agent Manager Server. Leve blank for now until CAS # integration work is complete # WAS_DMS_AGENT_MANAGER_SERVER_ADDRESS= #
2. Edit the lwistart.bat (lwistart.sh for UNIX), lwistop.bat (lwistop.sh for UNIX), and lwistatus.bat (lwistatus.sh for UNIX) files as follows. The files are located in the following directories: v On Windows: <eDMS_install_dir>\bin\lwistart.bat <eDMS_install_dir>\bin\lwistop.bat <eDMS_install_dir>\bin\lwistatus.bat where <eDMS_install_dir> is the installation directory of the lightweight device manager federated agent. The default installation directory is C:\<Program_Files_Dir>\ibm\edms_lwi where <Program_Files_Dir> represents the value of the Windows registry entry. v On UNIX: <eDMS_install_dir>/bin/lwistart.sh <eDMS_install_dir>/bin/lwistop.sh <eDMS_install_dir>/bin/lwistatus.sh where <eDMS_install_dir> is the installation directory of the lightweight device manager federated agent. The default installation directory is /opt/ibm/edms_lwi/bin. On Windows add the following lines at the beginning of the lwistart.bat, lwistop.bat, and lwistatus.bat files:
set JAVA_HOME=<eDMS_install_dir>\java\jre set PATH=<eDMS_install_dir>\java\jre\bin;%PATH%
assuming that JRE is installed on <eDMS_install_dir>\java on your Windows computer. On UNIX add the following lines at the beginning of the lwistart.sh, lwistop.sh, and lwistatus.sh files:
JAVA_HOME=<eDMS_install_dir>/java/jre PATH=<eDMS_install_dir>/java/jre/bin:$PATH
assuming that JRE is installed on <eDMS_install_dir>/java on your UNIX computer. 3. Add the following lines to the lwistart.bat (lwistart.sh for UNIX) file: On Windows add -Xmx512000000 to the lines starting with "%JAVA_PROGRAM%". For example,
"%JAVA_PROGRAM%" -Xmx512000000 -cp "%CONF_DIR%\configLWI.jar" com.ibm.lwi.config.CreateBatchScript
594
4. Copy the agentKeys.jks and agentTrust.jks files from the provisioning server, under %TIO_HOME%\cert, to your device manager federated agent server, at <eDMS_install_dir>\security\ keystore (Windows) or <eDMS_install_dir>/security/keystore (UNIX). 5. Rename agentKeys.jks to KeyStore.jks, and agentTrust.jks to TrustStore.jks. 6. On the target computer, edit the following lines in the <eDMS_install_dir>\conf\config.properties file (<eDMS_install_dir>/conf/config.properties on UNIX), as follows:
com.ibm.pvc.webcontainer.port.secure=9045 com.ibm.osg.webcontainer.port.secure=9045 com.ibm.lwi.profile=profile.Extended
7. (Optional:) The Agent Manager Host Name and Registration Password are provided by the prepareTCAImage.cmd or prepareTCAImage.sh script files. If you want to obtain the decrypted agent manager registration password: a. Log on as tioadmin to the provisioning server. b. At a command prompt, change directory to %TIO_HOME%\tools (Windows) or $TIO_HOME/tools (UNIX or Linux). c. Run the following command: On Windows getAMRegistrationPassword.cmd On UNIX or Linux getAMRegistrationPassword.sh 8. On the target computer, create an sslconfig file under <eDMS_install_dir>\conf (Windows) or <eDMS_install_dir>/conf (UNIX) with the following contents:
sslEnabled=true com.ibm.ssl.keyStore.9045=../../security/keystore/KeyStore.jks com.ibm.ssl.keyStorePassword.9045=<PASSWORD> com.ibm.ssl.trustStore.9045=../../security/keystore/TrustStore.jks com.ibm.ssl.trustStorePassword.9045=<PASSWORD> com.ibm.ssl.clientAuthentication.9045=false com.ibm.ssl.keyStore.9046=../../security/keystore/KeyStore.jks com.ibm.ssl.keyStorePassword.9046=<PASSWORD> com.ibm.ssl.trustStore.9046=../../security/keystore/TrustStore.jks com.ibm.ssl.trustStorePassword.9046=<PASSWORD> com.ibm.ssl.clientAuthentication.9046=true
where <PASSWORD> is the decrypted agent manager registration password on the provisioning server. 9. On the target computer, create a DMSSLConfig.properties file at the following locations, with the contents specified in the following: v Windows:
<eDMS_install_dir>\apps\eclipse\plugins\com.tivoli.eDMS_1.8.0.20060720D2 \DMSConfiguration
v UNIX:
<eDMS_install_dir>/apps/eclipse/plugins/com.tivoli.eDMS_1.8.0.20060720D2 /DMSConfiguration
595
Note: Note the double backslash signs in the Windows paths. On UNIX
TPM_KEYSTORE_LOCATION=<eDMS_install_dir>/security/keystore/KeyStore.jks TPM_KEYSTORE_PASSWORD=<PASSWORD> TPM_TRUSTSTORE_LOCATION=<eDMS_install_dir>/security/keystore/TrustStore.jks TPM_TRUSTSTORE_PASSWORD=<PASSWORD>
In the DMSSLConfig.properties, the <PASSWORD> value is the decrypted agent manager registration password on the provisioning server, obtained in step 7. 10. Replace the WAS_DMS_FEDERATED_AGENT_SERVER_ADDRESS in the <eDMS_install_dir>\conf\config.ini file (Windows) or <eDMS_install_dir>/conf/config.ini file (UNIX) with the fully qualified host name of your enterprise provisioning server. For example,
WAS_DMS_FEDERATED_AGENT_SERVER_ADDRESS=https://r22p02.tod.tpmserver.example.com:9045 austin.drda.host=r24x10.tod.tpmserver.example.com
11. Remove the webcontainer.properties file from the <eDMS_install_dir>\conf directory (Windows) or the <eDMS_install_dir>/conf directory (UNIX). 12. Start the lightweight device manager federated agent server by running the lwistart.bat/.sh command. The command location is: On Windows <eDMS_install_dir>\bin On UNIX <eDMS_install_dir>/bin Tip: You can run the lwistop.bat (Windows) or lwistop.sh (UNIX) command to stop the lightweight device manager federated agent server. Results The device manager federated agent is now configured to<eDMS_install_dir>/bin Configuring the device manager subagents: You can manually configure the device manager subagents installed on the targets at the branch office to communicate with the device manager federated agent.
Windows 2008 Select the option Run as administrator for all the commands that you run from %TIO_HOME%\tools. For more information about user account control in Windows 2008, see User Account Control Step-by-Step Guide.
Procedure 1. From the provisioning server, modify the TCA-JES Default by setting the value of the Addr parameter to the IP address and port of the device manager federated agent (for example, change Addr
596
parameter from https://%%TPM_SERVER_HOST_IP%%:9045/dmserver/SyncMLDMServlet to https://9.31.28.34:9045/dmserver/SyncMLDMServlet, where 9.31.28.34 is the IP address of the federated agent. 2. Install the Tivoli common agent on the target computer. If you want, you can enable the automated creation of the SDI-SAP service access point on the target, as part of the common agent installation. 3. Repeat the preceding steps for all the targets that you want to communicate with this device manager federated agent. 4. Add and install a dynamic content delivery depot server on another target computer. Results The device manager subagents installed on the target computers are now set up to successfully communicate with the device manager federated agent. Automated setup of the device manager federated agent: The eDMS_LWI.tcdriver automation package is provided to automate the configuration tasks that are required to set up the device manager federated agents to communicate with the device manager federator on the provisioning server. Before you begin The target computer on which you have set up the device manager federated agents must meet the following requirements: v Have a management IP address. v Have an RXA (Windows) or SSH (UNIX) service access point already defined for the Device.Execute and Device.Copy commands. v On Windows, does not have the SSH daemon running v On UNIX, have the GNU tar utility which must be the default tar utility to extract the files in the automation package. Note the following information about the device manager federated agent: v Windows: The device manager federated agent is installed as a Windows service. v Linux, AIX, and Solaris: A startup script for the device manager federated agent is installed and runs automatically. v By default, the device manager federated agent is automatically started after the installation. You can change the default behavior, according to your needs. See step 3 for more details. v The device manager federated agent is automatically started after restart. To set up the device manager federated agent: Procedure 1. Create and run a discovery scan using the SMB discovery configuration for Windows or the SSH discovery configuration for UNIX, to discover the target computer you are working with, its management IP address, and the RXA (Windows) or SSH (UNIX) service access point. 2. Manually add the corresponding operating system software installation to the software definition for the automation package, after the target computer has been added to the data model. For more information, see Adding a top level software resource for a software installation on page 719. 3. Install the eDMS_LWI software product. The default installation path for the eDMS_LWI.tcdriver automation package is: v Windows: <Program_Files_Dir>\ibm\edms_lwi, where <Program_Files_Dir> represents the value of the Windows registry entry.
Chapter 7. Deploying software
597
v UNIX: /opt/ibm/edms_lwi By default, the device manager federated agent is set to start automatically after the installation. If you do not want it to start automatically after install, set the value of the StartImmediatelyAfterInstall parameter to false. The default value is true. Results The device manager federated agent is now set up to successfully communicate with the device manager federator on the provisioning server. You can now manually configure the device manager subagents installed on the target computers at the branch office to communicate with the installed and configured device manager federated agent. Configuring the device manager subagents: You can manually configure the device manager subagents installed on the targets at the branch office to communicate with the device manager federated agent. Select the option Run as administrator for all the commands that you run from %TIO_HOME%\tools. For more information about user account control in Windows 2008, see User Account Control Step-by-Step Guide.
Windows 2008
Procedure 1. From the provisioning server, modify the TCA-JES Default by setting the value of the Addr parameter to the IP address and port of the device manager federated agent (for example, change Addr parameter from https://%%TPM_SERVER_HOST_IP%%:9045/dmserver/SyncMLDMServlet to https://9.31.28.34:9045/dmserver/SyncMLDMServlet, where 9.31.28.34 is the IP address of the federated agent. 2. Install the Tivoli common agent on the target computer. If you want, you can enable the automated creation of the SDI-SAP service access point on the target, as part of the common agent installation. 3. Repeat the preceding steps for all the targets that you want to communicate with this device manager federated agent. 4. Add and install a dynamic content delivery depot server on another target computer. Results The device manager subagents installed on the target computers are now set up to successfully communicate with the device manager federated agent. Restarting the device manager federated agent: If you use the default settings, the device manager federated agent is automatically restarted after a restart. If required, you can also restart it manually from the provisioning server. Similarly, you can manually stop the device manager federated agent. Uninstalling the device manager federated agent: You can uninstall the device manager federated agent either from the List page for that computer or from the Software Products Uninstallation page. Manual uninstallation of the lightweight device manager federated agent from the GUI:
598
You can uninstall the lightweight device manager federated agent using the eDMS_LWI automation package or you can uninstall it from the GUI To manually uninstall the lightweight device manager federated agent from the GUI: Procedure 1. Click Go To > Deployment > Provisioning Computers. 2. Select the computer from which you want to uninstall the lightweight device manager federated agent. 3. From the Select Action menu, select Uninstall > Software Installation. The Uninstall Software dialog is displayed. 4. Click Select Software and specify eDMS_lwi. 5. Optionally click Select Computer and specify the more computers from which you want to uninstall the lightweight device manager federated agent. 6. Click OK > Submit. Results The lightweight device manager federated agent is uninstalled from the target computer. Depot server installation: To be able to publish the software files that you want to distribute and install on target computers, you need to define the regions, zones, and depot servers that will be used in the software distribution process. Before you begin v New depot servers can only be added after a region has been defined. For more information, see the Adding and removing regions on page 818 topic. v Also, the server that will be configured as a depot server needs to be discovered first. Discovery adds the depot server to the data model. For more information see Regions, zones, and depot servers on page 817. v If you have enabled IPv6 addressing support for the scalable distribution infrastructure, the operating system on depots must be able to communicate appropriately with other computers in your environment. For example, if you have both IPv4 and IPv6 target computers, the depot can be configured to support both IPv4 and IPv6 addressing, or you can set up separate IPv6 and IPv4 depots to support communication with each type of IP addressing. If all communication with the depot will use IPv6 addressing, the depot can be configured to support IPv6 only. v Note that regardless of your language settings, Server Traffic statistics are displayed in the following format: 0.0. The new depot server with the specified properties is added and registered with the management center. It is also listed on the Depots Management page, and its displayed status is Active. For information about how to add a depot server, see Creating the infrastructure for scalable software distribution on page 572. You can perform the following actions with the depot server: v View more details for a depot server. v Modify depot server properties, designate the depot server as a preferred upload server, or install the depot agent services on the depot server. Preferred upload servers are selected before other depot servers to receive uploaded files. If no preferred upload server is available, another depot server is selected to receive the uploaded file. Preferred upload servers must be globally accessible, not blocked by a firewall from clients. If a preferred upload server is not included in the initial publishing of a file, a temporary preferred upload
Chapter 7. Deploying software
599
server is chosen by the Dynamic Content Delivery management center for the initial publishing. After all the replications are completed to the chosen depots, the file will be removed from this temporary preferred upload server. The criteria for a preferred upload server must include the following: High availability: Monitor the depot using the check status of a depot on the provisioning server. These depots must always be in an active status. Alternatively, you can use the Event Console in the Dynamic Content Delivery Admin Console. Proximity to the provisioning server or the management center. High network bandwidth availability. Large available disk space. You cannot have a preferred upload server in a zone with "Minimize traffic in and out of zone" set to enabled or incoming-blocked. A publish to this preferred upload server will fail. v Define the number of concurrent activities included in each activity plan when publishing software and patches. When you publish software products or patches to a depot, Provisioning Manager generates an activity plan. By default the activity plan contains five concurrent activities. If you want to change the number of concurrent activities, perform the following steps: 1. Click Go To > Administration > Provisioning > Provisioning Global Settings. 2. Click Variables. 3. Click New Row and add the following settings: Variable Type Publish software activity concurrency level Component Entire System Value Type the value of the property with the required number of concurrent activities. The default value is five. Tip: To view information about depot server status from the Start Center, expand the Depot status portlet. Running the dynamic content delivery depot as LOCAL_SYSTEM: To run the dynamic content delivery depot as LOCAL_SYSTEM, set the value of the Windows_Run_Service_As_SYSTEM parameter to true in the TCA default.<dcmId> configuration template for the CDS_Depot_Stack. The default value is false. To run the dynamic content delivery depot as LOCAL_SYSTEM: Procedure 1. Click Go To > IT Infrastructure > Software Catalog > Software Stacks. 2. Click CDS_Depot_Stack. 3. Expand Configuration Templates to locate Default Template and click the TCA default..<dcmId> configuration template. 4. In the Template Parameters list, the Windows_Run_Service_As_SYSTEM parameter is sorted onto the next page. Advance the parameter list page by clicking the right arrow in the Template Parameters header bar. 5. Set the value of the Windows_Run_Service_As_SYSTEM parameter to true. The default value is false. Results Setting the value of the Windows_Run_Service_As_SYSTEM parameter to true enables the credentials specified for the local system account to be used instead of the local user credentials.
600
Procedure
1. Click Go To > Deployment > Patch Management > Patch Distribution. 2. Click Select Patches and select the patches that you want to distribute, then click OK.
Windows To search for a particular patch, enter the patch number in the Patch box, for example KB921823. If multiple software definitions are available for that patch number, for example, Security Update for Windows Server 2003 and Security Update for Windows XP, select all the software definitions that match the patch number. The correct patch will be distributed based on the operating system on the computers. 3. Click Select Computers and select the computers to distribute the patches to, then click OK. 4. Click Schedule and specify when you want to distribute the patches. 5. Under Notification, specify when you want to be notified about the distribution status.
6. Click Submit.
Results
If you have chosen to distribute the patch immediately, the provisioning server starts the distribution. If you have scheduled the distribution, patches will be distributed at the specified date and time. You can view distribution progress and status on the Provisioning Task Tracking page.
What to do next
When distribution is complete, you can install the patch.
Procedure
1. Click Go To > Deployment > Software Management > Software Stack Distribution. 2. Click Select Stacks and select the software stacks that you want to distribute, then click OK.
Chapter 7. Deploying software
601
3. Click Select > Computers and select the computers where you want to copy the software, then click OK. 4. Click Schedule to specify when you want to distribute the software. 5. Under Notification, specify when you want to be notified about the status of the distribution. 6. Click Submit.
Results
If you chose to install the software immediately, the provisioning server starts the installation. If you scheduled the installation, the installation occurs at the specified date and time. You can view installation progress and status on the Provisioning Task Tracking page.
Distributing files
If you have the deployment specialist role assigned to your user account and have decided to perform the file distribution and installation separately, you can copy files in a specified file repository to selected target computers without installing them.
Procedure
1. Click Go To > Deployment > Software Management > File Distribution. 2. Click Select Files and select the files that you want to distribute, then click OK. 3. Click Select > Computers and specify the target computers where you want to copy the files. 4. Under Select Path, type the Windows or UNIX path for the file distribution. Restriction: For both Windows and UNIX, only full path values must be used, no variables are allowed. For example, you cannot use %TEMP% in the Windows path, but rather the exact path value, for example, C:\temp. 5. Click Schedule and specify when you want to distribute the files. 6. Click Notification and specify when you want to be notified about the status of the distribution. 7. Click Submit.
Results
If you chose to distribute the files immediately, the provisioning server starts the distribution. If you scheduled the distribution, the distribution occurs at the specified date and time. You can view distribution progress and status on the Provisioning Task Tracking page.
File repositories
A file repository is a computer that you use to centrally store software, images, scripts, application data, and other files that you want to install or run on managed systems. File repositories are used in several ways: v When you add new software to the software catalog, you can select a file repository where you currently store the installation packages.
602
v When you capture an image from a computer, you can select the file repository where you want to store the image. v Specialized file repositories that provide software updates, such as Microsoft Windows Server Update Services, can be used to create external software catalogs.
Procedure
1. Click Go To > IT Infrastructure > Provisioning Inventory > File Repositories. Tip: To perform this task from the Start Center, click File Repositories under Infrastructure applications. 2. Click the File Repositories tab. . 3. Click New File Repository 4. Type the file repository name and the root path where the software is stored. 5. If the file repository stores images, select the boot server that deploys the images. . 6. Click Save 7. Click the file repository that you created and configure it. a. Add a network interface card to provide physical link to the rest of the network. Click New NIC Resource and specify the required settings. Ensure that the Management check box is selected for the network interface card. b. Add a network interface so that other devices can address the computer with an IP address. Click the Network Interface tab and click New Network Interface and specify the required settings. c. Add a service access point to the file repository, and then assign credentials to control access. The type of credentials that you assign depends on the type of file repository that you created.
Results
The file repository is created. Note: For more detailed information about how to create a new file repository, see Setting up new file repositories for the Software Package Editor.
What to do next
After you have defined the file repository, identify the files on it. Note: You cannot remove a file repository if: v There are installable files associated with the file repository.
603
v The file repository was created when you set up coexistence of Tivoli Configuration Manager with Tivoli Provisioning Manager. Configuring the new file repository for the patch download: You can change the default location for the patch download to the new file repository. The default location for downloading the approved patches from the Microsoft Web site is the local file repository on the Tivoli Provisioning Manager server. To configure the newly created file repository as the default location for the patch download: Procedure 1. Click Go To > Administration > Provisioning > Provisioning Global Settings. 2. On the Variables tab, locate the ms-patch-default-file-repository variable. 3. Click the switch by the variable name. 4. In the Value field, replace the default LocalFileRepository value with the name of the new file repository. 5. Click Save. Results The default location for the patch download is now configured according to your settings.
Procedure
1. Click Go To > IT Infrastructure > Provisioning Inventory > File Repositories. 2. Search for the appropriate file repository and then click its name in the search results. 3. Click the Files tab. 4. To add a single file, click Add New File. Specify the name, description, version, and path to the file. The package path is the directory where the software is stored, relative to the root of the file repository. For example, if the repository path is configured as /share, and the package is stored in /share/package1, then the package path is /package1. 5. To add multiple files, from the Select Action menu, click Import Files. Specify the directory where the files are stored, relative to the root of the file repository. For example, if the repository path is configured as /share, and the files are stored in /share/files, then the package path is /files. Click Run. 6. If you added a new file, click Save .
604
Results
If you added a single file, an entry for the file is added to the Files tab of the file repository. If you used the Import Files command, the specified directory is scanned. The specified directory is scanned for files and the list of files is compared against the entries in the data model. v If the file exists but there is no entry for the file in the data model, the entry is created. v If there is an entry in the data model, but the file does not exist in the package path, the data model entry is deleted.
Procedure
1. Set up the retryWindowSec variable: a. Click Go To > Administration > Provisioning > Provisioning Global Settings. b. Click the Variables tab, and then click New Row. c. In the Variable field, type retryWindowSec. In the Component field, click Entire system. In the Value field, enter the number of seconds you allow the file download to complete. By default, this time interval is set to 7200 seconds. . d. Click Save 2. Set up the maxRetryIntervalSec variable: a. Click Go To > Administration > Provisioning > Provisioning Global Settings. b. Click the Variables tab, and then click New Row. c. In the Variable field, type maxRetryIntervalSec. In the Component field, click Entire system. In the Value field, type the appropriate number of seconds between retries. By default, this time interval is set to 30 seconds. d. Click Save .
Results
The default time interval for the file distribution is now reset according to the specified values.
605
You can cancel a software distribution to all target computers while the software package is already being distributed to the target computers. A target computer might be in a number of possible states during the deployment of a software distribution as follows:
Table 100. Software distribution cancellation depending on the target computer state Current state of your target computer: Computer has not started downloading the job Computer has started downloading the job Computer has started processing the job Computer has terminated processing the job If you cancel the software distribution: The job is canceled with no effect on the computer The job is canceled with no effect on the computer The job is canceled if the actual installation phase has not already started The computer is rolled back to its previous state
Canceling distributions
To cancel a software distribution, perform the following steps:
Procedure
1. To enable the cancel software distribution feature, set the following configuration parameter to true: SDI.Cancel.Through by performing the following steps: a. In the navigation pane, expand System Management. b. Click Global Settings. c. Click the Variables tab. Click the Variables tab. d. Select Add Variable from the Edit menu. e. In Key, enter SDI.Cancel.Through. f. Click Save. 2. In the Web interface, click Task Management > Track Tasks. 3. Identify and select the software distribution task that you want to cancel. 4. Select the action menu for the task to be canceled and click Cancel.
606
Procedure
1. Click Go To > Deployment > Software Management > Software Product Installation. 2. Click Select Software and select the software products that you want to install, then click OK. 3. Click Select > Computers and select the target computers on which you want to install the software products, then click OK. 4. Click Schedule to specify when you want to install the software. 5. Under Notification, specify when and which users you want to be notified about the installation status. 6. If you want to select or customize the software configuration templates for the selected software or specify a separate date and time for distribution of the software before it is installed, click the Advanced tab. Note: v For software management block (SPB) management purposes, specific parameters can be added to the configuration template that is associated with the software module for the SPB. For more information, see the Software Package Editor documentation. v By default, the software package is removed from the temporary installation directory after the installation process has completed. You can override this behavior by setting the REMOVE_SPB_AFTER_PROCESS parameter to false in the configuration template. 7. Click Submit.
Results
If you chose to install the software immediately, the installation starts. If you scheduled the provisioning task, the installation occurs at the specified date and time. You can track the installation progress on the Provisioning Task Tracking page.
607
v temp.dir.sunos v temp.dir.windows For any platform, you can add a value to these parameters that corresponds to the temporary directory you want to use on the target computer. You can add a replaceable macro value to specify environment variables. For example, if the SRT parameter temp.dir.windows is set to @[TEMP], and the target system's TEMP environment variable is set to C:\temp, the agent uses the C:\temp directory as the temporary directory.
5. Click Save. What to do next Ensure that the value for the above parameter is refreshed every 24 hours on the agents. If you do not want to wait, you can refresh manually. For more information about refreshing manually, see Incorrect value for the used space on a depot on page 807. Setting the DCD client cache size: For large SPBs, you must set the value of the DCD client cache size to a higher value. By default, all agents have peer-to-peer enabled with a default DCD client cache size value set to 4 GB. To install larger files, you can either disable peering or set the DCD client cache size to a higher value. To change the value of the DCD client cache size, perform one of the following: v On the agent, open the cdsclient.properties file located here: <agent_base>/runtime/agent/subagents/ cdsclient.properites. Edit the value of cache_max_size or peering to the new value. Restart the agent. v Log on to the DCD Management Console and go to Settings > Set Client Configuration. Click Advanced Settings and select Default cache size or Enable Peering. Then, to apply the changes, click Update. The actual value will be propagated to the agents after the heartbeat between the agent and the server. You can specify the frequency of the heartbeat in the Peer reporting frequency parameter in Advanced Settings.
608
v Before installing a new common agent, edit the peering and cache_max_size parameters in the SRT of the TCA-Feature Tivoli Provisioning Manager Base Software Definition. For more information about how to change these parameters, see the following topics: Configuring the default peering cache on page 655 Disabling and enabling peering on page 815 Tivoli Common Agent Stack configuration template parameters on page 633
Procedure
1. Click Go To > Deployment > Patch Management > Patch Installation. 2. To initiate a restart for the target computer, select the Reboot if required check box. 3. Click Select Patches and select the patches that you want to install. You can display patches based on Patch, Vendor, Version or you can expand Advanced Search Options for more options. 4. Under Selected Targets, specify the target computers on which you want to install the patches. You can also expand Advanced Search for more options. 5. Under Scheduling, specify when you want to install the patches. 6. Under Notification, specify when and which users you want to be notified about the installation status. 7. If you want to select Recipients, click Add User and specify the user name. You can also specify an e-mail address by clicking Add E-mail. 8. If you want to select Events, click Add Event and specify the event type. 9. Click Submit.
Results
If you chose to install the software immediately, the installation starts. If you scheduled the provisioning task, the installation occurs at the specified date and time. You can track the installation progress on the Provisioning Task Tracking page.
609
have already been distributed, they are installed on the targets. During patch installation, the provisioning server checks the list of approved patches against each target and only installs the patches that are required by that target. If v v v you want to install a patch on multiple targets in a single operation, you can select, for example: All targets in a provisioning group, customer, or application. All targets with a particular software product installed. All targets that are missing a particular patch.
Procedure
1. Click Go To > Deployment > Patch Management > Patch Installation. 2. Click Select Patches and select the patches that you want to install. You can display patches based on Patch, Vendor, Version or you can expand Advanced Search Options for more options. To search for a particular patch, type the patch number in the Patch field, for example KB921823. If multiple software definitions are available for that patch number, for example, Security Update for Windows Server 2003 and Security Update for Windows XP, select all the software definitions that match the patch number. Tivoli Provisioning Manager will install the correct patch based on the operating system on the computers. 3. Under Selected Targets, specify the target computers on which you want to install the patches. You can also expand Advanced Search for more options. 4. Under Scheduling, specify when you want to install the patches. 5. Under Notification, specify when and which users you want to be notified about the installation status. 6. Click Submit.
Results
If you chose to install the software immediately, the installation starts. If you scheduled the provisioning task, the installation occurs at the specified date and time. You can track the installation progress on the Provisioning Task Tracking page.
Procedure
1. Click Go To > Deployment > Software Management > Software Product Installation.
610
2. Under Select Software, search for the TPM user Interaction Service software definition, and select it. 3. Under Select Computers, select the provisioning group or the individual targets on which you want to install the selected installable. 4. Click Schedule to specify when you want to install the software. 5. Under Notification, specify when and which users you want to be notified about the installation status. 6. Click Submit.
Results
If you chose to install the software immediately, the installation starts. If you scheduled the provisioning task, the installation occurs at the specified date and time. You can track the installation progress on the Provisioning Task Tracking page.
What to do next
After the TPM user Interaction Service software definition is successfully installed on all of the targets that you want to apply patches to, you can proceed with the patch installation. On the Advanced page, you can set up the restart options as described in the Installing individual patches on UNIX and Linux on page 609 topic. A restart notification will be sent to each selected target.
Procedure
Click Go To > IT Infrastructure > Software Catalog > Software Stacks. Click Select Records and select the software stacks that you want to install. From the Select Action menu, click Install. Click Select > Computers and specify the target computers from which you want to uninstall the stacks. 5. Click Schedule to specify when you want to install the stacks. 6. If you want to select or customize the software configuration templates for the selected software, click the Advanced tab. Under Selected Software, select the software stack associated with the software configuration template that you want to work with. Under Configuration Templates, select the template that you want to use to uninstall the software stack. Customize the values as required. 7. Click Submit. 1. 2. 3. 4.
611
Results
If you chose to install the software immediately, the installation starts. If you scheduled the provisioning task, the installation occurs at the specified date and time. You can track the installation progress on the Provisioning Task Tracking page.
Procedure
1. Use Tivoli Application Dependency Discovery Manager discovery against the computer that has the existing WebSphere Application Server installation. For information about discovery, see Discovery basics on page 146. When the discovery is complete, the settings for the WebSphere Application Server installation are copied to the IBM WebSphere Application Server V6 software definition in the IBMWAS-6.0discovered-Windows-installationsoftware configuration template. 2. To install WebSphere Application Server with the discovered settings: a. Click Go To > Deployment > Software Management > Software Product Installation. b. Click Select Software and select IBM WebSphere Application Server V6 , then click OK. c. Click Select > Computers and select the computer where you want to install WebSphere Application Server, then click OK. d. Click the Advanced tab. e. Under Configuration Templates, select the IBMWAS-6.0-discovery-recommend-Windowsinstallation software configuration template. f. Click Submit. WebSphere Application Server 6 is installed with the selected settings. 3. If the original WebSphere Application Server had fix packs applied, you can upgrade the new installation with the same fix packs. a. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Computers. b. Search for the target computer and then click its name in the list.
612
c. Click the Software tab. d. In the list of software resources, find the WebSphere Application Server installation. e. Select the WebSphere Application Server installation and click Select Action > Upgrade.
613
Before you begin Before you define maintenance windows, set up the configuration parameters, both on the provisioning server and on the target computers. You can configure the following parameters: scan.period Number of milliseconds the system waits when checking the maintenance.ics file for updates. The default value is 20000 milliseconds (20 seconds). This parameter is set in the agent/subagents/ jes.properties file on the target computer. You can add it to the TCA-Subagent JES software resource template so that it overrides the default value at installation time. DiscoveryUploadUrl Specifies the URL for the inventory upload servlet. This parameter is defined in the TCA-Subagent JES software resource template and its value is dynamically generated. For more information about the inventory upload servlet, see Inventory upload servlet on page 1111. DMS_SYSTEM_JOB_PRIORITY Determines the priority for system jobs. The default value is 1. This parameter is a provisioning server configuration parameter and must be defined in the entire system component. Set the value to be smaller than the DMS_JOB_PRIORITY parameter, which has a default value of 3. Note: All time periods defined for maintenance windows are treated as Standard Time during the Daylight Savings Time periods of the year. Creating and distributing maintenance window definitions: Before you begin To define maintenance windows, create a calendar file using a tool by an independent software vendor, for example Google calendar or Thunderbird. To define maintenance windows, you create a maintenance.ics file that contains the maintenance window definitions. The *.ics format is a convention for iCalendar files. Any time periods outside of the calendar events defined in this file fall in the service window, during which maintenance operations on the target computer are not supported and must be paused. You then distribute the maintenance.ics file to the endpoints in a software package. To create and edit maintenance windows: Procedure 1. Create a maintenance.ics file that contains the maintenance windows definitions. 2. Create a software package to distribute this file to the endpoint To facilitate creation, a sample SPD file is provided in the following path: repository/tivoli/TCA/schedule.spd. a. Create a software package block from the software package definition file using the Software Package Editor. b. Import the software package block into the Tivoli Provisioning Manager repository. c. Select the software module definition for the software package block. d. In the General tab select Edit >Add Capability, and add a capability defining the operational schedule for the maintenance window. 3. Install the software module on target computers. Results The maintenance.ics file is saved in the ep/runtime/agent/subagents directory, where the common agent detects it and loads it as its latest maintenance window definition.
614
VCALENDAR Properties
VCALENDAR properties define the general properties of the calendar
Table 101. iCalendar VCALENDAR Properties Tag name PRODID VERSION UID Description Identifier for the product that created the calendar object. This property is required. Calendar object version. This property is required. Unique name. It is converted to uppercase and spaces are converted to the underscore (_) character. Can contain up to 40 characters. User-defined description. Can contain up to 120 characters. Time zone to be used when interpreting date values. Default value for VEVENT.DTSTART. Date time value. Default value for VEVENT.DTEND. Date time value. Default value for VEVENT.RRULE.UNTIL. Date time value. String that can be retrieved by TSS APIs. Exclude Saturday from availability calendar. Supported values are TRUE and FALSE. Exclude Sunday from availability calendar. Supported values are TRUE and FALSE.
Supported formats are as follows: v The VTIMEZONE tag applies to all date values in the file. If there is no time zone specified then the time zone of the target computer itself applies. The value associated with this tag is consistent with Java time zone specifications. For example: Europe/Rome, CST. For a complete list of possible timezones and more details, see the following Web sites: http://twiki.org/cgi-bin/xtra/tzdatepick.html http://java.sun.com/javase/timezones v Date and time values follow the RFC 3339 standard. For more information, see http://www.ietf.org/ rfc/rfc3339.txt . Supported date formats are as follows: YYYYMMDD, for example 20090314 YYYY-MM-DD, for example 2009-03-14
Chapter 7. Deploying software
615
v Supported time formats are as follows: HHMMSS, for example 231000 HH:MM:SS, for example 23:10:00 v Supported date and time formats are as follows: YYYYMMDD'T'HHMMSS, for example 20090314T231000 YYYY-MM-DD'T'HH:MM:SS, for example 2009-03-14T23:10:00
The following points apply: v Supported format for RRULE is as follows: RRULE:FREQ={DAILY|WEEKLY|MONTHLY|YEARLY} [;INTERVAL=n] [;{BYFREEDAY|BYWORKDAY|BYDAY=weekday_list| BYMONTHDAY=monthday_list}] [;UNTIL=date] v You can define multiple VEVENT objects in a single VCALENDAR object. In this case, the maintenance windows are determined by the association of the date ranges with the events. v VEVENTS do not span more than one day. For example, if you have a maintenance window that starts on Monday at 10:00 p.m. and ends on Tuesday at 02:00 a.m., define two separate VEVENT objects, one for Monday 10:00 p.m.-11:59 p.m., and another for Tuesday 00:00 a.m.-02:00 a.m.. The following is an example of a maintenance.ics file: BEGIN:VCALENDAR DESCRIPTION: Accounting Dept Endpoints
616
PRODID:IBM VERSION:1.0 BEGIN:VTIMEZONE TZID:CST END:VTIMEZONE BEGIN:VEVENT DESCRIPTION: Every Mon Tue Wed Thu Fri 18:00 to 21:00 DTSTART:20080901T180000 DTEND:20080901T210000 RRULE:FREQ=WEEKLY;BYDAY=MO,TU,WE,TH,FR,SA,SU; UNTIL=20200901T140000; END:VEVENT END:VCALENDAR
617
Results The report lists the target computers and maintenance windows information for each target computer, such as the current operational mode, the time when the server processed the update, and the time when the operational mode change happened on the target computer. You can also check the following log files for further information: v Provisioning Manager server logs v common agent logs v common agent runtime logs
Installation methods
The following table describes the available methods for installing simple software without writing provisioning workflows. Decide which method is most appropriate for your installation process. There are template definitions for each installation method that you can use to quickly provide values needed by Tivoli Provisioning Manager to distribute and install the software on computers.
Table 103. Installation methods Method Unzip Only: Copy a compressed file to a target computer and extract the contents to a specified location. A tool is copied to the target computer to extract the contents of the compressed file. Use this option to automatically extract the contents of a compressed file. Windows Yes UNIX or Linux
618
Table 103. Installation methods (continued) Method Unzip and Install: Copy a compressed file to a target computer, extract the contents, and then install the software. A tool is copied to the target computer to extract the contents of the compressed file. Use this option to automatically extract a specified compressed file that contains a software installer. For example, if a compressed file contains a Windows .msi file, you can use this option to extract the file and then install it with the msiexec command. Extract Only: Copy an archive file to a target computer and extract the contents to a specified location. Use this option to automatically extract the contents of an archive file. Extract and Install: Copy an archive file to a target computer, extract the contents, and then install the software. Use this option to automatically extract a software installer from an archive file. Install Only: Copy an installation file to a target computer and run the command to install the software. Use this option for ready-to-run programs, such as a script or an .exe installer. Yes Yes Windows Yes UNIX or Linux
Yes
Yes
Yes Custom Extract and Install: Copy a compressed file to a target computer, extract the contents with a specified command, and then run the command to install the software. Use this option for archive files that are not supported by the Extract and Install installation method. For a list of supported file formats, see Supported archive file formats.
Yes
Linux
619
Table 104. Supported archive file formats (continued) Operating system UNIX Installation method Extract Only Extract and Install Supported formats and file extensions Archive files in tar or compressed format. Ensure your archive has one of the following supported file extensions. If the archive has an incorrect file extension, extraction of the files from the archive will fail. tar file .tar bzip tar file .tar.bz2, .tar.bzip2, .tbz2, .tbz gzip tar file .tar.gz, .tgz, .tar.gzip compress tar file .tar.Z Note: This is the only supported file extension. The file extension is case sensitive. compressed file .zip
Software requirements
To automate installation, you must ensure that there are silent commands available for performing the file extraction and the software installation. Any actions required during the installation process must: v Be available from the command line. v Require no user interaction. Note: The ability to fully automate an installation depends on the silent installation support provided by the vendor of the software product. Not all software installations can be automated for deployment with simple software product distribution.
620
Unzip only (Windows) File Copy Only Required Extract only (Linux/ UNIX)
Parameter install-path: The path on the target computer where you want to copy the file. destination-filename: The name of the file when it is copied to the target computer. extract-command: The silent command to extract installation files from a compressed file extract-path: The path on the target computer where you want to extract contents of a compressed package. auto-file-overwrite: When enabled, existing files on the target computer are overwritten. install-command: The silent command to install the software install-command-timeout: Timeout in seconds for the command configured for install-command. rspfile-method: Indicate if a response file is required. installer-path: The path where the software installer is located. rsp-filepath: If you are using a response file, the path where the response file is located. rsp-filename: If you are using a response file, the name of the response file. license-filepath: If you are using a license key file, the path where the license key file is located. license-filename: If you are using a license key file, the file name of the license key file.
Install only
Optional
Required
Required
Required
Required Optional
Required Optional
Required Optional
Required
Required Optional
Optional
Optional
Optional
Optional
Optional
Optional
Optional
Optional
Optional
Optional
Optional
621
Procedure
1. Click Go To > IT Infrastructure > Software Catalog > Software Products. . 2. Click New 3. Specify the software product information, including the name, description, vendor, and build number. 4. Click New Installable. 5. In the Software Installable field, type the name of the software package. 6. In the Version field, type the software package version. 7. In the File Repository field, select LocalFileRepository or other file repository that you have created. 8. In the Installable Path field, specify the software package location. The path is relative to the default local file repository path. It can also be some other custom file repository. For example, if the repository path is configured as TIO_HOME/repository/, and the software package is stored in TIO_HOME/repository/package, then type /package as the parameter value. 9. In the File field, type the file name of the software package. 10. Click Submit. 11. Specify the installation options in the software configuration template. a. Click Select Action > Add SRT. b. Select Create from template definition. . c. Click Select Value d. Use the filter to search for template names with the text Hosting-Environment. e. Select the software configuration template that you want to use. f. In the Configuration Templates section, specify the appropriate parameter values.
622
Yes: Overwrite existing files. No: Do not overwrite existing files. If files exist, the workflow extracts files that are not duplicates but returns a failed status.
UNIX
Only the Yes option is available. Back up any existing files before installing the software product. destination-filename extract-command For the File Copy Only method, the name of the file when it is copied to the target computer. The silent command to extract the contents of the compressed file. The specific command and command syntax depends on the compression tool that you are using. The following examples show some simple commands. See the documentation for the tool that you want to use to uncompress the file for details about syntax and ensure that the tool is installed on target computers. v If the target computer has the WinZip Command Line Support Add-On for WinZip installed, the following command extracts all the files from example.zip, recreates the directory structure contained in the compressed file, and places the extracted files in c:\myfiles. wzunzip -d example.zip c:\myfiles v If you are using gzip, the following command extracts files from example.zip into the current directory. gzip -d example.zip v If you are using tar, the following command extracts files from example.tar to the current directory and outputs the name of each file: tar -xvf example.tar
extract-path install-command
Specify the full path on the target computer where you want to extract contents of the compressed file. The silent command to install the software. The command runs in installer-path, where the software installer is located.If the installation file name has spaces, enclose the file name in quotation marks. For example:
Windows
"installer 1.1.exe" -q
Solaris
pkgadd -n -d Note: When a response file or a license key file is required, the files will be copied to the same directory as the installer. You do not need to include absolute paths to these files in the installation command. install-command-timeout
Windows
This option is only supported on Windows for the Install Only, Unzip and Install, and Custom Extract and Install methods. install-path For the File Copy Only method, the path on the target computer where you want to copy the file.
623
A response file is always required. The default response file is located in /var/sadm/install/admin. The file is called nocheck. If you are using the default Solaris response file, do not specify a value for this parameter. The default response file will be used. rsp-filepath Type the path where the response file is located in the default file repository (LocalFileRepository). Ensure that the path is a relative to the root path of LocalFileRepository. The default root path for LocalFileRepository is TIO_HOME/repository. If you are using the default Solaris response file, do not specify a value for this parameter. The default response file will be used in the default location. Otherwise, specify the path of the response file. rsp-filename The file name of the response file. If you are using the default Solaris response file, do not specify a value for this parameter. The default response file will be used in the default location. Otherwise, specify the name of the response file. license-filepath Type the path where the license key file is located in the default file repository (LocalFileRepository). Ensure that the path is a relative to the root path of LocalFileRepository. The default root path for LocalFileRepository is TIO_HOME/repository. The file name of the license key file. An optional command used to specify a command that you want to run after the installation succeeds. This option is supported on Windows and UNIX.
license-filename post-install-command
g. Click Save.
Results
The software product is now ready to install.
Procedure
1. Installations to a UNIX computer will always overwrite files if they already exist. If you require existing files from a previous installation, ensure that you back up the files.
UNIX
624
Click Go To > IT Infrastructure > Software Catalog > Software Products. Select the software product that you want to install. From the Select Action menu, click Install. Specify the name of the task and the target computers for the installation. Schedule the deployment if you want it to run later. 6. Click Submit. 2. 3. 4. 5.
Results
The installation of the software product starts. If you chose to install the software immediately, the installation starts. If you scheduled the installation, the installation occurs at the specified date and time.
If an installer or script fails with a "no permission" exception, verify the following
information: v Verify that original file for the installer or script has the execute permission. v Identify the tool that was used to package the installer or script. Some packaging tools change file access rights when they package a file. The best way to retain file permissions is to use the packaging tool provided with the operating system. For example, if you want to create a bzipped tar file, use the bzip2 command to pack your files. Otherwise, confirm that the packaging tool that you want to use does not change file permissions.
If you see this error, verify the following conditions: v Verify that a software installation for the operating system is associated with the target computer as described in Software product distribution requirements on page 620. The operating system is displayed on the Software tab of the computer. v Verify that provisioning workflows for installing a simple software product are associated with the target computer. 1. Click the Workflows tab for the computer. 2. Verify that a device driver for the operating system is displayed. For example, if the computer is a Windows computer, the Windows Operating System device driver is displayed. If the device driver is not associated with the computer, click the arrow icon for the Currently Assigned Device Driver field and click Select Value, then select the appropriate device driver. v In the list of provisioning workflows, verify that the correct provisioning workflow is associated with the logical management operation HostingEnvironment.Host. For example, the provisioning workflow
Chapter 7. Deploying software
625
Windows_HostingEnvironment_Host is associated with the logical management operation on a Windows computer. If the association is not listed, click Assign Provisioning Workflow and select the HostingEnvironment.Host logical management operation and the appropriate operating system provisioning workflow.
CTGDEC119E The cache manager sub-component detected a failure during an I/O operation.
If you are distributing a file or software product and receive the error "Unable to create directory", you need to ensure that you specify a directory relative to the subagents directory. By default, the path is set to: v v
Windows UNIX
: C:\temp : /tmp/
Uninstalling software
Software products, patches, and software stacks use different methods to remove themselves from a system. You can uninstall a piece of software from a system if a specific provisioning workflow is available to perform this action for the selected piece of software.
Procedure
1. Click Go To > Deployment > Software Management > Software Product Uninstallation. 2. Click Select Software to select the software products that you want to uninstall, then click OK. 3. Click Select > Computers to select the target computers from which you want to uninstall the software, then click OK. 4. Click Schedule to specify when you want to uninstall the software. 5. Under Notification, specify the required notification options. 6. Click Submit.
626
Results
If you chose to uninstall the software immediately, the removal process starts. If you scheduled the uninstallation task, the removal process occurs at the specified date and time. You can view the task progress and status on the Provisioning Task Tracking application. Click Go To > Task Management > Provisioning Tasks > Provisioning Task Tracking. Note: By default, a forced uninstallation is performed when uninstalling a software package block (SPB). Therefore, the operation is successful also when the product is not installed on the system, or has been manually removed.
Procedure
1. Click Go To > Deployment > Provisioning Computers. 2. Search for the computer that you want to work with and click the name it in the search results. 3. Click the Software tab. 4. In the list of software, click the name of the software that you want to uninstall. 5. From the Select Action menu, click Uninstall.
Results
If you chose to uninstall the software immediately, the removal process starts. If you scheduled the uninstallation task, the removal process occurs at the specified date and time. You can view the task progress and status on the Provisioning Task Tracking application. Click Go To > Task Management > Provisioning Tasks > Provisioning Task Tracking.
Uninstalling patches
You might to uninstall a patch from a target computer if, for example, the patch caused problems to your environment or if the patch was installed on a computer for the purpose of testing and is no longer needed. You can uninstall only service packs that were installed using the provisioning server from an AIX target. You cannot uninstall technology levels.
AIX
Procedure
1. Click Go To > Deployment > Patch Management > Patch Uninstallation. 2. Click Select Patches and specify the patches that you want to uninstall, then click OK. You can search by the patch name, vendor, or version. 3. Click Select > Computers and specify the computers from which you want to uninstall the patches, then click OK. 4. Click Schedule to specify when you want to uninstall the patches. You can select Run Now to begin the uninstallation. If you want to schedule the uninstallation task, click Scheduled Start and specify the appropriate options. 5. If you want to select Recipients click Add User and specify the user name. You can also specify an e-mail address by clicking Add E-mail. 6. If you want to select Events click Add Event and specify the event type.
Chapter 7. Deploying software
627
7. Click Submit.
Results
If you specified that you wanted to uninstall the patch immediately, the provisioning server starts the removal process. If you scheduled the uninstallation task, the removal process occurs at the specified date and time. You can track the progress of the uninstallation task on the Provisioning Task Tracking page.
Procedure
1. Click Go To > IT Infrastructure > Software Catalog > Software Stacks. 2. Click Select Records and select the software stacks that you want to uninstall. 3. From the Select Action menu, click Uninstall. 4. Click Select > Computers and specify the target computers from which you want to uninstall the stacks. 5. Click Schedule to specify when you want to uninstall the software. 6. Click Submit.
Results
If you chose to uninstall the software stack immediately, the provisioning server starts the removal process. If you scheduled the task, the removal process occurs at the specified date and time. You can view the removal progress and status on the Provisioning Task Tracking page.
628
Agent manager The agent manager, installed on the provisioning server, is the server component of the Tivoli Common Agent Services, which provides functions that allow clients to get information about agents and resource managers. It enables secure connections between managed target computers, maintains the database information about the targets and the software running on them, and processes queries against that database from resource managers. It also includes a registration service, which handles security certificates, registration, tracking of common agents and resource managers, and status collection and forwarding. Resource manager Each product that uses Tivoli Common Agent Services has its own resource manager and subagents. For example, Tivoli Provisioning Manager has a resource manager and subagents for software distribution and software inventory scanning.
The common agent is installed once on each target computer. For example, if two management products (product A and product B) manage the same target computer, the common agent is installed only once on that target. The common agent runs two product-specific subagents: one for product A and another for product B. When the common agent is installed on a target computer, subsequent subagents can be deployed on the existing common agent.
629
The common agent contacts the agent manager and reports its status and any configuration changes at the following times: v When a common agent starts or stops v Any time a bundle is installed, upgraded, or removed v After a configurable period Some of the typical interactions are: The resource manager interacts with the agent manager v Registers with the agent manager v Queries common agents to identify which ones are present in the environment v Requests an initial security certificate v Delivers subscription-based notification of common agent registration and configuration The resource manager interacts with the common agent v Deploys bundles for its subagents v Starts and stops the subagents v Queries the configuration of the common agent and installed bundles The resource manager interacts with the bundles installed in the common agent v Resource manager runs commands on the common agent v Subagent sends information to the resource manager The subagents interact with the common agent Subagents can take advantage of the services provided by the common agent
630
v Deployment and life cycle management of subagents. Resource managers can remotely install, upgrade, patch, or uninstall bundles on any common agent. This helps keep the common agent deployment current without having to take explicit action on each common agent system. v Common agent health monitoring and configuration monitoring. The common agent has a "heartbeat" function that sends periodic status and configuration reports to the agent manager. The common agent allows any subagent to participate and to provide status information. Management applications can register to receive these updates. Updates are initiated by certain bundle events and periodically by the common agent. You can turn off periodic updates or control the frequency of updates. The default frequency is 24 hours. The common agent contacts the agent manager and reports its status and any configuration changes at these times: v When a common agent starts or stops. v After a configurable period. The default is 24 hours. v Any time a bundle is installed, upgraded, or removed. The registry contains only the most recent configuration update. By default, only the most recent status information is saved for each common agent, but the retention period is configurable.
631
Table 107. Default ports used on the management side (continued) Component Agent manager Port 9511 9512 Use Register agents and resource managers. v Provide configuration updates. v Renew and revoke certificates. v Query the registry for agent information. v Request ID resets. 9513 v Request updates to the certificate revocation list. v Request agent manager information. v Download the truststore file. v Agent recovery service. dynamic content delivery, and device manager service 9443 or 9046 Enable communication between: v The dynamic content delivery subagent and the dynamic content delivery management center. Secure SSL Unsecure Connection security Secure SSL Secure SSL with Client Authentication
v The device manager subagent and the device manager federated agent. Table 108. Default ports used on the target computer side Component Common agent Port 9510 Use The default common agent listening port. Configurable. Connection security Secure SSL Secure SSL
9010 or 9015 Enable communication between the common agent and the dynamic content delivery management center. 9514 and 9515
Nonstop service. The Nonstop agent service Unsecure monitors processes on the agent, to make sure they are running and available. The service automatically restarts the processes it monitors if they stop. Optional peering service. If peering is enabled, this port is used for other agents to pull files in the agent's cache. Used for management and downloads. Enables communication between: v The common agent and the dynamic content delivery depot servers. v dynamic content delivery depot servers v The dynamic content delivery management center and the dynamic content delivery depot servers. Secure SSL
2101
2100
Secure SSL
If you have a firewall between the common agents and the agent manager server, allow inbound traffic on ports 80 and 9513 to the agent recovery service. Opening these ports allows agents to report registration problems. If you configure the agent manager to use a port other than 9513 for the public port, open that port as well, so that agents can report communication problems after their initial registration.
632
When you use Tivoli Provisioning Manager to install the agent manager, port 80 is disabled and port 9513 is used as the backup port for the agent recovery service. Opening the backup port is especially important when the agent manager use of port 80 is disabled. You can manage endpoints with multiple network interface cards (NICs). Configure the appropriate host name for that NIC and the route to be used to the provisioning server. When the common agent is installed, it discovers the IP address of the NIC which is used during communication with the Agent Manager. Tivoli Provisioning Manager uses the IP address used by the common agent to register itself as the management IP address, and the defined host name as seen by the target computer on the management IP as the computer name.
TCA-TPM default RetriesMax RetryPeriod SocketTimeout EnableFirewallSupport The number of times to try a file upload again when using HTTP. The number of seconds between retries. Socket timeout in milliseconds To enable the common agent to discover services on the other side of a firewall, you must enable firewall support on the common agent by setting this value to true. 10 60 20000 false
TCA-Subagent JES Addr This parameter specifies the IP address of the device manager https://%%TPM_SERVER_HOST_IP%%:9045/ federator that the device manager subagent installed on the dmserver/SyncMLDMServlet target computer communicates with. Depending on environment, it can be either the IP address of the device manager federator installed on the provisioning server or the IP address of the device manager federator agent installed in a branch or regional location. User name for the device. Do not modify the default value. User password. Do not modify the default value. Determines if polling is enabled. The values are true or false (case is ignored). Specifies the polling interval in hours and minutes. Specifies the size of the message files Specifies the polling start time in hours and minutes. Specifies the polling end time in hours and minutes. To enable the common agent to discover services on the other side of a firewall, you must enable firewall support on the common agent by setting this value to true. tpmuser tpmpassword true 01:00 200 02:00 02:00 false
633
Table 109. Tivoli Common Agent Stack configuration template parameters (continued)
Parameter TCA-Subagent CDS Client URL Handler Default Parameters web_service_protocol Specifies the protocol preference when communicating with the dynamic content delivery management center. v 0 means to always use HTTP. v 1 means to use HTTPS when sending up passwords, but HTTP otherwise. v 2 means always use HTTPS. web_service_https_port web_service_host web_service_http_port peering This is the port used by the client to securely connect to the dynamic content delivery management center. Fully qualified domain name of the system running the dynamic content delivery management center. Port used by the client to connect to the dynamic content delivery management center (unsecured). If this is set to true, the target computer will attempt to download files from other clients and target computers within the same zone. Maximum size of peering cache in MB (megabytes). 9046 %%TPM_SERVER_HOST_IP%% 9082 true 1 Description Default Value
2048
The URL of the upload servlet. This servlet is used to upload the software stack. This is an obsolete parameter and is no longer used. This is an obsolete parameter and is no longer used. Determines the kind of input (such as statistics) that are collected.
upload_secure collector_input_file TCA-CIT default Windows_Cit_Install_Path_Override Windows64_Cit_Install_Path_Override AIX_Cit_Install_Path_Override Solaris_Cit_Install_Path_Override Solaris86_Cit_Install_Path_Override HPUX_Cit_Install_Path_Override HPUXItanium_Cit_Install_ Path_Override Linux86_Cit_Install_Path_Override LinuxPPC_Cit_Install_Path_Override Linux390_Cit_Install_Path_Override Installation override Windows_Install_Path_Override Windows64_Install_Path_Override AIX_Install_Path_Override Solaris_Install_Path_Override Solaris86_Install_Path_Override HPUX_Install_Path_Override HPUXItanium_Install_Path_Override Linux86_Install_Path_Override LinuxPPC_Install_Path_Override Linux390_Install_Path_Override
The path where CIT is installed. The path where CIT is installed. The path where CIT is installed. The path where CIT is installed. The path where CIT is installed. The path where CIT is installed. The path where CIT is installed. The path where CIT is installed. The path where CIT is installed. The path where CIT is installed.
@[ProgramFiles]\tivoli\cit @[ProgramFiles(x86)]\tivoli\cit /opt/tivoli/cit /opt/tivoli/cit /opt/tivoli/cit /opt/tivoli/cit /opt/tivoli/cit /opt/tivoli/cit /opt/tivoli/cit /opt/tivoli/cit
To override the installation path. To override the installation path. To override the installation path. To override the installation path. To override the installation path. To override the installation path. To override the installation path. To override the installation path. To override the installation path. To override the installation path.
C:\Program Files\tivoli\ep C:\Program Files (x86)\tivoli\ep /usr/tivoli/ep /opt/tivoli/ep /opt/tivoli/ep /opt/tivoli/ep /opt/tivoli/ep /opt/tivoli/ep /opt/tivoli/ep /opt/tivoli/ep
634
Preinstallation information
Before installing the common agent using the following methods, review the following information: v Requirements for common agent installation on page 547 v Installing the common agent on the provisioning server, where the agent manager is also installed, is not supported. If you want to revert to the previous version of a common agent for compatibility with other products that require the older product level, you must remove the agent and then reinstall it using the installation package included with the other product. Installing the common agent does not affect any other agents that are already installed. v Version 1.4.2.1 of the common agent is installed with the current version of the provisioning server. Note: The common agent installation does not support RSA credentials for Windows target computers. When the network discovery is performed using the RSA credentials, a set of password credentials for SMB must also be used to discover the Windows target computers.
Installation methods
There are two main ways to install the common agent: Using Tivoli Provisioning Manager You can use the Common Agent Installation page to install the common agent on an existing managed system. This option installs the common agent with default options. The following service access points (SAP) are created on the target computer during the common agent installation: v Agent-Server (IPv4 / CommonAgent) v SDI-SAP (IPv4/Scalable Distribution Infrastructure) v RXA-Server (IPv4/RXA) Note: The RXA SAP is created only if you provide credentials and there is no default SAP assigned to the device. The TCA.Create.EO.SAP configuration parameter determines if the SDI SAP is created as part of the agent installation. This parameter is set to true by default. To modify this parameter, go to Provisioning Global Settings->Variables. For more information, see Installing the common agent on managed systems on page 640. Outside of Tivoli Provisioning Manager The common agent can also be installed using an installation image, which provides all the required common agent installers, and their configuration. Restriction: The standalone installation does not support the installation of the dynamic content delivery depot subagent. For more information, see Installing the common agent and subagents using a stand-alone installation on page 641. The default common agent installation path is: v Windows: C:\Program Files\Tivoli\ep v Solaris or Linux: /opt/tivoli/ep v AIX or HP-UX: /usr/tivoli/ep
Checking prerequisites
To save time before deploying common agents to your managed resources, you can optionally run a prerequisite check. This way, you can determine which systems are currently ready for the agent installation and which still must be prepared. You can run a prerequisite check locally from the agent or globally from the server.
635
Note: The prerequisite check does not check the network connection with the Agent Manager on Windows target computers. The prerequisite script is called tcaInstallPrecheck.sh or tcaInstallPrecheck.vbs depending on your platform. To run a prerequisite check locally from the agent, you run the prerequisite command. To run the prerequisite check globally and for a group of computers, you use a Provisioning Workflow. The prerequisite check performs the following checks: Space requirements Checks the space required for the installation packages of the agent and the space required for the agent to be installed. Operating system patches and packages Checks the operating system patches and packages. Port conflict Checks if the port parameters in the response file are available. The following parameters are checked:
Agent installation response file parameter -w CASInstall.AgentPort -w CASInstall.NonstopPort1 -w CASInstall.NonstopPort2 Default value 9510 9514 9515
Network connection Checks that there are no network issues between the agent computer server and the Tivoli Provisioning Manager server. This check only validates the agent to agent manager connections required. The following parameters are checked:
Agent installation response file parameter -w CASInstall.PublicPort -w CASInstall.SecurePort -w CASInstall.RegistrationPort -w CASInstall.AgentManagerHostname Default value 9513 9512 9511 No default
Agent already installed Checks that the agent does not already exist on the target computer.
Return codes
The following table lists the return codes for the prerequisite check:
Table 110. Return codes for the prerequisite check Value 0 100 200 300 400 500 600 Description All tests were successful. Space requirements for the agent failed. Temporary space required during agent installation failed. Operating system patches and packages for the agent check failed. Operating system patches and packages for the subagents check failed. Port conflict check failed. Network connection test failed.
636
Table 110. Return codes for the prerequisite check (continued) Value 700 -1 -2 Description The agent is already installed. Command usage error. The response file is not valid.
637
3. 4. 5. 6. 7.
Enter the Provisioning Task name and select Provisioning Workflow type. In the Provisioning Workflow field, enter TCA_prereq_check. In the OutputFileDirectory field, enter the following path: /tmp. Click Save. From the Select Action menu, run the Provisioning Task.
8. From the Run Provisioning Tasks panel, select Groups. Results An output file is created in the path you provided in the OutputFileDirectory field on all targets. Note: The user "tioadmin" has permission only to the destination directory /tmp. If you want to collect the log files from any other directory, on Linux, create the directory where you want to collect the log files. Give "tioadmin" write access to this directory. On Windows,you can collect the log files from anywhere on the server.
638
Subagent bundles
A product-specific subagent consists of one or more bundles. A bundle is an application that is packaged in a format defined by the Open Services Gateway Initiative (OSGi) Service Platform specification, which is implemented in a lightweight infrastructure based on the WebSphere Everywhere Deployment technology. The common agent is installed once on each managed computer. For example, if two management products (product A and product B) manage the same computer, the common agent is installed only once on that computer. The common agent runs two product-specific subagents: one for product A and another for product B. Two software stacks can be used to install the common agent and subagents: v Tivoli Common Agent Stack, which installs the common agent. v CDS_Depot_Stack, which installs the common agent, subagents, and the dynamic content delivery depot. A number of subagent bundles are installed when you install the common agent. You can also install these bundles separately if a target computer already has the common agent. Tivoli Common Agent Stack includes the following software modules:
Table 111. Software modules in Tivoli Common Agent Stack
Software Module TCA-1.4.2 TCA-Feature Tivoli Provisioning Manager Base Description Tivoli Common Agent Version 1.4.2
639
Additional details about using the DcdAdmin automation package are available in the automation package documentation. To view the documentation: 1. Click Go To > Administration > Provisioning > Device Drivers. 2. In the list of device drivers, click DCDAdmin. 3. Click the Documentation link.
Table 113. Automation package documentation for the software modules
Software Module Common Agent service access point Remote Execution and Access (RXA) service access point Device Driver Tivoli Common Agent Service Access Point Tivoli Remote Execution and Access Service Access Point
Procedure
1. Click Go To > Deployment > Software Management > Common Agent Installation. 2. Under Common Agent Stacks, click the common agent software stack for the task. 3. Click Select > Computers and select one or more target computers for the task, then click OK. 4. If no default service access points (SSH or RXA) exist on the target computers, select Create Credentials and specify the credentials for creating a Remote Execution and Access (RXA) service access point on each target computer. 5. Click Schedule to schedule the task to run immediately or at a specified time. 6. Under Notification, configure the notification settings for the task. 7. Click the Advanced tab to set the configuration template parameters. For information about these parameters, see Tivoli Common Agent Stack configuration template parameters on page 633. 8. Click Submit.
Results
After the common agent and the subagents are installed on the specified target computers, the target computers are scanned and the software and hardware inventory information is added to the data model.
640
The following script files are provided for the stand-alone installation of the common agent and subagents: prepareTCAImage.cmd/.sh Creates the required installation image at the specified location. The installation image contains all of the required common agent installers, subagents, and their configuration, and the response file and the installation scripts (install.bat and install.sh) that are used to install the common agent and the subagents. The prepareTCAImage script does not use properties from the software stack as defined in the Tivoli Provisioning Manager user interface, it uses values from the software definition. The prepareTCAImage.cmd/.sh command searches for a global variable called TCA.Standalone.Stack.Name. If the variable exists and points to an existing stack, it uses the properties from the software stack specified in the variable. If the variable does not exist or points to a nonexistent stack, it uses the properties from the software definition Restriction: The stand-alone installer does not support the installation of a dynamic content delivery depot subagent. If you receive the error COPCOM608E after running the prepareTCAImage command, ensure that the Tivoli Provisioning Manager server is running. install.bat/.sh Automatically installs the common agent and the subagents, following the specifications provided in the configuration files. To perform a stand-alone installation of the common agent and subagents, follow these steps:
Procedure
1. Create the required installation image on the provisioning server: a. Log on as tioadmin to the provisioning server. b. At a command prompt, change directory to %TIO_HOME%\tools (Windows) or $TIO_HOME/tools (UNIX). c. Run the following command: v Windows:
prepareTCAImage.cmd [-o <OS>]<tcaimage_install_dir>
where <tcaimage_install_dir> specifies the fully qualified path for the common agent image installation. For example, /var/tcaimage/. If the directory is not specified, a new directory is created. <OS> specifies the operating system. for example: sol for Solaris Operating Environment Sparc
Chapter 7. Deploying software
641
Solaris Intel solx86 Solaris Sparc sol AIX aix Linux Intel linx86 Linux PowerPC linppc IBM on System z lin390 HP UNIX PA-RISC hprisc HP UNIX Itanium hpitan Windows - win
Note: When creating TCAimage files on Windows and transferring them to a UNIX computer, observe the following recommendations: Transfer all the files in a single package, for example in a .tar or a .zip file. After transferring and unpacking the files, check that all required permissions are set on all script and setup files. You can set the execute permission with the following command: chmod +x <file_name>, for example:
nc123072:~ # chmod +x example.sh nc123072:~ # ./example.sh EXECUTED
v UNIX:
prepareTCAImage.sh [-o <OS>]<tcaimage_install_dir>
where: <tcaimage_install_dir> specifies the fully qualified path for the common agent image installation. For example, /var/tcaimage/. If the directory is not specified, a new directory is created. <OS> specifies the operating system. For example: hprisc for HP UNIX PA-RISC
Solaris Intel solx86 Solaris Sparc sol AIX aix Linux Intel linx86 Linux PowerPC linppc Linux 390 lin390 HP UNIX PA-RISC hprisc HP UNIX Itanium hpitan Windows - win
Note: Before launching the common agent installation on a UNIX computer, the execute permission must be added before running the command.
[root@nc123006]# chmod +x install.sh <OS specific dir>/setup.lin
where: <OS specific dir> is, for example, linux86 for Linux Intel If a file without execution permission is launched, when files collected on a Windows platform are transferred to a UNIX computer, you have the following error.
[root@nc123006]# ./install.sh -bash: ./install.sh: Permission denied
Optionally, you can also provide the repository location for the common agent installers (if different from the default one), as a second argument to the previous command. The image that is created contains the following elements:
Table 114. Common agent installation image elements Name aix/ hpux/ Description AIX common agent and JRE installer. HP-UX common agent and JRE installer.
IBM Tivoli Provisioning Manager Version 7.2.0.2 User Guide
642
Table 114. Common agent installation image elements (continued) Name hpux-ia64/ linux390/ linux86/ linuxppc/ solaris/ solarisx86/ windows/ properties/ install.sh install.bat, ihscript.vbs caInstall.rsp readme.txt Common agent installer response file, editable. Provides instructions on how to use the common agent and subagent installer. Description HP-UX-ia64 common agent and JRE installer. Linux on S/390 common agent and JRE installer. Linux/x86 common agent and JRE installer. Linux/PPC common agent and JRE installer. Solaris common agent and JRE installer. Solaris/x86 common agent and JRE installer. Windows common agent and JRE installer. Subagent properties. UNIX installation script. Windows installation scripts.
d. Optional: Edit the configuration files, which are stored in the newly created image directory. v The Agent Manager Host name is provided by the prepareTCAImage.cmd or prepareTCAImage.sh script files. v The Agent Manager Hostname is provided in the caInstall.rsp file. e. Optional: Review the subagent configuration files, located in the properties/ directory. In the jes.properties file, review the following parameters: PollingInterval If required, you can change the default polling interval as described in the Changing the default polling interval on page 542 topic. Addr This parameter specifies the IP address of the device manager federator that the device manager subagent installed on the target computer communicates with. Depending on the environment, it can be either the IP address of the device manager federator installed on the provisioning server or the IP address of the device manager federator agent installed in a branch or regional location.
f. Optional: If required, you can provide a truststore file, by copying the agentTrust.jks file to the root directory of the image. During installation, this file is copied to the <agent_install_dir>/ runtime/agent/cert directory, where <agent_install_dir> is the common agent installation directory. If the CASInstall.TrustoreType parameter is set to copy and the CASInstall.TrustStoreLocation parameter is set to cert, then the agentTrust.jks file must be placed in the <tcaimage_install_dir>/<OS_name>/cert directory, where <tcaimage_install_dir> is the location of the common agent image installation. Example: 1) In the C:\tcaImage\windows\caInstall.rsp file, ensure that the following two parameters are set as described:
CASInstall.TruststoreType="copy" CASInstall.TrustStoreLocation="cert"
2) Replace the existing agentTrust.jks files in the following directories: v C:\tcaImage\aix\cert v C:\tcaImage\hpux\cert v C:\tcaImage\hpux-ia64\cert
Chapter 7. Deploying software
643
v v v v v
v C:\tcaImage\windows\cert 3) Run the C:\tcaImage\install.bat file. The agent now registers with the agentTrust.jks file. g. For Windows systems, if there is no C: drive on the target computer, complete the following steps, where the <tcaimage_install_dir> is the location of the common agent image installation directory: 1) Open the <tcaimage_install_dir>\windows_tca.tpm.feature.zip file and update the tca.tpm.feature.properties file by changing the following row to replace C: with the current system drive:
from.site=file:C:/tcatemp/com.ibm.tivoli.tpm.management.agent
2) Open <tcaimage_install_dir>\windows_tca.tpm.depot.feature.zip and update the tca.tpm.feature.properties file, changing the following row to replace C: with the current system drive:
from.site=file:C:/tcatemp/com.ibm.tivoli.cds.depot.cas.CdsDepot
3) Open <tcaimage_install_dir>\windows\caInstall.rsp and change the following two rows to replace C: with the current system drive:
-P installLocation="C:\Program Files\tivoli\ep" -W CASInstall.ProductFeaturesURL="file:/C:/tcatemp/windows_tca.tpm.feature.zip"
2. Transfer the installation image created in step 1 using mount or CD/DVD to the remote target computer on which you want to install the common agent and the subagents. 3. On the target computer, log on as Administrator (Windows) or root (UNIX or Linux), and run install.bat (Windows) or install.sh (UNIX or Linux) to silently install the common agent and all the subagents on the remote computer, using the image created in step 1 on page 641. Important: v Do not run install.bat before you have transferred the images over to the target. Tip: You can check the install.log file located in the common agent installation directory for any installer output information and error messages.
Results
The common agent and all the subagents are installed on the remote target computer.
What to do next
After the common agent installation is completed, run the Tivoli Common Agent Discovery configuration. The discovery scan will discover all the target computers that are registered with the agent manager. The data model is updated with the new target computers, which are now ready to be managed by the provisioning server. For information about the agent discovery algorithm, see Agent discovery algorithm on page 645. OEM installation using the stand-alone installer: The stand-alone installer provides an option for enabling the OEM installation.
644
The stand-alone installer also provides an option for enabling the OEM installation, which is intended to be run on an operating system that can be used as a base OS image for other new target endpoints. This enables the distribution of the common agent to multiple endpoints, as part of an operating system stack. Unlike the default installation, the OEM installation of the common agent does not automatically start the common agent after installation. The common agent however is configured and contains subagents. The common agent is started only after the first system reboot. During the first startup, the common agent determines that the operating system ID is incorrect, and triggers the generation of a new, real, Tivoli GUID value. The new value is then used to register the common agent with the agent manager. A typical use case for the common agent OEM installation can include the following steps: Procedure 1. Create the required installation image as described above. 2. Edit the C:\tcaImage\caInstall.rsp file to ensure that the line for the CASInstall.OEMInstall parameter is not commented out, and the parameter value is set to true. By default, it is set to false. -W CASInstall.OEMInstall="true" 3. On the target computer, log on as Administrator (Windows) or root (UNIX or Linux), and run install.bat (Windows) or install.sh (UNIX or Linux) to install the common agent and all of the subagents using the image created in step 1. The common agent is not automatically started after the OEM installation. You can check the install.log file located in the common agent installation directory for any installer output information and error messages. Agent discovery algorithm: You can run this discovery configuration to add the computer and its information to the data model. Note the following information about the agent discovery algorithm: IP address If the IP address of the agent changes, you must run the Tivoli Common Agent Discovery configuration to update the data model. The IP address is not updated automatically. Host name If the host name of a computer is changed, this information is only updated after the agent is restarted. However, running the Tivoli Common Agent Discovery configuration does not update the host name of the computer in the data model. Agent information If the new information matches an existing computer in the data model, the information is updated. If the new information does not match an existing computer in the data model, a new computer is created.
For the common agent uninstallation, return values are written to the CA_HOME/runtime/agent/logs/ install/epUnInstallStatus.log file.
Chapter 7. Deploying software
645
where the number variable has a signed integer value. For example, the following lines in the epInstallStatus.log file indicate a successful installation:
#Tue Oct 25 10:38:08 EDT 2005 InstallStatus=0
The following table lists the common agent return values. Note: v Return codes from 31 to 44, and 47 are also used by the common agent toolkit. v Return codes from 3 to 6 see previous versions of common agent services.
Table 115. Installation, upgrade, and uninstallation common agent return values Value of InstallStatus or UnInstallStatus 0 1 2 3 Description Successful installation or uninstallation. Installation canceled by the user. A general installation error. The response file parameter beanEPInfoPanel.EP_Port contains an unsupported value. The numeric value must range from 1 to 65531. The response file parameter beanUpgradeApproval.selection contains an unsupported value. The numeric value must be either 1 or 2. The response file parameter beanRegSvrInfoPanel.DownoladTrustChoice contains an unsupported value. The boolean value must be either true or false. The response file parameter beanCopyCertOptionPanel.COPY_CERT contains an unsupported value. The boolean value must be either true or false. The response file parameter CASInstall.WindowsSpecifyUserAccount contains an unsupported value. The boolean value must be either true or false. The response file parameter CASInstall.PortsConfiguration contains an unsupported value. The supported value can be either: v DISABLE_HTTP v DISABLE_HTTPS v DISABLE_HTTP_DISABLE_HTTPS 9 10 11 12 The response file parameter CASInstall.InstallType contains an unsupported value or is not specified. The value must be install or upgrade. The response file parameter CASInstall.InstallMode contains an unsupported value or is not specified. The value must be choose, advanced, or typical. The response file parameter CASInstall.OEMInstall contains an unsupported value. The boolean value must be either true or false. The response file parameter CASInstall.IgnorePortConficts contains an unsupported value. The boolean value must be either true or false.
4 5 6 7 8
646
Table 115. Installation, upgrade, and uninstallation common agent return values (continued) Value of InstallStatus or UnInstallStatus 13 14 15 16 17 18 19 20 21 22 23 24 25 Description The response file parameter CASInstall.UnmanagedAgent contains an unsupported value. The boolean value must be either true or false. The response file parameter CASInstall.ForceInstall contains an unsupported value. The boolean value must be either true or false. The response file parameter CASInstall.TruststoreType contains an unsupported value. The value must be download, demo, or copy. The response file parameter CASInstall.StartCommonAgent contains an unsupported value. The boolean value must be either true or false. The response file parameter CASInstall.WaitForRegistration contains an unsupported value. The boolean value must be either true or false. The response file parameter CASInstall.WaitForSubagents contains an unsupported value. The boolean value must be either true or false. The response file parameter CASInstall.RollBackOnRegistrationFailure contains an unsupported value. The boolean value must be either true or false. The response file parameter CASInstall.RollBackOnSubagentsFailure contains an unsupported value. The boolean value must be either true or false. The response file parameter CASInstall.RemoveExistingJRE contains an unsupported value. The boolean value must be either true or false. A non-upgradeable version of common agent has been detected at the specified location. A more recent version of common agent is already installed on this computer. Unspecified destination directory name is not specified. The installer detected common agent files in PendingFileRenameOperations in Windows registry. These files will be deleted during the next computer restart. Restart the computer manually and then perform the installation, or change the installation directory. No writing permissions in the specified destination directory. The format of the specified URL is not valid. The specified URL does not point to an archive file. The compressed file specified by this URL is unavailable. The specified URL already exists. The response file parameter CASInstall.AgentName is not specified. The response file parameter CASInstall.AgentPort contains an unsupported value or is not specified. The numeric value must not range from 1 to 65536. The response file parameter CASInstall.NonstopPort1 contains an unsupported value or is not specified. The numeric value must not range from 1 to 65536. The response file parameter CASInstall.NonstopPort2 contains an unsupported value or is not specified. The numeric value must not range from 1 to 65536. The response file parameter CASInstall.WebContainerPort contains an unsupported value or is not specified. The numeric value must not range from -1 to 65536. The response file parameter CASInstall.WebContainerSSLPort contains an unsupported value or is not specified. The numeric value must not range from -1 to 65536. The specified common agent ports are already in use. Common agent port conflicts have been detected.
26 27 28 29 30 31 32 33 34 35 36
37 38
647
Table 115. Installation, upgrade, and uninstallation common agent return values (continued) Value of InstallStatus or UnInstallStatus 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 Description The response file parameter CASInstall.AgentManagerHostName is not specified. The response file parameter CASInstall.PublicPort contains an unsupported value or is not specified. The numeric value must not range from 1 to 65536. The response file parameter CASInstall.AgentManagerContextRoot is not specified. The connection to the agent manager was established successfully, but the trust certificate has expired. The connection to the agent manager was established successfully, but the trust certificate is not valid. The connection to the agent manager has failed. The directory specified in CASInstall.TruststoreLocation cannot be found. The agentTrust.jks file, specified in CASInstall.TruststoreLocation, cannot be found. The registration password is not valid. The common agent cannot register. The response file parameter CASInstall.RegistrationPassword is not specified. The password and password confirmation are not specified. The common agent registration passwords do not match. The password and the Windows account user do not match. The user has not been granted the requested logon type on this computer. The password is not specified. The password confirmation field can only be empty if the password is specified. The Windows account password and the confirmation password do not match. The response file parameter CASInstall.WindowsAccountID is not specified. The Windows account ID contains one or more unsupported characters: \",<,>,^,=,;,&,|,?,,,*,/,[,],:,+, 57 58 The response file parameter CASInstall.WindowsAccountPassword is not specified. The installation failed. Check epPreinsall.log in the common agent installation directory for details. Check also other log files in the runtime/agent/log/install directory. An error occurred during the common agent registration. An error occurred during subagents installation. An error occurred during the GUID installation. The CASInstall.OEMInstall is set to true, although a common agent is installed on the system. The common agent cannot be uninstalled because one or more subagents are installed on top of the common agent. The common agent upgrade failed because a number of locked common agents have been detected. The installer was not able to back up the files that were modified during the upgrade procedure. The installer was not able to load the common agent properties file. The installer was not able to set file attributes.
59 60 61 62 63 64 65 66 67
648
Table 115. Installation, upgrade, and uninstallation common agent return values (continued) Value of InstallStatus or UnInstallStatus 68 Description The installer was not able to upgrade the properties file during the installation or upgrade: v //conf/overrides/config.properties v //conf/webcontainer.properties v //runtime//agent//config//endpoint.properties v //conf//overrides//upgrade.properties v //conf//overrides//logging.properties 69 70 71 72 73 74 75 76 77 78 79 80 81 82 The installer was not able to update the common agent scripts during the installation or upgrade. The installer was not able to create the specified user account. The installer was not able to run the LWI JAVA_HOME script in order to set the appropriate JRE for the common agent. The installer was not able to update the common agent registry. The registry is stored in the ep.reg file. This error might be caused by inconsistent registry content. The installer was not able to update the common agent status. The installer was not able to create the common agent service. The installer was not able to start the common agent. The installer was not able to detect the existing JRE installation directory. The installer was not able to delete the existing JRE installation directory. The installer was not able to install the specified subagent. The subagent's descriptor does not contain any property file. The timeout value was not provided in the correct format. It must be a positive number. The library specified in the CASInstall.NativesLibraryName property already exists. The library name specified in the CASInstall.NativesLibraryName property is too long (maximum 10 characters are allowed). The installation location path specified in the CASInstall.installLocation property is not valid. The installer is not able to resolve the lightweight runtime environment instance root and the instance name. The lightweight runtime environment instance location path specified in the CASInstall.installLocation property already exists. The response file contains an empty value in the CASInstall.LWIInstanceApachePort field. The port number in the CASInstall.LWIInstanceApachePort field is not entirely numeric or between 1 and 65536. This property is mandatory on the OS/400 platform. The response file contains an empty value in field CASInstall.LWIInstanceApacheServerName. This property is mandatory on the OS/400 platform. An error occurred during subagents uninstallation. The validator of the connection to the agent manager was not able to perform the validation within the specified amount of time.
83 84
85
86 87
649
Parameters
The following table lists the common agent runtime return values. Note: Return codes from 31 to 44 are also used by the installer.
Table 116. Common agent runtime return values Value of InstallStatus or UnInstallStatus 0 31 Description Successful operation performed by the common agent. v The response file parameter CASInstall.AgentName is not specified (installation return code). v The postinstallation configuration tool: the properties file specified with the -options property contains an empty value in the agentName field. 32 v The response file parameter CASInstall.AgentPort contains an unsupported value or is not specified. The numeric value must not range from 1 to 65536. v The postinstallation configuration tool: the properties file specified with the -options property contains an empty value in the agentPort field. 33 v The response file parameter CASInstall.NonstopPort1 contains an unsupported value or is not specified. The numeric value must not range from 1 to 65536. v The postinstallation configuration tool: the properties file specified with the -options property contains an empty value in the nonstopPort1 field. 34 v The response file parameter CASInstall.NonstopPort2 contains an unsupported value or is not specified. The numeric value must not range from 1 to 65536. v The postinstallation configuration tool: the properties file specified with the -options property contains an empty value in the nonstopPort2 field. 35 v The response file parameter CASInstall.WebContainerPort contains an unsupported value or is not specified. The numeric value must not range from -1 to 65536, excluding 0. v The postinstallation configuration tool: the properties file specified with the -options property contains an empty value in the webContainerPort field. 36 v The response file parameter CASInstall.WebContainerSSLPort contains an unsupported value or is not specified. The numeric value must not range from -1 to 65536, excluding 0. v The postinstallation configuration tool: the properties file specified with the -options property contains an empty value in the webContainerSSLPort field. 37 38 39 The specified common agent ports are already in use and port conflicts might occur. The common agent might not start or operate correctly. Common agent port conflicts have been detected. v The response file parameter CASInstall.AgentManagerHostName is not specified. The numeric value must not range from -1 to 65536. v The postinstallation configuration tool: the properties file specified with the -options property contains an empty value in the agentManagerHostName field. 40 v The response file parameter CASInstall.PublicPort contains an unsupported value or is not specified. The numeric value must not range from 1 to 65536. v The postinstallation configuration tool: the properties file specified with the -options property contains an empty value in the publicPort field.
650
Table 116. Common agent runtime return values (continued) Value of InstallStatus or UnInstallStatus 41 Description v The response file parameter CASInstall.AgentManagerContextRoot is not specified. v The postinstallation configuration tool: the properties file specified with the -options property contains an empty value in the agentManagerContextRoot field. 42 43 44 4546 47 4886 87 88 89 The connection to the agent manager was established successfully, but the trust certificate from the certificate authority has expired. The connection to the agent manager was established successfully, but the trust certificate is not valid yet. The connection to the agent manager has failed. Installation return codes. The registration password is not valid. The common agent cannot register. Installation return codes. Validation timeout. The validator of the connection to the agent manager was not able to perform the validation within the specified amount of time. Downloading of the trust certificates has failed, null certificates returned. Configure.sh/bat script error. One of required parameters are not provided. Specify one of the following options: v -options v -unmanaged v -amhost v -password v -prompt 90 Configure.sh/bat script error. The common agent has already been configured and it contains the certificate files. Running the configuration tool might delete or unregister the common agent. Specify the -force option to unregister or reconfigure the common agent. Configure.sh/bat script error. An error occurred while reading the password form console. Configure.sh/bat script error. An error occurred while applying the configuration to the common agent. Configure.sh/bat script error. An error occurred while installing the nonstop service for the common agent. Configure.sh/bat script error. An error occurred while starting the common agent.
91 92 93 94
651
The default listening port number for the common agent is 9510. If required, you can change the default common agent port number before the common agent installation. To be able to override the default common agent port number, you must define a CA-Listening-Port variable in the configuration template associated with the common agent software module. To change the default port number for the common agent installation:
Procedure
1. 2. 3. 4. Click Go To > IT Infrastructure > Software Catalog > Software Stacks. Click the software stack, for example, Tivoli Common Agent Stack. Under Configuration Templates, click TCA default. Under Template Parameters, click New Parameter and specify the following values: a. In the Parameter field, type CA-Listening-Port. b. In the Parameter Value field, type the new default port number for the common agent. Be sure to specify an unused port, because the common agent does not check for port conflicts. c. In the Parameter Type field, click String. . 5. Click Save 6. Go to $TIO_HOME/repository/tivoli/TCA and modify the response files that are found in this directory. The file name format is caInstall.<OS>.rsp. In each file, find the line-W CASInstall.AgentPort="9510" and set the port 9510 to the new port number. Save each response file with the new value. 7. Install the agent. 8. Update the port number configured in the common agent service access point: a. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Computers. b. In the list, find the computer that you want to update and click its name. c. Click the Credentials tab. d. In the list, find Agent-Server and click its icon. e. In the Port field, type the new common agent port number. f. Click Save .
Results
You have finished changing the default listening port number for the common agent. The new port number will be used during the common agent installation.
652
The default location for installing the common agent can be customized as required. For more information about how to override the default installation path, see the Overriding the default common agent installation path topic. UNIX Run the following command: ./<agent_installdir>/runtime/agent/bin/endpoint.sh start To stop the agent on all systems using the command line: Windows Use the Windows Services window or the Services folder in the Microsoft Management Console to stop the service with the following name:
IBM Tivoli Common Agent - agent_installdir
UNIX Run the command: ./agent_installdir/runtime/agent/bin/endpoint.sh stop Using provisioning workflows: If you have installed the common agent with RXA and already have one (not more) RXA service access point defined on the target computer, you can also use the TCA_SoftwareInstallation_Start.wkf and TCA_SoftwareInstallation_Stop.wkf provisioning workflows to start and stop the common agent and subagents. To run the provisioning workflow: 1. Click Go To > Administration > Provisioning > Provisioning Workflows. 2. Find the provisioning workflow name and click it. 3. From the Select Action menu, click Run Workflow. 4. In the SoftwareInstallationID field, type the software installation ID for the common agent installation object. To find the software installation ID, use the Data Model Object Finder application. 5. Click Run. The Workflow Status page is displayed with the status of the workflow execution. You can also use the TCA_Restart_Agent workflow to stop and start the agent. To run the provisioning workflow: 1. 2. 3. 4. 5. Click Go To > Administration > Provisioning > Provisioning Workflows. Find the provisioning workflow name and click it. From the Select Action menu, click Run Workflow. In the DeviceID field, type the DCM ID of the target system. In the Name field, type the software installation instance for Tivoli Common Agent, for example TCA-1.4.2.
6. Click Run.
653
The install-path variable that is defined in the configuration template associated with the common agent software module specifies the default common agent installation path. The following installation path variables can be used to override the default common agent installation path: v v v v v v v v AIX_Install_Path_Override where value is /usr/tivoli/ep HPUX_Install_Path_Override where value is /opt/tivoli/ep Solaris_Install_Path_Override where value is /opt/tivoli/ep Linux86_Install_Path_Override where value is /opt/tivoli/ep Linux390_Install_Path_Override where value is /opt/tivoli/ep LinuxPPC_Install_Path_Override where value is /opt/tivoli/ep Windows_Install_Path_Override where value is C:\Program Files\tivoli\ep HPUXItanium_Install_Path_Override where value is /opt/tivoli/ep
v Solaris86_Install_Path_Override where value is /opt/tivoli/ep To override the default common agent installation path, you need to set the value of the selected parameter, for example, Windows_Install_Path_Override, to the new installation path for the common agent, for example, C:\Programme\tivoli\ep in the configuration template. To override the default common agent installation path:
Procedure
1. Click Go To > IT Infrastructure > Software Catalog > Software Stacks. 2. Find the software stack called Tivoli Common Agent Stack and click it. 3. Under Configuration Templates, click TCA defaultnumber. 4. Under Parameter, click the icon for the appropriate parameter, for example, Windows_Install_Path_Override. 5. In the Parameter Value field, type the new installation path for the common agent, for example, C:\Programme\tivoli\ep. 6. Click Save .
Results
The default common agent installation path for the selected software definition has now changed to the specified new location. This change is permanent, meaning that any upgrades for this agent will use this value. Tip: If you want to change the common agent installation path just for the current installation of the common agent: 1. Click Go To > Deployment > Software Management > Common Agent Installation. 2. Click the Advanced tab. 3. Under Configuration Templates, click Default Template > TCA default. 4. Under Template Parameters, click the icon for the appropriate parameter, for example, Windows_Install_Path_Override. 5. In the Parameter Value field, type the new installation path for the common agent, for example, C:\Programme\tivoli\ep. 6. Click Save .
654
Based on the total number of managed systems, you must determine the most appropriate polling interval for your needs. For small numbers of managed systems, reducing the target polling interval can be acceptable. For large numbers of managed systems, short polling intervals might be detrimental to the overall system performance. Important: You can specify values for the polling interval in two places, in the software definition, and in the software stack. If you are using the prepareTCAImage script to complete a stand-alone common agent installation, the properties for the polling interval from the software definition are used by default. You can change this behavior by setting the TCA.Standalone.Stack.Name variable and specifying a software stack to use. The prepareTCAImage command searches for a global variable called TCA.Standalone.Stack.Name. If the variable exists and points to an existing stack, it uses the properties from the stack specified in the variable. If the variable does not exist or points to a nonexistent stack, the properties from the software definition are used for the default polling interval. You can change the polling interval in the TCA-Subagent JES configuration template, available in both the Tivoli Common Agent Stack and CDS_Depot_Stack configuration templates. Each stack contains its own unique copy of the PollingInterval template parameter. If a change is required in both places, the procedure must be performed in both stacks. The following procedure describes how to change the polling interval where the properties from the software stack are used to define the polling interval. If you are using the prepareTCAImage script for common agent installations, the following procedure does not change the default polling interval unless you have set the TCA.Standalone.Stack.Name variable and specified the software stack to use for the polling interval. If you are using the properties from the software stack, complete the following steps to change the polling interval:
Procedure
1. Click Go To > IT Infrastructure > Software Catalog > Software Stacks. 2. Find the software stack called Tivoli Common Agent Stack or CDS_Depot_Stack and click it. 3. Under Configuration Templates, expand the TCA-TPM-Base Feature default template. 4. Select TCA-JES Default. 5. Click the icon for the PollingInterval parameter and type the new interval in the Value field. For example, if you want to set it to 10 minutes, enter 00:10.
Results
You are now ready to install the common agent and the depot server. The default polling interval is reset to the specified value.
What to do next
After the polling interval is reset to the specified value, you can install the common agent and the depot server.
655
Procedure
1. 2. 3. 4. Click Go To > IT Infrastructure > Software Catalog > Software Stacks. In the list of stacks, find Tivoli Common Agent Stack. Under Configuration Templates, expand TCA-Feature Tivoli Provisioning Manager Base.<number>. Click TCA-CDS Client URL Handler Default.
5. Under Template Parameters, expand the cache_max_size parameter, and type the new value in the Parameter Value field. 6. Click Save .
Results
You have finished configuring the default peering cache size for the target computers.
656
The local administrator user can be defined either as a local user or as a domain user. The local administrator user will use the RXA credentials specified on the Common Agent Installation page for running the common agent service. Running the common agent as a local administrator user or as LOCAL_SYSTEM: When installing the agent, if the domain user must be used, then provide it as domain_name\domain_user not as just domain_user. The user can also be passed as domain_user@domain. However domain_name\domain_user is the recommended usage.
Distribution
The Dynamic Depot Selection (DDS) algorithm in dynamic content delivery determines the best depots in which to cache a file when it is passed into a list of target computers. It uses a configurable ratio between depots and target computers to figure out how many depots to put in the target list. It generates a custom target list for the deployment. You will not see this target list in the list of user defined target lists. The default ratio between depots and target computers is 50. If you do not have more than 50 target computers, it will only put the file on a single depot. For example, if you have 100 target computers, and CDS_DDSS_RATIO=20 then it will try to publish to 5 depots. That is, if 5 depots have been created. You can change this ratio by creating a variable with the name CDS_DDSS_RATIO under Systems Mangement > Global Settings.
Retry window
The retry window represents the time, in seconds, that a distribution is set to expire. The distribution will expire so that the client can keep retrying the download if it fails (for example, if the management center is too busy or the depot servers are too busy during the first try). By default, Tivoli Provisioning Manager sets the retry value to 7200 seconds. You can change this window by creating a variable named retryWindowSec under Systems Management > Global Settings. The value of maxRetryIntervalSec is the maximum time to wait between retries, in seconds. The default for this value is 30 seconds. You can change the default value by creating a variable with name maxRetryIntervalSec and specifying its value in seconds.
Procedure
1. Log on to the WebSphere Application Server console. 2. On the Security tab, click Global Security. 3. Expand JAAS Configuration and select J2C Authentication Data.
Chapter 7. Deploying software
657
4. Click CDSDataAuth. 5. Enter the new password. Click Apply > OK. 6. Save your changes.
Procedure
1. Add the following line to the %TIO_HOME%\config\log4j.prop file:
log4j.category.com.ibm.tivoli.orchestrator.datacentermodel.helper. ComplianceHelper=<LOG LEVEL>
2. Set the value of <LOG LEVEL> to anything higher than DEBUG. For example, OFF, FATAL, ERROR, or WARN are all valid entries.
Procedure
v cds_trace_depot.log: Search for addFile: It indicates if the file was published. v rcp.log: This log verifies if it received a job to process. Look for a message like this:
2006.04.24 15:08:43-05:00 JES023I Processing job: name = SPBDistribute, requestId = 20dc8ea1d3ce11dabc68000d609d5a54
v tmp.log: This log verifies if it received a call, copyFile, to the FileManagementService. Look for a message like this:
2006.04.24 15:08:43-05:00 TPMFMS001I File copy: source file: cdss://CDS_Administrator:@9.48.182.9:9453/1145908975030 target file: file:C:\WINNT\TEMP\CitScannerAgent_w2k.jar 2006/07/14 0:49:48 com.ibm.tivoli.tpm.osgi.service.impl. FileManagementServiceImpl copyFile INFO: TPMFMS005I File copy: Copied 711 bytes.
%CDS_Install_Location%\DCD\Manager\logprop
658
UNIX
$CDS_Install_Location/CDS/Manager/logprop
Important: After making changes to the logging and tracing, restart the provisioning server. v v
Windows UNIX
tio.cmd start
Linux
tio.sh start
By default, the logging and tracing level of all components is set to DEBUG_MIN. To configure the logging and tracing level of a component, set the component_name.logger.level property for that component in the cdsLog.properties file to the required level. For example, to set the logging and tracing level for a depot server to the maximum setting, set the server.logger.level property in the depot server cdsLog.properties file to DEBUG_MAX as shown in the following example:
server.logger.level=DEBUG_MAX
659
MB, msg_depotserver1.log is renamed msg_depotserver2.log, msg_depotserver.log is renamed msg_depotserver1.log, and a new msg_depotserver.log is created. To configure the maximum number of log and trace files for a component, set the component_nameFileHandler.maxFiles property for the component in the cdsLog.properties file. For example, to set the maximum number of log and trace files for the depot server to 5, set the serverFileHandler.maxFiles property in the depot server cdsLog.properties file as shown in the following example:
serverFileHandler.maxFiles=5
To configure the maximum size of log and trace files for a component, set the component_nameFileHandler.maxFileSize value for the component in the cdsLog.properties file. Specify the value in KB. For example, to set the maximum size of log and trace files for the depot server to 10 240 KB (10 MB), set the serverFileHandler.maxFiles property in the depot server cdsLog.properties file as shown in the following example:
serverFileHandler.maxFileSize=10240
By default, the logging and tracing level of all components is set to DEBUG_MIN. To configure the logging and tracing level of a component, set the component_name.logger.level property for that component in the cdsLog.properties file to the required level. For example, to set the logging and tracing level for a depot server to the maximum setting, set the server.logger.level property in the depot server cdsLog.properties file to DEBUG_MAX as shown in the following example:
server.logger.level=DEBUG_MAX
660
For example, the depot server writes messages to msg_depotserver.log. When that file reaches 8 MB, it is renamed msg_depotserver1.log and a new msg_depotserver.log file is created. When that file reaches 8 MB, msg_depotserver1.log is renamed msg_depotserver2.log, msg_depotserver.log is renamed msg_depotserver1.log, and a new msg_depotserver.log is created. To configure the maximum number of log and trace files for a component, set the component_nameFileHandler.maxFiles property for the component in the cdsLog.properties file. For example, to set the maximum number of log and trace files for the depot server to 5, set the serverFileHandler.maxFiles property in the depot server cdsLog.properties file as shown in the following example:
serverFileHandler.maxFiles=5
To configure the maximum size of log and trace files for a component, set the component_nameFileHandler.maxFileSize value for the component in the cdsLog.properties file. Specify the value in KB. For example, to set the maximum size of log and trace files for the depot server to 10 240 KB (10 MB), set the serverFileHandler.maxFiles property in the depot server cdsLog.properties file as shown in the following example:
serverFileHandler.maxFileSize=10240
661
Table 119. Log and trace files for the management center (continued) File name msg_client.log trace_client.log msg_EPM_Install.log trace_EPM_Install.log MC_DB_Install.err MC_DB_Install.out MC_WAS_* msg_EPM_Install.log trace_EPM_Install.log trace_manager_install.log trace_rxa.log msg_rxa.log CDS_DB2_install_schema.log Contents Message and tracing information for the download applet. Message and tracing information about the installation of the management center. Logging information about the installation of the management center database. Logging information about the WebSphere Application Server settings configured during installation and uninstallation. Message and tracing information about the WebSphere Application Server settings configured during installation and uninstallation. Tracing information about the installation and uninstallation of the management center. Logging information about the Remote Execution and Access (RXA) component. Logging information for the DB2 installation.
The log and trace files are in ASCII format. If an .err file displays 0 KB as file size, the file might not necessarily be empty.
662
The current values for these parameters are located in the jes.properties file in the common agent. When you run the workflow, the target computer will update the property file and then set the runtime value without restarting the common agent. If the common agent is not able to save the change to the property file, the workflow will fail and the runtime value will remain unchanged. The property file has to be updated, or else restarting the common agent or rebooting the computer will revert the file to its original value.
where: v DMS_F_Pi is the device manager federated polling interval set in the WebSphere Application Server or the lightweight run time. v JES_Pi is the job execution services polling interval on the common agent. This is set in the Tivoli Common Agent stack or in the jes.properties file on the target computer. v JT is the time it takes the scalable distribution infrastructure job to run. This can include the time it takes to download files, run scans, and upload results. v DI is the time it takes the dmsresultserver to process the incoming results from all of the target computers. It is typically a quick process, but it can take some time, depending on the number of target computers.
Procedure
1. Locate the traceConfig.properties file. v Location of the device manager only:
%WAS_HOME%/profiles/ctgAppSrv01/installedApps/ctgCell01/DMS_WebApp.ear/ dmserver.war/WEB-INF/classes/traceConfig.properties
v Location of the device manager (includes all of the device manager servers in a cluster):
663
2. Set the following values in the traceConfig.properties file: v TraceLevel: Set this value to 3. The default value is 1. There are four possible TraceLevel values: 0, 1, 2, and 3, where 3 gives the most detail and 0 means that no trace messages will be shown. v DISPLAY_ENTRY_EXIT: Set this value to true. v MaxFileSize: Sets the maximum file size of each file. Set this value to 55555. v MaxTraceFiles: Sets the maximum of files. When the maximum is reached, the oldest file is deleted. Set this value to 10. v Set tracing for all of the following device manager components to true: component.console=false component.dmserver=true component.event=false component.notification=false component.plugins=true component.resultscollector=false component.twgapi=false component.database=true component.enrollserver=true component.datconverter=false
What to do next
When the changes have been implemented, restart the server so that the changes will take effect. Note: If you think there are problems, copy the trace files to another location so that they are not overwritten.
664
file path is WAS_PROFILE_DIR/logs/DMS_AppServer/SystemOut.log. You can use this log file to determine whether DMS_AppServer was started without exceptions and to view trace messages when tracing is active. SystemErr.log This file gathers standard error information from the DMS_AppServer application server. Use this log file to view exceptions by device manager servlets that were added to the standard error stream. The full file path is WAS_PROFILE_DIR/logs/DMS_AppServer/SystemErr.log.
Procedure
1. Log on to the WebSphere Application Server console. 2. Navigate to Servers -> Application Servers -> MXServer -> Web Container Settings -> Web container transport chains. 3. Record the WCInboundDefault port number. 4. Navigate to Environment ->Virtual Hosts -> TPMVirtualHost -> Host Alias. 5. Ensure that there is an entry for the host name and port. This is the port from step 3. 6. Restart WebSphere Application Server. 7. Launch dmconsole and specify the device manager server. For example:
<fully_qualified_hostname>:port
where port is the port number from step 3. 8. Change the directory to dmconsole_dev and run the DMconsole.bat file. For the user name and password, use dmadmin / dmadmin. Leave the other fields with their default values. Ignore the error that appears. 9. In the left navigation pane, click Jobs and then click Submit.
Results
You will now be able to view your jobs. Click View > Refresh to update the data.
665
Follow these steps when you want to make sure that the device manager is installed and configured correctly.
Procedure
v Run the command:
https://<fully_qualified_host_name_server>:9045/dmserver/TraceServlet?trace=set
If the installation is successful, the command returns SUCCESS! v Check the log files for errors. The log files are located in the %WAS_HOME%\profiles\ctgAppSrv01\ logs\MXServer directory, in the DMSMsgn.log and TraceDMSn.log files (where the last n is replaced by 1).
666
Table 120. Log file locations File name /TEMP_DIR/DMS_install.log /TEMP_DIR/DMS_uninstall.log /DeviceManager/log/dms_config_trace.log Description Contains information about the device manager installation. Contains information about the uninstallation of the device manager. Contains detailed installation information for device manager server and device manager database configurations. Contains information about the device manager migration.
/DeviceManager/log/dms_migrate_trace.log
667
5. Publish the required installables for the agent upgrade for your operating system to selected depot servers: Note: From the list of installables provided for the common agent upgrade, you must determine what operating systems you have on your target computers and publish only the installables that are required for those operating systems. You can avoid generating unnecessary traffic by publishing only the required installables over a fast connection and to a depot server that is close by. a. Click Go To > Deployment > Software Management > Software Product Publishing. b. Type a name for the provisioning task. This name is used to view the provisioning task status on the Provisioning Task Tracking page. c. Under Select Software, specify the installation file for the provisioning task. d. Under Select Depots, select one or more target depot servers for the provisioning task. e. Click Submit. 6. (Optional) Distribute the installables to the target computers. If files are not distributed, the upgrade step also performs the distribution. a. Click Go To > Deployment > Software Management > Software Product Distribution. b. Under Select Software, select the software product that you want to distribute. For example, TCA-1.4.2.1 Upgrade. c. Under Targets, specify the target computers where you want to copy the software. d. Schedule the provisioning task to run at a specified time. e. Click Submit. A single implementation of the SoftwareInstallable.Distribute logical management operation is assigned to each selected installable. To distribute all of the required packages, select to distribute the required upgrade software package, and all the other packages are distributed automatically to the target systems. 7. Upgrade the common agent on the target computers: a. Click Go To > Deployment > Software Management > Software Product Upgrade. b. Under Select Software, select the common agent installable for the upgrade, for example, TCA-1.4.2.1. c. Under Targets, filter the displayed targets By Computer or By Group, and then select the target computers or the provisioning group for the provisioning task. Tip: To be able to sort the target computers By Group, first create a dynamic provisioning group that includes all of the computers that have the upgradeable version of the common agent, 1.4.2.1. The dynamic provisioning group can be created based on a specific inventory report. d. (Optional) Schedule the provisioning task to run at a specified time. e. Click Submit. The provisioning task is run against the specified target computers. When the provisioning task has completed successfully, the common agents on all the selected target computers are upgraded to the 1.4.2.1 version.
668
The script is located in the root directory of the common agent installation image. For example, C:\tcaimage (Windows) or /var/tcaimage/ (UNIX or Linux). To perform a stand-alone upgrade of the common agent and subagents, follow these steps:
Procedure
1. Create the required installation image on the provisioning server. For more information about creating the installation image, see Installing the common agent and subagents using a stand-alone installation on page 641. 2. Transfer the installation image created in step 1 using mount or a CD, or DVD to the remote target computer on which you want to upgrade the common agent and the subagents. 3. On the target computer, log on as Administrator (Windows) or root (UNIX or Linux). Run upgrade.bat (Windows) or upgrade.sh (UNIX or Linux) to silently upgrade the common agent and all the subagents on the remote computer, using the image created in step 1. During the upgrade, the common agent is upgraded first, and then some of the subagents are removed, added, or updated. The log files for the upgrade are located in /tmp/TCAUpgrade/.
Procedure
1. Click Go To > Deployment > Software Management > Software Product Uninstallation. 2. Click Select Software and select the TCA-1.4.2 software product, then click OK. 3. Click Select > Groups and select your group of computers, then click OK. 4. Click Submit to uninstall the common agent.
Results
The common agent is removed from all the target computers in the selected group. Together with the common agent, all of its subagents are also removed from the target computers. Note: For an alternative way of uninstalling the common agent from a group of computers, see Unpublishing the software and uninstalling the common agent on page 581.
669
Procedure
1. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Computers. 2. Search for the target computer and click its name. 3. From the Select Action menu, click Uninstall > Common Agent.
Results
The common agent is removed from the selected target computer. Removing the common agent also removes all its subagents.
5. On Windows operating systems, delete the Windows service for the common agent. Use one of the following methods: v Run the srvinstw.exe command, which is available in the Windows Resources Toolkit. This command launches a window in which you select the service to be deleted. v Download the InstallUtil utility. Run the following command:
InstallUtil uninstallservice service_name
670
v Manually edit the Windows Registry. Important: Be careful when editing the Windows Registry. An incorrect change can damage the operating system. a. Make a backup copy of the registry. b. In a registry editor such as regedit or "regedit32", expand the following keys: My Computer HKEY_LOCAL_MACHINE SYSTEM CurrentControlSet Services IBMTivoliCommonAgentn, where n is an integer starting with 0 for the first common agent that was installed on the system. c. Check the value of the Image Path key for the IBMTivoliCommonAgentn entry. This value specifies the directory in which the common agent was installed. Use the value to make sure that you are deleting the registry entry for the correct common agent. d. Delete the IBMTivoliCommonAgentn key for each common agent that you are removing. 6. 7. e. Save the changes to the registry. If a Windows account was created for the common agent and you do not need it when reinstalling the common agent, delete the account. Remove the entry for the common agent in the registry. On the server, use the RetrieveAgents, PurgeAgents, and LogicallyDeleteAgents utilities to identify and remove registry entries for the common agent. On Windows operating systems, restart the operating system to remove the Windows service. Optionally, delete the common agent installation directory. Optionally, uninstall the Tivoli GUID. On Windows, use Add or Remove Programs to uninstall TivGuid.
8. 9. 10.
On UNIX 1. Log on to the target computer as root. 2. At a command prompt, change directory to the common agent installation directory. The default installation directory is: v AIX or HP-UX: /usr/tivoli/ep v Linux or Solaris: /opt/tivoli/ep 3. In the _uninst directory, run the following command: ./uninstall.sh -console or ./uninstall -console, depending on your platform. 4. Delete the following files if they exist: v ep.reg v ep.bak Note: If you are uninstalling all common agents from the system, delete both the ep.reg and ep.bak files. If you are uninstalling a specific common agent, delete the line in the ep.reg and ep.bak files that lists the installation directory of the common agent that you are uninstalling. For example, to uninstall the common agent installed in the /opt/tivoli/ep1 directory, delete the line that begins with:
0 | cygnus0317b | /opt/tivoli/ep1 | 1.3.0.5 | 0 | 1.4.2 | IBM Corp...
671
AIX or HP-UX /usr/tivoli/ Linux or Solaris /opt/tivoli/ 5. Manually delete the common agent installation directory from the target. From the tivoli subfolder, run the following command: rm -rf ep*. If ep is the only subfolder in the /opt/tivoli folder, you can also run the following command from the /opt directory: rm -rf tivoli.
2. Uninstall all prerequisite file sets. 3. Uninstall the TivGUID with the following command
installp -u tivoli.tivguid
4. Delete the etc/TIVGUID file. On Linux 1. List all installed TivGUID packages with the following command:
rpm -qa |grep guid
and note the version number. 2. Uninstall the TivGUID with the following command:
rpm -e TIVguid-<version_number>
3. Delete the etc/TIVGUID file. On Solaris 1. Remove the TivGUID folder with the following command:
rm -rf /opt/tivoli/guid
2. Delete the etc/TIVGUID file. On HP 1. List all TivGUID packages with the following command:
swlist |grep guid
672
Procedure
1. Delete the CIT directory. The CIT directory is located in the following path, depending on the operating system: Windows Program_Files_Dir\tivoli, where Program_Files_Dir is the value of the Windows registry entry. AIX or HP-UX /usr/tivoli Linux or Solaris: /opt/tivoli 2. Remove the cit.ini file. The cit.ini file is located in the following path: Windows %WINDIR%\cit UNIX /etc/cit
Cleaning up the data model after the manual removal of the common agent
After you have manually uninstalled the common agent, you must clean up the data model to remove all the software modules in the common agent stack that were created during the common agent installation. The default Agent-Server service access point from the target computer must be removed as well. To clean up the data model, you must run the IBM Tivoli Common Agent Discovery configuration. For more information, see Running the common agent discovery scan on page 575.
Procedure
1. Click Go To > Administration > Provisioning > Provisioning Workflows. 2. Search for the TCA_Force_Uninstall_Agent provisioning workflow and click its name. 3. From the Select Action menu, click Run Workflow. 4. In the DeviceID field, type the device ID for the target computer. In the EpInstallPath field, type the fully qualified path where the common agent is installed. If the fully qualified path is not specified, the workflow will look up the installation path for the specified target in the data model. An exception is thrown if the path is not found in the data model. 5. Click Run.
673
What to do next
The workflow runs successfully and uninstalls the agent and cleans up the data model.
Procedure
1. Log in as root, Administrator, or Provisioning Administrator (tioadmin). 2. Browse to the AgentManager_Home/toolkit/bin directory and run the following command:
RetrieveAgents.sh [bat] -toolkitPassword <password> [-me<IDS>]
where: password Is the password of your database administrator. me Is the Managed Element ID
This parameter is optional. If you do not specify it, the command returns all agents. The following text is an example of the output of the command:
todxs05:/opt/IBM/AgentManager/toolkit/bin # ./RetrieveAgents.sh -toolkitPassword mypassword 3 Agent(s) found. Agent 0: Agent Name: todaix06.think.lab.austin.ibm.com Hostname: todaix06.think.lab.austin.ibm.com IP(s): 10.0.1.47 Port: 19510 Install Directory: file:///usr/tivoli/ep/runtime/agent Managed Element ID: 46d461faecc33e718b2b21259fc2cb71
674
Operating System ID: 9e68170443c511dd915308630a00012f Agent 1: Agent Name: todblade05 Hostname: todblade05.think.lab.austin.ibm.com IP(s): 10.0.1.53 Port: 9510 Install Directory: file:///C:/Program Files/tivoli/ep/runtime/agent Managed Element ID: 6f5148b2876839adadd7e8bb05663b5d Operating System ID: 853fbb21b5d911dd890500096bb561a3 Agent 2: Agent Name: todblade06 Hostname: todblade06 IP(s): 10.0.1.54 Port: 19510 Install Directory: file:///C:/Program Files/tivoli/ep/runtime/agent Managed Element ID: 4f11277a9b993df5b9f1781362399fc1 Operating System ID: 26a20321ca4c11dda67b000d604e985b
3. To delete the expired agents, run the following command specifying the managed element ID retrieved in step 2 on page 674:
LogicallyDeleteAgents.sh [.bat] -toolkitPassword <password> me <IDS>
For example, to delete the todblade05 agent, with managed element ID 6f5148b2876839adadd7e8bb05663b5d, type the following command:
todxs05:/opt/IBM/AgentManager/toolkit/bin # ./LogicallyDeleteAgents.sh -toolkitPassword mypassword -me 6f5148b2876839adadd7e8bb05663b5d
4. To remove the expired agent from the list of active agents, type the following command:
PurgeAgents.sh [.bat] -toolkitPassword <password> [-me <managed_element_ID>]
For example, to purge the todblade05 agent, with managed element ID 6f5148b2876839adadd7e8bb05663b5d, type the following command:
todxs05:/opt/IBM/AgentManager/toolkit/bin # ./PurgeAgents.sh -toolkitPassword mypassword -me 6f5148b2876839adadd7e8bb05663b5d
5. You can now list all the agents again to see which agents are still active. 6. Run the common agent discovery.
Agent registration
During installation, the common agent registers with the agent manager. You can configure settings for agent registration and manage registration of agents.
675
general communication with registered agents. This communication is based on mutually authenticated SSL. After the registration process completes, the common agent connects to the agent manager on port number 9512. Port number 9513 Public ports The agent manager uses this non-SSL port number to work around secure communication problems if the registration process fails. If a new agent cannot complete the registration process on port number 9511, it attempts to establish a connection using a non-SSL connection on port number 9513. The agent uses this unsecured connection to log the registration failure. Port number 9513 is also used to download the entire agent manager configuration. This is the first connection that is established by the agent and has to be successful to proceed with actual registration attempts on the other port numbers. It can also be used to download truststore if you choose that option during installation. The common agent registration with agent manager is available as a Web service. The common agent contacts the agent manager on the registration Web service to register itself using the information provided in the response file during installation and credentials in the agentTrust.jks file. After successful registration, the certificate revocation list, the keystore agentKeys, and password are stored in the agent cert directory. The common agent registration process with the agent manager is as follows: 1. The common agent downloads agent manager configuration through the catalog service. The common agent then uses server-side SSL communication to contact the agent manager on port number 9511. Because it is SSL communication, the host name and port number are required and security validation is performed using the certificates and agent identity. 2. The identity of the agent manager is validated automatically by testing the certificate provided by the agent manager against the certificate in the truststore file distributed with the common agent. The truststore file is called agentTrust.jks and is located in the ../ep/runtime/agent/cert directory. 3. The agent manager validates the common agent registration password, which is stored in the endpoint.properties file. 4. The X.509 certificate is generated by the agent manager and sent to the common agent, which stores it locally in the ../ep/runtime/agent/cert directory. The certificate file is named agentKeys.jks. 5. A registration event notifies the agent manager that the common agent is initialized. The registry is updated and the agent manager recognizes the agent as registered.
676
v The registration server cannot be found v The registration credentials are invalid Changes in endpoint IP between registration attempts does not prevent the agent from registering if the new IP configuration allows for the agent to communicate with the configured agent manager and none of the other failure scenarios cause a new failure. If the reason for a registration failure is due to a communication problem, such as having the wrong IP configuration, you can initiate a registration attempt by restarting the agent. The registration information is available in the agent manager run time log files. These log files are available in the agent manager server logs and are named as activity.log and SystemOut.log. You can view information about enabling tracing, as follows: v For information about enabling agent manager tracing on the TPM server, refer to Enabling or disabling agent manager tracing. v For information about enabling tracing for the agent on endpoint computers, refer to Setting log levels for Tivoli Common Agent.
677
Running the RetrieveAgent.sh script returns the agent name and the agent host name that are stored in the agent registry database.
The agent registration password serves two purposes: v Validating the registration of agents v Locking the agentTrust.jks truststore file
678
Therefore, when you change the password, you must update the agent manager properties, change the password in the truststore file, and redistribute the truststore file to unregistered agents and to resource managers that remotely install common agents. To change the agent registration password:
Procedure
1. Log on to the provisioning server as the user who runs the WebSphere Application Server processes. 2. Change to the AM_HOME/bin directory. 3. Change the value of the Registration.Agent.Access.Password property in the agent manager configuration file, AgentManager.properties by running the following command:
EncryptAMProps new_password
Replace new_password with the new agent registration password. This command updates the AgentManager.properties file. Note: The double quote character ( " ) is a known limitation and must not be used when creating the password. 4. Restart the provisioning server to start using the new properties file. 5. Update the agentTrust.jks truststore file by encrypting it with the new password that you specified in the preceding step. a. Start the IBM Key Management utility that is provided with WebSphere Application Server: 1) Change to the WAS_installdir/bin directory. 2) Run one of the following commands: v Windows: ikeyman.bat v AIX, Linux, and Solaris: ikeyman.sh b. In the IBM Key Management window, click Key Database File > Open. c. In the Open window, specify the truststore file: 1) In the Key database type field, click JKS. 2) Click Browse to locate the agentTrust.jks truststore file in the AM_installdir/certs directory. If that file is missing or corrupted on the agent manager server, you can copy the agentTrust.jks from an agent or resource manager in your deployment. However, because the password for the file changes when the agent or resource manager registers, you must use the password that unlocks the file on that system, rather than the agent registration password. 3) Click OK to open the truststore file. 6. In the Password Prompt window, type the current agent registration password and then click OK. The IBM Key Management window now shows the agentTrust.jks file, which contains the signer certificate named rootcert. 7. Update the key database password: a. Click Key Database File > Change Password. The Change Password window is displayed. b. Type a new password in the Password field, and retype it in the Confirm Password field. c. Click OK. A message in the status bar indicates that the request completed successfully. 8. Copy the agentTrust.jks file to the repository/tivoli/TCA directory on the provisioning server. 9. Change the value of registration-pw in the agentmanager.xml file by running the following command: v Windows: changePassword.cmd -c agent -n <new_password> v UNIX: changePassword.sh -c agent -n <new_password> where <new_password> is the same as the new_password in step 3.
Chapter 7. Deploying software
679
10. Run the TCA_PingAgentManager workflow to test that the registration password change was successful. 11. If you plan to use the standalone installation mechanism, create an installation image. For more information about creating an installation image, see Installing the common agent and subagents using a stand-alone installation on page 641. 12. Run the TCAupgrade_CreateSPBs workflow to recreate the TCA upgrade SPB's.
Results
The agent registration password is now changed.
Procedure
1. Edit the AgentManager.properties file using a text editor. The properties file is located in the following directory: WAS_HOME/InstalledApps/cell/AgentManager.ear/AgentManager.war/WEB-INF/classes/ resources. 2. Set the Status.timeToLive property to one of the following values: 0 n -1 Only the most recent record is kept for each agent. This is the default value. Keeps agent configuration records for n hours, where n is a positive integer.
Keeps all agent operation and error state records. This setting will greatly increase the size of your registry database. To estimate the storage that is needed, see Estimating database usage by the agent manager. 3. Save the file. 4. Restart the provisioning server.
680
from keeping a single update to 7 and 14 days. In this estimate, the registry receives four configuration updates per day. This includes one daily update plus three event-driven updates.
Table 121. The estimated size of a registry with varying numbers of agents, configuration update retention times, and row sizes Retain most recent only Number of agents 100 1,000 10,000 Average Rows 55 MB 96 MB 511 MB Maximum Row 70 MB 246 MB 2009 MB Retain for 7 days Average Rows 69 MB 240 MB 1951 MB Maximum Row 91 MB 455 MB 4102 MB Retain for 14 days Average Rows 86 MB 408 MB 3631 MB Maximum Row 115 MB 699 MB 6543 MB
Procedure
1. Edit the AgentManager.properties file using a text editor. The properties file is located in the following directory: WAS_HOME/InstalledApps/cell/AgentManager.ear/AgentManager.war/WEB-INF/classes/ resources 2. Set the Registration.Agent.Reregistration.Policy property to one of the following values: Any OS Any agent might reregister. This is the default value. An agent cannot reregister, but multiple agents are allowed on a single computer system, as identified by the operating system GUID. There is no restriction on the number of resource managers on a computer system. An agent might not reregister and there can be only one agent per computer system, as defined by the operating system GUID.
Chapter 7. Deploying software
None
681
Other values Any unrecognized value is treated as None. 3. Save the file. 4. Restart the provisioning server.
Procedure
1. In the agent_installdir/config directory, open the endpoint.properties file. 2. Change the value for the status.heartbeat.frequency property to the appropriate time interval. The value is specified in minutes and the default value is 1440 minutes, that is 24 hours. To disable the heartbeat function, set the value to 0.
Agent manager
The agent manager supports the WebSphere Application Server service-oriented architecture run time. WebSphere Application Server products provide a highly available, reliable, and scalable application environment. You can use the agent manager in any WebSphere deployment, from a standalone WebSphere application server to more advanced configurations using application server clusters and WebSphere workload management. You can run the agent manager in its own application server or in an application server shared with other products. The agent manager has the following parts: v Agent manager server v Registry v Agent recovery service
The registry
The registry is a database that contains the current configuration of all known agents and resource managers. The registry contains the identity, certificates, and communication information for each resource manager, and the following information about agents: v The identity of every known agent and its computer system v The certificate issued to each agent
682
v Basic configuration information about each agent, including information about the type and version of the hardware and operating system v The configuration of each agent (updated by the agent at a configurable interval) v The errors reported by each agent (updated by the agent at a configurable interval) v The communication parameters for the agent, including the IP address, the port or ports for which the agent is configured, and the supported protocol v The agents on which each bundle is installed The information in the registry is updated by asynchronous events, such as the registration of agents and resource managers, and by updates from the agent. The agent provides a configuration update when it starts, when a bundle is installed or uninstalled, and at a configurable interval (by default, daily). By default, the registry contains only the most recent configuration update and error information about each agent. However, the retention period for these records is configurable. For all other information, the registry contains the complete history of your agents and resource managers. The registry can be placed in one of the following types of database: v In a DB2 or Oracle Database on the same computer system as the agent manager server (a local DB2 or Oracle Database). v In a DB2 or Oracle Database on a different computer system (a remote DB2 or Oracle Database). v In a DB2 database on a different computer system that is accessed using a local database alias, using DB2 Administration Client or DB2 server. To place the registry in a remote DB2 or Oracle Database, install a supported version of the database server on the remote system before installing the agent manager.
683
backup port is especially important if you disable the agent manager use of port 80.
The file might contain a generic authorization list. The use of the type "*" in the following example shows that the default user, manager, can register all types of resource managers:
<authorization> <user id="manager" password=" encrypted_password"> <authType name="*" userList="manager"> </authorization>
3. At a command prompt, use the AuthXMLAddUser command to change the password. The use of the AuthXMLAddUser is described in Creating users for resource manager registration on page 685. For example, to change the password for the TPCAdmin user in the first sample Authorization.xml, when the agent manager is on an AIX, Linux, or Solaris system, run the following command:
AM_HOME/bin/AuthXMLAddUser.sh TPCAdmin mynewpassword TPC TPM
Be sure to specify all of the authorization types that are currently listed. If you omit an existing type, the user cannot register that type of resource manager. 4. Restart the provisioning server.
684
Creating users for resource manager registration: When the agent manager is installed, a single user named manager has the authority to register any resource manager. You can provide more granular authorization by restricting the access of the default user and creating users who have authority to register only specified resource managers. To create a user for resource manager registration, use the AuthXMLAddUser command, which has the following syntax: AuthXMLAddUser user_name clear_text_password auth_type [ auth_type ...] where: user_name The name of the new user. clear_text_password The password you want to set. auth_type [ auth_type ...] One or more resource manager authorization types that this user is permitted to register. The value is case sensitive. The authorization type TPM is for the provisioning server. To allow the user to register any type of resource manager, specify "*" (an asterisk symbol enclosed in double quotation marks). For example, to create the user TPMAdmin on a Windows system, setting the resource manager registration password to the string myPassword and granting the authority to register resource managers of type TPM, run the following command:
AM_HOME\bin\AuthXMLAddUser TPMAdmin myPassword TPM
To create the user rmadmin on an AIX, Linux, or Solaris system, with the password myPassword and authority to register resource managers of type TPC and TPM, run the following command:
AM_HOME/bin/AuthXMLAddUser rmadmin myPassword TPC TPM
To create the user moosa on an AIX, Linux, or Solaris system, with the password myPassword and authority to register any type of resource manager, run the following command:
AM_HOME/bin/AuthXMLAddUser moosa myPassword "*"
Configuring the login threshold and lockout periods for resource managers: The agent manager protects resource manager registration against attacks by limiting the number of unsuccessful login attempts that can be made by a user in a fixed time period. This makes it impractical for an attacker to try a large number of user and password combinations. Unsuccessful login attempts are logged. Monitor the log. A large number of failed login attempts might indicate an attack. To change the threshold for unsuccessful attempt to register using a resource manager user or the amount of time that the user is locked out: Procedure 1. Edit the AgentManager.properties file using a text editor. The properties file is located in the following directory: WAS_HOME/InstalledApps/cell/AgentManager.ear/AgentManager.war/WEB-INF/classes/ resources 2. Change the Registration.Manager.Authorization.Strikes, Registration.Manager.Authorization.ResetIntrvl, and Registration.Manager.Authorization.ResetScanIntrvl properties as follows:
685
Registration.Manager.Authorization.Strikes Specifies the threshold. Set this to the number of times a resource manager user can unsuccessfully attempt to register before the user is locked out. To disable tracking of unsuccessful attempts, set the value to zero. Registration.Manager.Authorization.ResetIntrvl Specifies both the lockout duration and the reset interval. Set this to the number of seconds that the user is locked out, which is also the amount of time before the strike count is reset (set to zero) when no additional unsuccessful attempts are logged. Registration.Manager.Authorization.ResetScanIntrvl Specifies the reset scan interval. Specify how often, in seconds, the agent manager must scan for users that are eligible to be unlocked or whose strike count can be reset because no additional unsuccessful attempts are logged. 3. Save the file. 4. Restart the provisioning server. Example
Table 122. Example of lockout configuration Parameter Registration.Manager.Authorization.Strikes Registration.Manager.Authorization.ResetIntrvl Registration.Manager.Authorization.ResetScanIntrvl Value 3 600 30
The following examples show how these settings respond to failed attempts to register. v If a user makes an unsuccessful attempt to register every 11 minutes, the user cannot be locked out because the account is unlocked after 10 minutes. v If there is one failed attempt every 9 minutes, then the strike count accumulates until the threshold is reached. When the threshold is reached, the user is locked out for 10 minutes plus any additional seconds before the next reset scan. When the ID is reset, the strike count is set to zero. Changing the password encryption key: The passwords in the AgentManager.properties and Authorization.xml files are encrypted using the HMAC-SHA1 keyed-hashing algorithm and a key that is randomly generated when the agent manager is installed. You can change the key if you suspect a security breach or if your security policy requires that passwords be changed. To change the password encryption key: Procedure 1. Stop the agent manager. For more information, see Starting and stopping the common agent on page 652. 2. Locate and delete the key file. In the AgentManager.properties file, the directory is specified in the ARS.directory property and the file name is specified in the REG.keyPWfile.name property. The next time a program that requires the key is run, the agent manager randomly generates a new key. The name of the key file and its location relative to the AM_HOME directory are indicated by the REG.keyPWfile.name property in the AgentManager.properties file. The AM_HOME directory is specified by the ARS.directory property. 3. Run the EncryptAMProps command to update the agent registration password in the AgentManager.properties file and re-encrypt the agentTrust.jks file. See Changing the agent registration password on page 678 for instructions.
686
4. Run the AuthXMLAddUser command to redefine each resource manager user in the Authorization.xml file. For information, see Changing the resource manager registration password on page 684. 5. Start the agent manager. 6. Redistribute the agentTrust.jks file to unregistered common agents and resource managers. Regenerating security certificates: In some situations, you might need to regenerate the security certificates for the agent manager. This change affects the agent manager server, the provisioning server, and all target computers with the common agent. Therefore, you must plan for implementation of security certificate files. Planning a maintenance window After you create new certificates on the agent manager server, the resource manager, and agents that rely on agent manager functions such as registration, authentication, and registry queries are unable to access these services until they have been provided with a copy of the new truststore. Plan a maintenance window for the time during which agent management functions are unavailable to existing resource manager and agent systems. Begin by creating new certificates for the agent manager on the provisioning server. You can then process the certificates for the common agent on each managed system. Creating security certificate files: Generate new security certificate files on the provisioning server. To regenerate certificates: Procedure 1. Stop the provisioning server, which also stops the agent manager. 2. Obtain the current password for the agent manager database, agent manager and the agent registration service. 3. Back up the files in AM_HOME/certs, where AM_HOME is the agent manager installation directory. Do not delete the files. 4. Open the command line processor. 5. Type "Ctrl+C" to escape the DB2 prompt. Type "set db2instance=ctginst1", then type "db2" to enter the DB2 prompt again. Type "connect to maxdb71 user maximo". Enter the following commands:
a. b. c. d. ALTER ALTER ALTER ALTER TABLE TABLE TABLE TABLE CDB.X509_CERT DROP PRIMARY KEY; CDB.MNGD_ELEMENT DROP PRIMARY KEY; CDB.AGENT_MANAGER DROP PRIMARY KEY; CDB.MNGD_ELEMENT DROP CONSTRAINT ME_FK_CON_01;
6. Delete all the rows of the table named CDB.MNGD_ELEMENT by entering the following command:
DELETE FROM CDB.MNGD_ELEMENT
This step will generate the certificates and will update the certificates if they were not deleted or backed up before running this script. 8. Add constraint to the table MNGD_ELEMENT with the following SQL query:
ALTER TABLE "CDB"."MNGD_ELEMENT" ADD CONSTRAINT "ME_FK_CON_01" FOREIGN KEY ("CLS_GUID") REFERENCES "CDB"."CLASS_TYPE"
Chapter 7. Deploying software
687
9. Restart the agent manager. 10. Verify that new files for agentTrust.jks, agentManagerTrust.jks, and agentManagerKeys.jks have been generated in AM_HOME/certs. 11. To verify if the agent manager is up and running, the following two tests need be performed: a. Enter the following URL into a web browser:
http://AM_IP:9513/AgentMgr/Info
or:
http://AM_HOST_NAME:9513/AgentMgr/Info
where: AM_IP Is the IP address of the agent manager. AM_HOST_NAME Is the host name of the agent manager. b. Run the agent manager health check tool as follows:
%AM_HOME%/toolkit/bin/ HealthCheck.[bat/sh] -toolkitPassword password
Windows AM_HOME: C:\Program Files\IBM\AgentManager Unix/Linux AM_HOME: /opt/IBM/AgentManager Note: The toolkit password should be the agent manager password. Note: If these two tests have been successful, you have replaced the security certificates. 12. Delete all files in TIO_HOME/cert. 13. Copy the agentTrust.jks file from AM_HOME/certs to TIO_HOME/cert. 14. Copy the agentTrust.jks file to the repository/tivoli/TCA directory on the provisioning server. 15. Restart the provisioning server, which automatically starts the agent manager. 16. Run the TCA_PingAgentManager.wkf provisioning workflow to verify that the provisioning server can connect to the agent manager. To run the provisioning workflow: a. Use the Find box at the top of the navigation pane to search for the TCA_PingAgentManager provisioning workflow, and click its name. b. On the Workflow Editor page, click Run > Run. No input parameters are required. Click Run again to run the provisioning workflow. What to do next You are now ready to configure managed systems with the common agent to use the new certificates. Configuring agents with new security certificate files: After you have generated new security certificate files on the provisioning server, you must distribute the new certificates to managed systems that have an installed common agent. Tip: Consider creating a favorite task that performs the steps in this procedure so that you can update certificates on multiple managed systems.
688
To configure managed systems with new certificates: Procedure 1. Stop the agent on all systems. See Using the command line on page 652. 2. Delete the contents of the agent_installdir/runtime/agent/cert directory to force the agent to reregister when it contacts the agent manager server again. 3. Copy the agentTrust.jks file stored in the repository directory to the agent_installdir/runtime/ agent/cert directory. 4. Start the agent.
689
During installation, administrators have the opportunity to change the default values for any template parameters that are configured as editable. For instance, the example diagram shows that the default installation directory in the software installation template is C:\DB2. If this parameter is editable, an administrator can change the installation directory to another value, such as C:\IBM\DB2, at installation time. Parameter changes made at installation time do not change the template, they only affect the current installation.
690
Configuration Software configuration options defined by the software configuration template associated with the installable file. This can include configuration for the software installation itself, or configuration for software that hosts the software installation. For example, a software patch might include configuration for the software product that it fixes. Cluster Domain A cluster domain managed by Tivoli Provisioning Manager is defined in the data model as software resources. Generic resource Other types of resources for specific operations. Some of these software resources are not tied to an item in the software catalog. Examples include: v A backup resource defines the backup scope for backing up the associated software installation. v Clusters members represented as software resources. v If you are using discovery to identify Windows user groups and Windows services on managed Windows computers, the information about discovered users, user groups, and services are stored as child software resources of the Windows software installation.
Resource configuration
Over time, installed software is often reconfigured or updated, making the information stored in the software configuration template out-of-date. Changes made to the configuration of a software resource are therefore stored as resource configuration data. For example, the resource configuration might include an entry that stores the directory for temporary files or an entry for the time zone of the computer. If these values change, the values for these entries must be updated.
Software concepts
Tivoli Provisioning Manager supports deployment of many types of software. Before you start working with software, it is important to understand software information is stored, and how this information is used to deploy and manage software. The software catalog is a library of all the software managed by Tivoli Provisioning Manager. Tivoli Provisioning Manager entries in the software catalog are called software definitions. A software definition stores information about a piece of software such as the name of the software, version, the file used to install the software, requirements to install or use the software, and installation options. When you install Tivoli Provisioning Manager, the software catalog includes software definitions for many types of software. If you install an automation package for a piece of software, a software definition is typically added to the software catalog automatically. You can also add software definitions manually. This option is particularly useful for adding simple software products that do not have complex installation requirements. Tivoli Provisioning Manager provides templates and built-in provisioning workflows for setting up the installation and configuration of simple software products so that you do not need to create a customized automation package to deploy them. The topics in this section describe how information is stored in the software catalog and how to manually create software definitions.
691
Software definitions are typically created by Tivoli Provisioning Manager or a provisioning workflow developer who builds the automation package for a piece of software. Some parts of the software definition are closely tied to the provisioning workflows in the automation package. For example, The provisioning workflow developer can ensure that the software configuration template includes the parameters required by provisioning workflows in the automation package, and that the correct device drivers are to defined in the automation package The provisioning server automatically creates a software definition when it is provided with enough information to configure it. For example, if you configure the provisioning server to import patch entries from Microsoft Windows Server Update Services, the provisioning server can use the available information to automatically create software definition and installable file entries in the software catalog. Similarly, if an automation package includes a software definition, device drivers, and other software elements, the software elements are automatically added to the software catalog when you install the automation package.
When software is installed, the person who installs it might select specific options or use specific parameter values. The actual configuration of software when it is deployed is stored in the data model as software resources. Software resources are created for each computer where the software is installed.
Software terminology
To manage software and automate software distribution, Tivoli Provisioning Manager stores several types of information about each software item. How to deploy the software The following information is stored together in the software catalog as a software definition.
692
The file to use for installation An installable file is the installation package or image that is used to install the software on a computer. Examples include a Windows .exe file, a .zip file, or a Ghost operating system image. The requirements of the software Software often has specific prerequisites to install or run it. These prerequisites are stored as requirements. Requirements can include specific hardware or software that must be available on the same computer. The capabilities of the software A capability is an attribute of the software that becomes associated with a computer when it is installed. Capabilities are used to validate requirements. For example, specific database capabilities are associated with DB2 in the data model. If another piece of software requires DB2, the provisioning server can check for the required capabilities on a computer before installing the software. Installation and configuration parameters To automate installation and configuration of software, the installation and configuration parameters to use must be predefined. Configuration parameters are stored in a software configuration template, which is similar to a response file for a silent installation of software. The software configuration template identifies parameters that are required by provisioning workflows that install the software. A software configuration template can contain child templates that define different parts of the installation and configuration. How software is configured when it is installed When software is installed on a computer, software resources are associated with the computer in the data model. The software configuration templates define the parameters to use for installation and configuration. The software resources store the actual values that were used with each parameter. For example, the software configuration templates might include a parameter for the installation directory and a default value. The actual value that is specified for the installation directory during installation is stored in the software resource. Installable files: An installable file is the actual software package or image file that is distributed and installed on a target system. There are two types of installable files: v General software packages. Examples include: Software packages such as Red Hat Package Manager (.rpm) files, AIX packages for use with installp (.lpp), and Microsoft Installer (.msi) files. A self-extracting file, such as a .exe file. An archived file in a format such as .zip or .tar. v System images that are installed by boot servers. When you define a installable file, you must specify the file name, file repository location. You can also specify requirements that are specific to this installable file, such as the required operating system or locale. Associating installable files with software definitions Each software definition can be associated with one or more installable files, but only one installable file is selected for installation. When there are multiple installable files, the provisioning server identifies the appropriate one to use during installation based on: v Requirements: The provisioning server compares the requirements of the installable files with the hardware and software configured on the target system.
Chapter 7. Deploying software
693
v Priority: The order of installable files in a software definition determines the priority. During installation, the provisioning server starts by checking the configuration of a target computer against the requirements of the first installable file. If the target computer meets the requirements of the software definition and this installable file, the installable file is selected for installation. Other installable files are not evaluated. If the target computer does not meet the requirements, it checks for the requirements of the next installable file. Example The following example shows a software definition with three installable files.
The software definition is for a software product called Sample Product. It has an installation requirement for Windows 2000 on the target computer. Three software packages are available to install the software on a target computer: package.zip This software package has the highest priority because it is the first one on the list. It requires WinZip on the target computer to install the software. package.msi This software package is next in the priority order. It requires Windows Installer on the target computer to install the software. package.exe This software package is last in the priority order. It does not have any defined requirements. In this example, the target computer has both Windows 2000 and WinZip installed. When the provisioning server checks the target computer for requirements, it identifies a match for the Windows 2000 requirement of the software definition and the WinZip requirement for the package.zip installable file. It therefore selects package.zip as the installation mechanism for the target computer. If the target computer has Windows 2000 but does not have WinZip, the provisioning server proceeds to check the requirements of each item in the list of installable files until an appropriate match is found.
694
The iterator An iterator is a special item that you can add to the list of installable files in a software stack. It is not a file. For details, see Defining software stacks on page 709. When to use multiple installable files Situations where you might want to include multiple installable files in a software definition include: v A software definition for a software stack that has multiple associated image files. Each image has the same software but has different hardware dependencies. For each installable image, the requirements list is configured with the appropriate hardware dependencies. During installation, the provisioning server can select the correct image by matching the image requirements with the hardware configuration of the target computer. v A software definition for a patch that has software packages for different combinations of target computer configurations. For example, the software definition can contain software packages for each combination of locale and operating system. For each installable package, the prerequisites list is configured with the appropriate combination of locale and operating system. During installation, the provisioning server can select the correct installable file by matching the patch requirements with the configuration of the target computer. v A software definition that is associated with different package formats for the same software. For example, a software definition might include a self-extracting .exe file, a.zip file, and a .tar file. During installation the provisioning server can select the correct package format based on the configuration of the target computer. Software dependencies: Software dependencies are used to identify relationships between pieces of software. Dependency information is defined as requirements and capabilities. Requirements Specific hardware or software that must be available to a piece of software. Requirements are stored as individual attributes such as vendor name, product type, product family, version number, storage capacity, and available memory. Capability An attribute of hardware or software that can be used to satisfy a requirement. Requirement types define a set of related attributes. Each requirement type is associated with one or more requirement names that represent specific attributes. For example, the OS requirement type includes an attribute for different characteristics of an operating system: os.distribution The specific edition of the operating system. For example, Red Hat or Windows 2000 Advanced Server. os.family The type of operating system. For example, Linux or Windows. os.kernel.version The kernel version. For example, 2.4. This capability primarily applies to Linux. os.name The name that you want to use to identify the operating system. For example Windows 2000 Advanced Server SP2. os.servicepack The service pack level of the operating system. For example U5 or SP2.
695
os.version The version of the operating system. For example 3.0 or 2000. The labels for requirements and capabilities are the same. The defined requirement types and requirement names determine the available capability types and capability names. 'For example, jdk.version is used to identify a required Java runtime environment version number. v If you add a jdk.version requirement to a software definition with a value of 1.4.1, you are indicating that the software requires a Java runtime environment at the version 1.4.1 level. v If you add a jdk.version capability with a value of 1.4.1, you are indicating that when this software is installed, the computer will have a Java runtime environment at the version 1.4.1 level and can support any piece of software that has a matching requirement for that Java runtime environment version. Hardware requirements are for resources such as disk space or memory. For example, a software definition can include a requirement for an Intel processor. When an administrator initiates installation of the software, the provisioning server checks the target computer for an Intel processor hardware resource. Some hardware resource information can be automatically added to the data model using discovery. For more information about discovery, see the Tivoli Provisioning Manager information center. Tivoli Provisioning Manager includes predefined requirements for a variety of different types of software. Reuse available requirement types whenever possible. New requirement types are typically defined by workflow developers. Types of relationships A requirement or capability can be assigned to software definitions, software configuration templates, and software resources. Installation requirements can also be assigned to installable files. v Requirements and capabilities in software configuration templates are copied to the software resources they create when the software is installed. v Requirements and capabilities defined in software definitions are copied to all software resources that they create when the software is installed. Requirements: Requirements define dependencies on software or hardware. Requirement types Requirements can be used to define different types of relationships. v Requirements that identify an installation mechanism. For example, if a software definition definition contains a .zip and a .tar file, the requirements of each installation file identify the software required to handle the file. At installation time, the appropriate file is selected by checking the target computer against the installation requirements for each installation file. Installation requirements are only used at installation time and are not inherited by software resources on the target computer. v Requirements to run the software. For example, a Java application might have a requirement for a specific version of the Java runtime environment on the target computer. v Hosting requirements. This requirement must be met by a hosting application, or an application that acts as a containing environment for the software. This type of requirement is more common for composite applications and Java programs. For example, a servlet is a Java program that runs on a Web server and extends server functions by generating dynamic content in response to Web client requests. It requires a standalone servlet engine or an application server with servlet support to load the servlet. The servlet engine therefore acts as a
696
container for running the software. If the servlet requires a specific container environment, such as WebSphere Application Server, the software definition for the servlet can include a host requirement for it. Defining requirements You can define requirements for three different software elements: v Installation requirements are defined on installable files. v Functional requirements: Global functional requirements apply to all deployments of the software. They are defined in - The software definition for an operating system, software product, or software patch. - A software stack. Requirements that are specific to a particular configuration of the software are defined at the software configuration template level. v When software is deployed, the created software resources inherit global functional requirements and the functional requirements defined in the software configuration template used for deployment. The element where you define requirements depends on the type of requirement and the type of validation that you want to perform. Use requirements on software definitions and installable files to help you to manage installation options. For example: Requirements for different target environments You can create a software definition for a software patch that is available for different operating systems and locales. You define the operating system and locale requirements in each installable file, and then add all the installable files to the single software definition for the patch. When an administrator installs the patch, Tivoli Provisioning Manager compares the requirements in each installable with the configuration of the target system to identify the correct patch file to install. Requirements for different installation mechanisms You can create a software definition that contains the same software in different software package formats.
Each package contains the same software. For all software packages, Windows 2000 is required to run the software, so this requirement is defined at the software definition level. Two of the software packages have their own requirements that are specific to the software package installation mechanism. package.zip requires WinZip on the target computer and package.msi requires Windows Installer on the target computer.
697
If you include multiple installable files in a software definition, but you do not specify requirements at the installable file level, Tivoli Provisioning Manager chooses the first installable file in the list. In some cases, you might want to use other criteria to determine the installation priority of an installable file, such as the distance of a target from the file repository where the software package or image is stored. This type of alternative decision-making is configured and managed by the workflow developer who creates the automation package for the software. Validating requirements When software is installed, the software resources for a software installation inherits requirements and capabilities from the software definition. Requirements and capabilities in a software configuration template are also inherited by the software resource that it creates. For example, DB2 for Windows requires the Windows operating system. In an environment where DB2 is installed on systems with Windows 2003, Service Pack 2, the following settings must be configured to define this dependency: v In the software definition for Windows 2003, Service Pack 2, configure an OS capability type, and two capabilities: os.version with a value of Windows2003 os.servicepack with a value of SP2 v In the software definition for DB2, configure a prerequisite for an operating system with Windows 2003 as the version number and SP2 as the service pack level. When The Windows 2003 software is deployed to a computer, a software resource for the operating system is associated with the computer in the data model. When you deploy DB2, to the same computer, the requirement information in the software resources is checked to ensure that the required operating system version is already installed. You can assign a requirement type without a requirement name to define a less restrictive dependency. For example, you can assign the RDBRT:RDB requirement type without any requirement names if a database is required and any version or type of database will satisfy the requirement. Tivoli Provisioning Manager includes some predefined requirement types and associated requirement names. If required, you can add new requirement types and requirements to define other types of software dependencies When you start the installation of a piece of software, there are two ways that you can configure validation of a requirement: v Pass validation only if a matching capability is on the target computer. v Pass validation if a matching capability is present or if capability is absent. If you use this option, the provisioning server rejects a capability with an incompatible value, but accepts the absence of the capability. For example, if a multimedia program requires a Creative Labs Sound Blaster sound card. v Computer A has a capability for a Sound Blaster sound card. v Computer B has a capability for a Dynex sound card. v Computer C does not have a capability for a sound card. the following behavior will occur: v If the requirement for the sound card is configured for a matching capability only, the software be installed on Computer A only. v If the requirement for the sound card is configured for a matching capability or no sound card capability, the software be installed on Computer A and Computer C.
698
Capabilities: Capabilities identify attributes of a piece of software that can be used for prerequisite and corequisite validation. Capabilities can be configured in a software definition or a software configuration template. Because all installable files in a software definition share the same capabilities, you cannot define specific capabilities for an installable file. For example, a software definition for DB2, Version 8.1 can contain multiple installable files in different package formats. However, if software contained in each package shares the following capabilities: v Software name: DB2 v Software version: 8.1 When any of the software packages is used to install DB2, Version 8.1 on a target system, these two capabilities are become associated with the target computer. Tivoli Provisioning Manager checks the capabilities of the system whenever it is the target of a software deployment and requirements are specified. Capabilities are assigned to software configuration template when you will need to use attributes about each type of deployment to validate requirements for another piece of software. For example, if you have specific database instance configurations for test deployments and production deployments of DB2, you can specify capabilities on the software configuration template for each type of deployment and then other software can use this information to determine if a computer has a test or production database instance installed. The available capability types match the available requirement types. Requirement types are typically defined by a workflow developer during automation package development. If the software has requirements that are not predefined, the workflow developer can add them to the XML data that it imports into the data model. Software configuration templates: A software configuration template identifies software resources and associated configuration details that you want to represent in the Tivoli Provisioning Manager data model after the software is installed on a system. Each software configuration template is used to create a software resource on the target system.
699
In the example diagram, there are three software configuration templates. During the installation process, provisioning workflows run for each template to create software resources that are associated with the target computer. v The parent template is a software installation template. It creates a software installation resource. v Each instance template creates a corresponding software instance on the target computer. v The software configuration templates used to create the software resources are stored with the software resource information. Each template stores the parameter values that were used during software deployment. You can create one or more software configuration templates in a software definition. For example, an installation of an operating system can include different components and configuration options, depending on the requirements of the managed system and the standards in your organization. If you create a software definition for Windows 2000 workstations, you might include software configuration templates for user workstations and administrator workstations. Software configuration template types The parent template of a software configuration template is typically a software installation. Child templates then define settings for other components of the software. You can define the following types of software resources in a software configuration template: Installation The template that represents a software definition for a piece of software. It is used to create a software installation resource on a target computer. Application data The template for software entities that are generated when an application is used, such as data in a database. Application data resources are typically entities that cannot be recreated if they are lost and cannot be recovered by reinstalling and configuring a product. Back up application data resources so that they can be recovered if they are lost. Cluster domain The template for a cluster domain.
700
Configuration Configuration settings for a software installation. The entries in a software configuration template are like parameters in a response file for a silent installation of software. Feature An optional installation component of the software. For example, a software product might include optional utilities, plug-ins, or language packs that you define in a configuration template as features that a user can select during installation. Foreign configuration Configuration settings for software that hosts the software installation. For example, a software definition for a software patch might include configuration settings for the software product it fixes. Instance An application instance. This template is useful for providing the ability to start and stop an application that you are running as a service, or control an application instance in a product such as a DB2. Unspecified This special type is used in software stacks for the topmost software configuration template. This is the only type of software configuration template that does not create a corresponding software resource during software deployment. Parameters Settings in a software configuration templates are defined by parameters. Each parameter can have one or more predefined values so that a software installer can easily select a valid value during installation. The following options are also available for each parameter: v Define the type value that is required: a string, integer, or boolean value. v Select the default value. v v v v Indicate Indicate Indicate Indicate if if if if the the the the parameter is optional or required value is fixed or if a software installer can change the value at installation time value is encrypted parameter is hidden from software installers during installation
701
You can manage software distribution to user computers including desktops, administrator computers, and other general computers that you need to manage. v Patch management v Image management v For general software product or software stack installation, see Software distribution.
Software deployment using the scalable distribution infrastructure: You can distribute and install software products, patches, and software stacks that are defined in the software catalog. The infrastructure solution for a scalable software distribution enables the management of large numbers of target computers in a variety of topologies. The distribution infrastructure enables you to centrally manage the software distribution from Tivoli Provisioning Manager, while using a number of software packaging, software distribution, and job management services to perform the actual software deployment operations. The scalable distribution infrastructure provides a fast and reliable way to distribute and install software on individual target computers or groups of computers in complex branch office environments. Distribute and Install pages are provided for deploying software products, software patches, and software stacks to target computers. Targets are periodically scanned for installed software, to keep software inventory information up-to-date, and to check for managed computer compliance.
702
Review the following requirements before you import a software package: v The device driver that identifies provisioning workflows to install and manage the software. v If you are importing a software package from a file repository, you must know the directory where the software package is stored. v The maximum size limit for file uploads is 2 GB. You can import any type of software package if you have a device driver installed that is capable of distributing and installing the software package. For example, a software package can be an RPM package, a .zip file, or a self-extracting file. The device driver for the software package includes the provisioning workflows needed to install the software package. When you import the software package, the wizard might prompt you for required parameters based on the selected device driver. To import software packages: Procedure 1. Click Go To > IT Infrastructure > Software Catalog > Software Product Import. 2. In the Define Software Product section, specify the name, version number, and vendor of the software. 3. In the Define Software Installable section, specify information about the actual file that you are importing. Operating system Select the operating system that the software can be installed on. File repository If you are importing from a file repository, select the one that contains the file that you are importing. If you are uploading a file, click Upload File and select a file. The file will be stored in the default file repository called LocalFileRepository. Package path The package path is relative to the root directory of the file repository. For example, if the repository path is configured as /share, and the package is stored in /share/package1, then the package path is /package1. v If you are importing from a file repository, specify the package path of the file. v If you are uploading a file, you can optionally specify a subdirectory for the file relative to the local file repository. 4. In the Installation Method section, select a Hosting Configuration Template option or Device Driver option to specify how the software is installed. If you select the Hosting Configuration Template option the operating system manages the installation so you do not need to write a workflow or specify a Device Driver. 5. Click Save. Results The software package is added to the software catalog. Importing software package blocks from the Web interface: You can now import software package block files (.SPB files) using the Web interface, and not only from the Software Package Editor like in earlier versions of Tivoli Provisioning Manager. Before you begin Prerequisites: To import a software package block file from the Web interface, the SPB file must already be created locally.
703
When you import the software package block, the import wizard prompts you for required parameters based on the installation method you selected. To import software packages, perform the following steps: Procedure 1. Click Go To > IT Infrastructure > Software Catalog > Software Product Import. 2. In the Select Installation Method section, select SPB Import. 3. In the Define Software Installable section, specify the following information about the actual SPB file that you are importing. (Optional) Operating system Select the operating system that the SPB file can be installed on. File repository Specify the destination file repository on which you want to save the SPB file. Package path The package path is relative to the root directory of the file repository where the SPB file is stored. 4. Click Upload File to choose the SPB file to upload. In File name the name of the SPB file is displayed. 5. Click Save. Results The software package block (.SPB file) is added to the software catalog of Tivoli Provisioning Manager. Manually defining software: If you want to manually define a piece of software, you must specify all the information necessary to install and configure it. The provisioning server can deploy software packages or software images in any format if an automation package with the ability to deploy the software is installed. Each software package or software image provides different kinds of information about the software, or might not contain any information that the provisioning server can automatically extract to describe the software or how to install it. As a result, each piece of software must be associated with a software definition. A software definition describes attributes, dependencies, and configuration for a piece of software in a common format that the provisioning server understands. Individual pieces of software are stored as software definitions and associated elements contained by a software definition. You can define the following types of individual pieces of software: Software product The most general type of software definition. You can define any piece of software that you want to manage as a software product. Operating system An operating system such as Windows 2000 or Red Hat Linux. An operating system is defined the same way as a software product except that you must specify the operating system information when you define the software. Software patch A software maintenance package that updates a software product after the software product is installed. When you add a software patch, you can include additional information such as the patch severity and approval status.
704
There are several other special types of software that you can define in the software catalog: Image A software image that is deployed by a boot server. Software stack A software stack is a list of software in a specific installation order. A software stack can include software products, software patches, operating systems, and other software stacks. The items in the software stack can either be specified as a list of software definitions, or an image file can be associated with the software stack. You can also remove a software definition that you no longer require. Removing a software definition also removes installable files associated with it. Before you remove a software definition, consider the impact of removing it. v Consider the impact on with software stacks that reference the software definition. When you remove a software definition, it is also removed from software stacks that reference it. Does the software stack need to be changed to handle the impact of removing the software definition? v Consider software dependencies. Do other software definitions have prerequisites that can only be met when this software is installed? Do other software definitions reference the software configuration template? You can use software views to identify software with prerequisites that this software definition meets, and to identify software with matching capabilities. v Consider the impact on computers where the software is installed. If you remove the software definition, you will not be able to uninstall it using the provisioning server in the future. Manually defining software products: By default, the software catalog includes software definitions for many common software products. If you need to manually add a new software products, the first step is creating its software definition. Procedure 1. Click Go To > IT Infrastructure > Software Catalog > Software Products. . 2. Click New 3. In the Name section, specify the name, description, vendor, and version number. Note: Each software product name must be unique. 4. In the Software Installables section, specify the actual installation file for the software. Click New Installable to add a file. Note: Use a single installable file if you only have a single software package or software image that is associated with the software definition. You can associate multiple installable files with a software definition if you have different mechanisms for installation. For example, you can include an .msi package for computers that have the Microsoft Software Installer and a compressed file for computers that have software to extract the contents of the file. At installation time, the requirement attributes of the installation files will be compared against the information about the target computer to determine which installation file to use. a. Specify the name, version number, and description. b. In the Status list, select the appropriate status of the file. c. If you are adding the file from a file repository, click the file repository name in the File Repository list. d. In the Installable Path field, type the path where the software package is stored. The path is relative to the root directory of the file repository. For example, if the repository path is configured as /share, and the package is stored in /share/package1, then the package path is /package1. e. In the File field, type the name of the file. f. If this file is specific to a locale, select the locale.
Chapter 7. Deploying software
705
g. Click Submit. An entry is added to the list of installation files. 5. Optional: In the Provisioning Groups section, you can add the software to a provisioning group to categorize and organize your software. Click Assign to Provisioning Group and select a provisioning group. 6. Requirements and capabilities for the software can be defined in several ways and will be explained in a later step. Create your software configuration templates with the specific installation parameters to use during installation of the software. For details see Creating software configuration templates on page 714. 7. Specify requirements for the software. v Define global requirements first in the Requirements section of the software. These requirements apply for any deployment of the software, regardless of which installation file is used or which software configuration template is used to perform configuration of the software during installation. a. Click Add Requirement. b. In the Requirement Type list, select the requirement type. c. If you only want to specify a requirement type, leave the Requirement field blank. If you want to add a requirement name, select a requirement name. d. If you selected a requirement name, select one or more values for it. You must specify at least one value. To add a value, type it in the Value field, and then click Add. e. If you are creating a hosting requirement, select the Hosting check box. Use this option when the software you are defining needs to run in the context of another software application. For example, a servlet requires a standalone servlet engine or an application server with servlet support to load the servlet. The servlet engine therefore acts as a container for running the software. If the servlet requires a specific container environment, such as WebSphere Application Server, you can specify a hosting requirement for it. f. If you want the provisioning server to reject a mismatched capability but accept a missing capability, select the Accept Non Existing Capability check box. g. Click Save. v If you added more than one file to the Installables list, expand the entry for each one in the Installable list and specify file-specific requirements. For example, if you have added different installation files for different hardware or different operating systems, specify the particular requirements for each file. v If you are using multiple software configuration templates to define different ways to configure the installation, specify requirements to check for each type of deployment. For example, if you are defining a J2EE application and want to deploy it to WebSphere Application Server and WebLogic Server, the software configuration templates that you create for each type of deployment can contain requirements for the type of J2EE server. 8. Capabilities identify attributes of the software that can be used for installation requirement validation. For example, if you are creating a software definition for WinZip 11, you can specify the vendor (Winzip Computing) and the version number (11). After you deploy WinZip 11, other software deployments that require WinZip 11 can verify whether a particular computer has the software installed. a. Click Add Capability b. Specify the capability details. 1) In the Capability Type field, select the appropriate capability type. 2) In the Name section, specify the appropriate values for each capability name. 3) Click Save. 9. Click Save . The changes you have made to the page are saved.
706
Results The software definition for the software product is created. What to do next To install the software, you must specify the provisioning workflows required for this software. For information about assigning provisioning workflows, see the provisioning workflows documentation. Manually defining patches: If you need to manually add a new patch, the first step is creating its software definition. The recommended way to add software patches to the software catalog is to use a supported software update system such as Microsoft Windows Server Update Services, because the provisioning server can automatically create software definitions for imported patches. Software definitions for patches include patch-specific information, such as the severity and issue date in software definitions for patches. Procedure 1. Click Go To > IT Infrastructure > Software Catalog > Patches. . 2. Click New 3. Type the name, description, vendor, and select the locale. 4. 5. 6. 7. In the Approval Status field, select the approval status of the patch. In the Severity field, select the importance of the patch. Type the version number. Select the appropriate check boxes: v Restart application indicates that customer application must be restarted.
v Can request restart indicates that the operating system must be restarted. v Patch can coexist indicates that patched servers can coexist in the same application tier as servers that have not been patched. 8. In the Software Installables section, specify the actual installation file for the software. Click New Installable to add a file. Note: Use a single installable file if you only have a single software package or software image that is associated with the software definition. You can associate multiple installable files with a software definition if you have different mechanisms for installation. For example, you can include an .msi package for computers that have the Microsoft Software Installer and a compressed file for computers that have software to extract the contents of the file. At installation time, the requirement attributes of the installation files will be compared against the information about the target computer to determine which installation file to use. a. Specify the name, version number, and description. b. In the Status list, select the appropriate status of the file. c. If you are adding the file from a file repository, click the file repository name in the File Repository list. d. In the Installable Path field, type the path where the software package is stored. The path is relative to the root directory of the file repository. For example, if the repository path is configured as /share, and the package is stored in /share/package1, then the package path is /package1. e. In the File field, type the name of the file.
Chapter 7. Deploying software
707
f. If this file is specific to a locale, select the locale. g. Click Submit. An entry is added to the list of installation files. 9. Optional: In the Provisioning Groups section, you can add the software to a provisioning group to categorize and organize your software. Click Assign to Provisioning Group and select a provisioning group. 10. Requirements and capabilities for the software can be defined in several ways and will be explained in a later step. Create your software configuration templates with the specific installation parameters to use during installation of the software. For details see Creating software configuration templates on page 714. 11. Specify requirements for the software. v Define global requirements first in the Requirements section of the software. These requirements apply for any deployment of the software, regardless of which installation file is used or which software configuration template is used to perform configuration of the software during installation. a. Click Add Requirement. b. In the Requirement Type list, select the requirement type. c. If you only want to specify a requirement type, leave the Requirement field blank. If you want to add a requirement name, select a requirement name. d. If you selected a requirement name, select one or more values for it. You must specify at least one value. To add a value, type it in the Value field, and then click Add. e. If you are creating a hosting requirement, select the Hosting check box. Use this option when the software you are defining needs to run in the context of another software application. For example, a servlet requires a standalone servlet engine or an application server with servlet support to load the servlet. The servlet engine therefore acts as a container for running the software. If the servlet requires a specific container environment, such as WebSphere Application Server, you can specify a hosting requirement for it. f. If you want the provisioning server to reject a mismatched capability but accept a missing capability, select the Accept Non Existing Capability check box. g. Click Save. v If you added more than one file to the Installables list, expand the entry for each one in the Installable list and specify file-specific requirements. For example, if you have added different installation files for different hardware or different operating systems, specify the particular requirements for each file. v If you are using multiple software configuration templates to define different ways to configure the installation, specify requirements to check for each type of deployment. For example, if you are defining a J2EE application and want to deploy it to WebSphere Application Server and WebLogic Server, the software configuration templates that you create for each type of deployment can contain requirements for the type of J2EE server. 12. Capabilities identify attributes of the software that can be used for installation requirement validation. For example, if you are creating a software definition for a Example Patch version 5, you can specify the vendor (Example) and the version number (5). After you deploy Example Patch 5, other software deployments that require Example Patch 5 can verify whether a particular computer has the patch installed. a. Click Add Capability b. Specify the capability details. 1) In the Capability Type field, select the appropriate capability type. 2) In the Name section, specify the appropriate values for each capability name. 3) Click Save. 13. Click Save .
708
Results The software definition for the software patch is created. What to do next To install the software, you must specify the provisioning workflows required for this software patch. For information about assigning provisioning workflows, see the provisioning workflows documentation. Defining software stacks: A software stack is a special type of software definition that you can use to identify groups of software that you want to install at the same time and in a specific sequence on target systems. A software stack can include installable files and software definitions for software products, software patches, and other software stacks. Software stacks serve several purposes: v You can consistently install the same software in the correct order and with the same configuration on managed systems. v You can add software stacks to computer templates so that Tivoli Provisioning Manager can identify managed systems that are not compliant with the software stack. v You can install software stacks on individual systems or add them to computer templates for automatic installation on provisioned servers. Using software definitions You can deploy software stack using a list of software definitions or using an image. The list of software definitions in a software stack represent each piece of software that you want to install and the required installation order. You can nest one software stack inside another software stack by adding the child software stack to the list of software definitions in the parent software stack. To plan software stacks and ways to combine them, consider groups of software that you can install in different environments. You can create software stacks for these groups and then incorporate them into larger software stacks that are for specific deployments.
709
For example, if you are setting up Apache Web servers and you want each Web server to include both Apache and two administration tools, you can create the following software definitions:
Table 124. Software definitions for software stacks Software Definition Apache for Windows Monitoring tool File manager Administration Tools Stack Apache Server Stack Contents A software definition for the Apache for Windows software stack. A software definition for one of the administration tools A software definition for one of the administration tools A software stack that contains the software definitions for both administration tools A software definition that contains the following software definitions: v Apache for Windows v Administration Tools Stack
Using images If you have an image that contains the set of software that you want to deploy, you can add it to the list of installable files in a software stack. This option can be easier to deploy than using software definitions because it does not require the provisioning server to install each piece of software individually. However, this method can also be less flexible. Re-create the whole image if you need to update an item in the software stack, and you cannot easily nest software stacks. Installation methods The items that you include in a software stack determine how it is installed. Your software stack can include a special configuration item called an iterator. Its placement in the list of installable files determines which software stack installation method to use when a software stack contains both a list of installable files and an image. v If you do not include an iterator, the provisioning server assumes that the software definitions are only in the software stack to model the contents of the software stack. v If you add an iterator, its placement of in the installable file list determines when the provisioning server deploys the software stack by installing individual software definitions. For example, if the iterator is the first item in the list, the provisioning server uses the software definitions before considering the installable files. If the iterator is the last item in the list, the provisioning server only uses the software definitions to install the software stack if a managed system does not match the requirements of installable files in the software stack. The iterator is typically placed at the end of the installable file list, because deploying images is typically more efficient than installing individual pieces of software. The following examples show different deployment scenarios.
710
Installable files
Iterator
Product 2
Product 3
In this configuration, the software stack contains a list of software definitions. Each software definition represents an item in the software stack. The provisioning server uses the software definitions to install each piece of software individually. To use this option, every software definition in the software stack must include at least one installable file. The software stack must also include a special entry in the list of installable files called an iterator. The iterator indicates that the provisioning server must use the software definitions to install the software stack. Install all items at the same time using a software image
Software definitions
Product 1
Installable files
Image 1
Product 2
Image 2
Product 3
A software stack can include one or more software images in its list of installable files. For example, you can create a standard Windows 2000 software stack that has three installable images that you use for three different types of servers. Based on the requirements of each image, the provisioning server determines the image to deploy to a particular target computer. If you use this option, it is not necessary to include software definitions in the software stack. However, you might want to include a list of software definitions so that you have a record of the items in the software stack. The installation of an image typically triggers provisioning workflows for deploying the image from a boot server. Use software images for software stacks that you deploy to new systems or systems that you want re-image because installing an image overwrites software that is installed on the target system.
711
Installable files
Iterator
Product 2
Image 1
Product 3
Image 2
If you want to make both software stack installation methods available, include the following items in the software stack: v A list of software definitions for the software in the software stack. Each software definition must include at least one installable file. v An iterator. v One or more images that contain the same pieces of software that are represented by the list of software definitions. The placement of the iterator in the installable file list determines the priority of the installation methods. For example, if the iterator is the first item in the list, the provisioning server uses the list of software definitions to install the software instead of the images in the list. If the iterator is the last item in the list, the provisioning server uses list of software definitions to install the software stack if the target computer does not match the requirements of all images listed in the software stack. Because deploying images is typically more efficient than installing individual pieces of software, the iterator is typically placed at the end of the installable file list. Making changes to software stacks When you make changes to existing software stacks that are associated with a resource pool or tier, consider the impact of the changes and take the following actions: v Ensure that existing servers in the resource pool or tier can coexist with servers that are added to the group with the updated software stack, or update the existing servers to match the new software stack. v If this software stack is referenced by other software stacks, ensure that the changes you are making do not create compatibility or dependency problems in the parent software stack. Adding software stacks: Create software stacks so that you can easily and consistently install a standard set of software on managed systems. To add a software stack: Procedure 1. Click Go To > IT Infrastructure > Software Catalog > Software Stacks. . 2. Click New 3. Specify the name, version, and description for the software stack. 4. If you are creating a software stack that performs an installation using list of other software definitions, perform the following steps:
712
a. Add the list of software to the Modules list. From the Select Action menu, click Add Stack Entry. Follow the instructions in the wizard. b. Add an iterator to the Installable Files list to indicate that you want to use the list to deploy software. Click Add Iterator. If you do not use an iterator, the list of software in the Modules list is stored for reference purposes only and is not used for deployment. 5. If you want to use an image to deploy the software stack, perform the following steps: a. b. c. d. e. f. Click Add Installable. Specify a name and description for the image. In the Status fields, select the testing status of the image file. In the Status fields, select the testing status of the image file. If the image is specific to a locale, select the locale. In the Image Type list, click the type of image you are adding.
g. In the Boot Server list, click the boot server to use for installing the image. h. Click Save. If you add more than one image, the provisioning server uses the requirements defined for each image to identify the appropriate image to deploy on a target computer. The order of the images indicates the priority of the image. The first image with requirements that the target computer can meet will be selected. 6. Optional: In the Provisioning Groups section, you can add the software to a provisioning group to categorize and organize your software. Click Assign to Provisioning Group and select a provisioning group. 7. In most situations, requirements for the software stack must be configured in the software definition of each entry in the Modules list or with each image in the Installable Files list. If you want to specify some requirements that apply to a list of multiple images in this software definition, you can define those requirements in the Requirements section. a. Click Add Requirement. b. In the Requirement Type list, select the requirement type. c. If you only want to specify a requirement type, leave the Requirement field blank. If you want to add a requirement name, select a requirement name. d. If you selected a requirement name, select one or more values for it. You must specify at least one value. To add a value, type it in the Value field, and then click Add. e. If you are creating a hosting requirement, select the Hosting check box. Use this option when the software you are defining needs to run in the context of another software application. For example, a servlet requires a standalone servlet engine or an application server with servlet support to load the servlet. The servlet engine therefore acts as a container for running the software. If the servlet requires a specific container environment, such as WebSphere Application Server, you can specify a hosting requirement for it. f. If you want the provisioning server to reject a mismatched capability but accept a missing capability, select the Accept Non Existing Capability check box. g. Click Save. 8. Specify capabilities if you are using an image to deploy the software stack and the capabilities apply to deployments with any software configuration template. For example, if all images contain the common agent, you can add this capability. If you are using entries in the Modules list, each entry must have specific capabilities defined already. a. Click Add Capability b. Specify the capability details. 1) In the Capability Type field, select the appropriate capability type. 2) In the Name section, specify the appropriate values for each capability name. 3) Click Save.
Chapter 7. Deploying software
713
9. In the Configuration Templates section, software configuration templates are automatically added for items that are in the Modules list. If you are using an image to deploy the software stack, manually create the software configuration template for the image. For more information, see Creating software configuration templates. Results The software definition for the software stack is created. What to do next If you are deploying with an image, specify the provisioning workflows required to deploy the software. For information about assigning provisioning workflows, see the provisioning workflows documentation. Duplicating software stacks: If you need to create multiple software stacks with similar software and configuration information, you can duplicate an existing software stack, and then update the copied software stack. When you duplicate a software stack, references to embedded software stacks remain the same. Embedded software stacks are not duplicated. Software Resource Templates of the duplicated software stack have no references to Software Resource Templates of the original software stack. Procedure 1. Click Go To > IT Infrastructure > Software Catalog > Software Stacks. 2. Select the software stack to duplicate. 3. From the Select Action menu, click Clone. 4. To display the software stack that you have cloned in the List tab: a. Click Go To > Administration > Provisioning > Provisioning Global Settings. b. c. d. e. Click the Variables tab. Click New Row to create a new variable. Create a new variable called display-cloned-stacks and set its value to true. Save the changes.
Results The new software stack is created with the name SWStack_name-ObjectID. For example, if duplicating MyStack, the new cloned software stack is named MyStack-13456 where MyStack is the software stack name and 13456 is the software stack object ID. To modify the new software stack, click its name in the software stack list, and then make the required changes. Creating software configuration templates: Software configuration templates are typically designed by workflow developers. If you are manually modeling software in the software catalog, you can manually add software configuration templates. Workflow developers typically include the required software definitions and software configuration templates in the automation packages they create for software. They are added to the data model when the automation package is installed. If you create a software configuration template manually, you can include parameters with fixed values or values that can be selected or changed at installation time.
714
Templates can be organized in a hierarchy when you want to define related resources. For example, you can define multiple templates for features within a parent template. There are several ways to create a software configuration template. v For some software, you can use a template definition to create the software configuration template. A template definition contains all the parameters required by the provisioning workflows that implement the installation and configuration of the software, and default values for the parameters. This option requires the least amount of customization or knowledge of the provisioning workflow implementation. v You can copy a software configuration template from an existing software definition and customize it as required. v If you are creating multiple software configuration templates in the same software definition with similar parameters, you can duplicate an existing software configuration template using the Clone command and then and then modify the copy as required. v If a template definition or existing software configuration template does not meet your needs, you can create an empty software configuration template and manually add all the parameters, requirements, capabilities, and child templates that you require. If there are multiple software configuration templates in a software definition, the first one in the list is the default. You cannot remove the default software configuration template. Software configuration templates and dependencies for software stacks: You can deploy software stack using a list of software definitions or using an image. When you add software definitions to a software stack, a copy of the software configuration templates for each software definition are used to build the software configuration template for the entire software stack. The following example shows the structure of a software configuration template for a software stack:
Apache (Software Definition)
Apache Test Template
The parent software configuration template type is Unspecified resource instantiation because a software resource is not created on the target system to represent the entire software stack. Under the
715
parent software configuration template, a copy of the software configuration template from each software definition in the software stack appears as a child template. The number at the end of the template name is the identifier for the copy of the template. Changes to the original templates do not affect the templates in the software stack because the child templates are copies. In addition, changes to the template copies in the software stack do not affect the original templates. This separation provides you with the ability to change the parameter values for installation of the software stack without affecting the original software configuration templates. Dependencies Requirements in software stack apply to any images that are included in the installable file list of the software stack. If you are using software definitions to install the software stack, the provisioning server uses requirements defined in the individual software definitions and in the software configuration template contained in the software stack to perform validation of a target computer. The provisioning server takes into consideration that the requirements of one software definition might be met by the capabilities of another software definition that is also in the software stack. Creating software configuration templates from template definitions: A template definition is a predefined software configuration template that you can use as the basis for your own software configuration template. If a template definition exists for the software configuration template that you want to create, the template definition can help you to quickly create software configuration template with the appropriate parameters and default values for deploying the software. You can create more than one software configuration template from a template definition. For example, if you want to include software configuration templates for deploying a piece of software on different operating systems, you can use the appropriate template definitions to add the required software configuration templates. Procedure 1. Open the page for the software that you are configuring. 2. In the Software Configuration Template section, click New Configuration Template. 3. Specify the following information: a. In the Name field, type the name of the software configuration template. b. In the Creation Method section, select Create from a template definition. c. In the Configuration Template Definition list, select the template definition that matches the type of software configuration template that you want to create. d. Click Save. Results The software configuration template is created. What to do next Review the parameters and default values in the new software configuration template and make changes as required. You can also add requirements and capabilities beyond those that are already configured. Copying a software configuration template from a software definition:
716
If you want to create a software configuration template with settings that are similar to a software definition in another software definition, you can copy the software configuration template and then make changes to the copy. Procedure 1. Open the page for the software that you are configuring. 2. In the Software Configuration Template section, click New Configuration Template. 3. Specify the following information: a. In the Name field, type the name of the software configuration template. b. In the Creation Method section, select Copy from a software definition. c. Select a Software Module that contains the software configuration template that you want to copy. d. In the Configuration Template list, select the software configuration template that you want to copy. e. Click Save. Results The software configuration template is copied from the specified software definition to the current software definition. What to do next Review the parameters and default values in the copied software configuration template and make changes as required. You can add or remove requirements and capabilities as required.
Rollback
Rollback is the capability to bring the system back to its prior state. It applies only to software products based on software package blocks. When you perform a rollback operation, the system returns to its previous state, before the installation or upgrade of a software product based on a software package block (SPB file). This operation is applicable only to software products which you installed enabling the rollback functions. As an example, the following scenario is provided: 1. You install on your system application version 1. 2. You upgrade the application to version 2. This installation is performed with the rollback option enabled. 3. You uninstall the application version 2 from your system, without the Force uninstall option selected. 4. Result: You have removed the application version 2 from your system and brought back the application to version 1. In the following cases, rolling back the installed software application to its previous state is a more convenient operation to perform, instead of completely uninstalling that software application: v When installing software applications that replace some system files. v When upgrading software applications. The rollback function is not usable on software package blocks built using the native installation wizards. If the installation of native packages, such as MSI or InstallShield packages, fails, use the rollback capability provided with the native installation tool. In case of native installers such as MSI, the rollback function is allowed but behaves like a remove operation.
717
Procedure
1. Click Go To > Task Management > Provisioning Tasks > Provisioning Task Definitions. 2. 3. 4. 5. 6. . Click New Type a name for the task. Click Activity Plan for the type. Click Edit > Create Activity > Software Management. Enter a name and a description for the activity.
7. Select Install from the Operation section and click Properties. 8. In the Rollback section, click Enabled. By default this setting has the same value as the value set for the Rollback_Enabled global variable.
Procedure
1. Click Go To > Administration > Provisioning > Provisioning Global Settings. 2. Click the Variables tab. 3. Find the Rollback_Enabled variable and click the icon beside it. 4. Set the appropriate value for the variable: v To enable the feature, set the value of the variable to TRUE. v To disable the feature, set the value of the variable to FALSE. 5. Click Save .
Procedure
1. Click Go To > Task Management > Provisioning Tasks > Provisioning Task Definitions. 2. Click New . 3. Type a name for the task. 4. Click Activity Plan for type. 5. Click Edit > Create Activity > Software Management. 6. Enter a name and a description for the activity. 7. Select Install from the Operation section and click Properties. 8. In the Rollback section, click Disabled.
718
When you install a software package block with the rollback feature enabled, a backup software package block is created to be used to perform a rollback operation. You can remove this backup software package block on the target computer if needed. Run the following command from the target computer on which you want to remove the backup software package block:
$install_dir\runtime\agent\agentcli spbhandler accept -n "Software Installable name.Software Installable version"
where: $install_dir Is the directory where the Tivoli Common Agent (TCA) is installed on the target computer. Software Installable name Is the name of the software package block which was installed with the rollback feature enabled, and for which a backup software package block exists. Software Installable version Is the version of the software package block which was installed with the rollback feature enabled, and for which a backup software package block exists. You can also run the SPB_Synch_Accept workflow from the Web interface by performing the following steps: 1. Click Go To > Administration > Provisioning > Provisioning Workflows. 2. Find the workflow named SPB_Synch_Accept. 3. Click the Run icon for the workflow.
Procedure
1. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Computers. 2. Search for the computer that you want to view and then click its name in the search results. 3. Click the Software tab.
Results
The Software page displays the software that is installed on the computer based on information in the data model.
719
Procedure
1. 2. 3. 4. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Computers. Search for the computer that you want to view and then click its name in the search results. Click the Software tab. Click Add Software.
5. In the Software Installation field, specify the name of the software installation. 6. In the Locale field, specify the locale of the software. 7. In the Software Definition field, select the software definition that represents the software installation. 8. In the Configuration Template list, select the software configuration template that most closely matches the configuration of the software. 9. In the Software Installable list, select the software installable that matches the product edition and version that was used to install the software. . 10. Click Save 11. If you want to edit details of a software resource, click its name in the Software Installations list.
Results
The software installation is added.
Procedure
1. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Computers. 2. Search for the computer that you want to view and then click its name in the search results. 3. Click the Software tab. 4. From the Software Installations list, identify and click the software installation to which you want to add a child software resource. The Details tab of the Software Resources application is displayed. 5. Click Add Child Resource. 6. Click the appropriate option: Add Software Instance Select this option for an instance of the parent software resource. For example, you can add an instance to a , DB2 or WebSphere Application Server software installation. Add Software Configuration Select this option to model configuration data for the parent software resource. Add Software Resource Select this option for software resources that do not fall into any of the other categories. Add Software Installation Select this option for a software installation. Add Software Application Data Select this option to model application data for the parent software resource. 7. Specify the following information:
720
a. In the Name field, specify the name of the child software resource. b. In the Locale field, specify the locale of the child software resource. c. In the Configuration Template field, select the software configuration template that represents the child software resource. d. If you are adding a software installation, select the software installable that matches the product edition and version that was used to install the software in the Software Installable list. e. Click OK .
Results
The child software resource is added. From the Software Resources application, you can also view the configuration templates of the software resource, change the device models for the software resource, or start and stop the software instances.
What to do next
If you are removing a WebSphere Application Server instance later, verify the following: v The first instance in the default profile is running. By default, the instance is called server1. v The instance that you want to remove is running. You cannot remove the instance if it is stopped. Note: The instance in the default profile cannot be removed. An instance running the node agent cannot be removed.
Procedure
1. 2. 3. 4. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Computers. Search for the computer that you want to view and then click its name in the search results. Click the Software tab. Find the software resource that you want to update.
Chapter 7. Deploying software
721
Results
The workflow for updating the data model runs.
Procedure
1. Click Go To > Deployment > Software Management > Software Product Upgrade. 2. In the Software section, select the software that you want to upgrade. 3. In the Targets section, select the target computers for the upgrade. 4. In the Upgrade Method section, specify how you want to upgrade the software: The available options and appropriate option to choose depend on the software product that you selected and the provisioning workflow that is associated with the software product. Upgrade existing configuration Upgrade the configuration of the existing software resource only. Upgrade to a new version Upgrade the software resource by installing a new version of the software on the computer. 5. Specify any additional options for the upgrade task. 6. Click Submit.
Results
The provisioning workflow for upgrading the software runs and performs the selected upgrade action either immediately or at the specified scheduled date and time.
722
domain can consist of two or more cluster domain nodes that can run on one or more computer systems, working together to provide a higher level of availability and scalability. Two cluster domain types can be described: Peer domain This cluster domain consists of two or more peer cluster domain nodes organized in such a way as to have one online node, called a master node, and one or more online or offline nodes, called standby nodes. Each cluster domain node is aware of all other nodes, and administration commands can be issued from any node in the peer domain. All cluster domain nodes have a consistent view of the domain membership. Clustering software is installed and configured on all of the nodes in the cluster, to monitor the status of the cluster domain. Whenever necessary, for example, in a failover scenario, the peer domain cluster redistributes the workload from the failed master node to a standby node, therefore increasing the availability. Although high availability is the main reason for setting up the peer cluster domain, scalability can also be increased, by making it possible to easily adjust the number of nodes in the cluster domain, based on demand. Management server domain This cluster domain has a management node that is used to administer a number of redundancy nodes. Only the management node has knowledge of the whole domain. The managed cluster domain nodes know only about the node managing them; they are not aware of each other. Clustering software is installed on the management node only, and administration commands are issued only from the management node to administer all the redundancy nodes. For a large data center, a management server domain can contain more than one management nodes to administer the redundancy nodes. Based on the cluster domain model, sets of logical management operations are provided that can be used to perform cluster domain configuration tasks such as provisioning or deprovisioning cluster domain nodes, or to perform management tasks such as starting or stopping cluster domains. Specific workflows implementing these logical management operations have been developed and are also provided. For more information about all the available logical management operations associated with cluster domain configuration and management, see the Tivoli Provisioning Manager information center.
723
Software configuration templates are provided to define all of the cluster resources, resource groups, and resource relationships available within cluster domains. For an example of software configuration templates, see the topic Software configuration template for cluster domain configuration. Based on the type of clustering technology that is used, you can use a predefined software configuration template as an example for building and configuring a new cluster domain. An example of software configuration templates can be found in the venice.xml file. Venice.xml is located in the $TIO_HOME/xml directory, where $TIO_HOME is the home directory of the provisioning server. This template is defined in XML format, and is associated with a software module. You can customize the XML definition of the software configuration template according to your needs, and then you can use the XMLImport utility to import the template into the data model. A specific logical management operation is also provided for configuring new cluster domains. When the ClusterDomain.Config logical management operation is run, the software configuration template associated with the specified cluster domain is identified, and is used to retrieve all predefined resource and resource group settings. After the resource and resource group settings are retrieved, you can import them into both the data model and the data center. For more information about logical management operations associated with cluster domain and resource configuration, see the topic Logical management operations for cluster domains and resources on page 733. To build a cluster domain using a software configuration template: Procedure 1. Create an XML software configuration template for the cluster domain that you want to build. You can use an existing example. See Software configuration template for cluster domain configuration. 2. Import the XML software configuration template into the data model using the XMLImport utility. 3. Using the web interface, you can either add cluster domain nodes to the cluster domain manually, or you can directly use the ClusterDomain.Config logical management operation, to automatically add nodes to the cluster domain. Software configuration template for cluster domain configuration: An existing software configuration template can be used as an example to build and configure a cluster domain. The software configuration template defines all the resources, resource groups, and resource relationships within a cluster domain. The following is an example of a software configuration template used for cluster domain configuration:
<datacenter> <!-- Define the software configuration template for the software module --> <software-module name="DB2 H/A Software for Linux" is-device-model="Simulator" version="1.0"> <installable-package name="H/A Cluster Product" version="1.0" service="true" install-path="C:\" file-repository="test file repository" status="tested"> <file name="H/A Cluster Product File" path="/usr/local"/> </installable-package> <software-resource-template name="ClusterResources"> <software-resource-template name="cr1"> <software-resource-template name="cr1-cra"> <!-- define the resources and its properties --> <template-param name="StartCommand" value="mount_start.ksh" /> <template-param name="StopCommand" value="mount_stop.ksh" /> <template-param name="MonitorCommand" value="mount_monitor.ksh" /> <template-param name="MonitorCommandPeriod" value="6" /> <template-param name="MonitorCommandTimeout" value="4" /> <template-param name="StartCommandTimeout" value="120" /> <template-param name="StopCommandTimeout" value="300" />
724
<template-param name="UserName" value="root" /> <template-param name="ProtectionMode" value="1" /> </software-resource-template> <template-param name="name" value="nfsserver-server" /> <template-param name="resource-type" value="IBM.Application" /> <template-param name="is-device-model" value="Cluster Domain Simulator" /> </software-resource-template> <software-resource-template name="cr2"> <template-param name="name" value="nfsserver-ip" /> <template-param name="resource-type" value="IBM.Service" /> <template-param name="is-device-model" value="Cluster Domain Simulator" /> </software-resource-template> <software-resource-template name="cr3"> <template-param name="name" value="nfsserver-data-vars" /> <template-param name="resource-type" value="IBM.Application" /> <template-param name="is-device-model" value="Cluster Domain Simulator" /> </software-resource-template> <software-resource-template name="cr4"> <software-resource-template name="cr4-cra"> <!-- define the resources and its properties --> <template-param name="StartCommand" value="db2_start.ksh" /> <template-param name="StopCommand" value="db2_stop.ksh" /> <template-param name="MonitorCommand" value="db2_monitor.ksh" /> <template-param name="MonitorCommandPeriod" value="20" /> <template-param name="MonitorCommandTimeout" value="10" /> <template-param name="StartCommandTimeout" value="60" /> <template-param name="StopCommandTimeout" value="60" /> <template-param name="UserName" value="root" /> </software-resource-template> <template-param name="name" value="db2-dbinst1-rs" /> <template-param name="resource-type" value="IBM.Application" /> <template-param name="is-device-model" value="Cluster Domain Simulator" /> </software-resource-template> <software-resource-template name="cr5"> <template-param name="name" value="db2-dbinst1-rs_mount" /> <template-param name="resource-type" value="IBM.Service" /> <template-param name="is-device-model" value="Cluster Domain Simulator" /> </software-resource-template> <software-resource-template name="cr6"> <!-- define the resources and its properties --> <software-resource-template name="cr6-cra"> <!-- define the resources and its properties --> <template-param name="ProtectionMode" value="1" /> <template-param name="IPAddress" value="9.21.31.4" /> <template-param name="MNetMask" value="255.255.255.0" /> </software-resource-template> <template-param name="name" value="db2-dbinst1-rs_ip" /> <template-param name="resource-type" value="IBM.ServiceIP" /> <template-param name="is-device-model" value="Cluster Domain Simulator" /> </software-resource-template> </software-resource-template> <software-resource-template name="ClusterResourceGroups" software-resource-template-source="ClusterResources"> <software-resource-template name="crg1"> <software-resource-template name="crg1-groupMember"> <template-param name="member1" value="nfsserver-server" /> <template-param name="member2" value="nfsserver-ip" /> <template-param name="member3" value="nfsserver-data-vars" /> </software-resource-template> <template-param name="name" value="SA-nfsserver-rg" /> <template-param name="is-device-model" value="Cluster Domain Simulator" /> </software-resource-template>
Chapter 7. Deploying software
725
<software-resource-template name="crg2"> <software-resource-template name="crg2-groupMember"> <template-param name="member1" value="db2-dbinst1-rs" /> <template-param name="member2" value="db2-dbinst1-rs_mount" /> <template-param name="member3" value="db2-dbinst1-rs_ip" /> </software-resource-template> <template-param name="name" value="db2-rg" /> <template-param name="is-device-model" value="Cluster Domain Simulator" /> </software-resource-template> </software-resource-template> <software-resource-template name="ClusterResourceRelationships" software-resource-template-source="ClusterResources"> <software-resource-template name="crr1"> <template-param name="name" value="rel1" /> <template-param name="sourceResource" value="db2-dbinst1-rs" /> <template-param name="targetResource" value="db2-dbinst1-rs_mount" /> <template-param name="dependency" value="Dependson" /> </software-resource-template> <software-resource-template name="crr2"> <template-param name="name" value="rel2" /> <template-param name="sourceResource" value="db2-dbinst1-rs" /> <template-param name="targetResource" value="db2-dbinst1-rs_ip" /> <template-param name="dependency" value="Dependson" /> </software-resource-template> </software-resource-template> </software-module> <!-- Define a new cluster domain --> <cluster-domain name="tsaHA2" display-name="TSA DB2 H/A 2-Node Cluster" cluster-type="Peer-Domain" is-device-model="Cluster Domain Simulator" virtual-ipaddress="VIP for StateBank Web/App" software-module="DB2 H/A Software for Linux" observed-state="Online" desired-state="Online"> </cluster-domain> </datacenter>
726
Adding or removing cluster domains: Adding new cluster domains To be able to model and manage the application tiers in your data center, you need to create a cluster domain. The type of cluster domain that you need depends on the type of the data center that you want to manage and possibly on other data center-specific requirements. After the new cluster domain has been successfully added, its name is added to the cluster domain list. Removing cluster domains If a cluster domain is no longer required by an application, you can remove it. If the cluster domain that you want to remove contains one or more subclusters, you must ensure that all of its subclusters are removed before you can remove the cluster domain itself. Before proceeding with this task, you must ensure that the provisioning workflow that implements the ClusterDomain.remove logical management operation, is assigned to the cluster domain that you want to remove. Associating device drivers with cluster domains: To be able to perform a number of configuration tasks on a cluster domain, you must ensure that the appropriate device driver is assigned to that cluster domain. By associating a device driver with a cluster domain, you assign a number of provisioning workflows that implement a number of cluster domain-specific logical management operations to that cluster domain. After the specified device driver has successfully been assigned to the cluster domain, all provisioning workflows and logical management operations associated with the device driver are available to be used with that cluster domain. Automatically configuring cluster domains: Prerequisite: This procedure assumes that you have already associated the cluster domain to be configured with the appropriate device driver. By associating a device driver with the cluster domain, you assign a number of provisioning workflows implementing cluster domain-specific logical management operations to that cluster domain. To become fully operational, a newly added cluster domain must be properly configured and provisioned with cluster domain nodes. To automate the cluster domain configuration and node provisioning, Tivoli Provisioning Manager provides the ClusterDomain.config logical management operation and a set of specific provisioning workflows that implement it. A larger data center might require more than one management node to administer all redundancy nodes in a management server cluster domain. Therefore, you might need to provision more management nodes to this cluster domain, by running the provisioning workflow that implements the ClusterDomain.config logical management operation more than once. After the cluster domain has been successfully configured and the specified nodes provisioned, the cluster domain remains in an unknown state until you start it. If the automatically configured cluster domain requires more nodes, you can manually provision it with additional nodes. Editing the cluster domain properties: You can make changes to the main details for a cluster domain, such as the cluster domain name, description, target status, and software definition. Adding or removing subclusters: Adding new subclusters To be able to provide additional functionality to an existing cluster domain, you might need to create a hierarchical cluster domain structure. For example, you might want to expand the functionality of an existing management server cluster domain so that it can function as a peer cluster domain as well. This additional functionality can be provided by creating a hierarchical or nested cluster domain structure.
727
Cluster domains nested inside other cluster domains are called subclusters. Subclusters, in turn, contain cluster domain nodes. Each cluster domain node can be a member of only one subcluster. A subcluster can have only one parent cluster domain. Removing subclusters If the hierarchical structure of a cluster domain is no longer required, it can be deleted by removing all nested subclusters. Removing subclusters from the cluster domain removes the additional functionality that was achieved by creating the nested cluster domain structure. If you want to remove the entire cluster domain, you must ensure that you remove all of its subclusters first. Cluster domain status: Using the provisioning server, two cluster domain or cluster domain node states can be consistently monitored in parallel: Current status This is the actual status of the cluster domain or cluster domain node. The current status of the physical cluster domain and its status in the data model must be synchronized. Tivoli Provisioning Manager provides a dedicated logical management operation, ClusterDomain.Config, that can be used to keep the data model and the physical cluster domain synchronized. Whenever a change in the configuration of a cluster domain or cluster domain node takes place, you can run the ClusterDomain.Config logical management operation directly to update the cluster domain's configuration in the data model. Target status The target status is the cluster domain or node status as it appears in the configuration of the high-availability application. In most cases, the current status and the target status are synchronized, because the cluster domain has the capability to manage its own status. However, you might encounter situations when the current and target states are different. For example: v A node in the cluster domain has failed. In this case, the target state says that the node must be Online, while the actual current status of the node is Failed. v A standby node in a peer cluster domain is Offline as long as the master node is Online and functioning as expected in the high-availability application. If the master node fails, the standby node comes Online. In this case, the target status of the standby node says it is Offline, while its actual current state is Online. A cluster domain node can be in one of the following states:
Table 125. Cluster domain nodes status types Status Online Offline Failed Unknown Description The node is fully operational and actively provides high-availability services in the cluster domain. The node is a passive part of the cluster domain. It is functional but does not run any high-availability services. The node cannot be controlled programmatically. In this case, a human operator has to resolve the failure and restore the node back to service. The node status cannot be determined or might not be required in the current implementation.
Configuring cluster domain nodes: A cluster domain node is an element in a cluster domain. It can be either a physical element such as a server, or a virtual element such as a software module instance. You can have two or more servers in a peer domain cluster, functioning as master and standby nodes. Similarly, you can have two or more software module instances running in a management server domain cluster as redundancy nodes.
728
The maximum number of cluster domain nodes that are allowed to run in a cluster domain depends on the clustering technology that is used, but there are no preset limitations. The maximum number can vary significantly from one clustering technology to another, and can range anywhere from two to a few dozens cluster domain nodes. After provisioning a new cluster domain node, additional configuration tasks must be performed before you can start it. You can configure only an offline node. Configuration tasks include editing the cluster domain node properties, adding resources to the cluster domain node, grouping resources, and so on. Sets of logical management operations are provided, which can be used to perform cluster domain node configuration tasks. A set of provisioning workflows that implement these logical management operations is provided. To automate these provisioning tasks, you must ensure that the provisioning workflows implement the appropriate logical management operations, and are assigned to the appropriate cluster domain nodes. For cluster domain nodes, you must assign provisioning workflows for adding and removing cluster domain nodes, creating resource groups, and starting and stopping cluster domain nodes. The following provisioning tasks can be performed with cluster domain nodes: v v v v Manually provisioning additional nodes Deprovisioning nodes Editing cluster domain node properties on page 730 Starting and stopping nodes on page 730
Manually provisioning additional nodes: Prerequisite: This procedure can be used whenever you want to add additional cluster domain nodes to an already configured cluster domain. It assumes that you have already configured the cluster domain and provisioned it with at least two nodes automatically. A cluster domain node can be either a physical element such as a server, or a virtual element such as a software module instance. v In a peer domain cluster, you can have two or more peer cluster domain nodes organized in such a way as to have one online node, called a master node, and one or more online or offline nodes, called standby nodes. Manually provisioning a cluster domain node to a peer domain cluster means adding a standby server to the cluster. In a failover scenario, for example, the peer domain cluster requires Tivoli Provisioning Manager to provision a new standby node that runs the same clustering software as the master node in order to replace the failed node. v In a management server domain cluster, you can have two or more software module instances running as redundant nodes. Manually provisioning a cluster domain node to a management server domain cluster means adding a redundant node to the cluster domain. You might need to do this for load balancing purposes, for example. Before proceeding with this provisioning task, ensure that the required provisioning workflow, that implements the ClusterDomain.addNode logical management operation, is assigned to the cluster domain that you want to work with. After the cluster domain node is successfully added to the cluster domain, the node remains in an unknown state until you start it. Deprovisioning nodes: If the cluster domain no longer requires as many cluster domain nodes, you can remove or deprovision one or more nodes. Ensure that all resources are stopped within the node and that the node's current status is offline before removing it. Before proceeding with this provisioning task, ensure that the provisioning workflow that implements the ClusterDomain.removeNode logical management operation, is assigned to the cluster domain that you want to work with.
Chapter 7. Deploying software
729
Editing cluster domain node properties: You can modify the description of a cluster domain node by editing the cluster domain node properties. Starting and stopping nodes: Starting nodes After adding a cluster domain node to a cluster domain, you need to start it for the node to be operational in the cluster domain. Before proceeding with this provisioning task, ensure that the provisioning workflow that implements the ClusterDomain.StopNode logical management operation, is assigned to the cluster domain that you want to work with. Stopping nodes A cluster domain node must be stopped before you can remove it. While the node is stopped, its current state is offline. Before proceeding with this provisioning task, ensure that the provisioning workflow that implements the ClusterDomain.StopNode logical management operation, is assigned to the cluster domain that you want to work with. Configuring cluster domain resources: Depending on its type, a cluster domain can run different types of resources: v Software resources, such as the database server program v Network resources, such as the virtual IP address v Disk resources, such as the volume group or share mount, and so on. For most of the tasks that can be performed with cluster resources, provisioning workflows that implement specific logical management operations are initiated. The main tasks that can be performed with cluster domain resources include: v Associating device drivers with cluster resources v v v v Starting and stopping cluster resources Creating cluster resource groups on page 731 Managing resources within groups on page 731 Managing resource relationships on page 731
Associating device drivers with cluster resources: To be able to perform a number of tasks on a cluster resource, you must ensure that the appropriate device driver is associated with that resource. By associating a device driver with a resource, you assign a number of provisioning workflows that implement resource-specific logical management operations to that resource. After a device driver is successfully associated with the cluster resource, all provisioning workflows and logical management operations associated with the device driver are available to be used with that resource. Starting and stopping cluster resources: Starting cluster resources After a cluster resource is added to a cluster domain node, you need to start the resource to make it operational in the cluster domain node. To proceed with this task, you must ensure that the provisioning workflow that implements the ClusterResource.Start logical management operation is assigned to the cluster domain that you want to work with.
730
Stopping cluster resources Before removing a cluster domain node, first you must ensure that all of its resources are stopped. To proceed with this task, you must ensure that the provisioning workflow that implements the ClusterResource.Stop logical management operation is assigned to the cluster domain that you want to work with. Creating cluster resource groups: You can also create cluster resource groups within a cluster domain node. Managing resources within groups: You can add cluster resources to resource groups or remove cluster resources from resource groups by initiating provisioning workflows that implement resource-specific logical management operations. Adding cluster resources to groups: To proceed with this task, you must ensure that the provisioning workflow that implements the ClusterResource.AddGroupMember logical management operation is assigned to the cluster resource that you want to work with. Removing cluster resources from groups: To proceed with this task, you must ensure that the provisioning workflow that implements the ClusterResource.RemoveResource logical management operation is assigned to the cluster resource that you want to work with. Managing resource relationships: You can define one or more relationships between two cluster resources. For example, a relationship can specify the precedence order for starting the resources in a group. When the group is started, the relationship indicates the order in which the clustering software must start the resources in that group. The format of the resource relationship depends on the type of clustering technology that you are using. For example, for starting resources, some clustering technologies might use StartAfter, while others might use DependsOn. Creating resource relationships: To automate the process of creating relationships between cluster resources, the ClusterResource.CreateDependency logical management operation is provided, as well as a number of provisioning workflows that implement it. Before proceeding with this task, ensure that the provisioning workflow that implements the ClusterResource.CreateDependency logical management operation is assigned to the cluster resource that you want to work with. Removing resource relationships: When a relationship between two cluster resources is no longer needed, you can remove it.
731
v Updating cluster domain states in the data model Viewing cluster domains: You can display a list of all cluster domains that are available in the system. For each of the cluster domains in the list, details such as the cluster domain's name, description, type, and its current and target states are displayed. Viewing node details in a cluster domain: For a selected cluster domain, you can display a list of all cluster domain nodes that are operational in the cluster domain. A number of additional details can also be displayed: v The cluster domain nodes' current and target states. v The system type, whether the node in the cluster domain is a dedicated, assigned, or overflow server. v Whether the cluster domain nodes are management nodes. v The subclusters and their states if the selected cluster domain is nested. Viewing resource groups in a cluster domain: For a selected cluster domain, you can also display a list of all resource groups that are defined in the cluster domain. Also displayed are the current and target states for each of the resource groups in the list. Viewing resource groups and details: For a selected resource group, you can display a list of all resources that are defined in it. For each resource in the list, you can also view the name of the cluster domain node that the resource is defined in. If the current resource group is nested, you can also display a list of all resource subgroups that are defined in it. Additional details such as the resource's name, description, type, its current and target states, its relationships with other resources, and the name of the parent group can also be displayed Starting and stopping cluster domains: Starting cluster domains Configuration tasks can be performed on a cluster domain only when it is offline. After you configured the cluster domain as required, you need to start it, so that it becomes operational within the high-availability application and managed by the system. The status of a started cluster domain is online. For more information about cluster domain states, see the topic Cluster domain status on page 728. Before proceeding with this task, you must ensure that the provisioning workflow that implements the ClusterDomain.Start logical management operation is assigned to the cluster domain that you want to work with. Stopping cluster domains Configuration tasks can be performed on a cluster domain only when it is offline. Before proceeding with this task, you must ensure that the provisioning workflow that implements the ClusterDomain.Stop logical management operation is assigned to the cluster domain that you want to work with. Updating cluster domain states in the data model: Whenever a change is made in the cluster domain configuration, you can automatically update the data model to reflect this change, by running the ClusterDomain.UpdateState logical management operation. Before proceeding with this task, you must ensure that the required provisioning workflow, that implements the ClusterDomain.UpdateState logical management operation is assigned to the cluster domain that you want to work with. If the workflow is run successfully, the data model is automatically updated with the latest changes in the cluster domain configuration.
732
Administrative domains
An administrative domain is a set of one or more nodes whose administrative servers share an administrative database. Administrative domains help you to centralize administration of a distributed server environment that consists of multiple servers. The administrative domain provides a single point for administration for all servers that belong to it.
733
You can model your administrative domains in the data model and create clusters to share workload for common server processes. An administrative domains defines the physical topology of servers and how the servers and their software resources are grouped for administration. A cluster defines the functional organization of software resources in an administrative domain, and how application servers are grouped to share workload for business functionality. When you create a WebSphere Application Server cluster, you can use it as a target for components of a composite application. An administrative domain consists of the following main parts: Subdomains A subdomain is a server within an administrative domain and the software installations on the server. Resource member A software installation on the server associated with a subdomain. Cluster You can create a cluster to manage workload for common components that are installed on multiple subdomains. Tivoli Provisioning Manager provides an automation package that enables you to create WebSphere Application Server clusters based on an administrative domain. WebSphere Application Server and administrative domains: In the data model, administrative domains are represented by servers that are managed in the administrative domain and the software installed on the servers. WebSphere Application Server uses its own terms to describe the parts of an administrative domain. WebSphere Application Server concepts The following two diagrams shows an administrative domain and how WebSphere Application Server terms map to both administrative domain concepts and software model concepts. It is only one possible topology that you can configure.
734
Deployment Manager
Cluster Cluster Member (Cluster Member) Cluster Member (Cluster Member) Cluster Member (Cluster Member) Cluster Member (Cluster Member)
Deployment Manager
Cluster Cluster Member (Software Instance) Cluster Member (Software Instance) Cluster Member (Software Instance) Cluster Member (Software Instance)
Cell
In WebSphere Application Server, an administrative domain is called a cell. Within a cell, a deployment manager serves as a single point for administration of the cell. The deployment manager is installed on one of the nodes within the cell.
735
In the data center model, administrative domains are associated with the WebSphere Application Server software definition that represents the version of the product that you are using to manage the cell. Nodes A subdomain corresponds to a node within a cell. A node is a logical grouping of server processes that share common configuration and operational control. It is associated with one physical installation of WebSphere Application Server. v In WebSphere Application Server Network Deployment, a cell can contain multiple nodes. The application and configuration files are stored centrally, so that the nodes can be administered from a single administration server. v In a standalone WebSphere Application Server configuration, a cell contains one node. A node can contain multiple servers, but the configuration files for each server are stored and maintained individually. Alternatively, WebSphere Application Server nodes can be added to a cell that is managed by a WebSphere Application Server Network Deployment server. For each subdomain, you must identify the host server for the node and the existing WebSphere Application Server software installation on the server. Clusters WebSphere Application Server Network Deployment provides the ability to create application server clusters to manage workload. You can create WebSphere Application Server Network Deployment clusters and distribute components of a composite application to it. An administrative domain can include zero or more clusters. All cluster members must belong to the same cell. Cluster members are represented by software instances in the data model. You can use discovery to automatically identify existing WebSphere Application Server cells and nodes and add them to the data model, or you can manually model them. You can create clusters within a cell from the Web interface. WebSphere Application Server Network Deployment clusters are created as management server clusters in the data model. Requirements to define administrative domains: The following requirements must be met to define a WebSphere Application Server administrative domain in the data model: v WebSphere Application Server or WebSphere Application Server Network Deployment must be installed on any computers that you want to include in the administrative domain. WebSphere Application Server Network Deployment must be installed on the computer that you want to use to administer multiple nodes within a cell. v Nodes and cells must be configured using WebSphere Application Server. For more information, see the WebSphere Application Server documentation. v To create a cluster, the application servers that you want to include must have identical application components deployed on them. The servers do not need to share other configuration data. For example, one cluster member might be running on a large multiprocessor enterprise server, while another member of that same cluster might be running on a smaller system. The configuration for each server is different, but the same application components must be installed if you want to include them both in the same cluster. v The appropriate WebSphere Application Server automation package and software definition must exist in the data model. Defining administrative domains: You can add an administrative domain to model a set of nodes that are managed from a single point, such as a WebSphere Application Server cell. After you have added the administrative domain, you must define the nodes and software that it manages.
736
Adding subdomains: A subdomain represents a server that is managed by an administrative domain. Before you begin Prerequisites: If you are modelling a WebSphere Application Server cell, a subdomain represents a node. The node that you want to define must already be configured in WebSphere Application Server. After the subdomain is added to the administrative domain, you can identify the software on the server that will be managed by the administrative domain. Adding resource members: Resource members represent the software resources that an administrative domain manages. Before you begin Prerequisites: If you are modelling a WebSphere Application Server cell, a resource member is a WebSphere Application Server installation on a node. The software installation that represents the WebSphere Application Server must be in the data model. You can then associate the software installation with the appropriate subdomains. The only type of resource member that can be associated with the parent administrative domain is a cluster. After the resource member is successfully added, its name is added to the list of resource members in the subdomain. Adding clusters to administrative domains: You can create a WebSphere Application Server cluster for fully defined WebSphere Application Server administrative domains in the data model. Before you begin Prerequisites: You must configure administrative domains to which you are adding the cluster with the appropriate subdomains and resource members. For WebSphere Application Server clusters, this configuration includes defining the cell as an administrative domain, defining the nodes as subdomains, and defining the WebSphere Application Server software installations as resource members. When you create a WebSphere Application Server cluster, the cluster type is set to Management Server Domain. You can use the cluster as a target for J2EE application components. Removing clusters from administrative domains: There are two options for removing clusters from an administrative domain. You remove a cluster from the data model only, or remove it from the actual administrative domain using a provisioning workflow.
737
738
Value Enter the override value as an integer. Component Enter Deployment Engine.
739
Agent
1
Gateway service
Proxy Relay
Command Channel
Gateway Manager
5 3
1. An agent connects to gateway service and sends a command to connect to the Agent Manager on the provisioning server. 2. The gateway service sends a command to gateway manager. 3. The gateway manager creates connection to manager. 4. The gateway creates a connection to the gateway service using the proxy relay. 5. The gateway manager ties connections 3 and 4 to form a virtual connection from the manager to the gateway service. 6. The gateway service ties connections 4 and 6 to form a virtual connection from the manager to the agent. Proxy relay The firewall components operate by opening default port 1960 on the proxy relay system, and then listening on this port for routed traffic. When a connection is made to this port, the proxy relay expects control information to be sent, which instructs the relay to create a TCP/IP connection to the specified address and port. After the new connection is created, the two input and output stream connections are joined together using a thread that reads data from an input stream and writes data to another output stream. Each proxy relay is configured with an access control list (ACL) which determines which incoming and outgoing connections to allow. The proxy relay is optional, as described in the Scenario 1: Connectivity using unidirectional firewall on page 746 topic. Gateway manager and service The gateway includes the gateway manager and the gateway service. The gateway is used to tunnel TCP/IP traffic from point 1 through the gateway service and gateway manager to the final destination 2.
740
Each gateway manager can connect to and manage one or more gateway services. In turn, each gateway service can be managed by one or more gateway managers. For gateway communications, all connections are created from the gateway manager to the gateway service.
Resource Manager
Resource Manager
Resource Manager
Gateway Manager
Gateway Manager
Gateway Manager
Proxy Relays
Gateway Service
Gateway Service
Target
Target
For example, a target computer (1, illustrated in the preceding image) must create a TCP/IP connection to a resource (2). Because of unidirectional firewall rules, connections can only originate from the network where the resource (2) resides. Using the gateway, the target computer (1) creates a connection to the gateway service (3), which is allowed, as they are in the same network. A gateway manager (4) creates a connection to a resource (2), which resides in the same network. Next, the gateway manager (4) creates a connection to the gateway service (3). Then, using the input and output streams, the original connection from the target computer (1) to the gateway service (3) acts as though it is connected directly to the resource (2). When the gateway manager and gateway service are operating correctly, there is a persistent TCP/IP from the gateway manager to the gateway service. This command channel enables the gateway service to alert the gateway manager when it receives a new connection request. A periodic heartbeat signal is sent to keep the connection alive. If the command channel is closed, the gateway manager will attempt to reconnect periodically. The gateway service will automatically stop listening on that particular gateway manager's service ports when the connection is broken. The gateway service can be configured to advertise a particular service. To use this feature, user datagram protocol (UDP) broadcasting must be enabled for the local subnet. A target computer can discover a service by sending a broadcast UDP packet containing the service's name. If the gateway service receives the UDP packet and it currently advertises that service name, then it will respond back with an addressed UDP packet which contains the port number that service is listening on. The target computer can then use the source address of the UDP packet and the port contained within the packet to connect to the given service. The following procedures are required to configure the firewall components, including setting up the gateway manager, starting the gateway service and gateway manager, and enabling the firewall support for the common agent. A couple of sample scenarios are also provided, to better illustrate how to set up the firewall components in complex network environments.
741
Prerequisites
The following prerequisites must be met before setting up the gateway manager: v A SDI-SAP service access point is required on your target computers, so that the scalable distribution infrastructure is used instead of the deployment engine when deployment occurs. This service access point can be created automatically when the common agent is installed. To enable this functions: 1. Click Go To > Administration > Provisioning > Provisioning Global Settings. 2. Click the Variables tab. 3. Find the TCA.Create.EO.SAP global variable and verify that its value is set to true, which enables the automated creation of the SDI-SAP service access point as part of the common agent installation process. v The provisioning server must be able to connect to agents directly during the agent installation. v The dynamic content delivery management center must be able to connect to depots directly, without using a proxy. This restriction does not apply to connections in the other direction, so that depots can use a proxy to connect to the management center. v Enable the user datagram protocol (UDP) broadcasting for the local subnet. The gateway service provides a broadcast UDP-based discovery mechanism, which allows the target computers to query the network for a gateway service that provides connectivity to a given service name. The targets must be able to UDP broadcast in order to be able to discover the gateway service.
742
9. When the gateway manager starts, it reads the gateway.private file and creates a file called gateway.public. This file needs to be copied to the current directory of the gateway service. The file can be renamed, but must retain the .public extension. When the gateway service starts up, it loads the public keys found in all .public files, which allows a gateway service to accept SSL connection from multiple gateway managers.
In earlier versions of Tivoli Provisioning Manager, the gateway service port had to be 1961. Proxy relay If a proxy relay is required, use the gateway.xml sample for the gateway manager provided in the Scenario 2: Connectivity using unidirectional firewall with additional network on page 748 topic. The following files are required in the directory where you start the proxy relay: 1. proxyrelay.xml A proxyrelay.xml sample is also provided in the Scenario 2: Connectivity using unidirectional firewall with additional network on page 748 topic.
Chapter 7. Deploying software
743
2. proxy.jar
where <port_number> is the port that the gateway service listens on. You can either specify the path of the proxy.jar file or you can run the command from the directory where the proxy.jar was saved. The default port number is 1961. Note: The provided sample .xml files use the default port number. 2. Proxy relay: If you have any proxy relays, start them by typing: java -jar proxy.jar -relay. 3. Gateway manager: Start the gateway manager on the provisioning server or on the same side of the firewall as the provisioning server by running the following command:
java -jar proxy.jar -gwmanager gateway.xml
You can either specify the paths for the proxy.jar and gateway.xml files, or run the command from the directory where both of these files are saved. Next, you need to configure the provisioning server from the web interface to enable the firewall support.
744
The following is a sample proxy.conf file where v tpmServer_ip = 9.48.162.4 v depotServer_ip = 9.3.5.88 v gatewayService_ip = 9.48.162.226 v gatewayService_hostName = GWServiceMachine
9.48.162.4:9045=9.48.162.226:9045 9.48.162.4:9046=9.48.162.226:9046 9.3.5.88:2100=9.48.162.226:2100 9.48.162.4:9511=9.48.162.226:9511 9.48.162.4:9512=9.48.162.226:9512 9.48.162.4:9513=9.48.162.226:9513 9.48.162.226:9045=9.48.162.226:9045 9.48.162.226:9046=9.48.162.226:9046 9.48.162.226:2100=9.48.162.226:2100 9.48.162.226:9511=9.48.162.226:9511 9.48.162.226:9512=9.48.162.226:9512 9.48.162.226:9513=9.48.162.226:9513 GWServiceMachine:9045=GWServiceMachine:9045 GWServiceMachine:9046=GWServiceMachine:9046 GWServiceMachine:2100=GWServiceMachine:2100 GWServiceMachine:9511=GWServiceMachine:9511 GWServiceMachine:9512=GWServiceMachine:9512 GWServiceMachine:9513=GWServiceMachine:9513
The proxy.conf file must contain the Tivoli Provisioning Manager server IP and not the Gateway Manager IP. The proxy.conf file must be in both of the following directories, depending on your operating system: v $CA_HOME/runtime/agent/config or %CA_HOME%\runtime\agent\config v $CA_HOME/runtime/agent/subagent/cds/client or %CA_HOME%\runtime\agent\subagent\cds\ client where CA_HOME is the common agent installation directory. Make sure to set the advertise fields of the gateway configuration file to false. The gateway configuration file is called gateway.xml by default. Set the fields that indicate which Gateway Services connect to the Gateway Manager.
Chapter 7. Deploying software
745
For example:
<!DOCTYPE gatewaymanager> <gatewaymanager> <gatewayservice name="barcelona" type="remote" host="9.48.162.226 " port="1961"> <service name="nice.itsc.austin.ibm.com:2100" port="2100" advertise="false"> <resource host="9.3.5.88" port="2100" /> </service> <service name="9.48.162.4 :9511" port="9511" advertise="false"> <resource host="9.48.162.4 " port="9511" /> </service> <service name="9.48.162.4 :9512" port="9512" advertise="false"> <resource host="9.48.162.4 " port="9512" /> </service> <service name="9.48.162.4 :9513" port="9513" advertise="false"> <resource host="9.48.162.4 " port="9513" /> </service> <service name="9.48.162.4 :9045" port="9045" advertise="false"> <resource host="9.48.162.4 " port="9045" /> </service> <service name="9.48.162.4 :9046" port="9046" advertise="false"> <resource host="9.48.162.4 " port="9046" /> </service> </gatewayservice> </gatewaymanager>
If the Tivoli Provisioning Manager server has multiple Network Interface Cards (NIC), insert both eth and eth0 IPs into the proxy.conf file. The format of the proxy.conf file is, in this case:
TPMSERVER_IP[NIC_eth]:9045=GS_IP:9045 TPMSERVER_IP[NIC_eth]:9046=GS_IP:9046 DepotServer_IP:2100= GS_IP:2100 TPMSERVER_IP[NIC_eth]:9511=GS_IP:9511 TPMSERVER_IP[NIC_eth]:9512=GS_IP:9512 TPMSERVER_IP[NIC_eth]:9513=GS_IP:9513 TPMSERVER_IP[NIC_eth0]:9045=GS_IP:9045 TPMSERVER_IP[NIC_eth0]:9046=GS_IP:9046 TPMSERVER_IP[NIC_eth0]:9511=GS_IP:9511 TPMSERVER_IP[NIC_eth0]:9512=GS_IP:9512 TPMSERVER_IP[NIC_eth0]:9513=GS_IP:9513 GS_IP:9045=GS_IP:9045 GS_IP:9046=GS_IP:9046 GS_IP:2100=GS_IP:2100 GS_IP:9511=GS_IP:9511 GS_IP:9512=GS_IP:9512 GS_IP:9513=GS_IP:9513 GS_HOSTNAME:9045=GS_HOSTNAME:9045 GS_HOSTNAME:9046=GS_HOSTNAME:9046 GS_HOSTNAME:2100=GS_HOSTNAME:2100 GS_HOSTNAME:9511=GS_HOSTNAME:9511 GS_HOSTNAME:9512=GS_HOSTNAME:9512 GS_HOSTNAME:9513=GS_HOSTNAME:9513
746
Prerequisites: To be able to use the gateway manager, you must set it up first. For more information, see Setting up the gateway manager on page 741. Ensure that all the prerequisites are met before proceeding with the setup. The server is behind a firewall which only allows traffic from the gateway manager to the target computers on port 1961. To operate correctly, the targets need to connect to the gateway service on TCP/IP port 9443, 9046, 2100, and 9511-9513, which are the ports necessary for tasks running over the scalable distribution infrastructure. Note: In the following setup, all ports from the gateway service to the gateway manager are closed.
Depot
Gateway Manager
Firewall
Gateway Service
Target
747
The gateway manager is configured to connect to the gateway service on port 1961. To configure the gateway manager, you can use a file called gateway.xml. The contents of this file indicate to the gateway manager where to forward packets when they reach the manager from the service. This is a sample gateway.xml file:
<!DOCTYPE gatewaymanager> <gatewaymanager> <gatewayservice name="SERVICE_NAME" type="remote" host="GW_SERVICE_IP" port="1961"> <service name="DEPOT_HOSTNAME:2100" port="2100" advertise="true"> <resource host="DEPOT_IP" port="2100" /> </service> <service name="TPM_SERVER_HOSTNAME:9511" port="9511" advertise="true"> <resource host="TPM_SERVER_IP" port="9511" /> </service> <service name="TPM_SERVER_HOSTNAME:9512" port="9512" advertise="true"> <resource host="TPM_SERVER_IP" port="9512" /> </service> <service name="TPM_SERVER_HOSTNAME:9513" port="9513" advertise="true"> <resource host="TPM_SERVER_IP" port="9513" /> </service> <service name="TPM_SERVER_HOSTNAME:9443" port="9443" advertise="true"> <resource host="TPM_SERVER_IP" port="9443" /> </service> <service name="TPM_SERVER_HOSTNAME:9046" port="9046" advertise="true"> <resource host="TPM_SERVER_IP" port="9046" /> </service> </gatewayservice> </gatewaymanager>
When connected, the gateway manager instructs the gateway service to listen on the following ports: 9443, 9046, 2100, and 9511-9513. When a connection is made to the gateway service on one of these ports, the gateway manager creates a connection to the provisioning server on the same port. It then creates another connection to the gateway service. When this connection is made, the gateway manager and service use a set of input-output data streams to create a seamless connection from the target computer to the provisioning server on the required port.
748
Depot
Gateway Manager
Firewall
Proxy Relay
Firewall
Gateway Service
Target
To operate correctly, the target computers need to connect to the gateway service on TCP/IP ports 9056, 9046, 2100, and 9511-1913. The gateway manager is configured to contact the gateway service through the proxy relay. To configure the gateway manager, you can use a file called gateway.xml. The contents of this file indicate to the gateway manager where to forward packets when they reach the manager from the service. The following is a sample gateway.xml file:
<!DOCTYPE gatewaymanager> <gatewaymanager>
Chapter 7. Deploying software
749
<gatewayservice name="SERVCE_NAME" type="remote" host="GW_SERVICE_IP" port="1961"> <routepath> <pathElement host="RELAY_IP" port="1960" /> </routepath> <service name="DEPOT_IP:2100" port="2100" advertise="true"> <resource host="DEPOT_IP" port="2100" /> </service> <service name="TPM_SERVER_IP:9511" port="9511" advertise="true"> <resource host="TPM_SERVER_IP" port="9511" /> </service> <service name="TPM_SERVER_IP:9512" port="9512" advertise="true"> <resource host="TPM_SERVER_IP" port="9512" /> </service> <service name="TPM_SERVER_IP:9513" port="9513" advertise="true"> <resource host="TPM_SERVER_IP" port="9513" /> </service> <service name="TPM_SERVER_IP:9443" port="9443" advertise="true"> <resource host="TPM_SERVER_IP" port="9443" /> </service> <service name="TPM_SERVER_IP:9046" port="9046" advertise="true"> <resource host="TPM_SERVER_IP" port="9046" /> </service> </gatewayservice> </gatewaymanager>
When connected, the gateway manager instructs the gateway service to listen on those ports. You also need a file to configure the proxy relay computer called proxyrelay.xml. This is a template that instructs the proxy relay on where to get and send its information to pass onto the gateway manager. This is a sample proxyrelay.xml file:
<!DOCTYPE proxyrelay> <proxyrelay port="1960"> <inboundACL> <entry>GW_MANAGER_IP/24:1960</entry> </inboundACL> <outboundACL> <entry>GW_SERVICE_IP/24:1961</entry> </outboundACL> </proxyrelay>
When a connection is made to the gateway service on one of those ports, the gateway manager creates a connection to the provisioning server on the same port. It then creates another connection to the gateway service. When this connection is made, the gateway manager and service use a set of input-output data streams to create a seamless connection from the target computer to the provisioning server on required port.
750
For information about creating software packages, see the Software Package Editor documentation in the Administrator Guide.
Process
To demonstrate how components interact, the following steps outline the component interactions during a software package (SPB) deployment in an environment that uses the scalable distribution infrastructure. 1. The task is submitted and activity plan engine starts task execution. 2. The deployment engine runs the workflow to perform the software distribution. 3. The software package file is published to the depot. 4. The job is submitted to device manager. 5. The target computer polls device manager for the job and downloads the software package and installs it. 6. The results are returned to device manager. If an error occurs during software distribution: 1. Verify that all requirements for software distribution are met as described in Prerequisite checklist. 2. Use the subsections of this topic to learn more about how to troubleshoot specific parts of a software distribution task.
1. Task status
Check the status of the software distribution task. For information about task status, see Tracking a provisioning task on page 1165. 1. Check for error messages that might explain the source of the problem. 2. On the provisioning server, check the log files for the activity plan engine and the deployment engine. By default, the log level for console.log is info and the log level for trace.log is error. Change the log level to debug to obtain more troubleshooting information. For information about setting the log level, see Configuring log4j dynamically.
Table 126. Log files Log file console.log Location
Windows
%TIO_LOGS%
Linux
UNIX
$TIO_LOGS
751
%TIO_LOGS%
Linux
UNIX
$TIO_LOGS
The following excerpts from console.log show key messages for a successful software distribution task: This line indicates that the task has started:
DEBUG [Activity Plan Engine] ( TpmTask.java:55) manager.TpmTask: Task execution started: Install Software
The following line shows that permissions were successfully verified on the target computer:
DEBUG [Install Software(88491) from com.ibm.tivoli.tpm.activityplan.manager.AggregateTaskDispatcher] (WorkflowAccessManager.java:106) accesscontrol.WorkflowAccessManager: checking permission (target:6027)Software.Install Software.Install on 24982 succeeded DEBUG [Install Software(88491) from com.ibm.tivoli.tpm.activityplan.manager.AggregateTaskDispatcher] (WorkflowAccessManager.java:106) accesscontrol.WorkflowAccessManager: checking permission (target:6027)Device.ManagerSoftware Device.ManagerSoftware on 24967 succeeded
The following line shows the dispatch of the target to the SDI infrastructure:
DEBUG [Install Software(88491) from com.ibm.tivoli.tpm.activityplan.manager.AggregateTaskDispatcher] (AggregateTaskDispatcher.java:73) manager.AggregateTaskDispatcher: Dispatching 1 targets to com.ibm.tivoli.tpm.infrastructure.SdiTaskInfrastructure
3. Check console log and trace log for more information. The examples in the software deployment topic use the Software.Install logical operation. Search for the associated ID (88491) for the software installation and look for the workflows that are associated with that task. You can then search for the workflow name or ID to look for error messages. 4. Open the Workflow Execution Logs view if it is not displayed. a. From the Eclipse menu, click Window > Show View > Other. b. Expand Automation Package and click Workflow Execution Logs. c. Click OK. The Workflow Execution Logs page displays the provisioning workflow run history. There is a limit of 4000 characters for provisioning workflow output. If this limit is exceeded, the output is truncated.
2. Publish status
Verify that the file was published to the depot. 1. The following line shows that the .spb file was published to the depot:
DEBUG [Install Software(88491) from com.ibm.tivoli.tpm.infrastructure.soa.OSGiSdiTaskDispatcher] (FileManager.java:317) cds.FileManager: Published file C:/Program Files/IBM/tivoli/tpm/repository/ \/Noname.1.0.spb with taskId 88491 to CDS depots: tpmlabw2k8.romelab.it.ibm.com
2. Verify in the dynamic content delivery console that the file is on the depot server. In a supported web browser, type the following URL:
https://host_name:9045/admin
3. Log on with the Tivoli Provisioning Manager administrator user name and password that you specified during core components installation. The default user is maxadmin. 4. If more information is required for the depot, check the following log files on the provisioning server:
752
Table 127. Log files Log file trace_cdsmgr.log Message and trace information for download plans as well as general message and trace information trace_cdssec.log Message and trace information for Web services authentication and authorization trace_distribution.log Message and trace information for the distribution agent Location
Windows
%TIO_LOGS%\..\..\ctgde\logs
Linux
UNIX Windows
$TIO_LOGS/../../ctgde/logs
%TIO_LOGS%\..\..\ctgde\logs
Linux
UNIX Windows
$TIO_LOGS/../../ctgde/logs
%TIO_LOGS%\..\..\ctgde\logs
Linux
UNIX
$TIO_LOGS/../../ctgde/logs
3. Job status
Verify the status of the software distribution job. 1. On the provisioning server, check console.log for a message to indicate that the job was submitted:
INFO [Install Software(88491) from com.ibm.tivoli.tpm.infrastructure.soa.OSGiSdiTaskDispatcher] (JobManagementServiceClient.java:534) client.JobManagementServiceClient: Submitted job to the job management server. Job id is: [128766740182461234]
2. If more information is required for device manager, check the following log files on the provisioning server:
Table 128. Log files Log file TraceDMSnumber.log Location
Windows
%WAS_PROFILE_DIR%\logs\MXServer
Linux
UNIX
$WAS_PROFILE_DIR/logs/MXServer
DMSMsgn.log
Windows
%WAS_PROFILE_DIR%\logs\MXServer\
Linux
UNIX
$WAS_PROFILE_DIR/logs/MXServer
3. In TraceDMSnumber.log, search for the job ID. For example, the log file example in step 1 has the job ID 128766740182461234. The default DMS polling interval is 60 minutes, so the timestamp in the log might be as much as 60 minutes after the job was submitted. The following example shows an excerpt from the log:
INSERT INTO SUBMITTED_JOB (JOB_ID, EXPIRATION_TIME, TARGET_DEVICE_SCOPE, ENROLLMENT_JOB, INSERTING, JOB_TYPE, ACTIVATION_TIME, JOB_PRIORITY, SEND_NOTIFICATION, TARGET_DEVCLASS_ID, ALL_DEVICES) VALUES (128766740182461234, {ts 2010-11-09 10:33:00}, BOTH, T, T, FEDERATOR, {ts 2010-10-20 10:33:01}, 3, F, 128766740182461234, T)
4. DMS logs provide the following information: a. Connected endpoint hostname/ip and eligible jobs for that endpoint:
Activity: When registered device connects to DMS server Log messages Event: ELIGIBLE_JOBS Host: xyz.in.ibm.com Job ID: J1 (JDS Command), J2 (Inventory), J3 (Patch install)
b.
753
Activity: When registered device connects to DMS server Log messages Event: JOB_RESULT Host: xyz.in.ibm.com Job ID: J1 Result: OK
d. DMS job federation activity and the resultant actual JDML job created:
Activity: When DMS federator federates job Log messages Event: JOB_FEDERATION Federator Job ID: 123456 JDML Job ID : 554433
Note: These messages are provided in Level 1 tracing and can be stopped by changing the value of key component.serviceability to false in the traceConfig.properties file. This is a new key introduced in this file for serviceability changes. The fix pack installer modifies the existing traceConfig.properties file, adding this new key by setting its value as true. 5. TraceDMS1.log entry examples:
06/29/2011 5:00:19.403 com.tivoli.dms.plugin.syncmldm.SyncMLDMDeviceObject sendSyncMLResponse WebContainer: 4 Event: ELIGIBLE_JOBS Host: 9.122.19.93 Job ID: 130881793422967296(DMSInventoryJob)
06/29/2011 5:00:21.150 com.tivoli.dms.dmserver.DeviceManagementServerServlet processDeviceJobProcessingCompleteEvent WebContainer: 4 Event: JOB_RESULT Host: 9.122.19.93 Job ID: 130881793422967296 Result: OK
06/29/2011 5:04:30.921 com.tivoli.dms.federator.FederatorDeviceJob execute DMSFederatorAgent Event: JOB_FEDERATION Federator Job ID: 130934180771897460 JDML Job ID: 130934187080707782
4. Target status
Check the progress of the software distribution job on the target computer for the software distribution task. 1. Change the log level on the Tivoli Common Agent and enable the highest level of tracing as described in Setting log levels for Tivoli Common Agent. Retrieve the requestId from the log on the provisioning server. The following line is an example of what you will see in the log file:
INFO [Install Software 24982(88603) from com.ibm.tivoli.tpm.infrastructure.soa.OSGiSdiTaskDispatcher] (JobManagementServiceClient.java:515) client.JobManagementServiceClient: job.requestId = e0b1fef0e1a111df9188000c291214c0
2. On the target computer, verify that the software distribution job was received for processing. In CA_HOME/logs/trace-log-number.xml look for the requestId:
JES045I Dequeued new job: name = [SPBInstall], request id = [e0b1fef0e1a111df9188000c291214c0]
C:\Program Files\tivoli\ep
Linux Solaris
/opt/tivoli/ep
754
AIX
/usr/tivoli/ep
number A number such as 1. If the job was not received, check the following items: a. Verify communication with the target computer. Run the TCA_PingAgent provisioning workflow. b. If the software distribution task is taking a long time to complete, one possible cause is that the target computer is not polling for jobs, so the job is never received. To fix this problem, see Jobs not reaching target computer. 3. Look for a call to the FileManagementService, copyFile:
INFO: TPMFMS001I File copy:...
4. Verify the status of the installation by checking the log for the following message:
DSM0002I Operation INSTALL (Name=swName, Version=1.0) completed with Return Code 0
5. On the target computer, check the following log files for additional information:
Table 129. Log files Log file error-log-number.log For error messages generated during agent run time. Location
Windows
C:\Program Files\tivoli\ep\logs
Linux Solaris
HP UX
/opt/tivoli/ep/logs
AIX
/usr/tivoli/ep/logs
5. Results
1. Check the file CA_HOME/logs/trace-log-number.xml for the status of the job completion event sent to device manager:
JES052I Sending job status notification for request [e0b1fef0e1a111df9188000c291214c0].
Check the log that begins with EVT009I Sending event for JobStatus and WorkItemStatus. The following log file example shows the possible values: JobStatus v JOB_STATE_QUEUED = 1; v JOB_STATE_SUBMITTED = 2; v JOB_STATE_CANCELLED_ALL = 4; v JOB_STATE_CANCELLED_PARTIAL = 5; v JOB_STATE_COMPLETE_ALL = 6; v JOB_STATE_COMPLETE_PARTIAL = 7; v JOB_STATE_FAIL = 8; v JOB_STATE_REJECTED = 9; WorkItemStatus v WORK_ITEM_STATUS_EXECUTING = 1; v WORK_ITEM_STATUS_COMPLETED = 2; v WORK_ITEM_STATUS_FAILED = 3; v WORK_ITEM_STATUS_CANCELLED = 4; (not used) v WORK_ITEM_STATUS_PENDING = 5; (not used) 2. Check TIO_LOGS\console.log to see if the results were received on the Tivoli(r) Provisioning Manager server:
DEBUG [Status Updater] (DmsService.java:546) dms.DmsService: js Application Data: SoftwareModule.Install DEBUG [Status Updater] (TaskTarget.java:124) instance.TaskTarget: Task target id=6403, name=null status=SUCCEEDED
Chapter 7. Deploying software
755
3. To log the endpoint DMS polling for jobs and OSGI bundles interaction, you can enable the OSGiAgent log: To debug the OSGiAgent, add the property osgiagent.debug=true in <ep home>\conf\overrides\ agent.properties. The log data is located at C:\osgiAgentLog1.txt. Related links Support information about the scalable distribution infrastructure Recovering from software provisioning problems on page 760 Uninstalling software on page 626
756
For more information, see Listing the software catalog . v Check the scalable distribution infrastructure log files for your platform. Log files for deploying software using the scalable distribution infrastructure are available in Log files on page 761. Checking the log files can help you to identify the cause of your problem. v Is your error listed in the deploying software problems list? See Software deployment problems and limitations on page 763 for a list of known scalable distribution infrastructure issues. Review this list after you have identified the component to which the issue applies. v Have you set up the hardware and software correctly? Check the documentation on setting up the scalable distribution infrastructure. v Have you checked the hardware and software prerequisites for your platform? Hardware and software prerequisites on page 547.
2. The job is federated for the target computers. Check the tracedms32.log file to view how this step was processed, for example:
11/29/2010 5:35:10.602 com.tivoli.dms.common.DBOperation getPreparedStatement SDIServerThreadPool : 11 INSERT INTO BRANCH_JOB_HISTORY (FEDERATED_JOB_ID, TARGET_DEVICE_NAME, TARGET_DEVICE_CLASS_NAME, TARGET_DEVICE_ID, BRANCH_SERVER_HOSTNAME, BRANCH_JOB_ID, BRANCH _JOB_TYPE, JOB_COMP_STATUS, BRANCH_JOB_COMP_TIME_LONG, BRANCH_JOB_COMPLETION_MSG) VALUES (129106917338403726, BAA3CDE94B54398B97C596C66B77ED69, tpmOSGi , 128015342003392107, u060tpma11.<your_domain>.com-126020498629587685 129106960855003727, JDS_COMMAND , STARTED , 129107011060204191, ?)
11/29/2010 5:35:17.255 com.tivoli.dms.common.DBOperation getPreparedStatement SDIServerThreadPool : 9 INSERT INTO BRANCH_JOB_HISTORY (FEDERATED_JOB_ID, TARGET_DEVICE_NAME, TARGET_DEVICE_CLASS_NAME, TARGET_DEVICE_ID, BRANCH_SERVER_HOSTNAME, BRANCH_JOB_ID, BRANCH_JOB_TYPE, JOB_COMP_STATUS, BRANCH_JOB_COMP_TIME_LONG, BRANCH_JOB_COMPLETION_MSG) VALUES (129106917338403726, BAA3CDE94B54398B97C596C66B77ED69, tpmOSGi , 12 8015342003392107, u060tpma11.<your_domain>.com-126020498629587685, 129106960855003727, JDS_COMMAND , OK , 12910
3. The target computers receive the job and the job is processed. Check the tracedms32.log file to view how this step was processed. 4. The target computers send the results for the job back to DMS. Check the tracedms32.log file to view how this step was processed, for example:
11/29/2010 5:35:17.223 com.tivoli.dms.plugin.syncmldm.SynMLDMDeviceCommunicationManager completeJob SDIServerThreadPool : 9 fire COMPLETE_JOB for DMS DeviceID=tpmOSGi:BAA3CDE94B54398B97C596C66B77ED69 Status=1
5. DMS processes the results for the job and the results are not federated. Check the tracedms32.log file to view how this step was processed, for example:
757
11/29/2010 5:35:17.232 com.tivoli.dms.common.DBOperation getPreparedStatement SDIServerThreadPool : 9 INSERT INTO ACTIVE_JOB_HISTORY (JOB_ID, DEVICE_ID, DEVCLASS_ID, JOB_COMP_STATUS, MESSAGE_KEY, DMS_ID, MESSAGE_PARMS) VALUES (129106960855003727, 1280153420033 92107, 125976661511753217, OK, JDS_COMMAND_EXECUTION_RESULTS, 126020498629587685, ?)
6. DMS federates the results for the job. Check the tracedms32.log file to view how this step was processed, for example,
11/29/2010 5:35:17.255 com.tivoli.dms.common.DBOperation getPreparedStatement SDIServerThreadPool : 9 INSERT INTO BRANCH_JOB_HISTORY (FEDERATED_JOB_ID, TARGET_DEVICE_NAME, TARGET_DEVICE_CLASS_NAME, TARGET_DEVICE_ID, BRANCH_SERVER_HOSTNAME, BRANCH_JOB_ID, BRANCH _JOB_TYPE, JOB_COMP_STATUS, BRANCH_JOB_COMP_TIME_LONG, BRANCH_JOB_COMPLETION_MSG) VALUES (129106917338403726, BAA3CDE94B54398B97C596C66B77ED69, tpmOSGi , 12 8015342003392107, u060tpma11.<your_domain>.com-126020498629587685, 129106960855003727, JDS_COMMAND , OK , 129107011725504197, ?)
Identify the following components in the log files to determine where the issue occurred: v The target computer IP address v The agent GUID v The Tivoli Provisioning Manager DCM device ID v The Tivoli Provisioning Manager task ID v The Tivoli Provisioning Manager job ID v v v v v The The The The The Tivoli Provisioning Manager job request ID Tivoli Provisioning Manager deployment request ID DMS federated job ID DMS branch job ID DMS results sent from the target computers
758
Table 130. Device manager service issues (continued) Component Potential issues For DMS polling on target computers, if jobs are not reaching the target computer or if the agent is not polling, you might need to change the polling. To view and change the device manager service client configuration and polling, complete the following: 1. Install the osgiagentservlet.jar file using the agentcli command: agentcli deployer install file:C:\bundles\osgiagentservlet.jar If the installation completed successfully, you will see a message similar to the following: The file:C:\bundles\osgiagentservlet.jar bundle was successfully installed. 2. Start the osgiagentservlet.jar file using the agentcli command: agentcli deployer start file:C:\bundles\osgiagentservlet.jar If the startup is successful, you will see a message similar to the following: BTC3146I The file:C:\bundles\osgiagentservlet.jar bundle was successfully started. 3. Use a browser that is in the same system as the agent to navigate to http://localhost:21080/osgiagentservlet. The OSGi agent control panel is displayed.
Review the following table for information that you need to provide to IBM Customer Support for deploying software jobs.
Table 131. Information required by IBM Support for some common issues Job where issue occurred Scan and Inventory (hardware and software) Compliance scan Patch deployment Required information Collect the CIT logs. Invoke the CIT scanner subagent to scan the system. For information about how to collect the CIT logs, see Log files for Common Inventory Technology. Collect the log file. For information about the log files, see Compliance log file locations. See the patch management checklist for a list of the items you need to collect for patch management jobs Patch management troubleshooting checklist on page 992.
759
Table 131. Information required by IBM Support for some common issues (continued) Job where issue occurred SPB installation Required information v CASservice.zip logs. For information about how to collect this, see Collecting target computer logs on page 765. v For complex issues, you can increase the trace level, as described in Tracing software package block installation errors.
Table 133. Recovering from software products problems Step where the problem occurs Add image Distribute software product Uninstall software product Unpublish/publish software product Install software product Import software product Resolving the problem Check Tivoli Provisioning Manager console log. Check errors in workflow log. Check errors in workflow log. Check errors in workflow log. Check errors in workflow log. Check Tivoli Provisioning Manager console log. Check errors in workflow log. Log files %TIO_LOGS%\console on the server SoftwareModule.DistributeInstallable workflow log SoftwareModule.Uninstall workflow log SoftwareInstallable.UpdatePublish workflow log SoftwareModule.Install workflow log v %TIO_LOGS%\console on the server v FileRepository.PutFile workflow log v FileRepository.RemoveFile workflow log Add SRT Check error message in user interface.
Table 134. Recovering from software stacks problems Step where the problem occurs Install software stack Add image Clone stack Resolving the problem Check errors in workflow log. Check Tivoli Provisioning Manager console log. Check error message in user interface. Check Tivoli Provisioning Manager console log. Log files SoftwareModule.Install workflow log %TIO_LOGS%\console on the server %TIO_LOGS%\console on the server
760
Table 134. Recovering from software stacks problems (continued) Step where the problem occurs Uninstall software Add SRT Add stack entry Resolving the problem Check errors in workflow log. Check error message in user interface. Check error message in user interface. Log files SoftwareModule.Uninstall workflow log
Table 135. Recovering from file problems Step where the problem occurs File distribute File publish Resolving the problem Check error message in user interface. Check Tivoli Provisioning Manager console log. Check errors in workflow log. File unpublish Check error message in user interface. Check errors in workflow log. Table 136. Recovering from agent installation problems Step where the problem occurs Common agent installation Windows update agent installation Resolving the problem Check errors in workflow log. Check errors in workflow log. Log files Install_Agent workflow log SoftwareModule.Install workflow log v SoftwareInstallable.UpdatePublish workflow log v %TIO_LOGS%\console on the server File.UpdatePublish workflow log Log files
Table 137. Recovering from patches problems Step where the problem occurs Patch installation Windows update agent installation Patch distribution Patch uninstallation Patch publishing Patch unpublishing Resolving the problem Check errors in workflow log. Check errors in workflow log. Check errors in workflow log. Check errors in workflow log. Check errors in workflow log. Check errors in workflow log. Log files SoftwareModule.Install workflow log SoftwareModule.Install workflow log SoftwareModule.DistributeInstallable workflow log SoftwareModule.Uninstall workflow log SoftwareInstallable.UpdatePublish workflow log SoftwareInstallable.UpdatePublish workflow log
Log files
The following are common troubleshooting problems that you might encounter and how you can resolve them. v Recovering from software resource problems v Recovering from software product problems v Recovering from software stack problems v Recovering from file problems
Chapter 7. Deploying software
761
Table 139. Recovering from software product problems Step where the problem occurs Add image Distribute software product Uninstall software product Unpublish/publish software product Install software product Import software product Resolving the problem Check Tivoli Provisioning Manager console log Check errors in workflow log Check errors in workflow log Check errors in workflow log Check errors in workflow log Check Tivoli Provisioning Manager console log Check errors in workflow log Log files %TIO_LOGS%\console on the server SoftwareModule.DistributeInstallable workflow log SoftwareModule.Uninstall workflow log SoftwareInstallable.UpdatePublish workflow log SoftwareModule.Install workflow log %TIO_LOGS%\console on the server FileRepository.PutFile workflow log FileRepository.RemoveFile workflow log Add SRT Check error message in user interface
Table 140. Recovering from software stack problems Step where the problem occurs Install software stack Add image Clone stack Resolving the problem Check errors in workflow log Check Tivoli Provisioning Manager console log Check error message in user interface. Check Tivoli Provisioning Manager console log Uninstall software Add SRT Add stack entry Check errors in workflow log Check error message in user interface Check error message in user interface SoftwareModule.Uninstall workflow log Log files SoftwareModule.Install workflow log %TIO_LOGS%\console on the server %TIO_LOGS%\console on the server
Table 141. Recovering from file problems Step where the problem occurs File distribute Resolving the problem Check error message in user interface Log files
762
Table 141. Recovering from file problems (continued) Step where the problem occurs File publish Resolving the problem Check Tivoli Provisioning Manager console log Check errors in workflow log File unpublish Check error message in user interface. Check errors in workflow log Table 142. Recovering from agent installation problems Step where the problem occurs Common agent installation Windows update agent installation Resolving the problem Check errors in workflow log Check errors in workflow log Log files Install_Agent workflow log SoftwareModule.Install workflow log Log files SoftwareInstallable.UpdatePublish workflow log %TIO_LOGS%\console on the server File.UpdatePublish workflow log
Table 143. Recovering from patch problems Step where the problem occurs Patch installation Windows update agent installation Patch distribution Patch uninstallation Patch publishing Patch unpublishing Resolving the problem Check errors in workflow log Check errors in workflow log Check errors in workflow log Check errors in workflow log Check errors in workflow log Check errors in workflow log Log files SoftwareModule.Install workflow log SoftwareModule.Install workflow log SoftwareModule.DistributeInstallable workflow log SoftwareModule.Uninstall workflow log SoftwareInstallable.UpdatePublish workflow log SoftwareInstallable.UpdatePublish workflow log
763
When the system is on IPv4, the nonstop services stop working when both IPv4 and IPv6 are configured in the /etc/hosts file. The agent nonstop process binds for localhost and if there are messages such as "agent stopped listening on 9510" or "BTC7849E Unable to start a nonstop service" in $TCA_HOME/ep/runtime/agent/logs/install/epInstall.log. Resolving the problem If the system is on IPv4, comment out the line ::1 local host in /etc/hosts. Determining the version of the currently installed common agent: Resolving the problem To determine the version of the currently installed common agent, run the script endpoint.bat or the endpoint.sh on the target computer, depending if Windows or UNIX is installed on the target computer. The location of the script is $CA_HOME/ep/runtime/agent/bin. The output of the command indicates the version, major release, minor release (modification level), and fix pack level of the common agent. It also includes a build identifier. Collecting common agent diagnostic information: The service command automatically collects diagnostic information into a file named CASservice.zip which can then be sent to IBM Software Support. To run the service command to collect diagnostic information: 1. Open a command window. 2. Change to the following directory: <agent_install>runtime/agent/toolkit/bin/ 3. Run the script for your operating system: v
Windows
service
UNIX Linux service.sh v The script creates an archive file named CASservice.zip file in the Install directory.
If you have more than one common agent on a managed system, run the tool in the Install directory of the common agent for which you want to capture diagnostic information. Note: If you plan to send multiple CASservice.zip files to IBM Software Support, rename the files so that they each have unique names. Verifying that the common agent is running: Symptoms You need to know whether the common agent is installed and started correctly. Resolving the problem v Check the msgAgent.log file in the agent_installdir\logs directory for any errors that might have occurred during installation. v On a Windows target computer, you can open the Windows Services control panel and look for a service called IBM Tivoli Common Agent. Make sure that the service is started. v At a command prompt, run the following command from the common agent installation directory: Windows agentcli.bat connector alive
764
UNIX or Linux ./agentcli.sh connector alive If the agent is running, the message The agent is alive. is displayed. If the agent is not running, the message CLI command failed. A communication error occurred. Verify that the agent is registered and active on port agent_port is displayed. Collecting target computer logs: When common agent problems occur on a target computer, you can use the TCA_Collect_Logs.wkf workflow to collect logs from the target computer. When common agent or subagent problems occur on a target computer, you can use the TCA_Collect_Logs.wkf workflow that is provided with Tivoli Provisioning Manager version 5.1.0.2 (Fix Pack 2) to collect logs from the target computer. In the event of a common agent or subagent problem, you can either schedule a task using this workflow or run the workflow to collect the target computer logs. The workflow provides information regarding the target computer on which the common agent is running. For each target computer that the workflow is run against, the %TIO_LOGS%\tivolicommonagent directory ($TIO_LOGS/tivolicommonagent for UNIX or Linux) on the Tivoli Provisioning Manager server receives an archive (.zip or .tar) with the deviceID_IDnumber_TimeStamp_actualTimeStamp_CASservice.zip/tar file name. The archive contains all the startup and console logs for that target computer, and can be used for troubleshooting or sent to IBM Software Support for analysis. Log files for the common agent: Symptoms The following table lists the logs created during the installation and uninstallation of the common agent. The locations of the logs are v v v
Windows HP UX AIX
C:\Program Files\tivoli\ep
Linux Solaris
/opt/tivoli/ep
/usr/tivoli/ep
Table 144. Runtime logs for the common agent Log File (located in $CA_HOME/logs/) error-log-0.xml error-log-1.xml, error-log-2.xml error-log-3.xml nonstop.log nonstopbundle.log trace-log-0.xml trace-log-1.xml, trace-log-2.xml, or trace-log-3.xml Description Error messages generated during agent run time.
The log of the nonstop process. The log for the nonstop bundle. Trace messages generated during agent run time.
The following table lists the runtime logs for the common agent and subagents.
Table 145. Installation logs for the common agent Log File $CA_HOME/runtime/agent/logs/agentcli.log.0 Description The log for agent command line.
765
Table 145. Installation logs for the common agent (continued) Log File $CA_HOME/runtime/agent/logs/install/epInstall.log $CA_HOME/runtime/agent/logs/install/ epInstallStatus.log Description Processing information collected during common agent installation. Return codes for the installation of the common agent.
$CA_HOME/runtime/agent/logs/install/epPreinstall.log Processing information collected before the common agent installation has started. $CA_HOME/runtime/agent/logs/install/epUnInstall.log $CA_HOME/runtime/agent/logs/install/ epUnInstallStatus.log AgentCliErr.log* AgentCliOut.log* InstallNonstopUtilErr.log* InstallNonstopUtilOut.log* lwiJavaHomeErr.log lwiJavaHomeOut.log LwiStatusErr.log* LwiStatusOut.log* SetFileSecurityErr.log* SetFileSecurityOut.log* tivGuidInstallErr.log tivGuidInstallOut.log WindowsInstallUtilErr.log* WindowsInstallUtilOut.log* winTivGuidInstall.log Processing information collected during common agent uninstallation. Return codes for the uninstallation of the common agent. Logs for steps run in the installation or uninstallation process. A * symbol indicates that there might be more than one instance of the log file with an associated timestamp instead of the * symbol.
Useful commands: A list of common agent commands, including commands for uninstalling and logging. Symptoms Uninstall the common agent and subagents. 1. Change to the following directory: v v
Windows UNIX
: C:\Program Files\tivoli\ep\_uninst
Linux
: /opt/tivoli/ep/_uninst
Windows
UNIX
Linux
./uninstall -console
List the bundles and their state 1. Change to the following directory: v v
Windows UNIX
: C:\Program Files\tivoli\ep\runtime\agent\bin
Linux
: /opt/tivoli/ep/runtime/agent/bin
766
UNIX
Linux
Retrieve all of the common agent logs 1. Change to the following directory: v
Windows
: C:\<agent_install_directory>\runtime\agent\toolkit\bin
Windows
service.bat
UNIX
Linux
service.sh
The CASservice.zip file will be created in the runtime/agent directory. Common agent installation: Cannot connect to the target using RXA: Symptoms Agent Installation error message occurs during install of common agent on a target system from Tivoli Provisioning Manager 7.1. The install fails with the error "COPCOM494E Cannot connect to the endpoint using RXA". Causes The Agent Installation error can be caused by the following: 1. Ports are blocked on the target system. Resolving the problem 1. Check the target to establish that the ports are open. Installing the common agent and the agent manager is not supported: Symptoms The common agent and the agent manager cannot be installed Causes Installing the common agent on the provisioning server, where the agent manager is also installed, is not supported. Resolving the problem Manually uninstall the common agent. The agent software stack installation fails: Symptoms
Chapter 7. Deploying software
767
The installation of the Tivoli Common Agent Stack is run from Go To > Deployment > Software Management > Software Product Installation. The install fails with: AgentInstallException exception occurred. The exception was caused by the following problem: Agent installation failure. Agent install return code log file contents: The response file parameter CASInstall.RegistrationPassword is not specified. Causes Tivoli Common Agent installation is not supported via direct stack install from the Software Product Installation menu. Resolving the problem Run the Tivoli Common Agent install through one of the supported mechanisms. Common agent reinstallation failure on Windows: Restart the computer before you reinstall the common agent to ensure that all services marked for deletion are actually deleted. Symptoms You cannot reinstall the common agent on Windows. Causes The Windows computer was not restarted after the previous Tivoli common agent was uninstalled. In some cases, if Windows cannot delete a service, it will mark that service for deletion on the next restart of the computer. In these cases, the common agent installer will not be able to install the common agent because the installer detects the previous common agent which, although marked for deletion, still exists until the next restart. Resolving the problem Restart the computer before you reinstall the common agent. Installing the common agent on Security-Enhanced Linux: This section describes how to install the common agent on Security-Enhanced Linux. Before you begin Check if the Linux security is on by running the following command at a Linux command line:
getenforce
If you obtained an enforcing as an output, it means that the security is on. You can also check the security status in the configuration file in the /etc/selinux/config directory. To install the common agent on Security-Enhanced Linux: Procedure 1. Switch off the security enhancement using either of these commands: setenforce 0
768
or echo 0 > /selinux/enforce 2. Install the common agent. 3. Turn on the security enhancement back using either of these commands: setenforce 1 or echo 1 > /selinux/enforce 4. Restart the computer. What to do next The common agent is now installed. Common agent installation failure due to duplicated GUID: Common agent installation fails when the Tivoli Global Unique Identify (Tivoli GUID) )is the same on different machines. Symptoms The common agent installation fails with the error "Agent installation failure. Agent install return code log file contents: Success". In the workflow logs you can see that the GUID created for the target machine is the same as the GUID of a previously installed machine. Causes You cannot have different machines with the same Tivoli GUID. Resolving the problem Uninstall the common agent and remove the GUID from the target machine, as explained in Uninstalling the common agent on page 669. To prevent this error during the common agent installation on the target machine, ensure that the common agent is not installed and the Tivoli GUID is removed from the computer that you are capturing the image from. Error during Tivoli GUID installation: Errors will occur if Windows Installer is turned off when you install the common agent. Symptoms On Windows, Tivoli GUID fails to install properly and the following error is given in the runtime/agent/logs/guid_install.log log file:
Failed to connect to server. Error: 0x80070422
Causes If you install the common agent, the installer also installs the Tivoli GUID component. On Windows platforms, the Microsoft Windows Installer is responsible for that. For this reason, the Windows Installer
Chapter 7. Deploying software
769
system service cannot be turned off, or else the first error will be caused. Moreover, when installing Tivoli GUID there cannot be any other MSI installations in progress, which is the cause of the second error. Resolving the problem Make sure that the Windows Installer system service is enabled and all other MSI installation processes are finished before running the common agent installer. Cannot install common agent on Solaris: Due to a known limitation, you cannot install the common agent on Solaris if you are using certain locales. Symptoms You cannot install the common agent on a Solaris computer system. Causes Due to a known limitation with Java Runtime Environment (JRE) for Solaris 1.3.1, you cannot install the common agent on a Solaris computer system if you are using any of the following locales: -en_US.UTF-8 -de_DE.UTF-8 -fr_FR.UTF-8 -it_IT.UTF-8 -es_ES.UTF-8 Resolving the problem Set the locale of the Solaris system to a non-UTF-8 locale to perform the installation. Use the export LANG command to set the locale. For example, run the command export LANG=fr_FR.ISO8859-1 to change the locale to fr_FR.ISO8859-1. After the installation is complete, reset the system to the original locale. You can use common agent commands to check and change the locale: 1. Ensure that the common agent is running. 2. Change to the directory where the common agent is installed. 3. Run the following command to check the current locale setting:
agentcli logmgr getlocale
where language is a two-letter lowercase code defined by ISO-639 and region is a two-letter uppercase code defined by ISO-3166. For example, to set the location to United States English, use the following command:
agentcli logmgr setlocale en US
Tivoli Common Agent installation fails on Solaris SPARC target computers: Installation will fail if the target computers are missing required SUNW packages. Symptoms Tivoli Common Agent installation fails on Solaris SPARC target computers with the following error message:
770
COPDEX123E A AgentInstallException exception occurred. The exception was caused by the following problem: Agent failed to install with install error: The installation process was cancelled by the user.
Causes The target computers are missing required SUNW packages, such as SUNWxcu4. Resolving the problem Review the required packages for Solaris target computers listed in the Requirements for Solaris targets topic in the Tivoli Provisioning Manager Information Center and ensure that all packages are installed. You can verify this by running the following command on the Solaris target computers:
pkginfo -i | grep <package-name>
Common agent installation failure on Red Hat 5: The firewall needs to be disabled before installing the common agent. Symptoms Common agent installation fails on Red Hat 5 with the following error message:
COPDEX123E A AgentInstallException exception occurred. The exception was caused by the following problem: Agent failed to Install with install error: The installation process was cancelled by the user.
In the workflow logs, the following error is reported by Tivoli Provisioning Manager:
std err: Log: common_agent_1.4.2.1_200902171611_linux.tar has been extracted into /tmp/tcatemp Log: common_agent_1.4.2.1_200902171611_linux.tar has been removed from /tmp/tcatemp Log: agentTrust.jks copied to: /tmp/tcatemp/cert No Java Runtime Environment (JRE) was found on this system
Causes Red Hat 5 has the Security-Enhanced Linux firewall utility enabled by default. This firewall prevents Tivoli Provisioning Manager from installing the common agent. Note: You can manually check if the firewall is enabled by entering the getenforce command at a Linux command line. If enforcing is returned, it means the firewall is enabled. Resolving the problem The firewall needs to be disabled before installing the common agent. There are two ways to do this: v Switch off security enhancement by entering the following command:
setenforce 0
v Edit the configuration file on the Linux computer. The file is found in the /etc/selinux/config directory. In the file, find this line:
SELINUX=enforcing
771
With the firewall disabled, the common agent can now be installed. After the installation has completed, you can turn the firewall back on. v If you disabled the firewall using the setenforce 0 command, you can re-enable it by entering setenforce 1 in the command line. v If you disabled the firewall by modifying the configuration file, you can re-enable it by editing the configuration file again and setting the SELINUX variable back to enforcing. Remember to restart the computer to apply these changes if you use this method. Common agent installation fails when using commands: These commands might fail if the /tmp directory is full. Symptoms An installation on a UNIX operating system fails when using copy or put file commands. Causes The /tmp directory or device might be full on the UNIX computer. The common agent installation copies files to the /tmp/tcatemp directory. Resolving the problem Run the df -k/tmp command to determine if the disk is full. If the disk is full, create the necessary space required in order for the installation to succeed. Common agent reinstallation failure on Windows: Restart the computer before you reinstall the common agent to ensure that all services marked for deletion are actually deleted. Symptoms You cannot reinstall the common agent on Windows. Causes The Windows computer was not restarted after the previous Tivoli common agent was uninstalled. In some cases, if Windows cannot delete a service, it will mark that service for deletion on the next restart of the computer. In these cases, the common agent installer will not be able to install the common agent because the installer detects the previous common agent which, although marked for deletion, still exists until the next restart. Resolving the problem Restart the computer before you reinstall the common agent. UAC not supported for common agent installation on Windows 7 target computers: On Windows 7 computers, the default level of the UAC mechanism for the Tivoli Common Agent installation is not supported. You cannot use the default level of the Windows user access control mechanism for installing the Tivoli Common Agent on Windows 7 target computers. Symptoms
772
The Tivoli Common Agent installation fails. You cannot use the default level of the Windows user access control mechanism for Windows 7 target computers. Causes There are four security levels for Windows UAC on Windows 7 computers. Level 3, which is the default level, does not allow Tivoli Common Agent to be installed. Environment Tivoli Provisioning Manager v7.2 and Windows 7 target computers. Resolving the problem To resolve this issue, disable Windows user access control on Windows 7 target computers. Installation does not create the tpm_default.xml file: Installation does not create the tpm_default.xml file Symptoms The stand-alone agent installation on Windows using the LocalSystem account does not create the tpm_default.xml file. It does not copy the getVersionBuild.bat file to the <AGENT_INSTALL_DIR>/ep/ runtime/agent/bin directory. Causes The stand-alone agent installation uses the LocalSystem account. When the service runs, it cannot access the AppData environmental variable. Resolving the problem Do not install the stand-alone agent using the Windows LocalSystem. SSLHandshakeException error when installing: This error will occur if signer certificates do not match. Symptoms You receive an SSLHandshakeException exception while installing a resource manager or common agent. Causes The signer certificate on the resource manager or common agent do not match the certificates offered by the agent manager server when the two computers attempt to set up a secure SSL connection. If the certificates do not match, the resource manager or common agent cannot determine whether it is communicating with the correct agent manager server. Resolving the problem 1. If you just created new certificates for the agent manager server, make sure that the agent manager server was restarted after the new certificates were created. The agent manager server will not start using the new certificates until it restarts.
773
2. Make sure that the resource manager or the common agent have a copy of the current truststore file for the agent manager server. The truststore file contains the signer certificate for the agent manager server. A simple way to do this is to copy the file to the resource manager or the common agent again. 3. Try the program that failed again. Common agent installation failure due to no stack: The common agent installation fails unless the common agent stack is selected. Symptoms The common agent installation from a Server Provisioning application fails unless the common agent stack is selected as the software to install. After installing version 1.4.2.1 of Tivoli Common Agent, a TCA-1.4.2.1 entry is added to the installed software list on the target computer, but the software is not actually installed. Causes The common agent does not install completely unless the software stack is used. Resolving the problem Use the Tivoli Common Agent Stack as the selected software, instead of Tivoli Common Agent 1.4.2.1, when you install the common agent from the Server Provisioning application. Installing common agent using sudo fails: Symptoms When installing the common agent on a target computer using sudo, the installation fails with the following error:
COPDEX040E An unexpected deployment engine exception occurred: class java.lang.RuntimeException:java.lang.RuntimeException: server indicated an error: scp: /tmp/tcatemp/common_agent_1.4.2.1_201003080501_linux.tar: Permission denied.
Causes The non-root user does not have permission to write to the /tmp/tcatemp directory because it was created by a different user such as root. This situation might occur if the target has been configured to run workflow commands using sudo. Installing the common agent using sudo does not require configuring the target computer to perform workflow commands using sudo. Resolving the problem To resolve the issue, perform the following steps: 1. Delete the /tmp/tcatemp directory, using sudo to obtain root permissions. For example, run the command:
sudo rm -rf /tmp/tcatemp
2. Ensure that the service access point of the target computer does not have any variables with names starting with "sudoers". If such variables exist, delete or rename the variables. 3. Install the common agent using sudo by following the steps described in Installing the common agent on page 570. Common agent installation fails in directory with DBCS characters:
774
Symptoms Installing into a directory that has double byte character set (DBCS) characters in its path causes the common agent installation to fail. Causes The nondefault installation path containing DBCS characters becomes corrupted and the agent installation fails. Resolving the problem Do not install into a directory that has DBCS characters in its path. The installation path can only contain ASCII characters. Tivoli Common Agent installation fails with invalid password: The installation will fail if the password on the target computer contains a double quotation mark. Symptoms The installation of the common agent on a target computer fails. Causes The password for the common agent on the target computer contains a double quotation mark. The double quotation mark is not a valid character. Resolving the problem Do not include double quotation marks in the password. Tivoli Common Agent installation fails if agent is already installed: This will happen if the target computer already had an agent installed that is not the currently supported agent version. Symptoms The installation of the common agent returns the following error:
The response file parameter CASInstall.InstallType contains an unsupported value or is not specified. The value must be install or upgrade.
Causes The target computer already had an agent installed that is not the currently supported agent version. Resolving the problem Uninstall the current agent from the target computer, or modify the software configuration to use an alternative installation location. The configurations can be found on the Tivoli Common Agent Stack software catalog entry. The software configuration can also be modified for a particular installation using the Advanced options on the agent installation user interface. Common agent files deleted after installation:
Chapter 7. Deploying software
775
Files are marked for deletion upon restart when the common agent was uninstalled. These files are deleted on restart even if they were replaced by a reinstall. Symptoms Files from a recently installed Tivolicommon agent are deleted after the computer is restarted. Causes In some cases, Windows will mark files for deletion upon the next restart if it cannot delete those files during the uninstallation process. If a user uninstalls Tivoli Common Agent and Windows cannot delete all the files immediately, it will mark them for deletion upon restart. If the user installs another version of the common agent on that computer without restarting, the files that were marked for deletion will be deleted upon the next restart of that computer. Resolving the problem Try to uninstall the Tivoli common agent. If the uninstall fails, follow these steps: 1. Remove the common agent service from the Windows Registry using one of the following methods: v Method 1 (Recommended): Use the common agent utility to remove the common agent service.
agent_installdir\InstallUtil -uninstallservice -service service_name
where service_name is the name of the service listed in the Windows Services control panel. The default service name is IBMTivoliCommonAgent0. v Method 2: Use the Regedit program to delete the service from the Windows Registry. 2. Remove the common agent entry from the common agent registry (located in %ProgramFiles%\tivoli\ ep.reg). You might have more than one entry if you have more than one common agent on that computer. Remove only the entry for this common agent, which you can identify by its installation location. 3. Delete the installation directory. 4. Restart the computer. 5. Reinstall the common agent. Registration errors: Common agent cannot register on HP-UX: The logs show a Java exception #231628960 error, which means that the GUID shared library cannot be read. Symptoms When the common agent is installed on HP-UX, the agent ID cannot be read, preventing the common agent from registering. This problem is intermittent. The following information is written to the log:
java.lang.Exception: 231628960 at com.tivoli.agentmgr.resources.GUIDHelper.getHostId (GUIDHelper.java:53) at com.tivoli.agent.id.IDServiceImpl.getEndpointId (IDServiceImpl.java:99) at com.tivoli.agent.id.IDServiceImpl.checkForOEMInstall (IDServiceImpl.java:60) at com.tivoli.agent.id.IDActivator.start(IDActivator.java:54) at com.ibm.osg.smf.BundleContext$1.run(BundleContext.java:1300) at java.security.AccessController.doPrivileged(Native Method) at com.ibm.osg.smf.BundleContext.start(BundleContext.java:1282) at com.ibm.osg.smf.Bundle.startWorker(Bundle.java:709)
776
at com.ibm.osg.smf.Bundle.start(Bundle.java:655) at com.tivoli.agent.system.SMFLauncher.startSMF(SMFLauncher.java:240) at com.tivoli.agent.system.SMFLauncher.main(SMFLauncher.java:94) Caused by: 231628960 at com.tivoli.srm.guid.GuidOFactory.<init>(GuidOFactory.java:79) at com.tivoli.agentmgr.resources.GUIDHelper.getHostId (GUIDHelper.java:48) ... 10 more
Causes Java exception #231628960 means that the GUID shared library cannot be read. Resolving the problem Uninstall the common agent and then install it again. If the problem persists, remove the agent ID and add it again with using the following steps: 1. Run the command swremove TIVGUID. 2. From the common agent installation image in the GUID directory, run installguid.sh. Cannot register target computers in firewall: The target computers cannot complete their registration with the provisioning server when the firewall toolkit is used. Symptoms You cannot register target computers with the provisioning server in a firewall environment. This issue has been described in an environment where a firewall is used between the provisioning server and the target computers. The updated firewall toolkit from Tivoli Provisioning Manager 5.1.0.1 (Fix Pack 1) has been used. This behavior has been consistently described in firewall environments, and occasionally in non-firewall environments. Causes The target computers cannot complete their registration with the provisioning server when the firewall toolkit is used. The process appears to work properly up to the final step when the target certificate is passed back to the target computer. The certificate is not created on the target computer (only three files are created in the cert directory on the target, namely agentTrust.jks CertificateRevocationList, and pwd). When the provisioning server attempts to create a target, it is able to connect to the target, install the common agent binary files, and start the agent. The agent is able to communicate back to the provisioning server, but the final certificate file (target key file) is not created on the target computer. Resolving the problem To avoid this issue, the following requirements must be met: v Port 9510 is required for TCA_PingAgent. v RXA ports (445 TCP and 139 RPC) are enabled. v Use the standalone agent when a firewall is between the provisioning server and the target computers. Common agent security error during registration:
Chapter 7. Deploying software
777
Security errors will occur if system clock on the agent system does not match the clock on the agent manager computer. Symptoms A security error (for example, SSLHandshakeException) occurs when: v The common agent attempts to register with the agent manager. v The common agent is contacted by another entity (for example, a resource manager) already registered with the agent manager. Causes The system clock on the agent system does not match the clock on the agent manager computer. The agent manager compares the clocks in Universal Time Coordinated (UTC). Resolving the problem Reset the system clock on the agent system to match the clock on the agent manager computer. Common agent registration and uninstallation errors on Windows: Restart the computer to ensure that the endpoint.properties file is deleted before reinstalling the common agent. Symptoms The endpoint.properties file is truncated (approximately 6-8 lines long instead of approximately 20). The common agent cannot register and cannot be uninstalled. Causes Windows was not restarted after uninstalling the common agent. This problem can occur in the following situation: 1. The user tries to uninstall the common agent, but the common agent uninstaller on Windows cannot delete the endpoint.properties file if it is locked or in use. It therefore queues deletion for the next restart. 2. The user installs a new common agent in the same directory, which creates a new endpoint.properties file that must not be deleted, but the file is still queued for the next restart. 3. When the user reboots the computer, the endpoint.properties file is deleted from the newly installed common agent. 4. When the common agent starts, it tries to register and creates a truncated version of the endpoint.properties file. The common agent cannot work properly. It cannot register because the port value is missing in endpoint.properties file, resulting in a parsing error. It also cannot be uninstalled because the uninstaller is looking for values in the endpoint.properties file that are not there. Resolving the problem Ensure that the endpoint.properties file is deleted when you uninstall the Windows common agent. You need to restart the computer before reinstalling the common agent in the original installation directory. Reregistering a common agent: You might want to perform this operation if you are experiencing multiple connectivity or registration problems which do not have obvious causes.
778
Various connectivity and registration problems can be resolved by forcing the common agent to reregister with the agent manager. You might want to perform this operation if you are experiencing multiple connectivity or registration problems which do not have obvious causes. Two methods are available for performing this operation: 1. Change directory to agent_installdir/runtime/agent/bin. 2. Run the agentcli.sh/bat security renew cert command. You can also perform the following steps: Procedure 1. Stop the common agent. 2. Delete the contents of agent_installdir/runtime/agent/cert. 3. Verify that the agent.ssl.truststore.download parameter is set to true in file endpoint.properties located in agent_installdir/runtime/agent/config. 4. Restart the common agent. Cannot register common agent or resource manager: This can happen if configuration regarding the agentTrust.jks is incorrect. Symptoms You cannot register either the common agent or the resource manager. Causes This can happen if you select the installation option to provide a copy of the agentTrust.jks truststore file to the common agent or resource manager, and then point to the wrong file. For example, you might point to the agentTrust.jks file in the cert directory of the installation image instead of pointing to the real file on a network share. Another possible cause is that you pointed to the agentTrust.jks file of your production environment when the common agent or resource manager is connecting to a test environment. Resolving the problem 1. Copy the agentTrust.jks file from the AM_HOME/certs directory on the agent manager server to the CA_HOME/certs directory on the common agent. 2. Restart the common agent. Upgrade errors: Common agent upgrade failure: Symptoms The upgrade of the common agent fails with a message like the following message: COPDEX123E A FailureLogStatus exception occurred. The exception was caused by the following problem: TCA upgrade exited with status: FAILURE. Check the log file C:\DOCUME~1\ADMINI~1\ LOCALS~1\Temp\TCA_upgrade_1.4.2.1\TCA_Install_1.0.log_13205. Causes One of the directories used by the common agent is being accessed by another user or process. During the upgrade, the process backs up some directories. If the directory or file is in use or locked, the process cannot back up the required files, causing the upgrade to fail.
779
Resolving the problem Check the log file indicated in the error message for error code 65. This error code indicates that the directory is being accessed by another user or process. Ensure that no user or process is accessing the common agent directories or files. Installing up-level common agent over existing common agent level: Symptoms an agent installation error message occurs during installation of the common agent on a target computer. The installation fails because the specified common agent ports are already in use and port conflicts might occur. The common agent might not start or operate correctly. Causes The Agent Installation error can be caused by another version of the common agent that is already present on the target computer. Note: Having an agent installed is not the only reason one might see such an error as IBM has not registered any of the agent ports for exclusive use. Any application might cause this error. It most likely is another agent, but might be something else. Resolving the problem Check the target to see if another version of the common agent already exists. Uninstall the previous version of the common agent before attempting to install the new version. For more information, see Manually uninstalling the common agent. The computer name is not updated after the common agent is upgraded: After upgrading the common agent, the correct host name (related to the NIC used for communication, if present) is not registered in the data model. Symptoms After upgrading the common agent, the computer name is not updated. If there was already a system with a name in the data model, the name does not change on subsequent discoveries, even if the host name reported by the agent changed. Causes The computer name is not updated Resolving the problem To register the new computer name in the data model, delete the computer from the data model and run the discovery. This operation brings in the host name associated with the NIC that is routable to the agent manager. Uninstalling the agent: Manually uninstalling the common agent: How to remove the common agent manually if the uninstallation wizard does not complete successfully.
780
This section describes how to remove the common agent manually if the uninstallation wizard does not complete successfully. Some of the following steps might not be necessary, depending on how much of the uninstallation wizard completed. This procedure removes all instances of the common agent from the system: 1. Stop the common agent. v Windows operating systems: In the Windows Services window, find the Tivoli Common Agent service, right-click on it, and then select Stop. v Other operating systems:
./endpoint.sh stop
If more than one common agent is installed, stop each one. 2. Verify that the common agent processes are all stopped by checking for the nonstop process. If the common agent stopped properly, the nonstop process will not be running. However, if the processes are still running, stop them as follows: v Windows operating systems: Using the Windows Services window to stop the common agent typically cleans up any remaining processes. No additional action is required. v AIX operating systems:
ps -ef | grep nonstop ps -ef | grep java
Use the kill -9 command to stop both processes. Stop both processes quickly, to prevent them from starting each other up again. v Other operating systems:
ps -aef | grep nonstop ps -aef | grep java
Use the kill command to stop the process ID with the lowest number for each process. (Linux has multiple process IDs shown, pointing up to lowest starting ID). 3. Use the uninstallation wizard to uninstall all common agents on the workstation. If more than one common agent is installed, run the wizard for each one. For any common agent that you can not uninstall, delete the common agent installation directory, including all files and subdirectories. 4. Clean up the ep.reg file and, if it exists, the ep.bak file: v If you are uninstalling all common agents from the system, delete both files. v If you are uninstalling a specific common agent, delete the line in each file that lists the installation directory of the common agent you are uninstalling. For example, to uninstall the common agent installed in the /opt/tivoli/ep1 directory, delete the line that begins like this:
0 | cygnus0317b | /opt/tivoli/ep1 | 1.3.0.5 | 0 | 1.4.2 | IBM Corp...
The files are in the following directory: v Windows operating systems: %ProgramFiles%\Tivoli v AIX operating systems: /usr/tivoli v All other platforms: /opt/tivoli 5. On Windows operating systems, delete the Windows service for the common agent. Use one of the following methods: v Run the srvinstw.exe command, which is available in the Windows Resources Toolkit. This command launches a window in which you select the service to be deleted. v Download the InstallUtil utility. Run the following command:
InstallUtil uninstallservice service_name
781
Important: Be careful when editing the Windows Registry. An incorrect change can damage the operating system. a. Make a backup copy of the registry. b. In a registry editor such as regedit or "regedit32", expand the following keys: My Computer HKEY_LOCAL_MACHINE SYSTEM CurrentControlSet Services IBMTivoliCommonAgentn, where n is an integer starting with 0 for the first common agent that was installed on the system. c. Check the value of the Image Path key for the IBMTivoliCommonAgentn entry. This value specifies the directory in which the common agent was installed. Use the value to make sure you are deleting the registry entry for the correct common agent. d. Delete the IBMTivoliCommonAgentn key for each common agent that you are removing. e. Save the changes to the registry. 6. On UNIX and Linux, delete the s71 and k71 scripts from the /etc/rc.d directory. 7. If a Windows account was created for the common agent and you will not need it when reinstalling the common agent, delete the account. 8. Remove the entry for the common agent in the registry. On the server, use the RetrieveAgents, PurgeAgents, and LogicallyDeleteAgents utilities to identify and remove registry entries for the common agent. 9. On Windows operating systems, restart the operating system to remove the Windows service. 10. Optionally, delete the common agent installation directory. 11. Optionally, uninstall the Tivoli GUID. On Windows, use Add or Remove Programs to uninstall TivGuid. The common agent is removed from your system. Failures during manual uninstallation of common agent: If you manually delete the Common Inventory Technology (CIT) directory from a target computer when uninstalling the common agent, all products and technologies that rely on CIT will fail. Symptoms The IBM Tivoli Common Agent discovery scan fails after manually removing the C:\Program Files\tivoli\cit directory (opt/tivoli/cit for UNIX). For example, you might have removed this directory manually when uninstalling the common agent and then encountered this failure after reinstalling the common agent. Causes Common Inventory Technology (CIT) is a shared component that must not be removed manually. If you manually delete the CIT directory from a target computer, all of the products and technologies that are installed on that computer and are reliant on CIT will fail. Resolving the problem If you decide to remove the CIT directory manually, you also need to manually remove the cit.ini file from the %WINDIR%\cit directory (/etc/cit for UNIX). In an environment where no manual removal of files is performed, if no exploiter product uses CIT, the CIT uninstaller removes the CIT native code and cit.ini file.
782
Manual uninstall does not automatically update the data model: To work around this issue you will need to either run an Agent Compliance Scan or run the discovery configuration called IBM Tivoli Common Agent Discover Device against the computer. Symptoms Uninstalling the common agent manually results in the status being refreshed to display stopped. The status must be updated as uninstalled. Causes The common agent status will not be updated to uninstalled. The common agent uninstall will not send a message to the provisioning server. The Agent Manager is updated. Resolving the problem 1. To work around this issue you will need to either run an Agent Compliance Scan or run the discovery configuration called IBM Tivoli Common Agent Discover Device against the computer. Either option will update the common agent status and clean up the common agent information from the computer. This is only an issue for a manual uninstall initiated from the common agent system and does not affect the common agent uninstall initiated from the computer. Authentication errors after agent installation: Symptoms Authentication errors occur after installing the common agent. Causes Authentication errors can be caused by the following: 1. Incorrect password. 2. Corrupted or missing authentication files in agent_installdir\cert directory, where agent_installdir is the agent installation directory. Diagnosing the problem Following installation of the common agent, the agent is unable to register with the agent manager. Authentication errors are logged in msgAgent.log. Resolving the problem 1. Verify that you are using the correct password. 2. Change the registration password on the common agent. This password is stored in encrypted form, so that a special command is required in to change it. a. Change directory to the agent installation directory. b. Use the following command to create and store a new encrypted registration password in the endpoint.properties file using the registration key Registration.Server.PW. In the command, password represents the registration password. Windows: jre\bin\java -cp lib\ep_install.jar;lib\ep_common.jar com.tivoli.agent.install.EncrPwdInConfFile config\endpoint.properties Registration.Server.PW password UNIX or Linux: jre/bin/java -cp lib/ep_install.jar:lib/ep_common.jar com.tivoli.agent.install.EncrPwdInConfFile config/endpoint.properties Registration.Server.PW password 3. Restart the common agent.
Chapter 7. Deploying software
783
IP address change at NAT server not detected by common agent: When you change the IP address on the NAT server, the common agent cannot automatically detect that the address has changed. An agent status update is required for the change to be registered. Symptoms The common agent does not detect the IP address change. Causes The common agent discovery does not detect the change. Resolving the problem 1. Stop the common agent. 2. Restart the common agent. Common agent is unable to read GUID upon startup on Linux: The common agent cannot read the GUID if the GUID failed to install. Symptoms After installation, the common agent is unable to read the GUID upon startup on Linux x86 and Linux ppc. The following message is logged in the traceAgent.log file when the common agent is starting up and tries to read the GUID:
13:05:18.980+01:00 com.tivoli.agent.id.IDServiceImpl getEndpointId main java.lang.Exception: 231628950
Causes The GUID failed to install. During the installation of the common agent, the Tivoli GUID is installed. After the common agent is installed, it attempts to read the GUID upon startup. If the agent cannot read the GUID, it will fail to start. Resolving the problem Rebuild the RPM database, then reinstall the common agent. RPM is the package manager for Linux. User response: The commands to rebuild the RPM database are:
rm -f /var/lib/rpm/__db* rpm -vv --rebuilddb
Incorrect information after Tivoli Common Agent installation: A remediation workflow calls the provisioning workflow SoftwareModule.Install against Tivoli Common Agent 1.4.2, but the result that it produces is incorrect. Symptoms If the compliance check Require Tivoli Common Agent (TCA) 1.4.2 is created and the end file does not have Tivoli Common Agent installed, a recommendation to install Tivoli Common Agent 1.4.2 will be provided. After installing Tivoli Common Agent 1.4.2, TCA 1.4.2 will show up in the installed software list of the target computer but has not actually been installed. Causes
784
A remediation workflow calls the provisioning workflow SoftwareModule.Install against Tivoli Common Agent 1.4.2, but the result that it produces is incorrect. It creates a Tivoli Common Agent 1.4.2 installation on the provisioning server, but does not install Tivoli Common Agent 1.4.2 on the target computer. Resolving the problem To verify that the Tivoli Common Agent is installed, create a compliance check against the Tivoli Common Agent stack instead of against Tivoli Common Agent 1.4.2. TCA_PingAgent workflow hangs: This might happen if a nonstop process is still running because the previous uninstallation did not remove all components. Symptoms Testing communication with the TCA_PingAgent workflow hangs on Windows computers. Causes A nonstop process might still be running because the previous uninstall did not remove all components. Diagnosing the problem Check theSystemErr.out file on the Windows computer for an error message similar to this error:
com.tivoli.agent.system.SystemStreamMgr$LogPrintStream println(String) SEVERE: NOTE ==><4> Server socket failed to accept incoming connections. [java.io.IOException: SSL session object is null. Socket resource may not be available.]
This error might indicate that the common agent cannot open the port, which means that it is already open by something else. Resolving the problem Determine which type of the error is causing the problem and follow the appropriate steps to resolve the error: v Access privileges are missing for the local administrator (error -121): The local administrator account for the Windows computer is missing the required privileges. 1. On the Windows computer, navigate to Control Panel > Administrative Tools > Local Security Policy > Local Policies > User Rights Assignment. 2. Ensure that the following policies are assigned to the administrator: Act as a part of the operating system Log on as service v Ports specified for install are already in use (error -124): To successfully install the common agent on target computers, you must ensure that ports 21080 (WebContainerPort) and 21443 (WebContainerSSLPort) are free on the target computers. If the common agent installation is attempted on an target computer that already uses these ports, the common agent installation will fail. For more information, you can refer to the preinstall.log file, located in the C:\Program Files\tivoli\ep\runtime\agent\logs directory. v A user action was not successful (error -101): This error, in the preinstall.log file might occur when you use the InstallUtil tool. This tool manipulates the system user. Launch the tool manually in the same way to reproduce the error. For example, C:\tcatemp\utility\InstallUtil.exe" - userexists -user <user_name>.
Chapter 7. Deploying software
785
Common agents cannot communicate with agent manager: Improper setup or failed installations can prevent common agent computers from being able to resolve the fully qualified name of the agent manager server. Symptoms Communication problems between the common agents and the agent manager might include, for example, a failed ping agent, or failed subagent installations when installing the common agent. Causes The Domain Name Server (DNS) was not set up properly. By default, the agent manager requires the common agent computers to be able to resolve the fully qualified name of the agent manager server. Resolving the problem If the target computer that you want to install the common agent on cannot resolve the fully qualified name of the agent manager server, follow these steps: 1. Stop the provisioning server. 2. On the provisioning server, edit the AgentManager.properties file that is located in the following directory:
$WAS_HOME/installedApps/<nodename>/AgentManager.ear/ AgentManager.war/WEB-INF/classes/resources
where <fully qualified name> can be, for example, bvtwin1.tpmserver.example.com. b. Replace the IP address with the fully qualified name, for example, 9.2.2.2. The resulting line is:
ARS.host=9.2.2.2
c. Restart the agent manager. d. Try installing the common agent on the target computer again. Common Agent service access point: Symptoms Tivoli Provisioning Manager provides an automation package with the following bundles to support the functions of the Common Agent service access point: Tivoli Provisioning Manager Core agent TivoliCommonAgent-core COP-CommonAgent-TPM.jar Scalable File Distribution Content Delivery Service v CDSClientAPIBundle.jar v CDSDepotServer.jar Job-processing subagents dms-client-subagent v httpadpator.jar v httpsadaptor.jar v osgiagent.jar
786
v syncml-core.jar v syncml-dm.jar v TPMAgentExt.jar event-subagent v EventAdmin.jar jes-subagent v jes.jar Scanning subagents SCMCollectorAgent v SCMCollectorAgent_<os>.jar CitScannerAgent v CitScannerAgent_<os>.jar v citBundle.jar SPB-processing subagents SPBHandler v spb_handler_<os>.jar Agent discovery of deleted agents reports incorrect version: Agent discovery of deleted agents at 1420 level reports an incorrect version. Symptoms If you reimage an endpoint or delete the entry of an endpoint from the Provisioning Computers panel, and then rerun the discovery, the endpoint might display an incorrect version. After running the Tivoli Common Agent Discovery or the Tivoli Common Agent Discovery Device, the agent status is reported as offline in Tivoli Provisioning Manager. Causes The Tivoli Provisioning Manager Agent Manager maintains its own database of the servers where the common agent is installed. If you delete the endpoint entry from the Provisioning Computers page, the entry still exists in the Agent Manager database and the agent status is displayed as offline. Resolving the problem Perform the following steps: 1. To clean up the agent from the Agent Manager and the data model, run the workflow TCA_DeleteServerFromAMAndDCM. 2. To register the agent with the Agent Manager, run the following command on the endpoint: %CA_HOME%/toolkit/bin/./configure.sh -amhost <AM_HOSTNAME> -passwd <AM_PASSWORD> 3. Run Tivoli Common Agent Discovery. Make sure that you run Tivoli Common Agent Discovery, and not the Tivoli Common Agent Discovery Device. After server upgrade, agent status is offline: Symptoms After the Tivoli Provisioning Manager server upgrade, the agent status is displayed as offline.
787
Causes There might be inconsistencies in the database for example, a null value in a field where the value null is not permitted. Resolving the problem Reconfigure the agent by running the following script from the endpoint:
%Agent_Home%/toolkit/bin/configure.[sh/bat] -amhost <Agent_Manager_Host_Name> -passwd <Agent_Registration_Password> -force
Windows SDI patch scan fails: Symptoms The Windows endpoint takes more than 30 minutes to complete the patch scan. The scan fails with a timeout error. Causes Due to slow endpoints, the scan command fails with a timeout error after 30 minutes. Resolving the problem By default, the timeout variable is set to 30 minutes. You can set the timeout value to one hour by performing the following steps: 1. Click Go To > Administration > Provisioning > Provisioning Global Settings. 2. Click the Variables tab. 3. Click New Row. 4. Type the variable name patch-scan-timeout. 5. Type the value in seconds. For example, to set the value to one hour, type 3600. 6. Click Save. Note: To see how long the patch scan takes on an endpoint, see the windowsupdate.log file on the endpoint. Configuring OSGi bundle logging on the endpoint: Symptoms The trace log does not produce enough data while tracking job processing on the endpoint. Resolving the problem
788
To log the endpoint DMS polling for jobs and OSGI bundles interaction, you can enable the OSGiAgent log. To debug the OSGiAgent, add the property osgiagent.debug=true in <ep home>\conf\overrides\ agent.properties. The log data is located in C:\osgiAgentLog1.txt.
Causes The depot server is inactive and the download plan must include a peer from the zone, or the published files were deleted from the depot. The dual stack computer is registered in the dynamic content delivery administration console with IPv6 address format. The dynamic content delivery administration console only records the IPv6 address format of the dual stack computer, and this information is used in the download plan for the IPv4 computer. The IPv4 endpoint is not able to download the file from the peer even though the peer has a dual stack configuration. The dynamic content delivery administration console continues to prepare the download plans until the dynamic content delivery timeout occurs (the dynamic content delivery default timeout value is set to approximately 2 hours). Because the IPv4 endpoint is not able to download the file, the task fails. Resolving the problem To avoid this issue, choose one of the following options: v Restart the depot server and Tivoli Common Agent Services. v Distribute the file to an IPv4 computer first or to a dual stack computer on which the IPv4 address format is registered in the dynamic content delivery administration console. File distribution times out if the device manager service timeout is set to one hour: Symptoms The file distribution times out if the device manager service timeout value is set to one hour. Causes The depot server is inactive. The target computer is not able to connect to the peers which contain the file to be downloaded. Therefore, the file download does not take place and the task times out. Resolving the problem Consider one of the following options to resolve this problem: v From the provisioning global settings, change the value for the variable DMS.Job.Interval.In.hours to 2 hours or more. v Restart the depot server and then restart the Tivoli Common Agent services. v Distribute the file to an IPv4 computer or to a dual stack computer registered with an IPv4 address in the Dynamic Content Delivery management center.
Chapter 7. Deploying software
789
To check the endpoint IP address registered on the Dynamic Content Delivery management center, follow the next steps: 1. Open the Dynamic Content Delivery properties file: v v
AIX Solaris HP UX Red Hat
/usr/tivoli/ep/runtime/agent/subagents/cdsclient.properties
SUSE
/opt/tivoli/ep/runtime/agent/subagents/cdsclient.properties
Windows C:\Program Files\tivoli\ep\runtime\agent\subagents\cdsclient.properties v 2. In the properties file, ensure that the key value pair of user_ip is IPv4 address. If you change the file key value pair, then you must also change the value initial_login_done=true to false. 3. In <Tivoli Common Agent installation directory\runtime\agent\bin, run endpoint.sh restart or endpoint.bat stop 4. Run endpoint.bat start
Software package distribution overwritten by installation: When you manually perform a distribution first before installing a software package, a second software package is created even though the files have not changed since the first packaging. The manual distribution is overwritten. Symptoms If you manually perform a distribution of a software package before you install it, the software package redistributes automatically during installation, overwriting the first distribution in the process and making it unnecessary. Causes Software packages (but not software package blocks) are distributed and installed at the same time by default. They normally do not perform the two tasks separately. When you manually perform a distribution before installing a software package, a second software package is created even though the files have not changed since the first packaging. Because this second software package was created with a different MD5 hash, the result is that the whole software package gets redistributed, overwriting the first distribution in the process. Resolving the problem Use software package blocks (SPBs) instead of software packages, because software package blocks are not affected by this limitation and you can distribute and install separately. Note: Although default software packages have this limitation, you can design your own workflows that do not have this problem, even without using software package blocks. Software product distribution to target computers fails when filtered by group: The software products do not have logical management operation implemented, the target computers were not enabled for scalable distribution infrastructure , or the target computer filtering was done using the By Group option. Symptoms Distribution of software products that do not have the SoftwareInstallable.Distribute logical management operation implemented on target computers that are not SDI enabled fails with the following error if the target computers were filtered using the By Group option:
COPDEX137E: There is no workflow that implements the VALUE_0 logical operation associated with device VALUE_1.
790
Causes The following factors contribute to this failure: v The software products that have been selected for distribution do not have the SoftwareInstallable.Distribute logical management operation implemented. For the SoftwareInstallable.Distribute LDO, a workflow is required for the specific Software Product being distributed. You must create one when required v The computers targeted for distribution are not SDI enabled, which means that they have do not have an SDI-SAP defined. v The target computer filtering was done using the By Group option. Resolving the problem Do the software product distribution by first filtering the target computers By Computer, and then consider the following behavior when making the software and computer selections on the Distribute Software Products page: v If no software product is selected in the Selected Software section, the list of target computers under Selected Targets displays only the computers that have an SDI-SAP defined. v If one or more software products that do not have the SoftwareInstallable.Distribute logical management operation implemented are selected, then only the computers that have an SDI-SAP defined are listed. v If one or more software products that all have the SoftwareInstallable.Distribute logical management operation implemented are selected, then all the target computers are listed, regardless of whether they are SDI-enabled or not. Software publish task fails: The software publish task fails Symptoms After successfully migrating the server, the File Publish operation does not work. One or more error messages similar to the following messages might be displayed:
COPDEX040E An unexpected deployment engine exception occurred: COPINF002E Failed to publish file: /opt/IBM/tivoli/tpm/repository/TCA_upgrade_SPB/spb/TCA_upgrade_AIX.spb with id 46210 to CDS depot servers. CTGDEC029E The file, TCA_upgrade_AIX.spb, could not be uploaded successfully to any of the depot servers chosen by the management center. CTGDEC035E The upload proxy certificate was denied by the depot server. The file, downloadGridtmp15101073668464212321247841674319, could not be uploaded to server: tpmserver32.in.ibm.com:2100.
Causes This problem is due to the time difference between the depot and the server. Resolving the problem Align the time on the depot with the time on the server. Software product distribution fails on HP-UX target computer: Symptoms When trying to install a software package block (.SPB file) on a HP-UX target computer with Tivoli common agent (TCA) version 1.4.1.0, the following error is displayed:
Chapter 7. Deploying software
791
COPINF050E Failed to install software product PackageExample with error: Installation of package PackageExample failed with return code [137], and message: sh[3]: SHLIB_PATH: not found sh[3]: SystemDrive: not found /usr/lib/hpux32/dld.so: Unable to find library libeacmr.sl. sh[3]: 5792 Killed; return code = 137
Causes This is a known issue with the 7.1 software package block handler. Resolving the problem It is recommended that you upgrade the HP-UX target computers to TCA version 1.4.2.1 to resolve this issue. Deleting and re-creating the depot causes distributions to fail: You delete and re-create a depot. The operation completes successfully but subsequent distributions fail. Symptoms When you try publish a file after re-creating the depot, a series of messages like the following messages is returned:
COPDEX040E An unexpected deployment engine exception occurred: COPINF002E Failed to publish file: C:/Program Files/IBM/tivoli/tpm/repository/testtextfile5.txt with ID 16444 to CDS depot servers. CTGDEC030E The management center was unable to find potential depot servers to upload the file. The file, testtextfile5.txt, could not be uploaded. Make sure that there is at least one active depot server available, that it has enough space to store the file, and that it is not in an unreachable or restricted zone.
Causes If you delete a depot without uninstalling the depot stack, then re-create the depot, the correct server version and disk space information are missing in the management center administrative console Resolving the problem You can perform one of the following operations: v Uninstall the depot stack before reinstalling the depot. v Restart the depot after reinstalling if you have not uninstalled it Upload server times out on idle connections to Oracle server: Firewall timeout for idle connections might sever a connection. This can cause JDBC applications to hang while waiting for a connection. Symptoms The upload server might time out on an idle connection to the Oracle server if the following conditions are met: v The provisioning server runs on Solaris with a remote Oracle database. v The upload server is on a separate server that connects to the Oracle server using a firewall. If the timeout occurs, the following error message is displayed:
792
Causes Firewall timeout for idle connections might sever a connection. This can cause JDBC applications to hang while waiting for a connection. Resolving the problem You can perform one or more of the following actions to avoid connections from being severed due to firewall timeout: v If you are using connection caching or connection pooling, then always set the inactivity timeout value on the connection cache to be shorter than the firewall idle timeout value. v Pass oracle.net.READ_TIMEOUT as connection property to enable read timeout on socket. The timeout value is in milliseconds. v For both JDBC OCI and JDBC Thin drivers, use a net descriptor to connect to the database and specify the ENABLE=BROKEN parameter in the DESCRIPTION clause in the connect descriptor. Also, set a lower value for tcp_keepalive_interval. v Enable Oracle Net DCD by setting SQLNET.EXPIRE_TIME=1 in the sqlnet.ora file on the server side. Canceled task does not cancel jobs in progress: When a task is canceled, its job is canceled only on the provisioning server. Symptoms When a file distribution task is canceled, agents that have already started processing the job will continue processing it. Results for the additional jobs that are in progress to finish the (now canceled) job are communicated back to the provisioning server. Causes When a task is canceled, its job is canceled only on the provisioning server. This does not stop any agent that has already begun processing the job. Resolving the problem To cancel the additional jobs that are run by the agents, restart the corresponding endpoints. Task status is not updated when distributing or installing software products: Database lock time-outs might occur when submitting a software product distribution or installation task with over 10000 targets. Symptoms When you are distributing or installing software products, database lock time-outs occur and the task status is not updated. Causes Database lock time-outs might occur when submitting a software product distribution or installation task with over 10000 targets. Resolving the problem
Chapter 7. Deploying software
793
1. Stop Tivoli Provisioning Manager. 2. Connect to the database from a DB2 command window. 3. Increase the LOCKTIMEOUT configuration parameter to 10 minutes: db2 update db cfg using LOCKTIMEOUT 600. 4. Restart the database. 5. Start Tivoli Provisioning Manager. 6. Allow the status of the existing task to finish updating. If the task does not complete successfully, cancel it and submit a new task. Problems associating discovered software resources with software definitions: You can only associate a discovered software resource with a software product, patch, or operating system software definition. Symptoms When you manually associate a discovered software resource on a computer with a software definition, you can only select a software product, patch, or operating system software definition. The following scenario is described: v You manually associated a discovered software resource on a computer with a software stack definition. v When you look at the properties of the software stack, no software modules are displayed. v Compliance checking also incorrectly defines the software stack as missing when the software stack is included in the server template. Causes You can only associate a discovered software resource with a software product, patch, or operating system software definition. Associations with a software stack or distributed application are not supported. Resolving the problem Avoid associating software stacks or distributed applications with identified software resources on a server. Linux on IBM System z fails to import a software signature: The 1024MB that is required for the task to run is too large for the Java virtual memory (JVM). Change the amount of required memory. Symptoms You cannot import a software signature when using Linux on IBM System z. Causes An out of memory exception occurs because the 1024MB that is required for the task to run is too large for the Java virtual memory (JVM). Resolving the problem
794
Change the required memory and then manually run the script to import a software signature. To change the memory, follow these steps: 1. Open a terminal window and go to the tools directory by typing cd $TIO_HOME/tools. 2. Open the importSoftwareSignature.sh script for editing.
vi importSoftwareSignature.sh
3. Replace Xmx1024m with Xmx900m. 4. From the $TIO_HOME/tools folder, run the script to import the software signature Out of memory when querying for software signatures: To avoid this problem, you need to manage your large object (LOB) locators appropriately. Symptoms Running a query using the JDBC type 2 driver to pull all Windows software signatures might cause the computer to run out of memory. Resolving the problem To avoid this problem, you need to manage your large object (LOB) locators appropriately. To do this, add the following line to the sqllib/cfg/db2cli.ini file:
PATCH2=50
This entry ensures that the command line interface frees a LOB locator when the next LOB is to be fetched. Software distribution troubleshooting: Symptoms The service access points on the Tivoli Provisioning Manager server, the file repository for the dynamic content delivery management center, and the variables that are required for software distribution using the scalable distribution infrastructure are not created automatically. Causes The tpmserver.xml and infrastructure.xml files have not been successfully imported as part of the agent installation. Resolving the problem 1. Ensure that the tpmserver.xml and infrastructure.xml files are imported successfully as part of the agent installation. You can check the following log files for error or warnings, in the %TIO_LOGS%\install (Windows) or $TIO_LOGS/install (UNIX) folder: v xmlimport.log v xmlimport_soa.log For more information, see the Deploying software using the scalable distribution infrastructure tutorial. Canceled task does not cancel jobs in progress: When a task is canceled, its job is canceled only on the provisioning server. Symptoms
795
When a file distribution task is canceled, agents that have already started processing the job will continue processing it. Results for the additional jobs that are in progress to finish the (now canceled) job are communicated back to the provisioning server. Causes When a task is canceled, its job is canceled only on the provisioning server. This does not stop any agent that has already begun processing the job. Resolving the problem To cancel the additional jobs that are run by the agents, restart the corresponding endpoints. Software distribution using DE fails with depot not found error: Symptoms The following error is found when deploying a software package to a target computer that has the common agent (TCA) installed:
COPINF003E The software product C:/Program Files/IBM/tivoli/tpm/repository/filename with the ID id_number could not be published to the dynamic content delivery depot for the specified targets.
Causes The TCA installation might have automatically created the SDI-SAP and assigned to the endpoint a task operation. This will create a problem when deploying the software package in a Deployment Engine (DE) infrastructure where no depot server is required. You receive the error message because the task is performing an SDI operation. Resolving the problem If you want to run the deployment in a Deployment Engine (DE) infrastructure, perform the following steps: 1. Go to the Provisioning Computers application. 2. Select the target computer to which you want to deploy the software product. 3. Click the Credentials tab. 4. Ensure that the SDI-SAP is not assigned to the endpoint task operation. 5. If the SDI-SAP is assigned, delete the SAP. 6. Click Save. Error 20006 occurs while uploading the package: A shell command error can occur after trying to import an SPB file on the Tivoli Provisioning Manager server. Symptoms When you are importing an SPB file on the server, you might see the following error:
DISSP6050E error 20006 occurred while uploading the package.
796
Follow these steps to diagnose and fix: 1. Log in as root to the provisioning server. 2. Enter the su - user1 command. The command must complete successfully. 3. Enter the su - user2 command. If this command fails with the su: incorrect password error, even though the correct password was entered, follow these steps to fix the problem: a. Log in as root to the provisioning server. b. Go to /etc/pam.d. c. Open the su control module. d. Comment out the following line:
# Uncomment the following line to add a user to the "wheel" group. auth required pam_wheel.so use_uid
This adds the user tioadmin to the wheel group. This allows provisioning workflows to run without error. Old download plans display after SPB is installed: Tivoli Provisioning Manager displays old download plans when a software package block (SPB) is installed using scalable distribution infrastructure. Symptoms A new download plan is created for a first-time installation. If you publish an SPB before installing it, the SPB remains on the depot or in the endpoint cache. When you uninstall the software and then reinstall it, or reinstall it with the force option, no new download plan is created. Tivoli Provisioning Manager displays the old download plan data in the task view. Causes If you publish an SPB to a depot and then install it on a target computer, when the SPB is installed again, it is not downloaded again. This is because the target computer is a peer and the SPB is already cached and so, the second install does not have a download plan generated. Tivoli Provisioning Manager shows the original download plan because it is the download plan used for the actual distribution. Resolving the problem Do not publish the SPB before installing it. This way, the SPB is deleted each time and a new download plan is generated each time. Error deploying SPB using scalable distribution infrastructure: An error can occur if you deploy a software package block using scalable distribution infrastructure. Symptoms The following error can occur if you deploy a software package block using scalable distribution infrastructure:
com.ibm.tivoli.tpm.osgi.service.FileManagementException: Error while attempting file transfer:An exception was detected while returning the output stream from the CDS URL handler., cause: An exception was detected while returning the output stream from the CDS URL handler.
Causes
797
The installation failed because there was not enough disk space on the computer. The target log files contain the following error:
TPMFMS001E File copy: Error while attempting to copy file; Exception: An exception was detected while returning the output stream from the CDS URL handler., cause: CTGDEQ046E The client does not have enough free space to download the file (C:\Program Files\tivoli\ep\runtime\agent\subagents\cds\downloads;1267379347631) with a size of (27050983326) bytes. The client has (5854089216) bytes free.
Resolving the problem The error might occur because the target ran out of the disk space necessary to store the large file. Allot some disk space to continue. Windows patch management on SDI infrastructure using WSUS: Symptoms Using a small environment patch management scenario, Windows Server Update Services (WSUS), you must configure SDI. Causes If you configured WSUS to manage Windows patches in your Tivoli Provisioning Manager environment, by default, you are using Deployment Engine instead of SDI. You can use SDI by defining the following variable: wsus-over-sdi. Resolving the problem To set the variable, perform the following: 1. Click Go To > Administration > Provisioning > Provisioning Global Settings. 2. In the Variables tab, set wsus-over-sdi to true. Silent installation of interactive Windows patches fails: One or more Windows patches that require an interactive installation might fail in Windows environments that do not have the Microsoft Windows Server Update Services (WSUS) set up. Symptoms One or more Windows patches that require an interactive installation mode might fail in both the Deployment Engine (DE) and the Scalable Distribution Infrastructure (SDI) modes if the environment has been configured without the Microsoft Windows Server Update Services (WSUS) server. Causes Microsoft suppresses the silent installation of some of the newly released patches to ensure that system administrators are aware of the upgrade. Consequently, interactive patches, such as Windows Server 2008 R2 Service Pack 1 x64 Edition (KB976932) and Windows Internet Explorer 9 for Windows Server 2008 R2 for x64-based systems, cannot be installed in silent mode using Tivoli Provisioning Manager. Resolving the problem To install these patches using Tivoli Provisioning Manager, configure your environment using the Microsoft Windows Server Update Services (WSUS) server.
798
am_install.log
am_upgrade.log
auth_stdout.log auth_stderr.log certGen_stdout.log certGen_stderr.log datastore.out datastore_stdout.log datastore_stderr.log ds_install.log dh_stdout.log db_stderr.log encrypt_stdout.log encrypt_stderr.log guid_install.log guid_stdout.log guid_stderr.log msg_EPM_Install.log trace_EPM_Install.log serverStatus_out.log serverStatus_err.log
799
Table 146. Agent manager installation log files (continued) Log File startserver_stdout.log startserver_stderr.log jacl/amApp_out.log jacl/amApp_err.log Description Standard output and standard error logs for starting the agent manager application server under WebSphere. Standard output and standard error logs generated while installing the AgentManager and AgentRecoveryService applications and WAR files. These logs are generated by the EPMInstallApp.jacl configuration script. Standard output and standard error logs generated while installing the application server for the agent manager. These logs are generated by the EPMAppServer.jacl script. Standard output and standard error logs for verifying the cell for the WebSphere Application Server configuration. These logs are generated by the EPMValidate.jacl script. Standard output and standard error logs for verifying the node for the WebSphere Application Server configuration. These logs are generated by the EPMValidate.jacll script. Standard output and standard error logs for configuring the WebSphere Java Database Connectivity (JDBC) provider, data source, and J2C Authentication Data Entry. These logs are generated by the EPMJdbcProvider.jacl script. Standard output and standard error logs for Secure Sockets Layer (SSL) configuration. These logs are generated by the EPMSSLConfig.jacl script. Standard output and standard error logs for creating the WebSphere virtual host. These logs are generated by the EPMVirtualHost.jacl script.
jacl/appServer_out.log jacl/appServer_err.log
jacl/jdbc_out.log jacl/jdbc_err.log
Agent Manager uninstallation log files The log files generated when you uninstall the agent manager are located in the AM_HOME/logs directory.
Table 147. Agent manager uninstallation log files Log File uninstall.log AMUninstallReturnValues.log msg_EPM_Install.log trace_EPM_Install.log Description InstallShield MultiPlatform (ISMP) log for uninstalling the agent manager. Summary of return values of the steps of the agent manager uninstallation. Messages and trace information generated when uninstalling the agent manager applications in WebSphere Application Server.
Remote registry installation log files If the registry is on a system other than the agent manager computer, install a subset of the agent manager files on the database server to create and initialize the registry database.
800
Table 148. Remote registry installation log files Log File datastore.out ds_install.log db_stdout.log db_stderr.log Description A log of the SQL statements that are run to create the registry database and its tables. An ISMP log for installing the files necessary to create the registry database. Standard output and standard error logs for creating the registry database. Check db_stdout.log first to see if the registry was created successfully.
Other log files The runtime logs for the agent manager running on WebSphere Application Server are located in the app_server_root/profiles/profile_name/logs/app_server_name' directory, where app_server_name is the name of the application server. By default, the name is AgentManager. The runtime logs for the agent manager running on the embedded version of IBM WebSphere Application Server are in the app_server_root/agentmanager/logs/app_server_name directory. The runtime logs for WebSphere Application Server are in the app_server_root/profiles/profile_name/ logs/server1 directory. Additional logs are in the app_server_rootprofiles/default/logs/ffdc directory, but no such directory exists for the embedded version of IBM WebSphere Application Server. DB2 provides several First Failure Data Capture (FFDC) facilities that log information as errors occur. The DB2 FFDC facilities are used with command-line interface and DB2 traces to diagnose problems. The information captured by DB2 for FFDC includes: db2diag.log When an error occurs, the db2diag.log file logs information about the error. This is the primary log to use when debugging DB2 problems. db2alert.log If an error is an alert, entries are made in the db2alert.log file and in the operating system or native logging facility. dump files For some error conditions, additional information is logged in external binary dump files that are named after the failing process ID. These files are intended for DB2 Customer Support. trap files The database manager generates a trap file if it cannot continue processing because of a trap, segmentation violation, or exception. Trap files contain a function flow of the last steps that were executed before a problem occurred. Other useful DB2 commands include: db2trc This command gives you the ability to control tracing. db2support This command collects environment information and log files and places them into a compressed archive file. On WebSphere Application Server, the agent recovery service logs are in the log for the application server server1. This is the SystemOut.log file in the app_server_root/profiles/default/logs/server1 directory. This is true even if the WebSphere Application Server is installed in an application server other than
Chapter 7. Deploying software
801
server1. However, this is not true for the embedded version of IBM, on which the agent recovery services logs are not supported. Cannot run backup tool with WebSphere Application Server: The backup tool might not run if the agent manager is installed with WebSphere Application Server in a version earlier than 6.0.2.15. You need to manually run the wsadmin command to run the backup tool. Symptoms The WebSphere Application Server backup tool will not run. Causes If you have the agent manager installed with WebSphere Application Server in a version earlier than 6.0.2.15 and then upgraded to the version required, it might not be possible to run the backup tool (receiving a message saying that the control service is not available instead). You can check if this is the cause of the problem by looking in the WebSphere Application Server wsadmin.traceout log file. Resolving the problem You need to manually run the wsadmin command from the location AM_HOME/tools/resources as shown in the following line:
/wsadmin.ext -conntype NONE -lang jython -f getConfig.py
This command refreshes .jar files, and you will be able to run the backup tool after running it. Installation or upgrade of agent manager fails with embedded version of IBM WebSphere Application Server: If you install or upgrade the agent manager with the embedded version of IBM WebSphere Application Server, you need to ensure that there is enough disk space for the operating system temporary directory. Symptoms Agent Manager fails to install or upgrade with the embedded version of IBM WebSphere Application Server. Causes If you install or upgrade the agent manager with the embedded version of IBM WebSphere Application Server, you need to ensure that there is enough disk space for the operating system temporary directory. Resolving the problem Ensure that your have at least this much disk space:: On On On On On On Windows operating systems: 200 MB AIX operating systems: 220 MB HP-UX 1A64: 310 MB HP-UX PA-RISC: 250 MB Linux operating systems: 200 MB Solaris: 260 MB
User response: To correct the problem, change the location of the operating system temporary directory.
802
2. Edit the $TIO_HOME/config/jlog.properties file. 3. Make the appropriate changes as indicated by comments inside the file. 4. Enter the following command to start the Tivoli Provisioning Manager engines:
tio start TPM_ONLY
803
RXA does not supply SSH code for UNIX machines. You must ensure SSH is installed and enabled on any target computer you want to access using SSH protocol. Symptoms Remote Execution and Access (RXA) cannot establish connections with any UNIX target computer that has all remote access protocols (RSH, REXEC, or SSH) disabled. Causes RXA does not supply SSH code for UNIX machines. You must ensure SSH is installed and enabled on any target computer you want to access using SSH protocol. Versions of OpenSSH that are version 3.71 or newer contain security enhancements that were not available in earlier releases. In all UNIX environments except Solaris, the Bourne shell (sh) is used as the target shell. On Solaris targets, the Korn shell (ksh) is used instead, due to problems encountered with sh. Resolving the problem Ensure that you are using OpenSSH 4.4 or newer. A known issue in version 4.3 can cause problems when the provisioning server runs Expect scripts on a target computer. In order for RXA to communicate with Linux and other SSH targets using password authentication, you must edit the file /etc/ssh/sshd_config file on the target computers and set: PasswordAuthentication yes (the default is no). After changing this setting, stop and restart the SSH daemon using the following command:
/etc/init.d/sshd stop /etc/init.d/sshd start
In order to use SFTP for file transfers, in addition to calling SSHPProtocol.setUSESFTP(true), make sure that the SFTP server is enabled on the target computer. Note that the location of the sftp-server directory is dependent on your operating system. It is typically found in the following locations: v v v v
Solaris Linux HP UX AIX
The ssh_config file contains a line similar to the one below. Make sure the line that enables the sftp-server subsystem is not commented out, and that it points to the operating system-specific location of the sftp-server subsystem. For example:
Subsystem sftp /one_of/the_paths/shown_above
804
Resolving the problem Verifying that the depot is active To check if depot is active from the dynamic content delivery management console server: 1. telnet depot-server 2100. 2. Run the command syst from the management console. The response will be, for example:
DS:pendolino.tpmserver.example.com=1.3.0.0
Publishing files to an unavailable depot If you try to publish a file to a depot (Depot A) that is unavailable, the dynamic content delivery management console will look for an available depot (Depot B) from the list of depots. It will temporarily place the published file in the available depot (Depot B). When the dynamic content delivery management console scans all the depots, and it detects that depot (Depot A) that you tried to publish the file to is now available, it will copy the file from the original depot (Depot B) to the intended depot (Depot A). It will also delete the temporary file from the Depot B. Cannot reinstall depot servers after removal: If the depot server reinstallation fails, remove GUID first and try again. Symptoms The reinstallation of a depot server, which has been previously deleted from the Manage Depots page using the Remove option might fail with the following exception recorded in the agentInstall.log file:
... com.tivoli.cas.install.common.InstallGUID, err, java.lang.Exception: Cannot get system GUID STACK_TRACE: 14 java.lang.Exception: Cannot get system GUID at com.tivoli.agentmgr.resources.GUIDHelper.getSystemGuid(GUIDHelper.java:247) at com.tivoli.cas.install.common.InstallGUID.saveGUID(InstallGUID.java:139) at com.tivoli.cas.install.common.InstallGUID.execute(InstallGUID.java:129) at com.installshield.wizard.RunnableWizardBeanContext.run(RunnableWizardBeanContext.java:21) Caused by: java.lang.Exception: 231628960 at com.tivoli.agentmgr.resources.GUIDHelper.getHostId(GUIDHelper.java:83) at com.tivoli.agentmgr.resources.GUIDHelper.getSystemGuid(GUIDHelper.java:241) ...
Causes The depot server was deleted and unregistered from the dynamic content delivery management center, but the GUID is still present. The depot needs to be completely removed from that computer Resolving the problem Removing the GUID is recommended as a workaround to solve this problem. Follow these steps: 1. Check whether the GUID still exists by running the following command:
rpm -qa ] grep TIVguid
805
3. Attempt to install the depot server again. Silent installation of the management center fails: The silent installation will fail if the value of the LICENSE_ACCEPT_BUTTON parameter is not set to TRUE. Symptoms The silent installation of the dynamic content delivery management center fails. Causes The value of the LICENSE_ACCEPT_BUTTON parameter is not set to TRUE. Resolving the problem To 1. 2. 3. 4. change the value of the LICENSE_ACCEPT_BUTTON parameter, follow these steps: Open the cds_manager_opts file in a text editor. Set the LICENSE_ACCEPT_BUTTON parameter by adding -V LICENSE_ACCEPT_BUTTON="TRUE". Save the cds_manager_opts file. Try the silent installation of the management center again.
Software distribution troubleshooting: Symptoms The service access points on the Tivoli Provisioning Manager server, the file repository for the dynamic content delivery management center, and the variables that are required for software distribution using the scalable distribution infrastructure are not created automatically. Causes The tpmserver.xml and infrastructure.xml files have not been successfully imported as part of the agent installation. Resolving the problem 1. Ensure that the tpmserver.xml and infrastructure.xml files are imported successfully as part of the agent installation. You can check the following log files for error or warnings, in the %TIO_LOGS%\install (Windows) or $TIO_LOGS/install (UNIX) folder: v xmlimport.log v xmlimport_soa.log For more information, see the Deploying software using the scalable distribution infrastructure tutorial. Published task files saving on different depot server: If the first depot server does not have enough space, published task files will also be saved on the next server. Symptoms There are two servers on Tivoli Provisioning Manager server. When a file is published on the first server, it is also published on the second depot server.
806
Causes There is not enough space on the first depot server to save a file. Resolving the problem Make enough space on the first depot server to store a file. Depot stack not removed on uninstall: The uninstallation of the depot does not automatically remove the depot from the dynamic content delivery system. The depot needs to be removed manually. Symptoms After successfully uninstalling the depot agent stack, you find that the entry for the depot stack in Tivoli Provisioning Manager has not been removed. Causes The uninstallation of the depot does not link with the removal of the depot from the dynamic content delivery system. It will cause the depot to still exist in Tivoli Provisioning Manager even though the depot is not available. Any files published to this depot will not get to the depot until a new depot is installed again for the same depot instance on the same computer. Resolving the problem 1. Navigate to the dynamic content delivery configuration page in the Tivoli Provisioning Manager web interface. Delete the entry of the depot server where the depot agent stack is to be uninstalled. 2. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Computers. Select the computer where you want to uninstall the depot from. From the Select Action menu, click Uninstall > Software Installation. 3. To verify whether the depot stack is uninstalled, go to the computer and change the directory path to: <tca-install-dir>/runtime/agent/subagents/eclipse/plugins. If the uninstall was successful, you will not see the com.ibm.tivoli.cds.depot.cas.CdsDepot_2.1.0.jar file any longer. Incorrect value for the used space on a depot: The value for the used space is refreshed every 24 hours. If you do not want to wait, then the refresh can be done manually. Symptoms On the Depot page, if the data directory limit value is changed, the used space value is not updated automatically. Causes The value for the used space is refreshed every 24 hours. Resolving the problem To resolve the problem, do one of the following tasks: v After the change is made, wait for 24 hours so that the refresh is done automatically. v Click Refresh on the Depot Server Details window. To do this, start the Dynamic Content Delivery console from the Select Action menu, click the Depot tab, and then click Refresh under Cache Size.
Chapter 7. Deploying software
807
v Change the MA_DEPOT_SPACE_CHECK_INTERV AL_HOURS parameter in Management Center Configuration to a smaller value so that the refresh is done automatically. Note: We recommend that the last task be done by the Tivoli Provisioning Manager administrator, and not by the user. This is because setting the MA_DEPOT_SPACE_CHECK_INTERV AL_HOURS variable to a smaller value might have an impact on performance. Login to dynamic content delivery console: To log in to the dynamic content delivery console, you need to add the user name to the Web service group, for example, TPWEBSERVICEUSER If you do not, you receive an authentication error. Symptoms When you log in to the to dynamic content delivery console or create a depot, make sure that the user name is added to the Web service group, for example TPWEBSERVICEUSER. If the user name is not included in the Web service group, you receive the following error:
CTGDEG005E The specified username or password is incorrect.
Causes To allow users to log in to the dynamic content delivery console, you must add the user name to the Web service group, for example TPWEBSERVICEUSER. Resolving the problem Add the user name to the Web service group, for example TPWEBSERVICEUSER. Depot servers are not available during a software product publish operation: Symptoms When deploying a software product the depot servers are not available and the following error is thrown:
COPINF003E The software product C:/Program Files/IBM/tivoli/tpm/repository/filename with the ID id_number could not be published to the dynamic content delivery depot for the specified targets.
Causes If you have an active depot server set up correctly, probably the depot server port, whose default value is 2100, is not open between the Tivoli Provisioning Manager server and the depot server, and among all depot servers of the environment as well. Also, the port 2101 is used for peering. If peering is enabled, the port 2101 must be accessible on each system that acts as a peer. Resolving the problem If the systems of your environment are behind a firewall, modify the settings to allow the depot server port access from all systems for port 2100. Dynamic Content Delivery Management Center is not alive: Information regarding the message: Dynamic Content Delivery Management Center is not alive.
808
Symptoms You receive the following error message in the console.log every two minutes.
2010-02-24 13:09:33,778 ERROR [Status Updater] (CdsManagementCenter. java:89) cds.CdsManagementCenter: DCD Management Center is not alive. com.ibm.webahead.downloadgrid.exception.CDSException: CTGDEC003E Unable to authenticate user maxadmin. at com.ibm.tivoli.cds.administration.api.AdministrationServices. getRegio
Resolving the problem To disable all scalable distribution infrastructure component checks and to prevent dynamic content delivery error messages in $TIO_LOGS/console.log: 1. Click Go To > Administration > Provisioning > Provisioning Global Settings. 2. Click Variables. 3. Filter and search for SDI.Comp.Status.Check and change the value to false. 4. Stop and start the Tivoli Provisioning Manager WebSphere Application Server using: v $TIO_HOME/tools/tio.sh stop v $TIO_HOME/tools/tio.sh start
Windows 2008 Select the option Run as administrator for all the commands that you run from %TIO_HOME%\tools. For more information about user account control in Windows 2008, see User Account Control Step-by-Step Guide. 5. To disable the SOAP and Web services so that both cannot be used on the Tivoli Provisioning Manager server, edit TIO_HOME/lwi/conf/overrides/TPMconfig.properties and add start.tpm.soapservice=false. 6. Restart the WebSphere Application Server and Tivoli Provisioning Manager.
Reference
Reference information supports the tasks that you want to complete.
Procedure
1. Create a directory named keys in the TIO_HOME directory. 2. Copy the RSA private generated key to TIO_HOME/keys/RSA and rename the file to identity. 3. Copy the contents of the .pub file public key to $USER_HOME/.ssh/authorized_keys directory on the target computer. 4. Log in to Tivoli Provisioning Manager. 5. Click Go To > Deployment > Provisioning Computers. 6. Click the target computer for which you are configuring the RSA credentials. 7. Click the Credentials tab and click the SSH-Server SAP.
Chapter 7. Deploying software
809
8. In the RSA Credentials section, select the identity key from the Private Key list. Note: The RSA private key is an optional field. If you do not define it, you need to create a global variable for the default private key and the value that you specify for the global variable is used. The global variable must have the key name RSA credential default private key and the component must be Entire system. To create the global variable: a. b. c. d. e. f. g. Log on to the Tivoli Provisioning Manager web interface. Click Go To > Administration > Provisioning > Provisioning Global Settings. Click the Variables tab. Click New Row. In the Variable field, enter RSA credential default private key. From the Component list, select Entire system. In the Value field, enter the location of the default private key.
h. Click Save. Note: To set up a server and client service access point for the target computer and server, complete the following steps: a. Click Go To > Deployment > Provisioning Computers. b. Select the target computers for which you want to set up the service access point. c. From the Select Action menu, click Add Credentials > SSH and SCP. d. In the Add Credential Pair dialog, click the Create RSA Credential option. e. Specify a user name, private key and passphrase. f. Click OK. You have now configured RSA credentials and set up a server service access point for the target computer and a client service access point for the server.
810
Management center The dynamic content delivery management center, installed on the provisioning server, provides centralized control of the upload, replication, and download of files. It also monitors the state of depot servers and stores file data and download statistics. It performs the following functions: v Maintains a catalog of the files stored on each depot server and peer. v Stores the configuration parameters of each depot server. v Directs the replication of uploaded files. v Authorizes clients to download a file. v Generates and authenticates download plans. v Stores information such as file data, user data, region information, download statistics in the database. v Monitors the state of depot servers. v Communicates with the database. The dynamic content delivery management center maintains a record data set for the managed bulk data. The branch depot servers maintain a working data set which is a cache of the management data set. To enhance performance, the management elements implement a cache pre-fill strategy in which data is distributed to the branch elements, in advance of when it is needed on the target computers, at the branch office. Depot servers A depot server is a system that stores files for distribution. Files are uploaded to a depot server using a client or subagent. By default, uploaded files are stored in the data directory in the path in which the depot server is installed. Depot servers can replicate uploaded files to other depot servers to optimize the efficiency of network traffic. Target computers download the uploaded files and install them. v Each depot server is assigned to a region. Regions are used to group systems that are located near one another to optimize upload, replication, and download times. v You can minimize the impact of downloads on network traffic by configuring adaptive or static bandwidth control for a depot server: Adaptive bandwidth control enables the depot server to automatically increase or decrease its transfer rate depending on the level of network traffic. Static bandwidth control limits the transfer rate of the depot server to a specified number of kilobytes (KB) per second. v You can define the number of concurrent activities included in each activity plan when publishing software and patches. When you publish software products or patches to a depot, Provisioning Manager generates an activity plan. By default the activity plan contains five concurrent activities. If you want to change the number of concurrent activities, perform the following steps: 1. Click Go To > Administration > Provisioning > Provisioning Global Settings. 2. Click Variables. 3. Click New Row and add the following settings: Variable Type Publish software activity concurrency level Component Entire System Value Type the value of the property with the required number of concurrent activities. The default value is five. v You can designate a depot server as a preferred upload server. Preferred upload servers are selected before other depot servers to receive uploaded files. If no preferred upload server is available, another depot server is selected to receive the uploaded file.
Chapter 7. Deploying software
811
Consider the following points for the Preferred upload server setting: Design at least one depot server as the preferred upload server. Using the Preferred upload server option provides a way to promote a depot server's precedence to an initial upload server during the file publishing process. Setting up this option only impacts the choice of the initial upload server (or the first server selected to add the file to a depot server) in the dynamic content delivery system. From there, replication is performed in the background to send that file to other servers in the dynamic content delivery system, and with that, this option has no further value. To take advantage of this special designation, use valid criteria when selecting a preferred upload depot server, such as: - High availability. - Close proximity to the publishing point into the dynamic content delivery system. - High network bandwidth availability. - Large available disk space. - Good administrator monitoring of uptime and resources. Using these criteria ensures the quickest initial (first upload) publishing times with minimal failures. More depot servers can be designated as preferred upload servers. In this case, the publishing process allows for some load balancing during consecutive publishing operations, to make use of the greater number of resources. - As a general recommendation, you might want to designate about 10-20% of your depot servers as preferred, which can be scoped by region. For example, if you had ten depot servers in your region, you can have the two best servers (based on the criteria enumerated previously) designated as preferred upload depot servers. These two depot servers are selected with higher precedence of the eight other depot servers, and from some load balancing between them. - A preferred depot server can be selected as the initial upload server, which is not included in your publishing list (target list). This selection is only temporary, and the file is removed from that server when all depot servers have been replicated to. - It is not recommended that you overuse the Preferred upload server setting, or it will thin its value in the overall system. If every depot server is set up as preferred, no depot server can benefit with this precedence against another server. - Avoid setting depot servers in a branch office to preferred. In some scenarios, the Preferred upload server setting might conflict with the Minimize In And Out Traffic zone setting, if the depot server resides in that zone definition. In these cases, the Minimize In and Out Traffic setting will prevent files from being published to the preferred depot server. The Minimize In and Out Traffic setting is typically used to help define a branch office scenario, and thus has a rule that prevents publishing into those branches from outside that branch. Regions and zones Regions and zones provide a mechanism to map out the configuration of the network to provide the management center with the information needed to produce optimal plans when transferring data from one host to another. A region is a geographical grouping of systems (depot servers, peer servers, and clients). More than one region can be created to separate one group of systems from another group of systems. Systems within the same region are considered before other regions when distributing data. One or more regions can be created as needed. A minimum network configuration consists of at least one region and one depot server. A region consists of one or more zones. Systems within a zone are considered before systems within the same region when creating upload and download plans.
812
Depot servers are configured to regions, not zones. A depot server is manually mapped to a region upon its registration. Clients and peer servers are mapped to a region through zones. A depot server can belong to only one region, but a region can have more than one depot server. Zones can be defined as IP address ranges or a DNS domain. A depot server is mapped to a domain zone upon registration when specifying the domain served. The zones are used to determine the depots and peers that are nearby a target computer when the target needs to download a file. Unlike a DNS domain-defined zone, a zone that is defined as an IP address range can also be used to determine the best depots to publish to when performing dynamic publishing for a set of targets. The management center uses the configuration of regions and zones to select the best depot server for a client request, such as a request to download a file. Without regions and zones, clients connect to depot servers and other peers randomly. When a client is not assigned to any configured zone, it is considered unclassified. Unclassified clients connect to depot servers and peer servers, randomly, thus not utilizing the network efficiently. Configuring zones result in better use of the local area network thus reducing the wide area network usage. In a branch office scenario, you can create a region for depot servers in the branch office. Then you can upload a file to a depot server in the branch office and then replicate the file to other depot servers in the branch office region.
Downloading files
Files that have been uploaded to depot servers can be downloaded by target computers and installed. The file download using the distribution infrastructure includes the following processes: 1. An agent initiates the download of a file. 2. The client subagent requests a download plan from the management center. 3. The management center authenticates the requestor of the file and verifies that the requestor has permission to download the file. 4. The management center generates a download plan that includes a list of available depot servers and peers specified in the publishing requests or chosen by proximity to the client subagent and past performance. 5. The client subagent pulls the file from one or more depot servers or peers. If data is pulled from multiple systems, the client subagent pulls segments of the file from each system and then reassembles the data into a single file. 6. The client subagent computes a checksum to ensure the integrity of the downloaded file. 7. The client subagent returns the transfer rates of each depot server to the management center for use in the creation of future download plans. Note: The default time interval for a successful file distribution to targets is set to two hours. A file distribution that has not successfully completed within two hours can be considered failed. If required, you can customize this interval to accommodate the distribution of larger files to larger numbers of targets. For more information, see the Overriding the default distribution time interval on page 605 topic.
813
v v v v v
Authorizes clients to download a file. Generates and authenticates download plans. Stores information such as file data, user data, region information, download statistics in the database. Monitors the state of depot servers. Communicates with the database.
When you publish a new file, the management center authorizes the upload and replicates the file to depot servers or peers located around the network. When a client requests a file, the management center authenticates the requestor of the file and verifies that the requestor has permission to download the file. Next, the management center generates a download plan that includes a list of depot servers and peers from which the client can download the file. The management center selects these depot servers based publishing requests or on their location and past performance history. After the download completes, the client notifies the management center whether download was successful and the sends the file transfer rates achieved during downloads. The management center stores this data for use in creating future download plans. The following components comprise the management center: Download plan generator The component of the management center that generates download plans. Peer manager The component of the management center that keeps track of the files stored on each client. The download plan generator uses the peer manager to create the lists of peers included in a download plan. Monitoring agent The component of the management center that periodically checks the health of the depot servers. If problems occur, the monitoring agent can attempt to restart a depot server or send a warning e-mail to a system administrator. Distribution agent The component of the management center that controls the distribution of files to depot servers. When you publish a file, the distribution agent manages the replication of the file to the depot servers that you specify. When you delete a file, the distribution agent deletes the file from the specified depot server that stores the file. Trimming data from the dynamic content delivery management center database: Data about deleted files or old peer data can affect the performance of the dynamic content delivery management center database. To reduce the impact on the database performance, you need to periodically trim the historical and peering data. Removing data from the management center database cannot be undone. Back up your database before performing the data trimming operation. Trimming historical data: To trim the historical data, use the dynamic content delivery administration console to complete the following steps: Procedure 1. Click Settings > Trim Historical Data. 2. To automatically remove historical data in the background (run at regularly scheduled times as determined by the management center):
814
a. b. c. 3. To a.
Select the Automatically trim historical data in the background check box. Enter the number of Days of data to preserve. Click Update. manually remove historical data: Clear the Automatically trim historical data in the background check box.
b. Specify the cutoff date for the deletion operation in the Trim all database data before field. All records for files deleted before this date will be deleted. c. Click Trim Historical Data. Results The historical data is deleted from the management center database. Trimming peering data: To trim the old peer data, use the dynamic content delivery administration console to complete the following steps: Procedure 1. Select Settings > Trim Peer List. 2. Specify the cutoff date for the deletion operation. All records for peers that have not contacted the management center since this date will be deleted. 3. Click Trim Peer List. Results The old peer data is deleted from the management center database.
815
v After installing the agent, you can disable peering by running the CDS_Set_Parameter.wkf provisioning workflow, which will turn peering off and update the configuration template for the TCA-Subagent CDS Client URL Handler software installation accordingly. To disable peering in the configuration template, before installing the agent, you must set the value of the peering parameter in the TCA-Subagent CDS Client URL Handler Default Parameters template to false. The default value is true. When you install the agent, the peering will be turned off, based on your changes to the configuration template. To disable peering after installing the agent, you can run the CDS_Set_Parameter provisioning workflow, which requires two parameters, the DeviceID of the target computer, and the ParameterName whose value needs to be set to peering, and its value, ParameterValue, set to false. Similarly, you can modify other client parameters. The provisioning workflow runs successfully, disables peering, and updates the configuration template accordingly. The subagent will be restarted automatically during the parameter change. Enabling peering on a dual stack of IPv4 and IPv6 targets: Peering enables computer systems to share downloaded files with peer systems on the network. By default, peering is enabled when the agent is installed. If you have a dual stack of IPv4 and IPv6 targets, you can force the target computers to use IPv6. Perform the following steps: Procedure 1. Browse to and open the cdsclient.properties file. The file is located in tca install dir/runtime/agent/ subagents, where tca install dir varies depending on the operating system UNIX /opt/tivoli/ep Linux /opt/tivoli/ep AIX /usr/tivoli/ep
Windows c:\Program Files\tivoli\ep 2. Create a property named domain and specify the IP domain the system is in. 3. Replace the value of the user_ip parameter with an IPv6 IP. 4. Change the value of the initial_login_done parameter to false. 5. Restart the agent using the endpoint.[sh|bat] restart command. The command is located in the tca_install_dir/runtime/agent/bin directory. Results The targets computers now use the IPv6 protocol.
816
public key is used to encrypt information; the private key is used to decrypt it. The management center can connect to depot servers directly, without using proxies. The client subagents are authenticated with certificates obtained through the common agent services. The management center registers as resource manager as part of the common agent services infrastructure. The following default port numbers are used by the dynamic content delivery depot servers and client subagents:
Table 149. Default dynamic content delivery ports on target computers Ports 2100 Use Enables communication between: v The common agent and the dynamic content delivery depot servers. v dynamic content delivery depot servers. v The dynamic content delivery management center and the dynamic content delivery depot servers. 9010 or 9015 Enable communication between the common agent and the dynamic content delivery management center. Enable communication between thedynamic content delivery client subagent and the dynamic content delivery management center. Secure SSL Connection security Secure SSL
9045 or 9046
Secure SSL
Depot server Depot servers are systems that store files for distribution. Distribution files are uploaded to a depot server using a client. Uploaded files are stored in a directory that is specified when the depot server is installed. Depot servers can replicate uploaded files to other depot servers to optimize the efficiency of network traffic. Regions and zones provide a mechanism to map out the configuration of the network to provide the management center with the information needed to produce optimal plans when transferring data from one host to another. More than one region can be created to separate one group of systems from another group of systems. Systems within the same region are considered before other regions when distributing data. One or more regions can be created as needed. A minimum network configuration consists of at least one region and one depot server. A region consists of one or more zones. Systems within a zone are considered before systems within the same region when creating upload and download plans. Depot servers are configured to regions, not zones. A depot server is manually mapped to a region upon its registration. Clients and peer servers are mapped to a region using zones. A depot server is mapped to
817
a domain zone upon registration when specifying the domain served. A depot server is mapped to an IP range zone based on its IP address. A depot server can belong to only one region, but a region can have more than one depot server. Adding and removing regions: Regions are used to group depot servers that are located near one another to optimize upload, replication, and download times. A depot server is either manually mapped to a region before its registration or automatically mapped to a region after its registration. Clients and peer servers are mapped to a region by zones. A depot server can belong to only one region, but a region can have more than one depot server. Before you can add a depot server, the region it belongs to must be defined. For information about adding a new region, see Creating the infrastructure for scalable software distribution on page 572. After the region is added, you can perform the following actions with it: v To view more details for a region, find the region in the list and click its name. v To modify the name or description of a region, find it in the list and click Properties. There are options available to control access to zones and servers, for example: 1. Incoming-blocked : Prevent other zones accessing servers in this zone. 2. Outgoing-blocked: Prevent this zone from accessing servers in other zones. 3. Minimize-traffic: Prevents systems in other zones from using this zone for uploads and downloads. Removing regions: To be able to remove a region, you must first ensure that it has no depot servers assigned to it and no zones defined. If depot servers are assigned to it or zones are defined within the region you want to remove, you must remove the depot servers and the zones first and then remove the region. Adding zones: A zone can be used to define an IP range or a domain name within a region. Zones are used to group systems associated with a region. One or more zones can be created for each region. Regions can be generic, without a real network definition, or they can be specific, when zones are used to define domain names within the region. Before you begin When you create a zone, specify a region for the zone. New zones can only be added after a region has been defined. Zones can be defined as IP address ranges or a DNS domain. v An IP range defines a range of IP addresses, for example, 34.34.130.1 to 34.34.130.250. Systems having an IP address within this range are included in the zone. Unlike a DNS domain-defined zone, a zone that is defined as an IP address range can also be used to determine the best depots to publish to when performing dynamic publishing for a set of target computers. v A domain defines a group of host names, such as lab.example.com. Systems with a host name that includes this domain are included in the zone. A depot server is mapped to a domain zone upon registration when specifying the domain served. The zones are used to determine the depots and peers that are nearby a target computer when the target needs to download a file.
818
Tip: When DNS domain zones are used, it is important to define the Domain served field on depot servers, to ensure that the depots are included in the domain when files are dynamically published to them. For more information, see Adding depot servers. IP ranges or domains can be used to control distributions to certain systems or networks in your enterprise. For example, the domain lab.example.com can be specified to create a zone for all systems in the lab domain, or different IP ranges can be used to create one zone for systems on dial-up connections and another zone for systems with broadband connections. Zones enable you to optimize upload and download times. Using zones, you can group systems that are located near one another geographically or are linked across fast network connections. Without zones, clients connect to depot servers and other peers randomly. Adding depot servers: To be able to publish the software files that you want to distribute and install on target computers, you need to define the regions, zones, and depot servers that will be used in the software distribution process. Before you begin v New depot servers can only be added after a region has been defined. For more information, see the Adding and removing regions on page 818 topic. v Also, the server that will be configured as a depot server needs to be discovered first. Discovery adds the depot server to the data model. For more information see Regions, zones, and depot servers on page 817. v If you have enabled IPv6 addressing support for the scalable distribution infrastructure, the operating system on depots must be able to communicate appropriately with other computers in your environment. For example, if you have both IPv4 and IPv6 target computers, the depot can be configured to support both IPv4 and IPv6 addressing, or you can set up separate IPv6 and IPv4 depots to support communication with each type of IP addressing. If all communication with the depot will use IPv6 addressing, the depot can be configured to support IPv6 only. v Note that regardless of your language settings, Server Traffic statistics are displayed in the following format: 0.0. The new depot server with the specified properties is added and registered with the management center. It is also listed on the Depots Management page, and its displayed status is Active. For information about how to add a depot server, see Creating the infrastructure for scalable software distribution on page 572. You can perform the following actions with the depot server: v View more details for a depot server. v Modify depot server properties, designate the depot server as a preferred upload server, or install the depot agent services on the depot server. Preferred upload servers are selected before other depot servers to receive uploaded files. If no preferred upload server is available, another depot server is selected to receive the uploaded file. Preferred upload servers must be globally accessible, not blocked by a firewall from clients. If a preferred upload server is not included in the initial publishing of a file, a temporary preferred upload server is chosen by the Dynamic Content Delivery management center for the initial publishing. After all the replications are completed to the chosen depots, the file will be removed from this temporary preferred upload server. The criteria for a preferred upload server must include the following: High availability: Monitor the depot using the check status of a depot on the provisioning server. These depots must always be in an active status. Alternatively, you can use the Event Console in the Dynamic Content Delivery Admin Console. Proximity to the provisioning server or the management center. High network bandwidth availability.
Chapter 7. Deploying software
819
Large available disk space. You cannot have a preferred upload server in a zone with "Minimize traffic in and out of zone" set to enabled or incoming-blocked. A publish to this preferred upload server will fail. v Define the number of concurrent activities included in each activity plan when publishing software and patches. When you publish software products or patches to a depot, Provisioning Manager generates an activity plan. By default the activity plan contains five concurrent activities. If you want to change the number of concurrent activities, perform the following steps: 1. Click Go To > Administration > Provisioning > Provisioning Global Settings. 2. Click Variables. 3. Click New Row and add the following settings: Variable Type Publish software activity concurrency level Component Entire System Value Type the value of the property with the required number of concurrent activities. The default value is five. Tip: To view information about depot server status from the Start Center, expand the Depot status portlet. Accessing the Tivoli Provisioning Manager Dynamic Content Delivery administration console: You can start the Tivoli Provisioning Manager for Dynamic Content Delivery administration console from the Manage Depots page. The dynamic content delivery administration console provides read-only access to additional information about regions, zones, depot servers, and files. You can also view file transfer information, download plans used during the file distribution, and global configuration information. A number of reports are also available, which you can use to filter and display event details, obtain additional information about file downloads, an overview of the file traffic, or details about the file traffic per region or zone. The dynamic content delivery administration console can be accessed from the Manage Depots page. To access the functions of the administration console, use the menu on the left side of the screen. To display the context-sensitive Help, click the question mark button at the upper right corner of the Welcome page. Click Close on the left menu to close the window. Migrating published files after changing the data directory on a depot server: You can change the Data directory for a depot server. You can move the directory to a different path on the same partition, or to a different partition. If you perform this operation, also manually migrate all the files that have been published to that depot server to the new cache location, otherwise problems can occur when installing or distributing software. To manually migrate the published files to the new data directory: Procedure 1. Stop the common agent on the depot server. This operation stops the depot server and client subagents. 2. Click Go To > Administration > Provisioning > Dynamic Content Delivery Configuration. Tip: To perform this task from the Start Center, click Dynamic Content Delivery Configuration under Provisioning administration applications. 3. Click the Depots tab.
820
4. Change the data directory. 5. Create the directory in the dynamic content delivery cache location, if you have not already done so. For example, if the current directory is abc (C:\Program Files\Tivoli\ep\runtime\agent\subagents\ cds\depot\abc), create a xyz directory (C:\Program Files\Tivoli\ep\runtime\agent\subagents\cds\ depot\xyz). Note: The subdirectory /files/1 are created automatically inside the new xyz directory. 6. Copy or move all the directories and files under abc to xyz. 7. Start the common agent on the depot server. This operation starts the depot server and client subagents and adds the files to the new location. Important: If the common agent is not started on the target computer, the newly published files are not added to the new location. If you change the publish file location and then try to publish the file, you might get either of the following error messages:
COPDEX040E: An unexpected deployment engine exception occurred COPINF002E: Failed to publish file: C:/Program Files/IBM/ tivoli/tpm/repository/<file name>with id 5979 to CDS depot servers. CTGDEC030E: The management center was unable to find potential depot servers to upload the file. The file,<file name>, could not be uploaded. Make sure that there is at least one active depot server available,that it has enough space to store the file, and that it is not in an unreachable or restricted zone.
To resolve these errors, restart the common agent. Results You have finished migrating the files published to the depot server to the new cache location. Removing depot servers: You can remove a depot server when it is no longer needed. Also remove depot servers before uninstalling Tivoli Provisioning Manager. When the depot server is deleted, it is also unregistered from the management center. The agent is not removed from the depot server. When deleting the depot server, also uninstall the depot stack. Removing depot stacks: To remove a depot stack, you can use the procedure you use to uninstall any agent. However, you can also remove a depot stack as follows: Procedure 1. Click Go To > Administration > Provisioning > Dynamic Content Delivery Configuration. 2. On the Depots tab, select the Mark row for delete icon. 3. Click Go To > IT Infrastructure > Software Catalog > Software Stacks. 4. In the Select Action menu, click Uninstall. 5. Select the target and submit the task. Automation package for management of large numbers of regions, zones, and depot servers:
821
You can create, update, and delete large numbers of zones, regions, and depot servers using provisioning workflows and scripts. The provisioning workflows and scripts provided with the DcdAdmin.tcdriver automation package refer to an .xml file that conforms with the dcdAdmin.dtd file, in which specific settings can be defined for the zones, regions, and depot servers that are used for the large-scale software distribution tasks. An extension to the automation package includes the ability to define isolated zones or exception depots, or configure depot access rules that can be used with specific attributes for the isolated zones. The elements defined in the dtd file cannot be imported using xmlimport. Instead, provisioning workflows are provided to create, update, and delete zones, regions, and depot servers. A sample xml file, dcdAdminSample.xml, which you can customize according to your needs, is provided in the following directory. v v
Windows UNIX
%TIO_HOME%\tools\DcdAdmin $TIO_HOME/tools/DcdAdmin
The DcdAdmin automation package provides a number of provisioning workflows and scripts. v The provisioning workflow file names start with DCD_*.wkf. The command line interface can be used to invoke any of the provisioning workflows. v The scripts are located in the following directory.
Windows UNIX
%TIO_HOME%\tools\DcdAdmin $TIO_HOME/tools/DcdAdmin
Additional details about using the DcdAdmin automation package are available in the automation package documentation. To view the documentation: 1. Click Go To > Administration > Provisioning > Device Drivers. 2. In the list of device drivers, click DCDAdmin. 3. Click the Documentation link.
822
treated as any other frequently disconnected pervasive devices. The device manager federator provides a capability for submitting jobs and collecting results from the intermittently connected device manager federated agents. Currently, a two-tiered federated environment is supported, including the following elements: Device manager federator The device manager federator, installed on the provisioning server at the enterprise, is configured to act as a federated server. The federator implements a job distribution policy that delivers incoming jobs to all of the regional federated agents that are configured to communicate with it. Currently, a two-tiered federated environment is supported. Device manager federated agents Device manager federated agents are installed as device manager servers at the branch and are configured to communicate with the federator periodically to get jobs and to distribute them to the set of currently known clients installed on the target computers in the branch. The agents determine whether there is a federator job available to be distributed to the clients, and work in conjunction with a federator plug-in to run the job. When a job is run, a JDS_Command provisioning task, in XML format, is created on the agent, and targeted to all of the clients that are known to that agent. Device manager subagents Clients are installed as device manager subagents on the managed systems or targets at the branch, and are used for receiving command jobs from and returning results to the federated agents. Command jobs are automatically propagated out to the clients at the branch offices and the results gathered are returned to the device manager federator, which in turn returns them to the provisioning server.
823
The subagents are authenticated with certificates obtained through the common agent services. All device manager servers and lightweight device manager servers in the branch office and the enterprise must register as resource managers as part of the common agent services infrastructure. When registered, these servers will keep up-to-date with respect to SSL certificate management for secure communications with the managed clients. If subagents are not authorized, either they will not have certificates or their certificates will be on the certificate revocation list. The following default port number is used by the device manager federated agents and subagents:
Table 150. Default device manager service ports on target computers Ports 9046 Use Enables communication between the device manager subagent and the device manager federated agent. Connection security Secure SSL
Job processing
The device manager federator provides the "federation" capability for submitting jobs and collecting results from the intermittently connected device manager federated agents. The job instructions are typically series of encapsulated Job Execution Service (JES) commands in XML format and are stored as a job parameter in the device manager JDS_COMMAND job. The device manager federator and federated agents do not parse the job instructions or results. Their role is to just pass the job instructions through the device manager servers to the device manager subagents and collect the results: v The device manager federated agents periodically contact the device manager federator to see if there are any jobs waiting in the job queue. If JDS_COMMAND jobs are awaiting, they are automatically propagated to the federated agents. v The device manager subagents intermittently or periodically connect with the federated agents to see if there are any jobs waiting in the job queue, obtain the jobs, process them, and send the job results back to the federated agents. v From the federated agents, the job results are then returned to the federator, where they are finally retrieved by the provisioning server. Subagents periodically connecting to the federated agent: Often, the job processing occurs between the federated agent and the subagent on the target computer, but the federated agent does not have network connectivity with the federator. Every time a federated agent connects to the federator, the federator sends a request to gather job results. That request has a job priority of 2 so it typically runs first, but jobs with a priority of 1 can be created to run before the job results are gathered. All operations to device manager subagents through the JDS_COMMAND flow only through Job Execution Service (JES) and common agent services interfaces. All interfaces to other subagent components are made available through common agent services. Real-time control or queued control are possible through common agent services interfaces. To ensure against rerunning jobs from the beginning, the tpmOSGi agent on the federator and the Job Execution Service agent support checkpoint and restart during job processing. So, if a subagent disconnects from the federated agent or is restarted, the job resumes at the last checkpoint to avoid processing the job from the beginning. Sending job results: The federated agent keeps track of which records are sent so no duplicate records are sent and if there is a loss of connectivity or an error, records can be resent without duplication. When there are multiple federated agents at a branch office, the job results are tracked so that the same job results are not sent by more than one federated agent. When the federated agent receives a confirmation
824
that the federator received and successfully processed the job results, it deletes the branch job history records in the range for the matching host name. This removes all records that were successfully sent to the federator. If there is an error while storing the job results in the database on the provisioning server, an error message is returned to the federated agent. If the federator or the federated agent is powered off before the processing of the job results is completed, those job results are resent the next time the federated agent connects to the federator. When the job results threshold is reached on the federator, an HTTP post is sent to the provisioning server informing that job results are ready for gathering. If the provisioning server is busy, the results can be gathered from the federator at the next periodic poll from the provisioning server. Overriding the default job expiry interval: Each job has an expiry interval. By default, jobs submitted to the device manager service are set to expire after 336 hours (two weeks). This expiry interval starts at the task submission time. For example, a target computer that requires more than two weeks to ask for a new job, does not receive the job from the device manager service, because the job would have expired by then. If necessary, you can override the default job expiry interval by defining a DMS.Job.Window.In.Hours global variable and setting up its value to whatever you want the new job expiry interval to be.
825
826
827
Oracle Version 10g v Windows Antivirus, Windows Power-On Password, and Windows User Password security checks. When recommendations related to these types of issue have been approved, they can be run immediately or scheduled to run at a convenient time. When you run or schedule an approved recommendation, a workflow is created to resolve the noncompliance issue. For example, if software that must not be present was detected, an uninstallation activity is created. Automation packages are available in the IBM Integrated Service Management Library for some of the noncompliance issues that are not supported by Tivoli Provisioning Manager workflows. You can also create your own automation packages for performing user-defined security compliance checks and remediation.
Compliance basics
Find out more about the compliance process, the key terms for compliance, who are the users that perform compliance checks, and what are the requirements that you need to verify before managing compliance. Review the troubleshooting information and the log files names and location for this feature and also additional resources that help you complete your Compliance Management tasks. After you have discovered resources, you can examine the software and security setup you have on them, and then compare that setup to your required setup in order to determine if they match. If they do not match, noncompliance occurs, and recommendations on how to fix the noncompliance issues are generated. v v v v Process User roles on page 831 Requirements on page 831 Key terms on page 832
v Troubleshooting on page 832 v Log files on page 832 v Resources on page 833
Process
The following diagram depicts a typical compliance process to determine whether the installed software, configuration, and security in your enterprise matches your required setup. If systems are noncompliant, Tivoli Provisioning Manager can make recommendations to fix them.
828
Discover computers
Verify compliance
Legend Provisioning Administrator Provisioning Configuration Librarian Compliance Analyst Deployment Specialist
The compliance process includes the following tasks: 1. Discover computers The data model must include information about all the computers for which you want to check compliance. Information is added to the data model by running a computer discovery. Ensure that this is done when the system is first set up and when any new computers are added to the environment. 2. Install the Tivoli Common Agent The Tivoli Common Agent stack is required to perform security compliance checks and remediation actions. It can be installed on all discovered computers during the computer discovery if you define the discovery using discovery wizards 3. Discover software configurations If you are using Tivoli Application Dependency Discovery Manager, you can use the software configuration information it collects to perform software configuration compliance checks. To do this, a TADDM discovery must be run to import the up-to-date information collected by Tivoli Application Dependency Discovery Manager into the data model. 4. Create provisioning groups Compliance checking can be defined for groups of computers and for individual computers. If the same set of compliance checks apply to several computers, define a provisioning group to include the computers with the same compliance requirements. 5. Create software configuration templates Software configuration templates represent the required configuration settings for an application. A template is created by copying the application configuration from a computer where the application
829
is known to have the correct settings. The computer must be monitored by Tivoli Application Dependency Discovery Manager and its configuration must have been imported to the data model using a configuration change discovery. 6. Create compliance checks Compliance checks define the compliant state of the computer or group of computers to which they apply. A set of compliance checks can include the following: v Security requirements, for example password rules and firewall requirements. v Required software and patches v Prohibited software v Requirement to install one software product from a group. v Required software configuration. 7. Run compliance checks Compliance checks can be run immediately or scheduled to run at a convenient time. If the schedule option is used, the checks can be scheduled to repeat at regular intervals. Compliance checking can include a scan of the target computers, to ensure that the information against which the checks are made is completely up-to-date. Depending on the types of compliance checks requested, a series of discoveries are performed to collect all the relevant information. If scans are required, the task must be performed the provisioning configuration librarian. If you already have regular discoveries scheduled, you can choose to perform the compliance checking without a scan. The compliance analyst can perform the checks without the scan. 8. Review and approve recommendations When the compliance checking process detects a noncompliance situation, it generates a recommendation that identifies the action required. Recommendations must be approved before any automated action can be taken to resolve the noncompliance issue. It is possible to set up compliance checks so that they are automatically given a status of "Approved". 9. Perform recommended actions Tivoli Provisioning Manager provides workflows to automate the following actions required to resolve the following noncompliance issues: v Installation of software and patches v Uninstallation of software and patches, provided that they were installed using Tivoli Provisioning Manager v Reconfiguration of: IBM DB2 Universal Database Enterprise Edition Version 8 IBM WebSphere Application Server Version 6 IBM HTTP Server Version 2.0 Oracle Version 10g v Application of Windows Antivirus, Windows screen saver, and Windows user password security rules. Automation packages can be created to resolve other issues. 10. Verify compliance When actions have been taken to apply approved recommendations, the compliance checks can be rerun to ensure that all recommended actions have been successful. If a repeating schedule has been created, the success of the actions taken is automatically checked next time the compliance checks are scheduled to run. Note: Using Tivoli Provisioning Manager to run compliance checks and perform compliance remediation for the computer where Tivoli Provisioning Manager is installed is not supported.
830
User roles
You must be assigned to the appropriate user role to manage compliance.
Table 151. User roles Role Provisioning Administrator Description of role v Discover and group target computers. v Set up servers and infrastructure, including the installation of the Tivoli Common Agent on targets. Compliance Analyst Skills v A detailed knowledge of the provisioning environment. v Knowledge of the target operating systems. v Knowledge of Internet technologies. v Detailed knowledge of the security policies in force in the organization. v Regularly updated knowledge of security issues.
v Defines and runs the compliance checks required for computers or groups of computers. v Evaluates the recommendations produced when non-compliance issues are identified. v Reviews and approves recommended remedial actions.
Deployment Specialist
v Performs and monitors the progress of any remedial actions. v Discover and group target computers. v Define software definitions to enable automation of remedial actions.
v Understanding of the software distribution process using the scalable distribution infrastructure. v A detailed knowledge of the software and hardware inventory v Knowledge of the target operating systems.
Requirements
User roles and requirements on page 835 Target computer requirements: Requirements for Windows target computers on page 556 Requirements for Red Hat Linux target computers on page 560 Requirements for SUSE Linux Enterprise Server (SLES) target computers on page 561 Requirements for AIX target computers on page 562 Requirements for Solaris Operating Environment target computers on page 563 Requirements for HP-UX target computers on page 565 v Software prerequisites on page 837
831
Key terms
compliance A state of being in accordance with established software and security specification on target computers, or the process of becoming so. recommendation When noncompliance occurs, recommendations are generated to suggest how to fix the noncompliance issues. remediation The task required to return a resource back to a specific state. Remediation can be policy driven (automated) or a manual effort based on audit reports or notification of a change.
Troubleshooting
v Troubleshooting compliance on page 858 v Log files for troubleshooting compliance v Compliance problems and limitations on page 864 v COPDSE messages v Support information about compliance v Contacting Support
Log files
Follow the steps below and review the indicated log files to recover from compliance problems: Web interface errors If you encounter Compliance Management errors in the web interface, check the following log for details: v v
Windows UNIX
%TIO_LOGS%\j2ee\console.log
Linux
$TIO_LOGS/j2ee/console.log
Compliance and remediation processing errors If you encounter compliance and remediation processing errors, check the following log for details: v v
Windows UNIX
%TIO_LOGS%\console.log
Linux
$TIO_LOGS/console.log
The subagent and collector output XML files can be used for troubleshooting compliance-related problems. In o 1. Enable tracing for the common agent, as described in Setting log levels for Tivoli Common Agent 2. Run the inventory scan.
832
Resources
To learn more about compliance, see one of the following resources: v Tutorial: Managing compliance on page 844 v Example: Defining a multiple-rule security compliance check on page 854 v Example: Restricting software on page 855 v Example: User-defined compliance checks on page 856 v Compliance checks export and import tools on page 839 v For a description of a field in the Tivoli Provisioning Manager console, press Alt+F1.
Related links Chapter 8, Checking compliance, on page 827 Requirements on page 835 Tutorial: Managing compliance on page 844
Compliance process
It is important to understand the overall compliance process before you start managing compliance with Tivoli Provisioning Manager. The following diagram depicts a typical compliance process to determine whether the installed software, software configuration and security in your enterprise matches your required set up. If systems are noncompliant, Tivoli Provisioning Manager can make recommendations to fix them.
Discover computers
Verify compliance
Legend Provisioning Administrator Provisioning Configuration Librarian Compliance Analyst Deployment Specialist
833
1. Discover computers The data model must include information about all the computers for which you want to check compliance. Information is added to the data model by running a computer discovery. Ensure that this is done when the system is first set up and when any new computers are added to the environment. 2. Install the Tivoli Common Agent The Tivoli Common Agent stack is required to perform security compliance checks and remediation actions. It can be installed on all discovered computers during the computer discovery if you define the discovery using discovery wizards 3. Discover software configurations If you are using Tivoli Application Dependency Discovery Manager, you can use the software configuration information it collects to perform software configuration compliance checks. To do this, a TADDM discovery must be run to import the up-to-date information collected by Tivoli Application Dependency Discovery Manager into the data model. 4. Create provisioning groups Compliance checking can be defined for groups of computers and for individual computers. If the same set of compliance checks apply to several computers, define a provisioning group to include the computers with the same compliance requirements. 5. Create software configuration templates Software configuration templates represent the required configuration settings for an application. A template is created by copying the application configuration from a computer where the application is known to have the correct settings. The computer must be monitored by Tivoli Application Dependency Discovery Manager and its configuration must have been imported to the data model using a configuration change discovery. 6. Create compliance checks Compliance checks define the compliant state of the computer or group of computers to which they apply. A set of compliance checks can include the following: v Security requirements, for example password rules and firewall requirements. v v v v Required software and patches Prohibited software Requirement to install one software product from a group. Required software configuration.
7. Run compliance checks Compliance checks can be run immediately or scheduled to run at a convenient time. If the schedule option is used, the checks can be scheduled to repeat at regular intervals. Compliance checking can include a scan of the target computers, to ensure that the information against which the checks are made is completely up-to-date. Depending on the types of compliance checks requested, a series of discoveries are performed to collect all the relevant information. If scans are required, the task must be performed the provisioning configuration librarian. If you already have regular discoveries scheduled, you can choose to perform the compliance checking without a scan. The compliance analyst can perform the checks without the scan. 8. Review and approve recommendations When the compliance checking process detects a noncompliance situation, it generates a recommendation that identifies the action required. Recommendations must be approved before any automated action can be taken to resolve the noncompliance issue. It is possible to set up compliance checks so that they are automatically given a status of "Approved". 9. Perform recommended actions Tivoli Provisioning Manager provides workflows to automate the following actions required to resolve the following noncompliance issues:
834
v Installation of software and patches v Uninstallation of software and patches, provided that they were installed using Tivoli Provisioning Manager v Reconfiguration of: IBM DB2 Universal Database Enterprise Edition Version 8 IBM WebSphere Application Server Version 6 IBM HTTP Server Version 2.0 Oracle Version 10g v Application of Windows Antivirus, Windows screen saver, and Windows user password security rules. Automation packages can be created to resolve other issues. 10. Verify compliance When actions have been taken to apply approved recommendations, the compliance checks can be rerun to ensure that all recommended actions have been successful. If a repeating schedule has been created, the success of the actions taken is automatically checked next time the compliance checks are scheduled to run. Note: Using Tivoli Provisioning Manager to run compliance checks and perform compliance remediation for the computer where Tivoli Provisioning Manager is installed is not supported.
Requirements
Before you start working with compliance, ensure that you meet all requirements.
v Defines and runs the compliance checks required for computers or groups of computers. v Evaluates the recommendations produced when non-compliance issues are identified. v Reviews and approves recommended remedial actions.
Deployment Specialist
v Understanding of the software distribution process using the scalable distribution infrastructure.
835
Table 152. User roles (continued) Role Provisioning Configuration Librarian Description of role v Discover and group target computers. v Define software definitions to enable automation of remedial actions. Skills v A detailed knowledge of the software and hardware inventory v Knowledge of the target operating systems.
Defining the Service Access Point for computers discovered from TADDM
Ensure that you define the Service Access Point (SAP) for computers which have been detected using a TADDM discovery before running any recommendations on them. When a computer is discovered into the data model from TADDM, you need to create a SAP for a root or administrator user ID, before running any recommendations on this computer. To manually add the service access point to the computer, perform the following steps:
Procedure
1. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Computers. 2. Identify and click the computer for which you want to add a SAP. 3. Click the Credentials tab. 4. Click Add Credentials > New Service Access Point. 5. Add the user name root or administrator. 6. Set a password for the root or administrator user ID. 7. In the Workflows tab, assign the appropriate workflows to the SAP. 8. Specify the Protocol Type and Application Protocol parameters. 9. Assign the created SAP to the Command execution and File Transfer sections. 10. Click Save .
What to do next
Now that you have manually added the service access point to the computers imported from TADDM, you can run any recommendations on them.
836
Procedure
Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Computers. Identify and click the computer on which Oracle was detected. Click Software tab. Locate the software installation of Oracle and click to see its Details page in the Software Resources application. 5. Expand the Software Resources tree and select Oracle to find the parameter named oracle_sys_password in the Template Parameters table. 6. Change its value to match the Oracle administrator password. 1. 2. 3. 4. 7. Click Save .
Procedure
1. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Computers. 2. Identify and click the computer on which WebSphere Application Server was detected. 3. Click Software tab. 4. Locate the software installation of WebSphere Application Server and click to see its Details page in the Software Resources application. 5. Expand the Software Resources tree and select WebSphere Application Server to find the parameters named wsadmin.username and wsadmin.password in the Template Parameters table. 6. Change their values to match the WebSphere Application Server administrator user id and password. 7. Click Save .
Software prerequisites
Ensure that the computers on which you want to manage compliance meet the software prerequisites. The following topic provides information about software prerequisites. Note: A depot is required if you want to run security compliance checks or if you want to run software remediation in a scalable distribution infrastructure. To use software configuration compliance management, you must have Tivoli Application Dependency Discovery Manager (TADDM) installed in your environment. The computers for which you want to monitor software configurations must have been discovered by TADDM and the resulting information replicated to the data model by running a TADDM discovery. The Tivoli Common Agent is required for security compliance management. For other types of compliance the common agent is only required if you are using the scalable distribution infrastructure.
Chapter 8. Checking compliance
837
Information about requirements for installing the Tivoli Common Agent is available at the following locations: v Requirements for Windows target computers on page 556 v Requirements for Red Hat Linux target computers on page 560 v Requirements for SUSE Linux Enterprise Server (SLES) target computers on page 561 v Requirements for AIX target computers on page 562 v Requirements for Solaris Operating Environment target computers on page 563 v Requirements for HP-UX target computers on page 565
v Microsoft Windows Server 2008 R2 Datacenter Edition (x86 64-bit) any SP v Microsoft Windows Server 2008 Standard Edition (x86 64-bit) any SP v Microsoft Windows Server 2008 Standard Edition (x86 32-bit) any SP v v v v v Microsoft Microsoft Microsoft Microsoft Microsoft Windows Windows Windows Windows Windows Server 2008 Enterprise Edition (x86 64-bit) any SP Server 2008 Enterprise Edition (x86 32-bit) any SP HPC (High Performance Computing) Server 2008 R2 7 Professional (x86 32-bit/ 64-bit) any SP 7 Enterprise (x86 64-bit) any SP
v Microsoft Windows 7 Enterprise (x86 32-bit) any SP v Windows Vista Ultimate Edition (x86 64-bit) any SP v v v v v Windows Windows Windows Microsoft Microsoft Vista Ultimate Edition (x86 32-bit) any SP Vista Enterprise Edition (x86 64-bit) Vista Enterprise Edition (x86 32-bit) Windows Server 2003 Standard Edition (AMD 64-bit) any SP Windows Server 2003 Enterprise Edition (AMD 64-bit) any SP
v Microsoft Windows Server 2003 Standard Edition (x86 64-bit) any SP v Microsoft Windows Server 2003 Enterprise Edition (x86 64-bit) any SP v v v v Microsoft Microsoft Microsoft Microsoft
AIX
Server 2003 Standard Edition (x86 32-bit) any SP Server 2003 Enterprise Edition (x86 32-bit) any SP XP Professional (64-bit) any SP XP Professional (32-bit) any SP
You can manage compliance for the following AIX operating systems and versions: 7.1 6.1 6.1 5.3 5.3 5.2 any TL (IBM System p 64-bit) any TL (IBM System p 64-bit) any TL (IBM System i 64-bit) any TL (IBM System p 32bit/64bit) ML 3 or above (IBM System i 32bit/64bit) ML 7 or above (IBM System p 64-bit) 32-bit emulation You can manage compliance for the following Solaris operating systems and versions:
v v v v v v
838
v v v v
v v v v v v v v v v
Red Red Red Red Red Red Red Red Red Red
You can manage compliance for the following Red Hat Linux operating systems and versions: Hat Enterprise Linux 6 Server Advanced Platform (x86 32-bit) Hat Enterprise Linux 6 Server Advanced Platform (x86 64-bit) Hat Enterprise Linux 6 Server Advanced Platform (IBM System z 64-bit) Hat Enterprise Linux 5 Server Advanced Platform (x86 32-bit) Hat Hat Hat Hat Hat Hat Enterprise Enterprise Enterprise Enterprise Enterprise Enterprise Linux Linux Linux Linux Linux Linux 5 Server Advanced Platform (x86 64-bit) 5 Server Advanced Platform (IBM System z 64-bit) 4 AS/ES (x86 32-bit) 4 AS/ES (x86 64-bit) 4 AS/ES (IBM System i 32-bit/64-bit) 4 AS/ES (IBM System p 32-bit/64-bit)
v Red Hat Enterprise Linux 4 AS/ES (AMD 64-bit) You can manage compliance for the following SUSE Linux operating systems and versions: v SUSE Linux Enterprise Server Enterprise Server 11 (x86 32-bit) v SUSE Linux Enterprise Server Enterprise Server 11 (x86 64-bit)
SUSE
v SUSE Linux Enterprise Server Enterprise Server 10 (x86 32-bit) v SUSE Linux Enterprise Server Enterprise Server 10 (x86 64-bit) v SUSE Linux Enterprise Server Enterprise Server 10 (IBM System z 64-bit) v v v v v SUSE SUSE SUSE SUSE SUSE
HP UX
9 9 9 9 9
(x86 32-bit) (x86 64-bit) (IBM System i 32-bit/64bit) (IBM System p 32-bit/64bit) (IBM System z 64-bit)
You can manage compliance for the following HP-UX operating systems and versions: v HP-UX 11i v1 (PA-RISC) v HP-UX 11i v2 (PA-RISC) v HP-UX 11i v2 (Itanium) v HP-UX 11i v3 (PA-RISC) v HP-UX 11i v3 (Itanium)
839
You have two options to import and export compliance checks, either using the new ccimport and ccexport commands or using the xmlimport and dcmexport commands, which have been extended to manage also compliance checks. With these tools you can easily move compliance checks between servers, for example from a test or development system into a production environment. The following table shows the differences between the ccimport/ccexport commands and the xmlimport/dcmexport commands:
Table 153. Export and import commands Command dcmexport ccexport xmlimport ccimport Description Exports all data model objects from the data model to a specified XML file, including the compliance checks. Exports only the compliance checks from the data model to a specified XML file. Imports all data model objects specified in an XML file into the data model, including the compliance checks. Imports only the compliance checks specified in an XML file into the data model.
Note: You cannot mix the usage of these two different set of commands. You can either use the set of tools dcmexport and xmlimport, or ccexport and ccimport, depending on the types of object that you want to export and import. Even if it is strongly recommended that you use one single set of tools, if you have the output of a dcmexport command and you cannot run a ccexport command, you can copy and paste the compliance check sections into a dummy ccexport output XML file, and then run the ccimport command, because the DTD format is the same in both cases.
840
Note: It is recommended that you specify the absolute path for the output file. If you specify only the file name, as in this example, the output file is created in the TIO_HOME/lwi/runtime/core directory. For details about the contents and syntax of the files used by the command, see ccexport command.
Results
An XML output file, named myCompChecksOutput.xml, is created. The file includes all compliance checks for the selected targets. On the command line, a message is displayed and indicates that the command ran successfully.
To export from the data model all the current compliance checks, perform these steps: 1. Log on as Tivoli Provisioning Administrator, for example as tioadmin, to the system where the Tivoli Provisioning Manager server is installed. 2. Move to the %TIO_HOME%\tools directory on Windows platforms or to the $TIO_HOME/tools directory on UNIX platforms. 3. Run the command:
ccexport -f myCompChecksOutput.xml
Note: It is recommended that you specify the absolute path for the output file. For details about the contents and syntax of the files used by the command, see ccexport command.
Results
An XML output file, named myCompChecksOutput.xml, is created. The file includes all the compliance checks stored in the data model. On the command line, a message is displayed and indicates that the command ran successfully.
841
Windows 2008 Select the option Run as administrator for all the commands that you run from %TIO_HOME%\tools. For more information about user account control in Windows 2008, see User Account Control Step-by-Step Guide.
Procedure
1. Log on as Tivoli Provisioning Administrator, for example as tioadmin, to the system where the Tivoli Provisioning Manager server is installed. 2. Move to the %TIO_HOME%\tools directory on Windows platforms or to the $TIO_HOME/tools directory on UNIX platforms. 3. Export the compliance checks for selected computers or groups by running the command:
ccexport -f myCompChecksOutput.xml -c compList.txt -g groupList.txt
Note: If you do not specify the absolute path for the three file names used by the command, you must manually copy these files into the $TIO_HOME/tools directory. For details about the contents and syntax of the files used by the command, see ccexport command. After the ccexport command is successfully performed, the output file myCompChecksOutput.xml is created. 4. Copy the XML output file onto the Tivoli Provisioning Manager server on which the compliance checks must be imported. 5. Import the compliance checks to the Tivoli Provisioning Manager server by running the command:
ccimport -f myCompChecksOutput.xml
Note: If you do not specify the absolute path for the file name used by the command, you must manually copy the file into the $TIO_HOME/tools directory. For details about the contents and syntax of the files used by the command, see ccimport command.
Results
All compliance checks defined in the XML file are imported into the Tivoli Provisioning Manager server. The selected computers and groups in the Tivoli Provisioning Manager server are correlated correctly when importing the checks defined in the XML file. On the command line, a message is displayed and indicates that the command ran successfully. If a computer or a group specified in the XML file does not exist on the Tivoli Provisioning Manager server, on which you run the command, an error message is displayed and the command stops. If a computer or a group specified in the XML file has already been assigned a compliance check, which the XML file assigns to it, an error message is displayed, and the ccimport command proceeds with the next compliance check to be imported.
842
2. Move to the %TIO_HOME%\tools directory on Windows platforms or to the $TIO_HOME/tools directory on UNIX platforms. 3. Import all the compliance checks defined in the XML file, without specifying any target computers or groups, by running the command:
ccimport -f myCompChecksOutput.xml
Note: If you do not specify the absolute path for the file name used by the command, you must manually copy the file into the $TIO_HOME/tools directory. Select the option Run as administrator for all the commands that you run from %TIO_HOME%\tools. For more information about user account control in Windows 2008, see User Account Control Step-by-Step Guide.
Windows 2008
Results
All compliance checks defined in the XML file are imported into the Tivoli Provisioning Manager server. On the command line, a message is displayed and indicates that the command ran successfully. If a computer or a group specified in the XML file does not exist on the Tivoli Provisioning Manager server, on which you run the command, an error message is displayed and the command stops. If a computer or a group specified in the XML file has already been assigned a compliance check, which the XML file assigns to it, an error message is displayed, and the ccimport command proceeds with the next compliance check to be imported.
To import a list of compliance checks that you already defined for one target computer into another computer, perform these steps: 1. Log on as Tivoli Provisioning Administrator, for example as tioadmin, to the system where the Tivoli Provisioning Manager server is installed. 2. Move to the %TIO_HOME%\tools directory on Windows platforms or to the $TIO_HOME/tools directory on UNIX platforms. 3. Export the compliance checks defined for computer A into an output XML file by running the command:
ccexport -f myCompChecksOutput.xml -c compList.txt
Note: Specify the absolute path for the file names used by the command. Otherwise you must manually copy the files into the $TIO_HOME/tools directory. For details about the contents and syntax of the files used by the command, see ccexport command.
Chapter 8. Checking compliance
843
4. Import the compliance checks defined for computer A to computer B by running the command:
ccimport -f myCompChecksOutput.xml -p importCfg.properties
Note: All compliance checks contained in the XML file are processed to be imported. If the XML file contains also compliance checks for computers different from computer A, also these compliance checks are imported on the Tivoli Provisioning Manager server. Note: Specify the absolute path for the file names used by the command. Otherwise you must manually copy the files into the $TIO_HOME/tools directory. For details about the contents and syntax of the files used by the command, see ccimport command.
Results
On the Tivoli Provisioning Manager Web interface, the compliance checks are displayed also for computer B. If a computer or a group specified in the XML file does not exist on the Tivoli Provisioning Manager server, on which you run the command, an error message is displayed and the command stops. If a computer or a group specified in the XML file has already been assigned a compliance check, which the XML file assigns to it, an error message is displayed, and the ccimport command proceeds with the next compliance check to be imported.
Learning objectives
In this tutorial you will learn how to: v Create security compliance checks. v Add compliance checks to a provisioning group. v Create software compliance checks. v Create a software configuration template
844
v v v v
Create software configuration compliance checks Schedule compliance checks. Review compliance recommendations. Run remediations for noncompliance issues.
Prerequisites
Before you start, the following tasks must have been done: v Creation of the provisioning groups required in this scenario: A group to which the Windows security compliance checks are associated. As this set of compliance checks is being used as a model for creating sets of compliance checks for other groups, this provisioning group can be empty. A group that includes the computers that are to be subject to the same security, software, and software configuration checks. v A hardware discovery to ensure that the computers for which you want to check compliance are included in the data model . v A TADDM discovery to store details about software configurations, collected by Tivoli Application Dependency Discovery Manager, in the data model. Configuration information must be collected for all computers in the group for which the compliance checks are to be defined and for the computer that is to be used to create the software configuration template for the DB2 Enterprise Server Edition. v Installation of the Tivoli Common Agent stack on the computers for which you want to check compliance.
845
To complete this task you must be logged on as a user with compliance analyst access. To create a set of security compliance checks: 1. 2. 3. 4. In the Start Center, click Provisioning Groups. Select the group that you created for the Windows security checks, and click the Compliance tab. Click New Compliance Check and select Security Check. The Add Security Check panel opens. Select the following security checks: v Windows Antivirus v Windows Power-on Password v Windows Screen Saver v Windows User Password
Note: Before setting the Windows Screen Saver security check, ensure that you have enabled the Screen Saver function at least once on the target computers if they are Windows 2008 or Windows 7 workstations. This action is required for creating the ScreenSaveTimeOut registry key under the following path: "HKEY_USERS\<user SID>\Control Panel\Desktop\" of the Windows registry. 5. Click Save. The selected security checks are displayed in the Compliance Check table. 6. Define and activate the settings to be checked for each of the selected security checks, as follows: a. Click Detail Menu in a row of the Security Check table and select Settings. The Settings panel for the selected security check opens. b. Enable the settings you want to check and define the required values. Default settings are automatically enabled. Though if you choose to change the default settings, they are not active until you have saved them. You can clear the check box to disable a setting you do not want to check. Default values are provided for most settings. To change a value, click the arrow to open the Properties panel and type or select the value that you want. For example, if all Windows computers must have active, password-protected screen savers that automatically lock after 15 minutes. Open the settings panel for the Windows Screen Saver compliance check, enable all the settings and define the following values: Active Yes Password protected Yes Maximum timeout value 15 c. Click Save. You have now created a set of compliance checks that apply to Windows computers.
846
Procedure
1. Search for the computer or group you want to work with and select it from your search results. 2. Click the Compliance tab. 3. Click Edit > Creating Compliance Checks using Model. The Creating Compliance Checks using Model dialog opens 4. Fill in the fields as necessary. For more information on the fields, click Help. 5. Click Save.
Results
The compliance checks are added to your computer or group and listed in the Security Compliance Checks and Software Compliance Checks tables.
847
5. Click New Compliance Check and select Software Check > Software Module Check . The Add Software Check panel opens. 6. Search for the HTTP Server and Adobe Reader, version 9.0.0 modules, select them and click Save. Software checks for the selected modules are added to the Compliance Checks table. The default settings of software module compliance checks include a required state setting of Software must be installed. No changes are required to the settings for the Adobe Reader module. 7. Define the settings for the HTTP Server as follows: a. Click Detail Menu for the HTTP Server module and select Settings. The Settings panel opens. b. Change the Desired state setting to Software must not be installed. c. Click Save. You have now created a set of compliance checks that includes security and software checks. You can now add a software configuration check to the set of compliance checks for this provisioning group.
848
To create a software configuration check based on that template: 1. In the Start Center, click Provisioning Groups. 2. Select the group for which you created security and software compliance checks in the preceding lesson, and click the Compliance tab. 3. Click Software Configuration Checks. 4. Click New Software Configuration Check. The Add Software Configuration Check panel is displayed. 5. Select the software configuration template you want to use for your configuration checks from the list. 6. Click Save. . 7. Click Detail Menu 8. Select Settings from the pop-up window to see details about the software configuration check. The Software Configuration Check Details panel is displayed and all the parameters from the template are listed. You can do the following: Change a parameter Click Select Value parameter. . The Properties panel opens and you can change the value of the
Delete a parameter Click Mark for Delete . Parameters that are marked for deletion are removed from the template when you save the settings. 9. Click Save. You have created a software configuration template for DB2 and added a related software configuration check to a provisioning group. You can now create a schedule for applying the checks. Editing software configuration remediation parameters: You can change some of the parameters in the software configuration remediation template. This topic describes the parameters that you can modify to change the behavior of the remediation recommendations of the software configuration type. Normally there is no need for you to edit the default remediation configuration parameters. However, if you want to change some of these parameters, you can edit their associated files located on the Tivoli Provisioning Manager server. The parameters are described in the following tables: Parameters for the HTTP server To edit parameters for the HTTP server, edit the file config/remediationConfiguration.xml. The following table describes the parameters you can change in this file:
Table 154. Editable parameters in config/remediationConfiguration.xml Section or attribute parameter section instance-reboot attribute configuration section Description Add or remove installed software parameters. You can only add a parameter that is supported by the discovery scan. Enter true or false to reboot the instance of the software after remediation has occurred. You can change any of the configuration parameters: file name, path, or delimiter.
849
Table 154. Editable parameters in config/remediationConfiguration.xml (continued) Section or attribute taddm-configuration use-existing-profile attribute Description Enter true to run a TADDM profile discovery using the profile that is defined in the section <profile>. Enter false to run a TADDM sensors discovery using the sensors that are listed in the sections named <sensor>. If you do not want the remediation operation to trigger a TADDM discovery at the end of the task, remove the taddm-configuration section from the file.
Parameters for the WebSphere Application Server, DB2, and Oracle To edit parameters for the WebSphere Application Server, DB2, and Oracle, edit the file config/remediationConfigurationCustom.xml. The following table describes the parameters you can change in this file:
Table 155. Editable parameters in config/remediationConfigurationCustom.xml Section or attribute instance-reboot attribute admin-config section Description Enter true or false to reboot the instance of the software after remediation has occurred. You can change the WebSphere Application Server scope. For example, you can change Server or Cell, but by doing so you would refer to a different set of parameters that must be defined at that scope. The list of scopes is available in the WebSphere Application Server tools. You can enter true to run a TADDM profile discovery using the profile that is defined in the section <profile>. Enter false to run a TADDM sensors discovery using the sensors that are listed in the sections named <sensor>. If you do not want the remediation operation to trigger a TADDM discovery at the end of the task, remove the taddm-configuration section from the file.
850
Part 2 Recommendations
Recommendations identify the actions required to resolve noncompliance issues. The compliance checking process generates a recommendation for each noncompliance issue. You will perform the following compliance tasks: Review and approve the recommendations The recommendations generated by the compliance checking process are listed. Use the list to get an overview of the noncompliance issues and approve the recommendations that you want to implement. Run or schedule the recommendations When the recommendations are in the approved state, you can run the related workflows immediately or schedule them to run at a convenient time.
851
The recommendations describe the action to be taken to resolve the noncompliance issue. In many cases, workflows are available to automate the remediation of the issue. By default, recommendations are created in the Open state. You can take the following actions to change the state: Approve Before an automated remediation can be applied for a recommendation, you must approve it. Close Closing a recommendation changes its state to Implemented. Use this action for issues that must be resolved manually.
Ignore Use this action if you do not want to apply a recommendation. Open Use this action to reopen a recommendation that is in any of the other states.
Note: When creating compliance checks, you can enable automatic approval. Recommendations are then created with the state already set to Approved. You can view all recommendations for a computer or group of computers by clicking the Recommendations tab on the Provisioning Computer or Provisioning Group page. If you want to view recommendations for a particular compliance check, select the compliance check in the table of compliance checks, open the context menu and select Recommendations. In this scenario, the compliance check has found that two computers do not have the Adobe Reader, version 9.0.0 installed and that the HTTP Server is installed on one of the computers in the group. Recommendations have been generated to install Adobe Reader on the two computers where it is missing and to uninstall the HTTP Server from the computer where it is installed. To complete this task you must be logged on as a user with compliance analyst access. To review and approve these recommendations: 1. In the Start Center, click Provisioning Groups. 2. Select the provisioning group for which you have run compliance checks, then click the Recommendations tab. 3. Select the check box for each recommendation and click Approve. The recommended actions can now be implemented.
Implementing recommendations
When recommendations have been approved, the recommended actions can be performed by implementing a workflow to run immediately or at a convenient time. In this scenario, recommendations were generated for the installation of the Adobe Reader, version 9.0.0 on two computers and the uninstallation of the HTTP Server from one computer. All recommendations have been approved. In this lesson, the HTTP Server is to be uninstalled and the Adobe Reader installations are to be scheduled to run. To complete this task you must be logged on as a user with deployment specialist access. 1. In the Start Center, click Provisioning Groups. 2. Select the provisioning group for which you have run compliance checks and click the Recommendations tab. 3. Select the recommendation for the uninstallation of the HTTP Server and the installation of Adobe Reader. 4. Click Implement. A provisioning task is created to run the workflow for the software. A panel appears giving you the option to view and configure the task. You can choose to run the task now or schedule it to run at a later date. 5. Click Submit.
852
You have created tasks to apply the recommended actions to bring the computers into a compliant state. To monitor the tasks that you have created, click Provisioning Task Tracking in the start center and filter the list of provisioning tasks to include only those with the type compliance remediation.
Procedure
1. Determine what policies you need in your organization to be compliant with SOX standards. 2. You can use the empty SOX Group as a sample group. Or, create your own groups for SOX-compliance. If compliance checks are defined, you can run a SOX report on any custom group that is static and of computer type. Manually add any computers that you want to be SOX-compliant to the SOX Group by performing the following: a. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Groups. b. Click SOX Group and manually add the computers to the group. For information about groups, see Provisioning groups on page 38. 3. Click the Compliance tab of the group. The sample SOX group provides the following predefined checks: v Windows Antivirus v Windows Screen Saver v Windows Power-On Password v Windows User Password You can add additional checks for the SOX policies that you are interested in by selecting New Compliance Check > Choose Type 4. Click Run > Scan and Check. 5. Run the SOX compliance report by selecting Run Reports from the Select Action menu. 6. Click the report Is the Group of Computers compliant against the defined SOX rules?. 7. Select the SOX Group and click Submit.
Chapter 8. Checking compliance
853
Results
A report appears that lists all the computers in the SOX Group that are NOT compliant with the list of the compliance checks. It also lists all of the compliance checks defined for the group.
The following security compliance checks support multiple rules. v Linux System Logging v UNIX File Permissions v UNIX Services v User Defined Check v Windows File Permissions v Windows Services In the following example, a Windows Services compliance check is added to a group of computers to ensure that: v The LiveUpdate service is present, is configured to start automatically, and has started. v The NetMeeting Remote Desktop Sharing service is present and is configured to start manually. Its current state is not important. To complete this task you must be logged on as a user with compliance analyst access. To define these checks, perform the following steps:
Procedure
1. In the Start Center, click Provisioning Groups. 2. Select the group for which you want to create the Windows Services check and click the Compliance tab. 3. Click New Compliance Check and select Security Check from the pop-up window. The Add Security Check panel opens. 4. Select Windows Services and click Save. The Windows Security check is added to the Compliance Check table. . for the Windows Services check and select Settings from the pop-up window. 5. Click Detail Menu The Settings panel opens. 6. Define the LiveUpdate service checking rule, as follows: a. In the Compliance Checks section of the Settings panel, click Add. The Properties dialog opens. Complete it as follows: Compliance check A string to identify the compliance check. This appears in the list of Windows Services checks shown in Settings panel.
854
Service Specify LiveUpdate. b. Define the required settings for the LiveUpdate service as follows: Startup type Automatic Service applicability Required Service state Started Change a setting by clicking the arrow next to it. The settings Properties dialog opens. 7. Define the NetMeeting Remote Desktop Sharing service checking rule, as follows: a. In the Compliance Checks section of the Settings panel, click Add. The Properties dialog opens. Complete it as follows: Compliance check A string to identify the compliance check. This appears in the list of Windows Services checks shown in Settings panel. Service Specify NetMeeting Remote Desktop Sharing. b. Define the required settings for the NetMeeting Remote Desktop Sharing service as follows: Startup type Manual Service applicability Required Service state Clear the check box for this setting. 8. Click Save.
To complete these tasks you must be logged on as a user with compliance analyst access.
Procedure
1. In the Start Center, click Provisioning Groups or Provisioning Computers.
Chapter 8. Checking compliance
855
2. Select the group or computer for which you want to define allowed software. and click the Compliance tab. 3. Click the Security Checks tab and then click New Security Check. 4. Select Restrict Other Software and click Save. 5. Select the software that is to be allowed on the target computer or computers: a. Click the Software Checks tab and then click New Software Check. b. From the pop-up window, choose Software Module, Software Group, or Software Stack c. Select all the software modules, stacks or groups you want to allow and click Save.
Results
You have created a list of allowed software that you can see if you click the Allowed Software tab. A noncompliance would be generated if any other software was detected on the target computer or computers.
Procedure
1. In the Start Center, click Provisioning Groups or Provisioning Computers. 2. Select the group or computer for which you want to add a compliance check. and click the Compliance tab. 3. Click the Software Checks tab and then click New Software Check. The software check pop-up window opens. 4. Choose Software Module or Software Stack 5. Select the software modules or stacks that are not permitted and click Save. Software checks for the selected modules are added to the Compliance Checks table. The default settings of software module compliance checks include a Desired state setting of Software must be installed. 6. Change the Desired state setting for each check as follows: and select Settings from the pop-up window. The Settings panel opens. a. Click Detail Menu b. Change the Desired state setting to Software must not be installed. c. Click Save.
856
Procedure
1. Create an automation package to include the user-defined workflow and compliance definition. You can use the sample automation package, sample-compliance-validation as a starting point. 2. Define the compliance checking workflow, implementing the Compliance.ValidateServer LDO. The Sample_IP_Check.wkf file in the sample-compliance-validation package provides an example of how to implement the Compliance.ValidateServer LDO. 3. Create the compliance definition in the XML file in your automation package. The sample-compliance-definition.xmlfile in the sample-compliance-validation package provides an example. 4. Define the remediation workflow, implementing the ComplianceRecommendation.Remediate LDO. 5. Install the automation package.
Procedure
1. In the Start Center, click Provisioning Groups or Provisioning Computers. 2. Select the group or computer for which you want to add a compliance check. and click the Compliance tab. 3. Click New Compliance Check and select Security Check from the pop-up window. The Add Security Check panel opens. 4. Select User Defined Check and click Save. User Defined Check is added to the compliance check table. . in a row of the table and select Settings from the pop-up window. The 5. Click Detail Menu Settings panel opens showing any user-defined checks that have already been added. 6. Click Add. The Properties dialog opens. Complete it as follows: Compliance check A string to identify the compliance check. This appears in the list of user-defined checks shown in Settings panel. Compliance name The name of the compliance definition created in the XML file of the automation package. 7. Click Add. The compliance check is added to the list. You can continue to add more checks. 8. When you have added all the required checks, click Save.
857
Troubleshooting compliance
To help you troubleshoot problems with compliance, it is important to understand the process that occurs during a compliance operation. Use the information in the Process section to learn about the main steps that occur during a compliance operation. Use the remaining sections to find out how to troubleshoot errors that occur during specific parts of the process. v Process v 1. Task status on page 859 v 2. Target status on page 862
Process
There are three compliance processes to consider when troubleshooting compliance: 1. Compliance Scan 2. Compliance Check 3. Compliance Remediation To demonstrate how components interact, the following steps outline the component interactions during a compliance operation. Compliance Scan 1. The user submits the Compliance Scan operation. 2. The provisioning task is built to run the Compliance Scan operation and it is submitted to the activity plan engine. 3. The activity plan engine runs the Compliance Scan task: v Each activity in the plan triggers a corresponding action. The checks defined on the computer where the compliance scan is requested can trigger one or more of the following actions: a. Install or Uninstall Software The SoftwareModule.Install logical operation runs. b. SCMCollectorAgent discovery Security compliance check c. IBM Tivoli Common Agent Discovery The Target Agent security check d. Tivoli Application Dependency Discovery Manager discovery Software configuration check e. Patch Scan Operating system patch compliance check Note: The compliance process does not add any steps to discovery or software installation actions. If an error occurs during discovery, see Troubleshooting discovery on page 239. If an error occurs during software installation see Troubleshooting software distribution on page 751. Compliance Check 1. The user submits the Compliance Check operation. 2. The provisioning task is built to run the Compliance Check operation and it is submitted to the activity plan engine. 3. The activity plan engine runs the Compliance Check task: v The Deployment Engine runs the Compliance_Validation workflow. Compliance Remediation
858
1. The user selects one or more recommendations and triggers the Implement operation. 2. A provisioning task is created that contains the required activities for running the remediation activities selected by the user. It is submitted to the activity plan engine. 3. The activity plan engine runs the Compliance Remediation task: v Each activity in the plan triggers a corresponding operation. Different operations occur depending on the remediation activity. For example: a. Install or Uninstall Software SoftwareModule.Install logical operation runs. Note: If an error occurs during software installation, see Troubleshooting software distribution on page 751. b. Install Patch SoftwareModule.Install logical operation runs. Note: If an error occurs during a patch deployment, see Troubleshooting SDI Windows patch management on page 989. c. Security Remediation workflow ComplianceRecommendation.Remediate or ComplianceRecommendationGroup.Remediate logical operation runs. d. Finalization Workflow ComplianceRecommendation.Finalize workflow runs. Deployment infrastructures used when running a compliance-related operation Compliance Scan and Compliance Remediation operations go through different deployment infrastructures depending on the operation and the target. For example: 1. Compliance Scan v The operation will go through scalable distribution infrastructure or through deployment engine, depending on the targets and executed discovery. Note: This operation is not specific to compliance. Only the preparation and submission are compliance-specific. See Troubleshooting discovery on page 239 for more information about this topic. 2. Compliance Check v The operation is server-side and runs through deployment engine. 3. Compliance Remediation v Security Remediation and Software Configuration Remediation operations go through the deployment engine. Patch Installation and Software Install/Uninstall Remediation operations go through scalable distribution infrastructure or through deployment engine, depending on the targets and software. Note: Patch and software installation operation rules apply.
1. Task status
1. If an error occurs for one of the following actions, the error is related to the web interface: v Viewing compliance-related information in the Provisioning Computers and Provisioning Groups applications. v Creating, deleting, copying, or editing compliance checks. v Approving, opening, ignoring, closing, or viewing recommendations.
859
v Configuring advanced options for remediation, before the dialog regarding Task Tracking application is displayed. Check the following logs for errors relating to actions triggered from the interface:
%TIO_LOGS%\j2ee\console.log %WAS_HOME%\AppServer\profiles\ctgAppSrv01\logs\MXServer\SystemOut.log %WAS_HOME%\AppServer\profiles\ctgAppSrv01\logs\MXServer\SystemErr.log
UNIX Linux Windows
2. Check the status of the compliance task. For information about task status, see Tracking a provisioning task on page 1165. a. Go into the task details and review at the task instance level. b. Information pertaining to the error message associated with each task instance can be accessed by clicking the >> arrows on the right of the task status column. c. If the message details are not clear, go into details at the target level and check for a workflow log and log number associated with each target of the operation. Then click the workflow number and open the workflow execution log. If no workflow log number is associated with the task, the operation was executed through scalable distribution infrastructure, therefore the log, and trace files must be inspected to retrieve additional diagnostic information. 3. If the information contained in the workflow execution log cannot be used to identify the cause of the failure, or if a scalable distribution infrastructure was used, the next step is to look at the activity plan engine and the deployment engine logs. By default, the log level for console.log is info and the log level for trace.log is error. Change the log level to debug to obtain more troubleshooting information. For information about setting the log level, see Configuring log4j dynamically.
Table 156. Log files Log file console.log Location
Windows
%TIO_LOGS%
Linux
UNIX
$TIO_LOGS
trace.log
Windows
%TIO_LOGS%
Linux
UNIX
$TIO_LOGS
In the logs, use the following information to locate messages related to the compliance operation. Search for these items and the word Exception to quickly locate the failure. v The workflow number v The workflow name (Compliance_Validation, ComplianceRecommendation.Remediate, SoftwareModule.Install, Discovery.OnDevice) v The provisioning task name (Compliance Check, Compliance Scan, or Compliance Remediation) To help you troubleshoot compliance-related tasks, look for the following key words in the log file: v Compliance_Validation v v v v v v ComplianceRecommendation.Remediate SoftwareModule.Install Discovery.OnDevice Compliance Check Compliance Scan and Check Compliance Remediation
IBM Tivoli Provisioning Manager Version 7.2.0.2 User Guide
860
Sample log entries for compliance-related operations Compliance Check Check the status of a compliance check in the log file:
DEBUG [Status Updater] (StatusUpdateProcessor.java:80) manager.StatusUpdateProcessor: Start processing for task instance id=89217, name=Compliance_Validation DEBUG [Compliance_Validation(17212)] (WorkflowExecutionMonitor.java:66) komodor.WorkflowExecutionMonitor: Starting workflow: Compliance_Validation.java INFO [Compliance_Validation(17212)] (ExecutionLogger.java:342) runtime.ExecutionLogger: Start configuration compliance validation check for device with id: 6603 DEBUG [Compliance_Validation(17212)] (GroupComplianceValidator.java:229) validation.GroupComplianceValidator: The Compliance Check has completed successfully INFO [Compliance_Validation(17212)] (ExecutionLogger.java:342) runtime.ExecutionLogger: Finish configuration compliance validation check for device with id: 6603
Compliance Scan To check the status of a compliance scan in the log, search for the discovery workflow that is used for the task:
DEBUG [Discovery.OnDevice(17213)] (WorkflowExecutionMonitor.java:66) komodor.WorkflowExecutionMonitor: Starting workflow: Discovery$OnDevice.java DEBUG [Discovery.OnDevice(17213)] (WorkflowExecutionMonitor.java:74) komodor.WorkflowExecutionMonitor: DiscoveryID = 4476 DEBUG [Discovery.OnDevice(17213)] (WorkflowExecutionMonitor.java:74) komodor.WorkflowExecutionMonitor: DeviceID = 23024
Compliance Remediation To check the status of a compliance remediation task, search for log entries associated with the type of remediation that you are performing. The following log excerpts show the status of a software installation remediation using the deployment engine. In this example, when you find the deployment request ID 17215 in the log, you can track the progress of the software installation by searching for the deployment request 17215.
DEBUG [Status Updater] (StatusUpdateProcessor.java:211) manager.StatusUpdateProcessor: current status for plan: Compliance Remediation [11/2/10 3:41 PM](7804) is IN_PROGRESS DEBUG [Status Updater] (StatusUpdateProcessor.java:218) manager.StatusUpdateProcessor: Updating plan instance status of: Compliance Remediation [11/2/10 3:41 PM](7804) from SUBMITTED to: IN_PROGRESS ... INFO [Install Software 5179(93732) from com.ibm.tivoli.orchestrator.de.task.OSGiDETaskDispatcher] (MessageTranslatorProxy.java:319) messagetranslator.MessageTranslatorProxy: New deployment request was created (id=17215) DEBUG [Install Software 5179(93732) from com.ibm.tivoli.orchestrator.de.task.OSGiDETaskDispatcher] (DETaskExecutor.java:181) task.DETaskExecutor: Deployment request 17215 is created for task target: 6816 ... DEBUG [SoftwareModule.Install(17215)] (WorkflowExecutionMonitor.java:74) komodor.WorkflowExecutionMonitor: SoftwareModuleID = 5179
The following log excerpts show the status of a software installation remediation using the scalable distribution infrastructure. The log examples show the task starting, permissions verification on the target computer, and the workflow starting. In this example, you would use task ID 23963 to search for additional information about the task in the log.
DEBUG [Activity Plan Engine] (QueuedActivity.java:80) activityplan.QueuedActivity: dequeuing Install_Software_23963(7816) DEBUG [Activity Plan Engine] ( TpmTask.java:55) manager.TpmTask: Task execution started: Install Software 23963 DEBUG [Install Software 23963(93752) from com.ibm.tivoli.tpm.activityplan.manager.AggregateTaskDispatcher] (WorkflowAccessManager.java:104) accesscontrol.WorkflowAccessManager: checking permission (target:6822)Software.Install Software.Install on 23963 DEBUG [Install Software 23963(93752) from com.ibm.tivoli.tpm.activityplan.manager.AggregateTaskDispatcher] (WorkflowAccessManager.java:106) accesscontrol.WorkflowAccessManager: checking permission (target:6822)Software.Install Software.Install on 23963 succeeded DEBUG [Install Software 23963(93752) from com.ibm.tivoli.tpm.activityplan.manager.AggregateTaskDispatcher] (WorkflowAccessManager.java:104) accesscontrol.WorkflowAccessManager: checking permission (target:6822)Device.ManagerSoftware Device.ManagerSoftware on 23024 DEBUG [Install Software 23963(93752) from com.ibm.tivoli.tpm.activityplan.manager.AggregateTaskDispatcher] (WorkflowAccessManager.java:106) accesscontrol.WorkflowAccessManager: checking permission (target:6822)Device.ManagerSoftware Device.ManagerSoftware on 23024 succeeded
The following log excerpts show the status of a security remediation, beginning from the point where the workflow starts. You can use the IDs for the remediation workflow (15219), the recommendation (85507), and the target computer (83564) to look for relevant information in the log.
DEBUG [ComplianceRecommendation.Remediate(15219)] (WorkflowExecutionMonitor.java:66) komodor.WorkflowExecutionMonitor: Starting workflow: ComplianceRecommendation$Remediate.java DEBUG [ComplianceRecommendation.Remediate(15219)] (WorkflowExecutionMonitor.java:74) komodor.WorkflowExecutionMonitor: ComplianceRecommendationID = 85507
861
DEBUG [ComplianceRecommendation.Remediate(15219)] (WorkflowExecutionMonitor.java:74) komodor.WorkflowExecutionMonitor: TargetID = 83564 DEBUG [ComplianceRecommendation.Remediate(15219)] (WorkflowExecutionMonitor.java:68) komodor.WorkflowExecutionMonitor: Calling workflow: Remediation_Antivirus_Remediation.java INFO [ComplianceRecommendation.Remediate(15219)] (ExecutionLogger.java:342) runtime.ExecutionLogger: start
Check the logs for the Cit_SDI_OnDevice provisioning workflow in the web interface to determine where the error occurred. The error messages in the log can help you to identify which component is the source of the problem. v Open the Workflow Execution Logs view if it is not displayed. a. From the Eclipse menu, click Window > Show View > Other. b. Expand Automation Package and click Workflow Execution Logs. c. Click OK. The Workflow Execution Logs page displays the provisioning workflow run history. There is a limit of 4000 characters for provisioning workflow output. If this limit is exceeded, the output is truncated. Workflow execution log a. From the Tivoli Provisioning Manager user interface go to the "Provisioning Workflows Status" application and select the "Compliance_Validation" workflow instance to be analyzed: v Use the "Go To" menu: Click Go To > Administration > Provisioning > Provisioning Workflow Status b. Alternatively you can reach the same execution log starting from the "Provisioning Task Tracking" application where you can select the task and expand its details: v Use the "Go To" menu: Click Go To > Provisioning Reports > Provisioning Task Tracking 5. The log console.log also contains errors for compliance and remediation errors as described here Compliance log file locations.
2. Target status
Check the progress of the job on the target computer for the compliance task. Check the log that corresponds to the task that ran and the infrastructure that was used to perform the task. This only applies if using scalable distribution infrastructure. 1. On the target computer verify that the job was received for processing. Look in CA_HOME/logs/ trace-log-number.xml. CA_HOME The agent installation directory v v v
Windows HP UX AIX
C:\Program Files\tivoli\ep
Linux Solaris
/opt/tivoli/ep
/usr/tivoli/ep
number A number such as 1. The following message shows that the job was received.
JES023I Processing job: name = [CitScan], requestId = 6e58be70988b11dfbef4000c291214c0]
If the job was not received, check the following items: a. Verify communication with the target computer. Run the TCA_PingAgent provisioning workflow.
862
b. If the compliance task is taking a long time to complete, one possible cause is that the target computer is not polling for jobs, so the job is never received. To fix this problem, see Jobs not reaching target computer. 2. If using scalable distribution infrastructure, verify that the discovery job ran in trace-log-number.log. For an Inventory discovery, the following line indicates that the results of the discovery were generated on the target computer.
CIT034I Combined CIT output file as an XML import format C:\Program Files x86)\tivoli\ep\conf\org.eclipse.osgi\bundles\167\data\cit_tpmlabw2k82010.08.04.11.26.20.xml
The following line indicates that the discovery results were uploaded to the provisioning server:
JES037I Done executing work item: Job [CitScan], Work Item [ScanFileUpload]
3. If using scalable distribution infrastructure, check the following log files on the target computer for additional information.
Table 157. Log files Log file error-log-number.log For error messages generated during agent run time. Location v v v
Windows HP UX AIX
C:\Program Files\tivoli\ep
Linux Solaris
/opt/tivoli/ep
/usr/tivoli/ep
4. If an error occurs in step 3 on the target computer, check the TCA log files by reviewing Log files for the common agent. Additional troubleshooting information can also be found in the troubleshooting section specific to the triggered operation. Using Tivoli Security Compliance Manager result XML files The subagent and collector output XML files can be used for troubleshooting compliance-related problems. In order to obtain them, you must turn on debugging for the common agent: a. Enable tracing for the common agent, as described in Compliance log files. b. Run the inventory scan. XML files will be generated on the target computer in the common agent installation directory. The files will have the following name patterns:
scm_<hostname>_collectors<timestamp>.xml scm_<hostname>__converted<timestamp>.xml
Note: For more troubleshooting information for the target computer, see the troubleshooting documentation for the specific task that ran. Related links Support information about compliance Log files Example: Restricting software on page 855
Log files
Log files help in diagnosing problems and recording commands.
%TIO_LOGS%\j2ee\console.log
Linux
$TIO_LOGS/j2ee/console.log
863
%TIO_LOGS%\console.log
Linux
$TIO_LOGS/console.log
Symptoms
You attempt to perform a remediation task but you receive the following error message:
The recommendation with ID: ID_number is not in a valid state for the run action
Causes
You cannot perform a remediation task if you have not approved the related recommendation from the web interface.
Symptoms
A computer has a compliance check listed more than once.
Causes
This occurs when a computer is a member of more than one group and two or more of these groups define the same compliance check. Because each compliance check has specific settings, they can be set up differently from each other, and there might be conflicting compliance checks.
864
For example, one group might require that a certain software product be installed, and another group, that the computer belongs to, might prohibit the same software.
Symptoms
A computer has a compliance check listed more than once.
Causes
This occurs when the same compliance check is defined for a computer and also for at least one group to which that computer belongs. Because each compliance check has specific settings, they can be set up differently from each other, and there might be conflicting compliance checks. For example, one group might require that a certain software product be installed, and one of the computers in the group might prohibit the same software.
Symptoms
The compliance inventory scan will not finish successfully.
Causes
If you are running a compliance inventory scan on a target computer or group for any of the following compliance checks: v AIX Activity Logging v AIX Remote Root Login v Linux System Logging v UNIX File Permissions v UNIX Services v v v v v v v Windows Antivirus Windows Event Logging Windows File Permissions Windows Firewall Windows Screen Saver Windows Services Windows Unauthorized Guest Access
Chapter 8. Checking compliance
865
v Windows User Password then the common agent must be installed on the target machines. If the common agent is not installed, then the compliance inventory scan will fail.
Symptoms
You cannot modify a compliance check directly when it is inherited from another group.
Causes
If a computer is a member of a group, it inherits all of the compliance checks of its parent group. These compliance checks are listed in the Compliance tab for the computer, but you cannot modify an inherited compliance check directly.
Symptoms
You receive no recommendation after running a Linux System Logging check on SUSE Linux Enterprise Server 10 (x86 32-bit).
Causes
The SCM collector agent of the common agent does not collect syslog information about SUSE Linux Enterprise Server 10 (x86 32-bit).
Compliance check does not recognize that Windows Native firewall is running
This is a known limitation if the computer is the member of a domain. It can be ignored.
Symptoms
The following message is given when you run a Windows Firewall compliance check on a computer that is using Windows Native Firewall, and when the Track traffic setting is set to Yes:
Change the value of the "Track traffic" setting for the firewall software "Windows Native Firewall" to match the compliant value "true"
Causes 866
IBM Tivoli Provisioning Manager Version 7.2.0.2 User Guide
This occurs if the computer is the member of a domain. This is a known limitation.
The problem is related to the Web v Viewing compliance-related information in the Provisioning interface. Check for exceptions or errors in the Web interface log files. Computers and Provisioning Groups applications v Creating, deleting, copying, or editing compliance checks v Approving, opening, ignoring, closing, or viewing recommendations v Configuring advanced options for remediation, before the dialog regarding Task Tracking application is displayed
867
Step where the problem occurs Running a compliance scan or compliance remediation
Resolving the problem Running through the deployment engine: The problem is related to the workflow execution in the deployment engine. If the problem occurs in common agent-related activities, check the endpoint logs.
Log files Server side on Windows v $TIO_LOGS/console.log v $TIO_HOME/SCMCollectorAgent/ <deviceID>-scmSubagentInput.xml v $TIO_HOME/SCMCollectorAgent/scm_ <hostname>_converted <timestamp>.xml
Endpoint side on Windows v %AGENT_INSTALL_DIR%\logs\ The workflow log from the error-log-xx.xml Provisioning Task Tracking v %AGENT_INSTALL_DIR%\logs\ interface is also useful for trace-log-xx.xml problem determination. The v %AGENT_INSTALL_DIR%\ SCMCollector xml files are scm_<hostname> related only to compliance _collectors.xml scans. They are written only Endpoint side on UNIX or Linux if the server and endpoint v $AGENT_INSTALL_DIR/logs/ log level have been error-log-xx.xml respectively set to DEBUG. v $AGENT_INSTALL_DIR/logs/ Running through the scalable trace-log-xx.xml distribution infrastructure: v $AGENT_INSTALL_DIR/ Use the same procedure as scm_<hostname>_collectors.xml described above for the deployment engine. Additionally check the console.log. It is useful for tasks submission, result management, and other small tasks like DMS jobs triggering. Be sure to check the endpoint log files. No workflow execution log is available from Provisioning Task Tracking. It is available only from Workflow Status interface and only in the case of patch management. Running a compliance check The problem is related to the workflows execution in the deployment engine. Nothing is run on the endpoint side. Also check the workflow log from the Provisioning Task Tracking interface. Windows %TIO_LOGS%\console.log UNIX $TIO_LOGS/console.log
Symptoms
When you define a Windows Power-On Password security check in the Compliance tab and run a scan and check task on a computer, the following incorrect recommendation might be generated:
868
Run an inventory scan to discover information about the "Windows Power-on Password" setting for this computer
Causes
This error occurs when the BIOS properties of a specific computer do not contain the power-on password setting value. In this case the information about the power-on password cannot be detected by the Tivoli Provisioning Manager Inventory Discovery and a wrong recommendation is generated.
Symptoms
When you create a software configuration template for a WebSphere Application Server installation, selecting IBM WebSphere Application Server - xxx for both creating the template and defining the software configuration check, the recommendation generated after running a compliance scan and check might become incorrect, and cause the following message to be displayed:
Define the configuration settings on the computer for the software installation "Profile: default" to match the compliant value.
Causes
The TADDM discovery populates the data model with IBM WebSphere Application Server - xxx as the base WebSphere Application Server installation. This object contains only some installation parameters. When the compliance check is run, the parameters are checked also against Profile: default as the base WebSphere Application Server installation. This generates recommendations that are incorrect.
Reference
Reference information supports the tasks that you want to complete.
869
Table 158. Security compliance checks (continued) Compliance check AIX Remote Root Login Target Agent Platform AIX Purpose Settings Multi-rule? No No
Checks remote root login settings. v Remote login allowed: Yes, No. v Status of the agent v Maximum number of hours between contact.
AIX, Linux, Checks target agent settings Solaris, HP-UX, and Windows Linux
Checks for the existence and v Facility configuration of different types of v Priority Linux system logs. Define a rule v Destination for each log to be checked. Note: It is not possible to enable or disable these settings individually.
Yes
Checks that all operating system patches and updates required by Tivoli Provisioning Manager patch management are installed.
v Patch approval group Note: You cannot change the patch approval group after you have saved the setting. If you have chosen the wrong group, delete the check and create it again.
No
No settings Checks that only the required software specified in the software compliance checks is installed on the target computers. When this check is added, the Allowed Software tab shows all the required software.
No
AIX, Linux, Solaris, and HP-UX AIX, Linux, Solaris, and HP-UX
Checks UNIX file permissions for v IsDirectory each file you specify. You can v Permissions create a rule for each file you want to check. Checks for missing or prohibited UNIX services. Also checks for configuration of the service and state of the service. You can create a rule for each service you want to check. v Port number v Protocol v Service state
Yes
UNIX Services
Yes
Implements checks that you have v Name of the check defined as automation packages. v Provisioning workflow You can create a rule for each to implement the check automation you have created.
Yes
870
Table 158. Security compliance checks (continued) Compliance check Windows Antivirus Platform Windows Purpose Checks for various antivirus settings, such as the maximum virus definition age. Settings v Maximum elapsed time between virus scans Multi-rule? No
v Maximum virus definition age The following antivirus programs are supported: v Auto update virus definition schedule v Symantec Antivirus Corporate Edition (Versions 8.x and 9.x)
v Norton Antivirus Corporate Edition (Version 7.x) v Norton Antivirus (Versions 5.x and 6.x) v Trend Micro Antivirus (Version 7) v McAfee VirusScan Enterprise (Versions 7.0, 8.0i, and 8.5i) v Sophos Anti-Virus (Versions 3.xx, 4.5x, and 5.x). Windows Event Logging Windows Checks Windows event logging settings. v Minimum retention period of application data v Minimum retention period of security data v Minimum retention period of system data v Minimum value of the maximum application log size v Minimum value of the maximum security log size v Minimum value of the maximum system log size No
871
Table 158. Security compliance checks (continued) Compliance check Windows File Permissions Platform Windows Purpose Settings Multi-rule? Yes
Checks Windows file permissions v List folder/Read Data for each file you specify. You can v Create Files/Write Data create a rule for each file that you v Create Folders/Append want to check. Data v Read Extended Attributes v Write Extended Attributes v Traverse Folder/Execute File v Delete Subfolders and Files v Read Attributes v Write Attributes * Delete v Read Permissions v Change Permissions v Take Ownership v Synchronize
Windows Firewall
Windows
Checks firewall settings. The following firewall programs are supported v McAfee Desktop Firewall (Versions 8.0 and 8.5) v Windows Native Firewall v Windows Zone Alarm Integrity Flex Firewall (Version 3.5.175.057).
v Track traffic v Activate Windows service v Windows Service enabled to start automatically
No
Windows Hard Disk Password Windows Power-on Password Windows Screen Saver
Checks for a hard disk password. v Hard disk password required: Yes, No. Checks for a power-on password. v Power-on password required: Yes, No.
No No
No Checks screen saver settings. v Active Note: Running a compliance v Password protected check for a Windows screen saver v Maximum timeout value might return incorrect results if (minutes) there are two identical user IDs Note: For this setting on the same computer. you are required to log off and reboot the When the local user ID and system after applying domain user ID are identical but the remediation. each user ID has different screen saver settings, Tivoli Provisioning Manager will arbitrarily choose one user ID and read its screen saver settings, and ignore the screen saver settings for the other user ID.
872
Table 158. Security compliance checks (continued) Compliance check Windows Services Platform Windows Purpose Settings Multi-rule? Yes
Checks the existence and v Startup type configuration of selected v Service applicability Windows services. You can create v Service status a rule for each service you want to check. Checks for appropriate guest access settings. v Guest account can only be a member of Guests group v Guest account must be active v Guest account must be locked
Windows
No
Windows
v Enforce password history (passwords remembered) v Maximum password age v Minimum password length (characters)
No
873
DB2 version 8 Parameters v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v agentpri aslheapsz audit_buf_sz authentication catalog_noauth clnt_krb_plugin clnt_pw_plugin comm_bandwidth conn_elapse cpuspeed datalinks diaglevel dir_cache discover discover_inst dft_mon_bufpool dft_mon_lock dft_mon_sort dft_mon_stmt dft_mon_table dft_mon_timestamp dft_mon_uow dftdbpath fcm_num_anchors fcm_num_buffers fcm_num_connect fcm_num_rqb fed_noauth Federated fenced_pool health_mon intra_parallel instance_memory v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v v java_heap_sz jdk_path keepfenced local_gsspplugin max_connections max_connretries max_coordagents max_querydegree max_time_diff maxagents maxcagents mon_heap_sz notifylevel num_initagents num_initfenced numdb query_heap_sz rqrioblk sheapthres spm_log_file_sz spm_log_path spm_max_resync spm_name start_stop_time sysadm_group sysctrl_group sysmaint_group sysmon_group tm_database tp_mon_name trust_allclnts trust_clntauth util_impact_lim
874
WebSphere Application Server version 6 parameters v v v v v v v v v v v v v v v v v v v v v v v v ActiveIIOPProtocol AllowOverflow AppClassloaderPolicy AppClassloadingMode AuthDataAlias AutoRestart BaseDN BindDN BootClasspath CacheTimeoutMSeconds Classpath DebugArgs DebugMode DefaultDatasourceJNDIName DisableJIT Enabled EnableJava2SecRuntimeFiltering EnableServletCaching EnforceJava2Security ExecutableJarFileName GenericJvmArguments HprofArguments InactivePoolCleanupIntervalMsecs InitalHeapSizeMB v v v v v v v v v v v v v v v v v v v v v v v InvalidationTimeout IssuePermissionWarning MappingConfigAlias MaximumHeapSizeMB MaxInMemSessionCount MaxStartupAttempts MonitorInterval NodeRestartState PassivationDirectory PingIntervalSecs PingTimeoutMSecs ReuseCollection RunHprof SearchTimeout SessionAffinityFailoverServer SessionAffinityTimeout SslConfig SslEnabled UseDomainQualitifedUserNames UseLocalSecurityServer VerboseModeClass VerboseModeGarbageCollection VerboseModeJNI
875
876
Process
To learn about the patch management process, see the following platform-specific topics:
Windows AIX Red Hat SUSE Solaris
Patch management process for Windows environments using SDI Patch management for AIX environments Patch management process for Red Hat Enterprise Linux version 5 environments Patch management process for SUSE Linux Enterprise Server 11 environments. Patch management process for Solaris environments
877
User roles
You must be assigned to the appropriate user role to manage patches. For more information about the necessary roles and skills for managing patches on your platform, see the following topics:
Windows AIX Red Hat SUSE Solaris
Roles and skills for Windows environments Roles and skills for AIX environments Roles and skills for Red Hat Linux Enterprise environments Roles and skills for SUSE Linux Enterprise Server environments Roles and skills for Solaris environments
Table 159. Roles and skills for patch management in Windows environments Role Provisioning Administrator Provisioning tasks v Discover and group target computers v Set up servers and infrastructure Skills v Knowledge of the provisioning environment v Knowledge of the Windows operating system v Knowledge of Internet technologies v Knowledge of scalable distribution infrastructure Provisioning Configuration Librarian v Acquire patches v Scan the target computers for missing patches v Organize and maintain the patch catalog v Create and maintain patch groups, delete patches from the data model Compliance Analyst v Approve patches in the data model v Knowledge of the Windows operating system v Set up compliance v Perform patch check v Approve compliance recommendations v Verify compliance results Deployment Specialist v Install required software on target computers v Publish patches v Distribute patches v Unpublish patches v Implement compliance recommendations to install missing patches v Monitor patch installation v Uninstall patches v Knowledge of the Windows operating system v Knowledge of the patch management life cycle v Knowledge of the patch management life cycle v Knowledge of the Windows operating system v Knowledge of the patch management life cycle
878
Table 160. Roles and skills for patch management on AIX Role Provisioning Administrator Provisioning tasks v Discover target computers v Group target computers Skills v Knowledge of the of the provisioning environment v Knowledge of the AIX operating system v Knowledge of Internet technologies Provisioning Configuration Librarian v Acquire patches v Scan the target computers for missing patches Compliance Analyst v Set up compliance v Approve compliance recommendations v Verify compliance results Deployment Specialist v Install patches v Monitor patch installation v Uninstall patches v Knowledge of the AIX operating system v Knowledge of the patch management life cycle v Knowledge of the AIX operating system v Knowledge of the patch management life cycle v Knowledge of the AIX operating system v Knowledge of the patch management life cycle
Table 161. Roles and skills for patch management in Red Hat Enterprise Linux environments Role Provisioning Administrator Provisioning tasks v Discover and group target computers v Set up servers and infrastructure Skills v Knowledge of the provisioning environment v Knowledge of the Red Hat Enterprise Linux operating system v Knowledge of Internet technologies v Knowledge of scalable distribution infrastructure v Knowledge of how to set up the YUM repository Provisioning Configuration Librarian v Acquire patches v Scan the target computers for missing patches v Organize and maintain the patch catalog v Create and maintain patch groups, delete patches from the data model Compliance Analyst v Approve patches in the data model v Knowledge of the Red Hat Enterprise Linux operating system v Set up compliance v Approve compliance recommendations v Verify compliance results v Knowledge of the patch management life cycle v Knowledge of the Red Hat Enterprise Linux operating system v Knowledge of the patch management life cycle
879
Table 161. Roles and skills for patch management in Red Hat Enterprise Linux environments (continued) Role Deployment Specialist Provisioning tasks v Install required software on target computers v Publish patches v Distribute patches v Unpublish patches v Implement compliance recommendations to install missing patches v Monitor patch installation v Uninstall patches Table 162. Roles and skills for patch management in SUSE Linux Enterprise Server environments Role Provisioning Administrator Provisioning tasks v Discover and group target computers v Set up servers and infrastructure Skills v Knowledge of the provisioning environment v Knowledge of the SUSE Linux Enterprise Server operating system v Knowledge of Internet technologies v Knowledge of the scalable distribution infrastructure v Knowledge of how to configure the SMT or YUM repository Provisioning Configuration Librarian v Acquire patches v Scan the target computers for missing patches v Organize and maintain the patch catalog v Create and maintain patch groups, delete patches from the data model Compliance Analyst v Approve patches in the data model v Knowledge of the SUSE Linux Enterprise Server operating system v Set up compliance v Approve compliance recommendations v Verify compliance results Deployment Specialist v Install required software on target computers v Publish patches v Distribute patches v Unpublish patches v Implement compliance recommendations to install missing patches v Monitor patch installation v Knowledge of the SUSE Linux Enterprise Server operating system v Knowledge of the patch management life cycle v Knowledge of the patch management life cycle v Knowledge of the SUSE Linux Enterprise Server operating system v Knowledge of the patch management life cycle Skills v Knowledge of the Red Hat Enterprise Linux operating system v Knowledge of the patch management life cycle
880
Table 163. Roles and skills for patch management in Solaris environments Role Provisioning Administrator Provisioning tasks v Discover and group target computers v Set up servers and infrastructure Skills v Knowledge of the provisioning environment v Knowledge of the Solaris operating system v Knowledge of Internet technologies Provisioning Configuration Librarian v Scan the target computers for missing patches v Organize and maintain the patch catalog v Create and maintain patch groups, delete patches from the data model Compliance Analyst v Set up compliance v Approve compliance recommendations v Verify compliance results Deployment Specialist v Install required software on target computers v Knowledge of the Solaris operating system v Knowledge of the patch management life cycle v Knowledge of the Solaris operating system v Knowledge of the Solaris operating system v Knowledge of the patch management life cycle
v Implement compliance v Knowledge of the patch recommendations to install missing management life cycle patches v Monitor patch installation v Uninstall patches
Requirements
Target computer requirements:
Windows AIX Red Hat SUSE Solaris
Requirements for Windows on page 895 Requirements for AIX on page 918 Requirements for Red Hat Enterprise Linux 6 and 5 environments on page 933 Requirements for SUSE Linux Enterprise Server 11 environments on page 956 Requirements for Solaris on page 978
881
Key terms
compliance A state of being in accordance with established software and security specification on target machines, or the process of becoming so. compliance check A group of settings used to determine whether a computer or group of computers is compliant or not. There are two types of compliance checks: software and security. compliance report A report that provides information about the patch compliance status of all selected target computers. compliant state The state of conforming to the defined rules of compliance. deployment engine A component of Tivoli Provisioning Manager that runs provisioning workflows. depot server The component that stores files for distribution. Files are uploaded to a depot server using a client and stored in a directory that is specified when the depot server is installed. Depot servers can replicate files to other depot servers. Target computers can download files from depot servers or peers. distribute To disperse software packages, software patches, and software stacks to be installed over one or more targets. distribution infrastructure A framework for software distribution supporting software management tasks including configuration, distribution, installation, and asset inventory management. noncompliance The failure to comply with compliance checks. region A logical grouping of depot servers. Regions typically group depot servers by network proximity or geographical region to optimize replication and download times.
scalable distribution infrastructure A solution that ensures fast and reliable software distribution to large numbers of target computers in a variety of topologies. It enables central management of software distribution, and relies on core services such as Tivoli Common Agent services, the dynamic content delivery, and device manager service to perform the actual software distribution and federated job management operations. service access point (SAP) The protocol and credentials associated with an IT asset for authentication of remote operations. An IT asset can have more than one service access point. zone An IP range or domain that is used to logically group computers into regions. You can define one or more zones for each region.
Troubleshooting
v Patch management troubleshooting checklist on page 992 v Log files on page 996 v Patch management problems and limitations on page 997 v Patch messages v Support information about patch management v Contacting Support
882
Log files
Follow the steps below and review the indicated log files to recover from patch management problems: v Scalable distribution infrastructure patch acquisition v Scalable distribution infrastructure patch installation v Windows patch installation v Scalable distribution infrastructure patch scan v Solaris patch management log files
Scalable distribution infrastructure patch acquisition If you encounter patch management errors during patch acquisition using the scalable distribution infrastructure, check the following log file for details: v
Windows
Scalable distribution infrastructure patch installation If you encounter patch management errors during patch installation using the scalable distribution infrastructure, check the following log files for details: v v v
Windows Red Hat SUSE
<systemdrive>:\Windows\windowsupdate.log <agent logs> /tmp/tpminstallupdates.log (on target computers) /tmp/tpmzypperinstallupdates.log (on target computers)
Windows patch installation If you encounter problems during patch installation on Windows using Windows Server Update Services, check the <systemdrive>:\Windows\windowsupdate.log log file. Scalable distribution infrastructure patch scan If you encounter patch management errors during a patch scan using the scalable distribution infrastructure, check the following log files for details: v v v
Windows Red Hat SUSE
%TEMP%\<date>__patchscan__<time>.log <agent logs> /tmp/tpmscanupdates.log (on target computers) /tmp/tpmzypperscanupdates.log (on target computers)
Solaris patch management log files The following table provides information about where you can find Solaris patch management log files.
Table 164. Solaris patch management log files Description Information about applied or uninstalled patches Information about patches installed successfully Log files /var/sadm/spool/sunucLog/job_history.log /var/sadm/<patch id>/log
883
Resources
To learn more about patch management, refer to one of the following resources: v
Windows Tutorial: Managing patches in Windows environments using the Scalable Distribution Infrastructure on page 895 AIX Red Hat
v v
Tutorial: Managing patches in AIX environments on page 917 Tutorial: Managing patches in Red Hat Enterprise Linux 6 and 5 environments on Tutorial: Managing patches in SUSE Linux Enterprise Server 11 environments on
page 932 v
SUSE
page 955 v
Solaris Tutorial: Managing patches in Solaris environments using Sun Update Connection on page 977 HP UX
v Demo: Patch management across multiple operating systems in the product wiki. v Chapter 9, Deploying patches, on page 877 v Cross platform feature support v For a description of a field in the web interface, press Alt+F1.
Related links Chapter 9, Deploying patches, on page 877 Cross platform feature support Troubleshooting SDI Windows patch management on page 989 Tutorial: Managing patches in Windows environments using the Scalable Distribution Infrastructure on page 895 Tutorial: Managing patches in AIX environments on page 917 Tutorial: Managing patches in Red Hat Enterprise Linux 6 and 5 environments on page 932 Tutorial: Managing patches in SUSE Linux Enterprise Server 11 environments on page 955 Tutorial: Managing patches in Solaris environments using Sun Update Connection on page 977
Patch acquisition
Depending on your platform, you need to complete a procedure to directly acquire patches into the data model. On some platforms, you do not complete the patch acquisition process. The following table provides information about the platforms on which you need to perform patch acquisition.
Uninstalling patches
You can uninstall patches on some platforms. Before uninstalling patches, you need to be certain that there are no dependencies on the patches that you are uninstalling and you need an in-depth knowledge of the platform and potential issues that might arise when patches are uninstalled. Do not uninstall patches unless you are certain that the patches are no longer required and that there are no adverse effects on your target computers or environment. The following table provides information about the platforms for which you can uninstall patches.
884
Commit
You need to commit the patch installation only on AIX. Commit is not supported on any other platform.
Proxy support
Depending on your platform, you can use a proxy server. The following table provides information about the platforms for which you can use a proxy server.
Yes
Yes
No
Yes
Yes
Yes
Yes
Yes
No
No
Yes
No
Yes
Yes
No
No
No
Yes
No
No
No
No
Yes
Yes
No
No
No
Yes
Yes
No
Yes
Yes
885
Table 165. Cross platform support (continued) Platform HP-UX Version Patch acquisition Reboot if required Yes Commit No Uninstall No Proxy support No
Supported platforms
You can manage patches for the following Windows operating systems and versions: v Microsoft Windows Server 2008 Standard Edition (x86 64-bit) any SP v v v v v Microsoft Microsoft Microsoft Microsoft Microsoft Windows Windows Windows Windows Windows Server 2008 Standard Edition (x86 32-bit) any SP Server 2008 Enterprise Edition (x86 64-bit) any SP Server 2008 Enterprise Edition (x86 32-bit) any SP Server 2008 R2 Standard Edition (x86 64-bit) any SP HPC (High Performance Computing) Server 2008 R2
v Microsoft Windows 7 Professional (x86 32-bit/ 64-bit) any SP v Microsoft Windows 7 Enterprise (x86 32-bit) any SP v v v v v v v v v v v v Microsoft Windows Windows Windows Windows Microsoft Microsoft Microsoft Microsoft Microsoft Microsoft Microsoft Windows 7 Enterprise (x86 64-bit) any SP Vista Ultimate Edition (x86 64-bit) any SP Vista Ultimate Edition (x86 32-bit) any SP Vista Enterprise Edition (x86 64-bit) Vista Enterprise Edition (x86 32-bit) Windows Server 2003 Standard Edition (AMD 64-bit) any SP Windows Server 2003 Enterprise Edition (AMD 64-bit) any SP Windows Windows Windows Windows Windows Server 2003 Standard Edition (x86 64-bit) any SP Server 2003 Enterprise Edition (x86 64-bit) any SP Server 2003 Standard Edition (x86 32-bit) any SP Server 2003 Enterprise Edition (x86 32-bit) any SP XP Professional (64-bit) any SP
v Microsoft Windows XP Professional (32-bit) any SP The following sections provide information about managing patches in Windows environments using the scalable distribution infrastructure and the deployment engine. v Tutorial: Managing patches in Windows environments using the Scalable Distribution Infrastructure on page 895 v Managing patches in Windows environments using the deployment engine on page 911
886
Patch management includes the processes that are illustrated and detailed later in this section. Roles for each step in the process are noted in parentheses.
Discover computers
Set up environment
Install WUA
Acquire patches
Test patches
Set up compliance Scan for missing patches Approve compliance recommendations Install patches
Legend
Provisioning Administrator Provisioning Configuration Librarian Compliance Analyst Deployment Specialist
1. Discover computers and set up the environment (Provisioning Administrator) This process consists of the following tasks:
887
v Run initial discovery to discover all computers and to add them to the data model. Initial discovery identifies what operating system is installed on your target computers, which is required to make sure that patches for that operating system are acquired in a later step in the process. As part of initial discovery, you group the discovered target computers to manage patches for multiple computers at the same time. Tip: The provisioning configuration librarian can also complete the task of discovering computers. v Depending on the configuration used in your organization, you must set up a number of servers to discover the patches that are released by the vendor. This might include a patch server, download server, and proxy server. v Set up the scalable distribution infrastructure to manage distribution and installation of patches on the target computers. Tip: The provisioning configuration librarian can also complete the task of setting up the infrastructure. 2. Install required software on target computers (Deployment Specialist) This process consists of installing the common agent and Windows Update Agent (WUA) on the target computers. The common agent is a software product that is required for software distribution and software compliance management. WUA is a Windows software product that is required so that you can determine which target computers require patches. 3. Acquire patches (Provisioning Configuration Librarian) This process consists of specifying your patches of interest from those released by the vendor, and bringing those patches into the data model. 4. Test patches Testing patches is recommended as part of the patch management life cycle process. Testing patches ensures that all possible conflicts have been identified in a test environments before installing the patches in the production environment. You can install the patches to defined test environments using the patch installation application, but the actual testing of patches must be performed outside of the provisioning applications. Therefore, this task does not have a role associated with it. Normally, the test engineer in your organization performs this task. 5. Approve patches (Compliance Analyst) This process consists of approving which patches you want to install. Two levels of approval are required: for the entire organization (at the data model level), and per target computer or group of target computers, if a patch is missing from the group. 6. Set up compliance (Compliance Analyst) This process consists of creating compliance checks to determine if the software installed on the target computers matches your requirements. Compliance checks define the state of compliance of your target computers and are used to detect, report, and recommend how to fix noncompliance. You add a patch check to a group of target computers. When doing so, you can identify specific patch approval groups to scan. 7. Scan for missing patches (Provisioning Configuration Librarian) This process consists of scanning the target computers and checking to identify which patches are missing from the target computers. After the scan, a list of missing patches is generated and then the check creates compliance recommendations for each computer or group. 8. Approve compliance recommendations (Compliance Analyst) This process consists of approving the patches that you want to install. You approve patches per target computer or group of computers, if a patch is missing on the target computers. 9. Install patches and monitor patch installation (Deployment Specialist)
888
This process consists of distributing and installing the patches on target computers. You can distribute and install patches at the same time or schedule these tasks separately. You can install patches on a specific target computer or multiple target computers into one task. You can also monitor the progress of patch installation. 10. Verify compliance results (Compliance Analyst) This process consists of validating that the patches were successfully applied to all the target computers. You run the compliance check again to verify that the installed patches are no longer displayed on the list of recommendations.
Supported configurations are presented later in this section. Windows installed on the provisioning server: In the configuration illustrated in the following diagram, the provisioning server has the Windows operating system installed and has direct access to the Internet.
Internet
In the configuration illustrated in the following diagram, the provisioning server has the Windows operating system installed. Internet access is provided using a proxy server.
Internet
Proxy server
UNIX operating system installed on the provisioning server without download server: If the provisioning server has a UNIX operating system installed, but there is no requirement to have a Windows computer (Microsoft patch download server) to extract the cab file that contains the patches, you must complete the following steps: 1. Unset the <wsus-download-server-name> global variable.
Chapter 9. Deploying patches
889
2. Create a variable named cabextractcommand to extract the cab file, setting its value as follows:
cabextract _CAB_FILE_NAME_ -d _WORKING_DIRECTORY_
Important considerations: v The cabextract variable and the <wsus-download-server-name> variable are alternatives for extracting the .cab files on UNIX systems and you cannot use them together. If you are using the cabextract variable, you cannot use the <wsus-download-server-name> variable. v The cabextract utility that you use must be supported by the UNIX operating system that is installed on the provisioning server. v Do not include any paths in the cabextract command. v Make sure that the executable file is in the system path. UNIX operating system installed on the provisioning server with download server: In the configuration illustrated in the following diagram, the provisioning server has a UNIX operating system installed, for example AIX or Red Hat Linux. A computer called the Microsoft patch download server is used to download and extract the .cab files from the Internet. The Microsoft patch download server has the Windows operating system installed.
Internet
In the configuration illustrated in the following diagram, the provisioning server has a UNIX operating system, such as AIX or Red Hat Linux, installed. A computer, called the Microsoft patch download server, downloads and extracts the .cab files from the Internet. The Microsoft patch download server has the Windows operating system installed. Internet access is provided using a proxy server.
890
Internet
Proxy server
Note: Downloaded patches are saved in .zip format. If you download a large number of patches, ensure that the native extract utility installed on the UNIX provisioning server has large file support. Related tasks Setting up the target restart notification on page 610 Related information Setting up the proxy server on page 900 Tutorial: Managing patches in Windows environments using the Scalable Distribution Infrastructure on page 895 Windows environments using the scalable distribution infrastructure on page 887
891
If you use a Microsoft Windows Server Update Services server to acquire patches over the scalable distribution infrastructure, you require the following Microsoft components: Microsoft Windows Server Update Services (WSUS) server The WSUS server is a computer that is connected to the Microsoft Update Web site to get the latest patches. The system administrator must ensure that this computer is maintained. This is a manual process performed outside of the provisioning server. To be able to install patches on target computers that belong to a provisioning group, you create an association between the WSUS server and that group. After this association is established, all the approved patches can be installed on the target computers. Multiple provisioning groups can use the same WSUS server. If more than one WSUS server is used in your organization, at least one of them must connect to the Microsoft Update Web site to obtain the available updates. This WSUS server can then be used as an update source for all of the other WSUS servers. After installing the WSUS server, synchronize it with the Microsoft Update Web site to get the latest software updates. By default, the WSUS server is configured to use the Microsoft Update Web site as the location to obtain updates. To automatically update your WSUS server with the latest Windows patches, ensure that synchronization with the Microsoft Update Web site is enabled. Based on the software security policy in your organization, schedule synchronization to update the WSUS server. For more information about the synchronization feature, see your WSUS documentation. Windows Update Agent (WUA) The client component installed on the target computers is required to receive updates either from a WSUS server or directly from the Microsoft Update site. If the target computers belong to a provisioning group that is not associated with a WSUS server, the WUA clients installed on the target computers are set up to connect to the Microsoft Update site to search for the latest patches, download them, and then install them on the target computers. If a proxy server is present, the WUA client uses the Internet Explorer settings for authentication. The proxy server must be configured outside the provisioning applications. Verify that the following requirements are met: v The WSUS server must have WSUS 3.0 and Microsoft .NET Framework 3.5 installed on it. Review the software and hardware requirements, and then download and install Microsoft Windows Server Update Services and its prerequisites using the documentation from the Microsoft Web site. Run initial discovery to add the WSUS server to the data model. v User roles for patch management are listed in the User roles and requirements on page 896 topic. v Requirements for the target computers are listed in the Requirements for Windows target computers on page 556 topic. To associate the WSUS server with the target computers, create a variable named WSUServer with the value http://<WSUS_server_name>:<port_number> or https://<WSUS_server_name>:<port_number>, where WSUS_server_name is the name of the WSUS server. This computer must exist in the data model. If using the https:// notation, make sure that the target computers trust the certificate from the WSUS server. If you are using a WSUS server over the scalable distribution infrastructure, you must set the wsus-over-sdi global variable for the patch provisioning and deployment. By default, a configuration including a WSUS server uses the deployment engine for patch provisioning, rather than scalable distribution infrastructure. Setting the wsus-over-sdi global variable, the patch provisioning on targets having scalable distribution infrastructure service access points are performed over the deployment engine using WSUS, other tasks like Inventory or Software Distribution are performed over the scalable distribution infrastructure. To set the wsus-over-sdi global variable, complete the following steps: 1. Click Go To > Administration > Provisioning > Provisioning Global Settings. 2. Click the Variables tab.
892
3. Click New Row to create the wsus-over-sdi global variable. 4. Enter the following details for the WSUS variable: a. In the Variable field, enter wsus-over-sdi. b. In the Component field, select Entire system. c. In the Value field, type true. d. Save the changes.
Note: v An Internet-facing computer with a fast connection is recommended. Running the offline collection of patches must be done after Microsoft's Patch Tuesday. It must also be run if high-priority patches are released by Microsoft. v The ms_patch_download_offline.sh/.cmd command can accept the optional flag -cabextract, which causes the extraction of the wsusscn2.cab file to take place on the Internet-facing Windows computer. This can be useful if the provisioning server is on UNIX (which does not include any cab-extraction utilities) and the cabextractcommand global variable is not used. To acquire Windows patches offline using the Tivoli Provisioning Manager web interface:
893
Procedure
1. Set the global variable ms.sdi.patch.use.offline to true. 2. Run the workflow MS_Patch_Generate_Offline_Script with no parameters. 3. Copy the ms_offline_patch_scripts.tar/.zip to the Internet-facing computer (the bundle is located in /tmp or /cygwin/tmp) . 4. Decompress the bundle ms_offline_patch_scripts.tar/.zip and enter the ms_patch_download_offline.sh/.cmd command. This creates the offline_patches.tar/zip file. The ms_patch_download_offline.sh/.cmd command accepts the optional flag -cabextract, which performs the extraction of the wsusscn2.cab file to the Internet-facing Windows computer. For example, ms_patch_download_offline.cmd -cabextract. 5. Copy the file offline_patches.tar/.zip to the TIO_HOME/repository/wua directory. 6. Run the workflow MS_Patch_Process_Offline_Download_Bundle to import the patch bundle. 7. Set the properties for the Microsoft Updates Discovery configuration, and then run it. This populates the data model with patch metadata. 8. The metadata is used to generate all the download commands. 9. Repeat steps 2 through 7. Once complete, you can scan and deploy patches into the infrastructure.
Results
After you have completed steps 1-9, you can begin scanning targets while repeating the steps 2-7, which populate the actual patch data. Cabextract support on UNIX: When UNIX-based cab-extraction utilities are supported, to enable this functionality: Procedure 1. Create a global variable named cabextractcommand. 2. In this variable, include the full cabextract command with Tivoli Provisioning Manager placeholders. For example: v If the command uses the following syntax:
cabextract <cab_file_Name> -d <extract_directory>
v Substitute with:
cabextract _CAB_FILE_NAME_ -d _WORKING_DIRECTORY_
3. Enter the cabextract command. It looks similar to this: Note: Do not include paths in the cabextract command. Ensure that the executable is in the user path.
cabextract wsusscn2.cab -d /tmp/update
The command extracts wsusscn2.cab to the /tmp/update directory. Processing the cab file without cabextract: When the Tivoli Provisioning Manager is running on UNIX, but the cabextract utility is not supported, you can process the wsusscn2.cab file on a Windows Internet-facing computer. To enable this functionality, add the option cabextract to the download command. v For example:
ms_patch_download_offline.cmd -cabextract
894
Depending on the speed of the Windows Internet-facing computer, it might take about 10 minutes longer to process the downloads. The size of the offline_patches.tar/zip bundle file will also be about 100 MB larger. The rest of the process is automated, and Tivoli Provisioning Manager automatically uses the decompressed data, if present. Note: If the import fails on the UNIX provisioning server, and the offline_patches.tar/zip file has been removed by the provisioning workflow, it might be required that the bundle be copied to the UNIX Tivoli Provisioning Manager server. For more information, see MS_Patch_Offline_For_SDI.
Tutorial: Managing patches in Windows environments using the Scalable Distribution Infrastructure
This tutorial demonstrates patch management using the scalable distribution infrastructure, on target computers that have the Windows operating system installed. The scalable distribution infrastructure allows you to manage a large number of target computers in various topologies. It provides a fast and reliable way to scan, distribute and install patches on target computers that require them.
Learning objectives
This topic applies to patch management for Windows environments using the Scalable Distribution Infrastructure (SDI).
In this tutorial, you learn how to: v Discover and group target computers v Set up servers, infrastructure, and target computers v Acquire patches v Approve patches v Set up compliance for the target computers v v v v Scan the target computers for missing patches Distribute patches Install patches Verify compliance results
Allow several hours to discover your target computers, set up the infrastructure, set up the target computers, and install the patches on them. Acquiring the patches from the Microsoft Web site might take four to six hours depending on the number of patches that are available and your connection speed.
Prerequisites
Before you start, verify that your systems meet the requirements listed in Requirements for Windows. Modules in this tutorial v Requirements for Windows v Part 1: Environment setup on page 897 v Part 2: Day-to-day tasks on page 904 Requirements for Windows:
895
Before you start managing patches in Windows environments using the scalable distribution infrastructure, ensure that your systems meet all of the requirements.
This topic applies to patch management for Windows environments using the Scalable Distribution Infrastructure (SDI).
You can manage patches for the following Windows operating systems and versions using the scalable distribution infrastructure: v Microsoft Windows Server 2008 Standard Edition (x86 64-bit) any SP v Microsoft Windows Server 2008 Standard Edition (x86 32-bit) any SP v Microsoft Windows Server 2008 Enterprise Edition (x86 64-bit) any SP v Microsoft Windows Server 2008 Enterprise Edition (x86 32-bit) any SP v Microsoft Windows Server 2008 R2 Standard Edition (x86 64-bit) any SP v v v v v v v v v v v v v Microsoft Microsoft Microsoft Windows Windows Windows Windows Microsoft Microsoft Microsoft Microsoft Microsoft Microsoft Windows 7 Professional (x86 32-bit/ 64-bit) any SP Windows 7 Enterprise (x86 32-bit) any SP Windows 7 Enterprise (x86 64-bit) any SP Vista Ultimate Edition (x86 64-bit) any SP Vista Ultimate Edition (x86 32-bit) any SP Vista Enterprise Edition (x86 64-bit) Vista Enterprise Edition (x86 32-bit) Windows Server 2003 Standard Edition (AMD 64-bit) any SP Windows Windows Windows Windows Windows Server 2003 Standard Edition (x86 64-bit) any SP Server 2003 Enterprise Edition (x86 64-bit) any SP Server 2003 Standard Edition (x86 32-bit) any SP Server 2003 Enterprise Edition (x86 32-bit) any SP XP Professional (64-bit) any SP
v Microsoft Windows XP Professional (32-bit) any SP User roles and requirements: To perform the tasks in patch management, ensure that you have the required knowledge and access permissions to perform your role.
This topic applies to patch management for Windows environments using the Scalable Distribution Infrastructure (SDI). Table 167. Roles and skills for patch management in Windows environments Role Provisioning Administrator Provisioning tasks v Discover and group target computers v Set up servers and infrastructure Skills v Knowledge of the provisioning environment v Knowledge of the Windows operating system v Knowledge of Internet technologies v Knowledge of scalable distribution infrastructure
896
Table 167. Roles and skills for patch management in Windows environments (continued) Role Provisioning Configuration Librarian Provisioning tasks v Acquire patches v Scan the target computers for missing patches v Organize and maintain the patch catalog v Create and maintain patch groups, delete patches from the data model Compliance Analyst v Approve patches in the data model v Knowledge of the Windows operating system v Set up compliance v Perform patch check v Approve compliance recommendations v Verify compliance results Deployment Specialist v Install required software on target computers v Publish patches v Distribute patches v Unpublish patches v Implement compliance recommendations to install missing patches v Monitor patch installation v Uninstall patches v Knowledge of the Windows operating system v Knowledge of the patch management life cycle v Knowledge of the patch management life cycle Skills v Knowledge of the Windows operating system v Knowledge of the patch management life cycle
Server requirements: If your Tivoli Provisioning Manager server is not a Windows system, see the Configuration section. Otherwise, there are no specific requirements.
This topic applies to patch management for Windows environments using the Scalable Distribution Infrastructure (SDI).
Target computer requirements: There are no specific requirements for target computers for managing patches in Windows environments using the scalable distribution infrastructure. However, the common agent is required on target computers to complete many Tivoli Provisioning Manager tasks. You might also want to install a specific version of Windows Update Agent.
This topic applies to patch management for Windows environments using the Scalable Distribution Infrastructure (SDI).
Part 1: Environment setup: Before starting to manage patches for Windows environments, you must set up the servers depending on the configuration that you are using. Also, you must set up the scalable distribution infrastructure and install required software on your target computers.
897
This topic applies to patch management for Windows environments using the Scalable Distribution Infrastructure (SDI).
Discovering and grouping target computers: You need to make your target computers known to the data model. To do this, you can run initial discovery. Initial discovery searches for unknown resources and adds them to the data model. For existing resources, the data model is updated with any new or changed information. After that, you can group your target computers so that you can manage patches for multiple computers at the same time. Make sure that the following requirements are met: v Your user role is Provisioning Administrator, Provisioning Configuration Librarian, or equivalent. v Your target computers meet the requirements listed in the Target computer requirements on page 897 topic.
This topic applies to patch management for Windows environments using the Scalable Distribution Infrastructure (SDI).
Tip: You can use the Computer Discovery, Common Agent Installation and Inventory Discovery discovery wizard to run a network discovery of the computers, install the common agent on these computers, and run a hardware and software scan. For more information, see Discovering your environment using the ready-to-use network discoveries on page 231. To discover and group your target computers, complete the following steps: 1. Click Go To > Discovery > Provisioning Discovery > Discovery Configurations. Tip: To perform this task from the Start Center, click Discovery Configurations under Provisioning administration applications or Discovery and task applications. 2. Find the discovery configuration called Initial Discovery and click its name on the list. 3. Click the IP Address Ranges tab. 4. Click New Row. 5. In the Start and End fields, type the IP addresses of your target computers. After each set of IP addresses, click New Row. Tip: You can also specify subnetworks that you want to discover. If, for example, all the target computers that you want to discover are in a LAN, click the Subnetworks tab and specify the IP address and mask for the LAN. After specifying each subnetwork, click New Row. 6. Click the Credentials tab. 7. Click New Row. 8. Type the user name and password. After each set of credentials, click New Row. If you specify more than one set of credentials, those credentials are used for each target computer in the order that they are listed. If the logon attempt on a target computer is successful, the computer is added to the data model. Notes: v The system attempts to connect to each IP address using each user name and password provided until it finds a user name and password that it can use to connect successfully. This might cause user accounts to be locked out, depending on the security policy enforced on the target computers. v You might need to increase the default timeout value if you are on a slower network or you are attempting to discover slower computers.
898
9. In the Add Computers to Group field, click Select Value computer to after running initial discovery. Tip: If you want to create a group, see Creating groups. 10. 11. 12. 13.
. Click Save Click Run Discovery. Under Scheduling, specify scheduling options if you want to schedule the task for a later time. Under Notification, specify notification options if you want users to be notified about the task status. 14. Click Submit. 15. On the Provisioning Task Tracking page, click Refresh to update the task status until the task is completed. The discovery task is displayed with a status of Success on the Provisioning Task Tracking page and the discovered computers are recorded in the details of the discovery task. Setting up the patch server: When you set up a patch server, you can use it to connect to the Internet, download, and store locally the required patches. You can then make the downloaded patches available in your environment. To set up the patch server, perform the steps in this topic. If you do not set up the patch server, Provisioning Manager downloads the patches directly. To use the provisioning server as patch server, do not set up patch server explicitly. If you are using the provisioning server as the patch server, the provisioning server must have access to the internet. If the provisioning server has a UNIX operating system installed, you can configure a Microsoft patch download server to download and extract the .cab files from the Internet. This computer must have the Windows operating system installed. Note that the patch download server is not a Microsoft Windows Server Update Services server. If you are using a WSUS server, you need to set it up separately. Make sure that the following requirements are met: v Your user role is Provisioning Administrator or equivalent. v The Microsoft patch download server meets the requirements listed in the Server requirements on page 897 topic.
This topic applies to patch management for Windows environments using the Scalable Distribution Infrastructure (SDI).
If you are setting up a Microsoft patch download server, perform the task documented in this section. Alternatively if you want to manage patches when the provisioning server has a UNIX operating system installed, but without a Windows computer as the Microsoft patch download server, see the Components for Windows environments using SDI on page 889. To define the patch server in the data model: 1. Click Go To > Administration > Provisioning > Provisioning Global Settings. Tip: To perform this task from the Start Center, click Provisioning Global Settings under Provisioning administration applications. 2. Click the Variables tab. 3. Find the wsus-download-server-name variable and set its value to the fully qualified name of the Microsoft patch download server.
899
Note: The wsus-download-server-name variable is unrelated to the WSUS server, if you are using a WSUS server to acquire patches. This is a separate variable and the patch download server you are setting up here is not the WSUS server. 4. Click Save .
Setting up the proxy server: When the provisioning server is installed on a Windows computer that has Internet access using a proxy server, you must set up the proxy server. Make sure that your user role is Provisioning Administrator or equivalent.
This topic applies to patch management for Windows environments using the Scalable Distribution Infrastructure (SDI).
You need to perform a number of tasks to set up the proxy server. Defining the proxy server in the data model: To define the proxy server in the data model: 1. Click Go To > Deployment > Provisioning Computers. Tip: To perform this task from the Start Center, click Provisioning Computers under Automation development applications. 2. In the Computer field, type the name of the computer where the Windows patches will be downloaded (Microsoft patch download server or provisioning server). In the list, click the computer name. 3. Click the Credentials tab. 4. Click Add Credentials > New Service Access Point. 5. Type a name for the service access point. 6. 7. 8. 9. In the Protocol Type field, click Network protocol IPv4. In the Application Protocol field, click HTTP Access. In the Context field, type WUA. Type the port number for the proxy server, for example, 8080.
Note: Port 8080 is the default port for most proxy servers. If you are using a different proxy server port in your environment, type the correct proxy server number. 10. In the Domain field, type the fully qualified host name or IP address of the proxy server. 11. Select the Host check box. 12. If the proxy server requires authentication, select the Authentication check box. Otherwise, leave this check box blank. 13. Click New Password Credential. 14. In the Search Key field, type wua-download. 15. Type the user name and the password for the proxy server. 16. Click Save .
Configuring your Internet browser to use a proxy server: To configure your Internet browser to use a proxy server: 1. In the Microsoft Internet Explorer window, click Tools > Internet Options.
900
2. Click the Connections tab, and then click LAN Settings. 3. On the Local Area Network (LAN) Settings window, under Proxy Server, select the Use a proxy server for your LAN check box. 4. In the Address field, type the host name of the proxy server. 5. In the Port field, type the port number for the proxy server, for example, 8080. 6. Clear the Bypass proxy server for local addresses check box and click OK. Related information Setting up the patch server on page 899 Setting up the infrastructure Installing required software on target computers on page 902 Setting up the infrastructure: You can set up a region, a zone, and a depot server, which will be used to distribute and install the patches on the target computers. Make sure that your user role is Provisioning Administrator or equivalent.
This topic applies to patch management for Windows environments using the Scalable Distribution Infrastructure (SDI).
You need to perform a number of tasks to set up the infrastructure. Setting up a region: Regions are used to group depot servers that are located near one another to optimize upload, replication, and download times. When you create a depot server, associate it with a region. You can assign a depot server to only one region. To set up a region: 1. Click Go To > Administration > Provisioning > Dynamic Content Delivery Configuration. Tip: To perform this task from the Start Center, click Dynamic Content Delivery Configuration under Provisioning administration applications. 2. Click the Regions tab. 3. Click New Row. 4. Type a name and a description for the new region. 5. Click Save Setting up a zone: Optionally, you can set up a zone to define an IP address range or a domain name within a region. Regions can be generic, without a real network definition, or they can be specific, when zones are used to define domain names within a region. Zones are used to logically group computers within regions. To set up a zone: 1. Click Go To > Administration > Provisioning > Dynamic Content Delivery Configuration. Tip: To perform this task from the Start Center, click Dynamic Content Delivery Configuration under Provisioning administration applications. 2. On the Dynamic Content Delivery Configuration page, click the Zones tab.
Chapter 9. Deploying patches
901
3. Click New Row. 4. Type a name and a description for the new zone. and click the region that you created in the previous task. 5. In the Regions field, click Select Value 6. Select Domain Name, and then specify the domain that your depot server and target computers are in. 7. Click Save .
Setting up a depot server: A depot server is a system that stores files for distribution. Distribution files are uploaded to a depot server using a client. Uploaded files are stored in a directory that is specified when the depot server is installed. Depot servers can replicate uploaded files to other depot servers to optimize the network traffic. The target computers download the files from the depot servers. To set up a depot server: 1. Click Go To > Administration > Provisioning > Dynamic Content Delivery Configuration. Tip: To perform this task from the Start Center, click Dynamic Content Delivery Configuration under Provisioning administration applications. 2. On the Dynamic Content Delivery Configuration page, click the Depots tab. 3. Click New Row. 4. Type a name and description for the depot server. and click the region that you have created in the previous 5. In the Region field, click Select Value task. This is the region that the depot server is assigned to. 6. In the Computer field, click Select Value set up as a depot server. and click the name of the computer that you want to
Attention: The depot server must not be included in your group of target computers. 7. In the Fully qualified host name field, type the fully qualified host name of the depot server that has already been discovered. 8. Select the Install the depot agent services? check box to install the depot agent services on the depot server. 9. In the Domain Zone Served field, click Select Value previous task. 10. Type the user name and password for the depot server. and select the zone that you set up in the
11. If using only one depot server, select the Preferred upload server check box. At least one preferred depot server is required. . 12. Click Save Related information Setting up the patch server on page 899 Setting up the proxy server on page 900 Installing required software on target computers Installing required software on target computers:
902
You can install the common agent and Windows Update Agent (WUA) on the target computers. The common agent is a software product that is required for software distribution and software compliance management. WUA is a Windows software product that is required so that you can determine which target computers require patches. Make sure that the following requirements are met: v Your user role is Deployment Specialist or equivalent. v The target computers meet the requirements listed in the Target computer requirements on page 897 topic.
This topic applies to patch management for Windows environments using the Scalable Distribution Infrastructure (SDI).
Installing Windows Update Agent: Windows Update Agent (WUA) is required to determine which target computers require patches and to install these patches on the computers. In this task, you download and install WUA on the target computers. If you include a specific version of the Windows Update Agent in the repository, that version is installed on target computers. If you do not include a version of Windows Update Agent in the repository, Tivoli Provisioning Manager downloads the latest version of Windows Update Agent and installs that version on target computers. To install Windows Update Agent (WUA): 1. Click Go To > Deployment > Patch Management > Windows Update Agent Installation. Tip: To perform this task from the Start Center, click Windows Update Agent Installation under Patch management applications. 2. Click Select > Groups and select your group of target computers, then click OK. 3. 4. 5. 6. Under Scheduling, specify scheduling options if you want to schedule the task for a later time. Under Notification, specify notification options if you want users to be notified about the task status. Click Submit. On the Provisioning Task Tracking page, click Refresh to update the task status until the task is completed.
The WUA installation task is displayed with a status of Success on the Provisioning Task Tracking page. In addition, the Windows Update Agent (WUA) software definition is displayed on the Software tab, in the Provisioning Groups page for your group of computers. Installing the common agent: The common agent is a software product that provides infrastructure for management applications. The common agent installed on the target computers provides remote deployment capability, shared computer resources, secure connectivity, and a single entry point. The common agent can be installed once on each target computer. After the common agent is installed on a target computer, subsequent subagents can be installed on the top of an existing common agent. To install the common agent, perform the steps listed later in this section. If you used the Computer Discovery, Common Agent Installation and Inventory Discovery discovery wizard to discover your computers, then the common agent is already installed. Proceed to Acquiring patches on page 904. 1. Click Go To > Deployment > Software Management > Common Agent Installation. 2. Click Select > Groups and select your group of target computers, then click OK. 3. Under Scheduling, specify scheduling options if you want to schedule the task for a later time. 4. Under Notification, specify notification options if you want users to be notified about the task status.
Chapter 9. Deploying patches
903
5. Click Submit. 6. On the Provisioning Task Tracking page, click Refresh to update the task status until the task is completed. The common agent installation task is displayed with a status of Success on the Provisioning Task Tracking page. Related reference Target computer requirements on page 897 Related information Setting up the patch server on page 899 Setting up the proxy server on page 900 Setting up the infrastructure on page 901 Part 2: Day-to-day tasks: After setting up the environment, there are a number of tasks that you must perform as day-to-day patch management activities to ensure that your target computers are always up-to-date with the required patches.
This topic applies to patch management for Windows environments using the Scalable Distribution Infrastructure (SDI).
Acquiring patches: You must set up your model so that you specify which patches you want to check for from the ones that are made available by the vendor. These options that you set include the product family, locale, and severity of the patches. After setting up your options, run a task to bring these patches into the data model. Make sure that the following requirements are met: v Your user role is Provisioning Configuration Librarian or equivalent. Note: Though not a requirement, your patch acquisition might run more smoothly if you turn off Windows Automatic Updates on the target computers. For more information, see the Turning off automatic updates on page 905 topic.
This topic applies to patch management for Windows environments using the Scalable Distribution Infrastructure (SDI).
By default, the ms.sdi.patch.create.bulletin.groups global variable is set to true. When this variable is set to true, Microsoft bulletin groups are imported into the data model when you complete the patch acquisition process. If you do not want to import Microsoft bulletin groups into the data model and want to import individual patches, unset the ms.sdi.patch.create.bulletin.groups global variable. To unset the variable: 1. Click Go To > Administration > Provisioning > Provisioning Global Settings. 2. Click the Variables tab and search for the ms.sdi.patch.create.bulletin.groups variable. 3. Change the ms.sdi.patch.create.bulletin.groups variable setting to false.
To acquire patches: 1. Click Go To > IT Infrastructure > Software Catalog > Patch Acquisition. Tip: To perform this task from the Start Center, click Patch Acquisition under Discovery and task applications.
904
and click Scalable Distribution Infrastructure. 3. From the Infrastructure list, click Select Value 4. Click Select Product Family and select the product family for which you want to acquire patches, then click OK. 5. Optional: To approve the acquired patches automatically, in the Initial Patch Status list, click Select and click APPROVED. This option is useful if you want to mark as approved all the Value patches that have been made available by the vendor, without having to approve them in a later step. 6. Click Select Severity and select the check boxes corresponding to the severity values for the patches that you want to acquire, then click OK. 7. Click Select Products and select the check boxes corresponding to the software products for the patches that you want to acquire, then click OK. 8. Click Select Locale and select the check boxes corresponding to the locales for the patches that you want to acquire, then click OK. 9. Under Scheduling, specify scheduling options if you want to schedule the task for a later time. 10. Under Notification, specify notification options if you want users to be notified about the task status. 11. Click Submit. 12. On the Provisioning Task Tracking page, click Refresh to update the task status until the task is completed. The patch acquisition task is displayed with a status of Success on the Provisioning Task Tracking page. The patches are added into the data model. To view the patches catalog, in the Start Center, click Patches under Favorite applications. Turning off automatic updates: Before acquiring patches for Windows 2003 target computers, you might want to disable the Windows automatic updates. By default, the Windows automatic updates are enabled. If you do not disable them, the operating system and the Patch Acquisition application might attempt to run the same updates, which could block the update process.
This topic applies to patch management for Windows environments using the Scalable Distribution Infrastructure (SDI).
To 1. 2. 3.
disable the automatic updates: On the Windows 2003 desktop, right-click the Computer icon and click Properties. Click the Automatic Updates tab. Select Turn off automatic updates and click OK.
The automatic updates are now disabled. Next you will be acquiring the patches into the data model. Testing patches: It is recommended to test the released patches before installing them, to ensure that all possible conflicts have been identified in a test environment before installing them in the production environment. You can install the patches to a test computer using the Patch Installation application. However, the actual testing of patches must be performed outside of the provisioning applications.
Chapter 9. Deploying patches
905
This topic applies to patch management for Windows environments using the Scalable Distribution Infrastructure (SDI).
Approving patches in the data model: After patches are acquired, the first step in the approval process is to approve the patches for the entire organization (at the data model level). Only the approved patches are included when scanning the target computers for missing patches. For example, in some organizations all patches are approved at the data model level and then the compliance analyst decides which patches to approve per provisioning group. This second step in the approval process is done when scanning for missing patches. In other organizations, there might be particular patches that the compliance analyst does not want to approve immediately after acquisition, because further testing is required before approving. Make sure that your user role is Compliance Analyst or equivalent.
This topic applies to patch management for Windows environments using the Scalable Distribution Infrastructure (SDI).
To approve the acquired patches in the data model: 1. Click Go To > IT Infrastructure > Software Catalog > Patches. Tip: To perform this task from the Start Center, click Patches under Favorite applications. 2. Press Enter to display all patches from the catalog. Tip: You can filter down the list of displayed patches by patch name, version, severity, vendor, release date, and so on. To search for a particular patch, type the patch name in the Patch field, for example, KB921823. To use more search fields, click Advanced Search and customize the options in the window, then click Find. 3. Click Select Records and select the patches that you want to approve, then click Approve. Note: To be able to select records, filter down your list of patches to a maximum of 200. If you want to approve more than 200 patches at the same time, filter down your patches, then click Approve and click OK on the confirmation message. Patches that you have approved are displayed with a status of Approved on the Patches page. Setting up compliance: You can set up a compliance check to verify if patches are required on the target computers. Compliance checks define the compliance state of your target computers and are used to detect, report, and recommend how to fix noncompliance. Make sure that your user role is Compliance Analyst or equivalent.
This topic applies to patch management for Windows environments using the Scalable Distribution Infrastructure (SDI).
To set up compliance: 1. Click Go To > Deployment > Provisioning Groups. Tip: To perform this task from the Start Center, click Provisioning Groups under Provisioning administration applications. 2. Find your group of target computers and click its name on the list.
906
3. Click the Compliance tab. 4. Click New Compliance Check > Patch Check. 5. In the Patch Approval Group field, click Select Value scanned, then click Save. and select a group of patches to be
Tip: By default, all patches that have been approved in the data model are scanned, and target computers are verified against all approved patches to see if computers are compliant. You can also select a patch approval group, which is used to specify a set of allowed patches, or approval lists. The patch approval group limits the patches for which recommendations are generated to the specified set of patches only. You might want to use this option to tightly control patches for critical computers where more exhaustive testing of patches is needed before they are required to be installed. Do not perform the patch check using a software compliance check of type Software Group associated to the Patch Approval Group. Doing this can cause the following problems: v If a software patch contained in the Patch Approval Group is installed, target computers result as compliant. v The check is performed for the specific software patch installation and disregards any relation between the software patches, for example, superseding patches. v The check is performed on all computers belonging to the group and disregards if the software patch is applicable to only certain platforms. 6. Optional: To automatically approve recommendations when they are generated, click Enable Automatic Approval and click OK in the message box. All recommendations that are generated by this compliance check will be created in the Approved state. 7. Click Save .
The Operating System Patches and Updates compliance check is displayed in the list of compliance checks defined for the group of target computers. Scanning for missing patches: You can compare the software installed on your target computers with a list of the patches that have been approved for the entire organization to see which patches are missing on which computers. By default, all patches that have been approved in the data model are scanned, and target computers are verified against all approved patches to see if computers are compliant. You can also select a patch approval group, which is used to specify a set of allowed patches, or approval lists. The patch approval group limits the patches for which recommendations are generated to the specified set of patches only. You might want to use this option to tightly control patches for critical computers where more exhaustive testing of patches is needed before they are required to be installed. To scan for missing patches, some of the patches must in the Approved state, otherwise the scan and check fails. Make sure that at least some of the patches are in the Approved state before you begin this procedure. Make sure that your user role is Provisioning Configuration Librarian or equivalent.
This topic applies to patch management for Windows environments using the Scalable Distribution Infrastructure (SDI).
To scan for missing patches: 1. Click Go To > Deployment > Provisioning Groups. Tip: To perform this task from the Start Center, click Provisioning Groups under Provisioning administration applications. 2. Click your group of target computers. 3. Click the Compliance tab.
Chapter 9. Deploying patches
907
4. Click Run Scan and Check. Tip: If you want to schedule the provisioning task for a later time, click Schedule Scan and Check to specify scheduling options. 5. Click the Notification tab to specify notification options if you want users to be notified about the task status. 6. On the Provisioning Task Tracking page, click Refresh to update the task status until the task is completed. Attention: Wait until the task completes before starting another compliance scan task on the target computers. If you run concurrent compliance scan tasks on a target computer, the tasks might fail. The scanning and checking task is displayed with a status of Success on the Provisioning Task Tracking page. The recommendations to install missing patches are generated. On the Compliance tab for the group, the patch check displays either Yes or No in the Compliant column, depending on whether all required patches are installed on the target computers. If notification was set up, recipients will be notified that recommendations need be approved. Approving compliance recommendations: After scanning your target computers to see which patches are missing on them, compliance recommendations are generated. Based on these recommendations, you can decide which patches you want to install on your target computers. Make sure that your user role is Compliance Analyst or equivalent.
This topic applies to patch management for Windows environments using the Scalable Distribution Infrastructure (SDI).
To approve compliance recommendations: 1. Click Go To > Deployment > Provisioning Groups. Tip: To perform this task from the Start Center, click Provisioning Groups under Provisioning administration applications. 2. Click your group of target computers. 3. Click the Recommendations tab. 4. In the recommendations list, select the check boxes corresponding to the missing patches that you want to approve and click Approve. The selected patches are displayed with a status of Approved on the Recommendations tab. Distributing patches: After patches are approved, you can distribute them first and then install them on the target computers. During distribution, the patch binaries are downloaded into the data model, and then the patch binaries and other files (for example cab file, vbscript) are published to a depot server. From the depot server, patches are distributed for installation on target computers. You can distribute patches immediately or schedule this task for a specified date and time. Make sure that your user role is Deployment Specialist or equivalent.
This topic applies to patch management for Windows environments using the Scalable Distribution Infrastructure (SDI).
908
To distribute patches: 1. Click Go To > Deployment > Patch Management > Patch Distribution. Tip: To perform this task from the Start Center, click Patch Distribution under Patch management applications. 2. Click Select Patches and select the patches that you want to distribute, then click OK. Tip: You can filter down the list of displayed patches by patch name, vendor, and version. To search for a particular patch, type the patch name in the Patch field, for example, KB921823. If multiple software definitions are available for that patch number, for example, Security Update for Windows Server 2003 and Security Update for Windows XP, select the check boxes for all the software definitions that match the patch number. The correct patch, based on the operating system on the target computer, will be distributed to the appropriate target computer. To use more search fields, expand Advanced Search Options and customize the options in the window, then click Refine. Click Select > Groups and select your group of target computers, then click OK. Under Scheduling, specify scheduling options if you want to schedule the task for a later time. Under Notification, specify notification options if you want users to be notified about the task status. Click Submit. On the Provisioning Task Tracking page, click Refresh to update the task status until the task is completed.
3. 4. 5. 6. 7.
The patch distribution task is displayed with a status of Success on the Provisioning Task Tracking page. Installing patches: After patches are approved, you can install them on the target computers where they are missing. Make sure that your user role is Deployment Specialist or equivalent.
This topic applies to patch management for Windows environments using the Scalable Distribution Infrastructure (SDI).
To install patches: 1. Click Go To > Deployment > Provisioning Groups. Tip: To perform this task from the Start Center, click Provisioning Groups under Provisioning administration applications. Click your group of target computers. Click the Recommendations tab. Select all the patches that are approved from the recommendations list and click Implement. Specify the options you want for installing and click Submit. On the Provisioning Task Tracking page, click Refresh to update the task status until the task is completed.
2. 3. 4. 5. 6.
The patch installation task is displayed with a status of Success on the Provisioning Task Tracking page. Verifying compliance results: After installing patches on the target computers, you can verify that patches installed successfully. Make sure that your user role is Compliance Analyst or equivalent.
909
This topic applies to patch management for Windows environments using the Scalable Distribution Infrastructure (SDI).
You can verify compliance results either by running the compliance scan again and verifying the list of recommendations or by running patch reports that provide information about missing patches. Running the compliance scan again: To run the compliance scan: 1. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Groups. Tip: To perform this task from the Start Center, click Provisioning Groups under Provisioning administration applications. Click your group of target computers. Click the Compliance tab. Click Run > Check to run a compliance check before displaying the recommendations so that the results are accurate. Click the Recommendations tab. In the list of recommendations, verify that the installed patches are no longer displayed as missing. Click OK.
2. 3. 4. 5. 6. 7.
Installed patches are no longer listed on the list of recommendations because they are not missing from the target computers. Generating patch compliance reports: To generate patch compliance reports: 1. Click Go To > Deployment > Provisioning Groups. Tip: To perform this task from the Start Center, click Provisioning Groups under Provisioning administration applications. Click the group of target computers to generate the report for. Click the Compliance tab. Click Run > Check to run a compliance check before running the report so that the results are accurate. Click Go To > Administration > Reporting > Report Administration. Search for the report with the description Do Windows servers comply with the patch policy? and click the report name. Click Generate Request Page. After the report is generated, click Close. The report lists all the target computers that have a patch compliance check defined. The Is Compliant column lists the compliance status of the target computers. Click Preview and in the window that is opened click Submit. Tip: You can also generate the report with the description What patches are missing on what Windows servers? to list all the missing patches and their corresponding target computers. Installed patches are not listed because they are not missing from the target computers.
2. 3. 4. 5. 6. 7. 8.
9.
910
Related information Testing patches on page 905 Approving patches in the data model on page 906 Setting up compliance on page 906 Scanning for missing patches on page 907 Approving compliance recommendations on page 908
v Microsoft Windows 7 Enterprise (x86 32-bit) any SP v Microsoft Windows 7 Enterprise (x86 64-bit) any SP v v v v v v v v v v v v Windows Windows Windows Windows Microsoft Microsoft Microsoft Microsoft Microsoft Microsoft Microsoft Microsoft Vista Ultimate Edition (x86 64-bit) any SP Vista Ultimate Edition (x86 32-bit) any SP Vista Enterprise Edition (x86 64-bit) Vista Enterprise Edition (x86 32-bit) Windows Server 2003 Standard Edition (AMD 64-bit) any SP Windows Server 2003 Enterprise Edition (AMD 64-bit) any SP Windows Server 2003 Standard Edition (x86 64-bit) any SP Windows Windows Windows Windows Windows Server 2003 Enterprise Edition (x86 64-bit) any SP Server 2003 Standard Edition (x86 32-bit) any SP Server 2003 Enterprise Edition (x86 32-bit) any SP XP Professional (64-bit) any SP XP Professional (32-bit) any SP
Use one of the following sections for information about managing patches using the deployment engine, depending on whether or not you are using a WSUS server for patch acquisition: v Acquiring patches without using a WSUS server on page 912 v Acquiring patches with a WSUS server on page 912
911
Automation packages
The following automation packages are used for Windows patch management: v MS_WSUS For information about the automation packages, search for automation package descriptions in the information center.
Components
This patch management solution requires the following Microsoft components: Microsoft Windows Server Update Services (WSUS) server The WSUS server is a computer that is connected to the Microsoft Update website to get the latest patches. The system administrator must ensure that this computer is maintained. This is a manual process performed outside of the provisioning server. To be able to install patches on target computers that belong to a provisioning group, you create an association between the WSUS server and that group. After this association is established, all the approved patches can be installed on the target computers. Multiple provisioning groups can use the same WSUS server. If more than one WSUS server is used in your organization, at least one of them must connect to the Microsoft Update website to get the available updates. This WSUS server can then be used as an update source for all of the other WSUS servers.
912
After installing the WSUS server, synchronize it with the Microsoft Update website to get the latest software updates. By default, the WSUS server is configured to use the Microsoft Update website as the location to obtain updates. To automatically update your WSUS server with the latest Windows patches, ensure that synchronization with the Microsoft Update website is enabled. Based on the software security policy in your organization, schedule synchronization to update the WSUS server. For more information about the synchronization feature, see your WSUS documentation. Windows Update Agent (WUA) The client component installed on the target computers is required to receive updates either from a WSUS server or directly from the Microsoft Update site. If the target computers belong to a provisioning group that is not associated with a WSUS server, the WUA clients installed on the target computers are set up to connect to the Microsoft Update site to search for the latest patches, download them, and then install them on the target computers. If a proxy server is present, the WUA client uses the Internet Explorer settings for authentication. The proxy server must be configured outside the provisioning applications.
Requirements
Verify that the following requirements are met: v The WSUS server must have WSUS 3.0 and Microsoft .NET Framework 3.5 installed on it. Review the software and hardware requirements, and then download and install Microsoft Windows Server Update Services and its prerequisites using the documentation from the Microsoft Web site. Run initial discovery to add the WSUS server to the data model. v User roles for patch management are listed in the User roles and requirements on page 896 topic. v Requirements for the target computers are listed in the Requirements for Windows target computers on page 556 topic.
Automation packages
The MS_WSUS automation package is used for Windows patch management: For information about automation packages, search for automation package descriptions in the information center.
913
Discover computers
Set up environment
Acquire patches
Test patches
Set up compliance
Legend
Provisioning Administrator Provisioning Configuration Librarian Compliance Analyst Deployment Specialist Verify compliance results
1. Discover computers and set up the environment (Provisioning Administrator) This process consists of the following tasks: v Run initial discovery to discover all computers and to add them to the data model. Initial discovery finds out what operating system is installed on your target computers, which is required to make sure that patches for that operating system will be acquired in a next step in the process. Also, the AIX satellite server that is part of your configuration is added to the data model. Tip: The task of discovering computers can also be performed by the provisioning configuration librarian. v Group the discovered target computers to manage patches for multiple computers at the same time.
914
2. Acquire patches (Provisioning Configuration Librarian) This process consists of specifying your patches of interest from those released by the vendor, and bringing those patches into the data model. 3. Test patches Testing patches is recommended as part of the patch management life cycle process. Testing patches ensures that all possible conflicts have been identified in a test environments before installing the patches in the production environment. You can install the patches to defined test environments using the patch installation application, but the actual testing of patches must be performed outside of the provisioning applications. Therefore, this task does not have a role associated with it. Normally, the test engineer in your organization performs this task. 4. Set up compliance (Compliance Analyst) This process consists of creating compliance checks to determine if the software installed on the target computers matches your requirements. Compliance checks define the state of compliance of your target computers and are used to detect, report, and recommend how to fix noncompliance. You add a patch check to a group of target computers. When doing so, you can identify specific patch approval groups to scan. 5. Scan for missing patches (Provisioning Configuration Librarian) This process consists of scanning the target computers and checking to identify which patches are missing from the target computers. After the scan, a list of missing patches is generated and then the check creates compliance recommendations for each computer or group. 6. Approve compliance recommendations (Compliance Analyst) This process consists of approving the patches that you want to install. You approve patches per target computer or group of computers, if a patch is missing on the target computers. 7. Install patches and monitor patch installation (Deployment Specialist) This process consists of installing the patches on target computers. You can install patches on a specific target computers or multiple target computer into one task. 8. Verify compliance results (Compliance Analyst) This process consists of validating that the patches were successfully applied to all the target computers. You run the compliance check again to verify that the installed patches are no longer displayed on the list of recommendations.
915
Provisioning server
Internet
The required components are the target computers and the AIX satellite server. The AIX satellite server connects to the AIX Fix Center over the Internet to download the AIX patches. The AIX satellite server is defined as a target computer in your configuration. Downloaded patches are moved to the provisioning server. The patches are distributed to the target computers from the provisioning server. Optionally, you can use a proxy server to provide Internet access to the AIX satellite server. In this configuration, you must set up SUMA to work with a proxy server. For information about how to configure SUMA, see the System p and AIX information center.
916
Note: Downloaded patches are saved in .zip format. If you download a large number of patches, ensure that the native extract utility installed on the AIX provisioning server has large file support.
Fix types
You can download the following fix types, which are available from the IBM Support Web site. Technology Level (TL), previously known as Maintenance Level (ML) Technology level fixes contain new hardware and software features and updates. They are intended to be installed as a whole, to avoid working with individual updates and installing configurations that are not supported. After you apply a Technology level fix, you cannot reject it. Technology level fixes are supported for two years. Service Pack Service packs, which are released between Technology Levels, contain fixes for customer reported problems (APARs) that cannot wait until the next Technology Level. These fixes address critical problems. Service packs are released approximately every 8-12 weeks. Related concepts Patch management process on page 914 Managing patches in AIX environments on page 913 Related reference Requirements for AIX on page 918
Learning objectives
In this tutorial you will learn how to: v Discover and group target computers. v Acquire patches. v Set up compliance for the target computers. v Scan the target computers for missing patches. v Distribute patches. v Install patches. v Verify compliance results. Allow several hours to discover and group your target computers, and to install the patches on them. Getting the list of missing patches from the AIX FIX Center might take two hours depending on the number of patches that are available and your connection speed.
Prerequisites
Before you start, verify that you meet the requirements listed in Requirements for AIX on page 918. Modules in this tutorial v Requirements for AIX on page 918 v Part 1: Environment setup on page 920 v Part 2: Day-to-day tasks on page 921
917
User roles and requirements: To perform the tasks in patch management, ensure that you have the required knowledge and access permissions to perform your role.
Table 168. Roles and skills for patch management on AIX Role Provisioning Administrator Provisioning tasks v Discover target computers v Group target computers Skills v Knowledge of the of the provisioning environment v Knowledge of the AIX operating system v Knowledge of Internet technologies Provisioning Configuration Librarian v Acquire patches v Scan the target computers for missing patches Compliance Analyst v Set up compliance v Approve compliance recommendations v Verify compliance results Deployment Specialist v Install patches v Monitor patch installation v Uninstall patches v Knowledge of the AIX operating system v Knowledge of the patch management life cycle v Knowledge of the AIX operating system v Knowledge of the patch management life cycle v Knowledge of the AIX operating system v Knowledge of the patch management life cycle
Server requirements: There are a number of requirements that must be met by the AIX satellite server so that you can manage patches in AIX environments. Satellite server requirements The AIX satellite server must meet the following requirements: v Operating system: AIX 5L Version 5.3 TL5 (5300-05) or later v Service Update Management Assistant (SUMA) must be installed. SUMA is included with the following AIX versions: AIX 5L Version 5.3. AIX 7.1 TLO SP3 (7100-00-03).
918
Note: The suma command is used to download updates for the satellite server from the AIX Fix Center. The suma command requires root permissions or equivalent. Ensure that the credentials used by the provisioning server to access the satellite server has root permissions or equivalent. v Internet access, either directly, or using a proxy server. v Recommended: Has a file system mounted on the directory where you plan to download your patches. This directory must have a minimum of 20 GB of space and the possibility to extend it. To find out the directory that is used by your system, run the command:
suma -D
The output of the command displays the patch download directory in the DLTarget field. The default directory is /usr/sys/inst.images. Target computer requirements: There are a number of requirements that must be met by the target computers so that you can manage patches in AIX environments. Note: All prerequisites of the target should also be met by the satellite server. Ensure that the following prerequisites are met on all the target computers running AIX.
Table 169. Requirements for AIX Requirement Command prompt Details When running scriptlets, the provisioning server expects that the command prompt ends in $, # or >. The PS1 environment variable governs the appearance of the prompt. If you change this variable on your target computer (managed-to) or provisioning server (managed-from), you might run into problems running provisioning workflows. The following examples show command prompts you can use: command$ $ command# # command> > There has to be a blank character at the end of the prompt on AIX target computer in order to run on it a workflow containing a scriptlet (bash / perl). If a blank character is not present at the end of the prompt then the scriplets (both perl and bash) called inside a workflow stop and do not return to executing workflow. Required packages v openSSH 4.4 or later v bash v Expect 5.4 or later (required for compliance patch management) Tip: OpenSSH for AIX 5 can be obtained from https://sourceforge.net/projects/ openssh-aix.
919
Table 169. Requirements for AIX (continued) Requirement Package locations Details The location of the shells or script interpreters is important because scripts that are run must include this information about the first line of the script. Ensure that the packages are installed in the following locations. v Bash location: /usr/bin/bash v Expect location: /usr/bin/expect v Perl location: /usr/bin/perl Note: Expect is only required to be installed on a target computer if a certain automation package runs expect code on the target computer itself. This installation is optional depending on the requirements. The runtime code, which is a The xlC.rte 6.0 runtime code can be downloaded as a fix from the AIX Support site prerequisite of GSKit7 on at: https://techsupport.services.ibm.com/server/aix.fdc. AIX 5.2.
920
Notes: v The system attempts to connect to each IP address using each user name and password provided until it finds a user name and password that can be used to connect successfully. This might cause user accounts to be locked out, depending on the security policy enforced on the target computers. v You might need to increase the default timeout value if you are on a slower network or you are attempting to discover slower computers. 9. 10. 11. 12. . Click Save Click Run Discovery. Under Scheduling, specify scheduling options if you want to schedule the task for a later time. Under Notification, specify notification options if you want users to be notified about the task status. 13. Click Submit. 14. On the Provisioning Task Tracking page, click Refresh to update the task status until the task is completed. The discovery task is displayed with a status of Success on the Provisioning Task Tracking page. Note: If you want to use the provisioning server as your satellite server, make sure that your provisioning server meets the requirements listed in the Server requirements on page 918 topic, then follow the steps to set up your provisioning server as documented in the Setting up the provisioning server as a satellite server topic. Grouping target computers: Defining groups is a way of organizing managed computers for patch management and other tasks. You can group your target computers so that you manage patches for multiple computers at the same time. Make sure that the following requirements are met: v Your user role is Provisioning Administrator, Provisioning Configuration Librarian, or equivalent. v Your target computers meet the requirements listed in the Target computer requirements on page 919 topic. To group the target computers: 1. Click Go To > Deployment > Provisioning Groups. Tip: To perform this task from the Start Center, click Discovery Configurations under Provisioning administration applications or Discovery and task applications. . 2. Click New 3. Type a name and description for the new group. and click Computer. 4. In the Member Type field, click Select Value 5. Click Add Members and select your target computers, then click OK. Attention: Do not select the AIX satellite server as part of the group, because you will not manage patches for the satellite server together with the target computers. 6. Click Save .
921
Acquiring patches: You must set up your model so that you specify which patches you want to check for from the ones that are made available by the vendor. You might want to check for all AIX patches that are made available regardless of the version, or you might want to check for a specific version only, for example, patches that apply to AIX version 6.1. After setting up your options, you can download these patches into the data model. Make sure that your user role is Provisioning Configuration Librarian or equivalent. Note: Starting with AIX 7.1, SUMA uses eCC (Electronic Customer Care) to retrieve AIX updates. It will download AIX 5.3 TL6 and later updates, as 5.3 TL6 is the starting level of updates that are loaded into eCC. To acquire patches: 1. Click Go To > IT Infrastructure > Software Catalog > Patch Acquisition. Tip: To perform this task from the Start Center, click Patch Acquisition under Discovery and task applications. 2. In the Operating System list, click Select Value systems. 3. In the Satellite Server list, click Select Value list of computers. and click AIX from the list of operating and click the name of the satellite server from the
4. Click Refresh TL/SP Definitions to bring all available AIX patches, whether for version 7.1, 6.1, 5.3, or 5.2 into the data model. 5. Click Submit. 6. On the Provisioning Task Tracking page, click Refresh to update the task status until the task is completed. 7. Click Go To > IT Infrastructure > Software Catalog > Patch Acquisition. 8. Under Scheduling, specify scheduling options if you want to schedule the task for a later time. 9. Under Notification, specify notification options if you want users to be notified about the task status. 10. Under Technology Levels and Service Packs, select the check boxes corresponding to the patches that you want to acquire and click Download Patches. This step is mandatory for the selected patches to be considered for installation. 11. Click Submit. 12. On the Provisioning Task Tracking page, click Refresh to update the task status until the task is completed. The patch acquisition task is displayed with a status of Success on the Provisioning Task Tracking page. The patches are added into the data model. To view the patches catalog, in the Start Center, click Patches under Favorite applications. Testing patches: It is recommended to test the released patches before installing them, to ensure that all possible conflicts have been identified in a test environment before installing them in the production environment. You can install the patches to defined test environments using the Patch Installation application, but the actual testing of patches is to be performed outside of the provisioning applications. Setting up compliance:
922
You can set up a compliance check to verify if patches are required on the target computers. Compliance checks define the compliance state of your target computers and are used to detect, report, and recommend how to fix noncompliance. Make sure that your user role is Compliance Analyst or equivalent. This topic shows you how to set up compliance using the Latest Level scan model. To customize your scan model, see the Customizing the patch scanning model topic. To set up compliance: 1. Click Go To > Deployment > Provisioning Groups. Tip: To perform this task from the Start Center, click Provisioning Groups under Provisioning administration applications. 2. Find your group of target computers and click its name on the list. 3. Click the Compliance tab. 4. Click New Compliance Check > Patch Check. 5. In the Select Patch Group dialog, click Save. Tip: By default, all patches that have been approved in the data model are scanned, and target computers are verified against all approved patches to see if computers are compliant. You can also select a patch approval group, which is used to specify a set of allowed patches, or approval lists. The patch approval group limits the patches for which recommendations are generated to the specified set of patches only. You might want to use this option to tightly control patches for critical computers where more exhaustive testing of patches is needed before they are required to be installed. Do not perform the patch check using a software compliance check of type Software Group associated to the Patch Approval Group. Doing this can cause the following problems: v If a software patch contained in the Patch Approval Group is installed, target computers result as compliant. v The check is performed for the specific software patch installation and disregards any relation between the software patches, for example, superseding patches. v The check is performed on all computers belonging to the group and disregards if the software patch is applicable to only certain platforms. 6. Optional: To automatically approve recommendations when they are generated, click Enable Automatic Approval and click OK in the message box. All recommendations that are generated by this compliance check will be created in the Approved state. 7. Click Save .
The Operating System Patches and Updates compliance check is displayed in the list of compliance checks defined for the group of target computers. Customizing the patch scanning model: If you want to change the default patch scanning model, which scans only the latest level for available AIX patches, specify options in a discovery configuration. Make sure that your user role is Compliance Analyst or equivalent. To customize the scanning model: 1. Click Go To > Discovery > Provisioning Discovery > Discovery Configurations.
923
Tip: To perform this task from the Start Center, click Discovery Configurations under Automation development applications . 2. Find the AIX Discover Patches discovery configuration and click it. for the Maintenance Strategy Model field, and click the option that you 3. Click Select Value want for the scanning model: v Latest Level: Scans for the latest available technology level and service pack for the current operating system level. v Recommended: Scans for the latest available technology level and the latest service packs for one level before the latest technology level. v Latest for current TL: Scans for the latest service pack for the current technology level. v Custom: Technology Level + Service Pack: Scans for a specific technology level and service pack for a specific OS version. In the OS Level, Technology Level, and Service Pack fields, select the appropriate values depending on what you want to scan for. The technology level must be the same as your current technology level on the target computer. Tip: You can use the Info: Discover current TL and SP option to display the current technology level and service pack for your target computers. for the Satellite Server field, and click the name of the computer that you 4. Click Select Value want to use as theAIX satellite server. 5. In the Download Location for All Targets field, type the path for downloading the patches into the file repository, in the format <base_path>/installp/ppc. To find out the base path that is used on your system, run the command
suma -D
The output of the command displays the base path that you need to enter in the DLTarget field. The default base path is /usr/sys/inst.images/installp/ppc. . 6. Click Save 7. Click Run Discovery. 8. Click Select > Groups and select the check box corresponding to your group of target computers, then click OK. 9. Click Submit. 10. On the Provisioning Task Tracking page, click Refresh to update the task status until the task is completed. The discovery task is displayed with a status of Success on the Provisioning Task Tracking page. Next you will be scanning for missing patches. Scanning for missing patches: You can compare the software that exists on your target computers with the list of patches that are available to see which patches are missing on which computers. By default, all patches that have been approved in the data model are scanned, and target computers are verified against all approved patches to see if computers are compliant. You can also select a patch approval group, which is used to specify a set of allowed patches, or approval lists. The patch approval group limits the patches for which recommendations are generated to the specified set of patches only. You might want to use this option to tightly control patches for critical computers where more exhaustive testing of patches is needed before they are required to be installed.The AIX patch scan generates recommendations based on AIX patch updates available in the data model. Make sure that your user role is Provisioning Configuration Librarian or equivalent.
924
To scan for missing patches: 1. Click Go To > Deployment > Provisioning Groups. Tip: To perform this task from the Start Center, click Provisioning Groups under Provisioning administration applications. 2. Click your group of target computers. 3. Click the Compliance tab. 4. Click Run Scan and Check. Tip: If you want to schedule the provisioning task for a later time, click Schedule Scan and Check to specify scheduling options. 5. Click the Notification tab to specify notification options if you want users to be notified about the task status. 6. On the Provisioning Task Tracking page, click Refresh to update the task status until the task is completed. Attention: Wait until the task completes before starting another compliance scan task on the target computers. If you run concurrent compliance scan tasks on a target computer, the tasks might fail. The scanning and checking task is displayed with a status of Success on the Provisioning Task Tracking page. The recommendations to install missing patches are generated. On the Compliance tab for the group, the patch check displays either Yes or No in the Compliant column, depending on whether all required patches are installed on the target computers. If notification was set up, recipients will be notified that recommendations need be approved. Approving compliance recommendations: After scanning your target computers to see which patches are missing on them, compliance recommendations are generated. Based on these recommendations, you can decide which patches you want to install on your target computers. The AIX patch scan generates recommendations based on AIX patch updates available in the data model. Make sure that your user role is Compliance Analyst or equivalent. To approve compliance recommendations: 1. Click Go To > Deployment > Provisioning Groups. Tip: To perform this task from the Start Center, click Provisioning Groups under Provisioning administration applications. 2. Click your group of target computers. 3. Click the Recommendations tab. 4. In the recommendations list, select the check boxes corresponding to the missing patches that you want to approve and click Approve. The selected patches are displayed with a status of Approved on the Recommendations tab. Distributing patches: After patches are approved, you can distribute the already downloaded technology levels or service packs to the target computers before installation. Because the size of the AIX patches is quite large, it is recommended to distribute the AIX patches before installing, especially if the maintenance window for installing the patch is not very long. You can distribute patches immediately or schedule this task for a specified date and time.
Chapter 9. Deploying patches
925
Make sure that your user role is Deployment Specialist or equivalent. To distribute patches: 1. Click Go To > Deployment > Patch Management > Patch Distribution. Tip: To perform this task from the Start Center, click Patch Distribution under Patch management applications. 2. Click Select Patches and select the patches that you want to distribute, then click OK. Tip: You can filter down the list of displayed patches by patch name, vendor, and version. To search for a particular patch, type the patch name in the Patch field, for example, AIX_SP 6100-00-01. To use more search fields, expand Advanced Search Options and customize the options in the window, then click Refine. 3. Click Select > Groups and select your group of target computers, then click OK. 4. 5. 6. 7. Under Scheduling, specify scheduling options if you want to schedule the task for a later time. Under Notification, specify notification options if you want users to be notified about the task status. Click Submit. On the Provisioning Task Tracking page, click Refresh to update the task status until the task is completed.
The patch distribution task is displayed with a status of Success on the Provisioning Task Tracking page. Installing patches: After patches are approved, you can install them on the target computers where they are missing. You need to install technology levels before you install service packs. Make sure that your user role is Deployment Specialist or equivalent. To install patches: 1. Click Go To > Deployment > Provisioning Groups. Tip: To perform this task from the Start Center, click Provisioning Groups under Provisioning administration applications. 2. Click your group of target computers. 3. Click the Recommendations tab. 4. From the recommendations list, select all of the patches that are approved and click Implement. 5. Specify the options you want for installing and click Submit. 6. On the Provisioning Task Tracking page, click Refresh to update the task status until the task is completed. The patch installation task is displayed with a status of Success on the Provisioning Task Tracking page. Verifying compliance results: After installing patches on the target computers, you can verify that patches installed successfully. Make sure that your user role is Compliance Analyst or equivalent You can verify compliance results either by running the compliance scan again and verifying the list of recommendations or by running patch reports that provide information about missing patches. Running the compliance scan again:
926
To run the compliance scan: 1. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Groups. Tip: To perform this task from the Start Center, click Provisioning Groups under Provisioning administration applications. 2. Click your group of target computers. 3. Click the Compliance tab. 4. Click Run > Check to run a compliance check before displaying the recommendations so that the results are accurate. 5. Click the Recommendations tab. 6. In the list of recommendations, verify that the installed patches are no longer displayed as missing. 7. Click OK. Installed patches are no longer listed on the list of recommendations because they are not missing from the target computers. Generating patch compliance reports: To generate patch compliance reports: 1. Click Go To > Deployment > Provisioning Groups. Tip: To perform this task from the Start Center, click Provisioning Groups under Provisioning administration applications. 2. Click the group of target computers to generate the report for. 3. Click the Compliance tab. 4. Click Run > Check to perform a compliance check before running the report so that the results are accurate. 5. Click Go To > Administration > Reporting > Report Administration. 6. Search for the report with the description Are servers compliant with their compliance checks? and click the report name. 7. Click Generate Request Page. 8. After the report is generated, click Close. The report lists all the target computers that have a patch compliance check defined. The Is Compliant column lists the compliance status of the target computers. 9. Click Preview and in the dialog box that is opened click Submit. Tip: You can also generate the report with the description What patches are missing on what servers? to list all the missing patches and their corresponding target computers. Installed patches are not listed since they are not missing from the target computers.
927
Related information Testing patches on page 922 Setting up compliance on page 922 Scanning for missing patches on page 924 Distributing patches on page 925 Installing patches on page 926 Discovering the AIX satellite server and the target computers on page 920
Supported platforms
You can use IBM Tivoli Provisioning Manager to manage patches for the following Red Hat Enterprise Linux environments: v Red Hat Enterprise Linux only) v Red Hat Enterprise Linux only) v Red Hat Enterprise Linux infrastructure only) v Red Hat Enterprise Linux only) 6 Server Advanced Platform (x86 32-bit) (scalable distribution infrastructure 6 Server Advanced Platform (x86 64-bit) (scalable distribution infrastructure 6 Server Advanced Platform (IBM System z 64-bit) (scalable distribution 5 Server Advanced Platform (x86 32-bit) (scalable distribution infrastructure
v Red Hat Enterprise Linux 5 Server Advanced Platform (x86 64-bit) (scalable distribution infrastructure only) v Red Hat Enterprise Linux 5 Server Advanced Platform (IBM System z 64-bit) (scalable distribution infrastructure only) v Red Hat Enterprise Linux 4 AS/ES (x86 32-bit) v Red Hat Enterprise Linux 4 AS/ES (x86 64-bit) v Red Hat Enterprise Linux 4 AS/ES (IBM System i 32-bit/64-bit) v Red Hat Enterprise Linux 4 AS/ES (IBM System p 32-bit/64-bit) v Red Hat Enterprise Linux 4 AS/ES (AMD 64-bit) Note: Only 64-bit packages are installed with the default installation of Red Hat Enterprise Linux 6 Server Advanced Platform (x86 64-bit), which might cause 32-bit applications running on 64-bit targets to fail. To avoid this, during the installation, select Custom installation, and then, from the Base Server component, select the Compatibility Libraries and Unix Legacy Library boxes, to also install the 32-bit packages that are required to run 32-bit binaries. The following sections provide information about how to manage patches for Red Hat Enterprise Linux versions 6, 5 and 4: v Tutorial: Managing patches in Red Hat Enterprise Linux 6 and 5 environments on page 932 v Managing patches in Red Hat Enterprise Linux 4 environments on page 949
928
Patch management includes the processes that are illustrated and detailed the information later in this section. Roles for each step in the process are noted in parentheses.
Discover computers
Set up environment
Acquire patches
Test patches
Set up compliance Scan for missing patches Approve compliance recommendations Install patches
Legend
Provisioning Administrator Provisioning Configuration Librarian Compliance Analyst Deployment Specialist
1. Discover computers and set up the environment (Provisioning Administrator) This process consists of the following tasks: v Run initial discovery to discover all computers and to add them to the data model. Initial discovery finds out what operating system is installed on your target computers, which is required to make sure that patches for that operating system are acquired in a later step in the process. As part of initial discovery, group the discovered target computers to manage patches for multiple computers at the same time. Tip: The task of discovering computers can be performed also by the provisioning configuration librarian.
Chapter 9. Deploying patches
929
v Depending on the configuration used in your organization, you might need to set up a proxy server for connecting the provisioning server and the YUM server. v Set up the scalable distribution infrastructure to manage distribution and installation of patches on the target computers. Tip: The task of setting up the infrastructure can be performed also by the provisioning configuration librarian. 2. Install required software on target computers (Deployment Specialist) This process consists of installing the common agent on the target computers. The common agent is a software product that is required for software distribution and software compliance management. 3. Acquire patches (Provisioning Configuration Librarian) This process consists of specifying which patches you want to acquire from those released by the vendor, and bringing those patches into the data model. 4. Test patches This process is recommended as part of the patch management life cycle process, to ensure that all possible conflicts have been identified in a test environment before installing the patches in the production environment. You can install the patches in defined test environments using the Patch Installation application, but the actual testing of patches is performed outside the provisioning applications. Therefore, this task does not have a role associated with it. Typically, the test engineer in your organization performs this task. 5. Approve patches (Compliance Analyst) This process consists of approving which patches you want to install. Two levels of approval are required: for the entire organization (at the data model level), and for each target computer or group of target computers, if a patch is missing on a specific group of computers. 6. Set up compliance (Compliance Analyst) This process consists of creating compliance checks to determine if the software installed on the target computers matches your requirements. Compliance checks define the compliant state of your target computers and are used to detect, report, and recommend how to fix noncompliance. Add a patch check to a group of target computers, and, optionally, identify specific patch approval groups to scan. 7. Scan for missing patches (Provisioning Configuration Librarian) This process consists of scanning the target computers and checking to see which patches are missing from the target computers. After the scan, a list of missing patches is generated and then the check creates compliance recommendations for each computer or group. 8. Approve compliance recommendations (Compliance Analyst) This process consists of approving which patches you want to install. You approve patches for each target computer or group of computers, if a patch is missing on the target computers. 9. Install patches and monitor patch installation (Deployment Specialist) This process consists of distributing and installing the patches on target computers. You can distribute and install patches at the same time or schedule these tasks separately. You can install patches on a specific target computer or multiple target computers as one task. You can also monitor the progress of patch installation. 10. Verify compliance results (Compliance Analyst) This process consists of validating that the patches were successfully applied to all the target computers you selected. Run the compliance check again to verify that the installed patches are no longer listed in the list of recommendations.
930
Red Hat Enterprise Linux 6 and 5 environments: This topic applies to patch management for Red Hat Enterprise Linux 6 and 5 environments.
Internet
YUM Repository
You can install any supported operating system on the provisioning server. The provisioning server is connected to the YUM repository. If the provisioning server and the YUM repository are separated by a firewall, you need to set up a proxy server. The patches are stored on the YUM repository.
Customizing the Red Hat Enterprise Linux 6.0 installation for common agent support
During the Red Hat Enterprise Linux version 6.0 installation, you can install several optional packages to ensure support for the common agent. To customize the Red Hat Enterprise Linux 6.0 installation for common agent support:
Procedure
1. When the RHEL 6.0 installation wizard prompts you to customize the packages to be installed, select the Customize now radio button, and then click Next. 2. Select Base System in the left list, then make the following selections in the right list: a. Select the Compatibility libraries check box, then right-click it and select the Select all optional packages option in the pop-up menu. b. Select the Legacy UNIX compatibility check box, then right-click and select Select all optional packages. c. Select the Networking Tools check box, then right-click and select Select all optional packages. 3. Click Next, and then follow the default wizard steps until the installation completes.
Chapter 9. Deploying patches
931
4. After the installation, verify that the required libraries have been installed successfully: For x86_64 bit platforms Enter the following commands. The output looks similar to the following:
ldconfig -p | grep -i ld should give similar to below output 1564 libs found in cache `/etc/ld.so.cache librpmbuild.so.1 (libc6,x86-64) => /usr/lib64/librpmbuild.so.1 librpmbuild.so (libc6,x86-64) => /usr/lib64/librpmbuild.so libplds4.so (libc6,x86-64) => /lib64/libplds4.so libplds4.so (libc6,x86-64) => /usr/lib64/libplds4.so libnss_ldap.so.2 (libc6,x86-64) => /lib64/libnss_ldap.so.2 libnss_ldap.so (libc6,x86-64) => /usr/lib64/libnss_ldap.so libldb.so.0 (libc6,x86-64) => /usr/lib64/libldb.so.0 libldap_r-2.4.so.2 (libc6,x86-64) => /usr/lib64/libldap_r-2.4.so.2 libldap_r-2.3.so.0 (libc6,x86-64) => /usr/lib64/libldap_r-2.3.so.0 libldap-2.4.so.2 (libc6,x86-64) => /usr/lib64/libldap-2.4.so.2 libldap-2.3.so.0 (libc6,x86-64) => /usr/lib64/libldap-2.3.so.0 libkldap.so.4 (libc6,x86-64) => /usr/lib64/libkldap.so.4 libkldap.so (libc6,x86-64) => /usr/lib64/libkldap.so libkdeinit4_kbuildsycoca4.so (libc6,x86-64) => /usr/lib64/libkdeinit4_kbuildsycoca4.so ld-linux.so.2 (ELF) => /lib/ld-linux.so.2 ld-linux-x86-64.so.2 (libc6,x86-64) => /lib64/ld-linux-x86-64.so.2
For zSeries platforms Enter the following commands. The output looks similar to the following:
1327 libs found in cache `/etc/ld.so.cache librpmbuild.so.1 (libc6,64bit) => /usr/lib64/librpmbuild.so.1 librpmbuild.so (libc6,64bit) => /usr/lib64/librpmbuild.so libplds4.so (libc6,64bit) => /lib64/libplds4.so libnss_ldap.so.2 (libc6,64bit) => /lib64/libnss_ldap.so.2 libnss_ldap.so (libc6,64bit) => /usr/lib64/libnss_ldap.so libldb.so.0 (libc6,64bit) => /usr/lib64/libldb.so.0 libldap_r-2.4.so.2 (libc6,64bit) => /usr/lib64/libldap_r-2.4.so.2 libldap-2.4.so.2 (libc6,64bit) => /usr/lib64/libldap-2.4.so.2 libkldap.so.4 (libc6,64bit) => /usr/lib64/libkldap.so.4 libkldap.so (libc6,64bit) => /usr/lib64/libkldap.so libkdeinit4_kbuildsycoca4.so (libc6,64bit) => /usr/lib64/libkdeinit4_kbuildsycoca4.so ld64.so.1 (libc6,64bit) => /lib64/ld64.so.1 ld.so.1 (ELF) => /lib/ld.so.1
Learning objectives
Red Hat Enterprise Linux 6 and 5 environments: This topic applies to patch management for Red Hat Enterprise Linux 6 and 5 environments.
In this tutorial, you learn how to: v Discover and group target computers. v v v v v v Set up servers, infrastructure, and target computers. Acquire patches. Approve patches. Set up compliance for the target computers. Scan the target computers for missing patches. Distribute patches.
IBM Tivoli Provisioning Manager Version 7.2.0.2 User Guide
932
v Install patches. v Verify compliance results. Allow several hours to discover your target computers, set up the infrastructure, set up the target computers, and install the patches on them. Acquiring the patches from the YUM repository might take from 30 minutes to a few hours, depending on the number of patches that are available, the connection speed, and the location of the YUM repository, if local or remote.
Prerequisites
Before you start, verify that you meet the requirements listed in Requirements for Red Hat Enterprise Linux 6 and 5 environments. Modules in this tutorial v Requirements for Red Hat Enterprise Linux 6 and 5 environments v Part 1: Environment setup on page 935 v Part 2: Day-to-day tasks on page 941 Requirements for Red Hat Enterprise Linux 6 and 5 environments: Before you start managing patches in Red Hat Enterprise Linux 6 and 5 environments, ensure that you meet all requirements.
Red Hat Enterprise Linux 6 and 5 environments: This topic applies to patch management for Red Hat Enterprise Linux 6 and 5 environments.
You can manage patches for the following Red Hat Enterprise Linux 6 and 5 operating systems and versions: v Red Hat Enterprise Linux 6 Server Advanced Platform (x86 32-bit) v Red Hat Enterprise Linux 6 Server Advanced Platform (x86 64-bit) v Red Hat Enterprise Linux 6 Server Advanced Platform (IBM System z 64-bit) v Red Hat Enterprise Linux 5 Server Advanced Platform (x86 32-bit) v Red Hat Enterprise Linux 5 Server Advanced Platform (x86 64-bit) v Red Hat Enterprise Linux 5 Server Advanced Platform (IBM System z 64-bit) Note: Only 64-bit packages are installed with the default installation of Red Hat Enterprise Linux 6 Server Advanced Platform (x86 64-bit), which might cause 32-bit applications running on 64-bit targets to fail. To avoid this, during the RHEL 6 installation, select Custom installation, and then, from the Base Server component, select the Compatibility libraries, and Legacy UNIX compatibility check boxes, to also install the 32-bit packages that are required to run 32-bit binary files. User roles and requirements: To perform the tasks in patch management, ensure that you have the required knowledge and access permissions to perform your role.
Red Hat Enterprise Linux 6 and 5 environments: This topic applies to patch management for Red Hat Enterprise Linux 6 and 5 environments.
933
Table 170. Roles and skills for patch management in Red Hat Enterprise Linux environments Role Provisioning Administrator Provisioning tasks v Discover and group target computers v Set up servers and infrastructure Skills v Knowledge of the provisioning environment v Knowledge of the Red Hat Enterprise Linux operating system v Knowledge of Internet technologies v Knowledge of scalable distribution infrastructure v Knowledge of how to set up the YUM repository Provisioning Configuration Librarian v Acquire patches v Scan the target computers for missing patches v Organize and maintain the patch catalog v Create and maintain patch groups, delete patches from the data model Compliance Analyst v Approve patches in the data model v Knowledge of the Red Hat Enterprise Linux operating system v Set up compliance v Approve compliance recommendations v Verify compliance results Deployment Specialist v Install required software on target computers v Publish patches v Distribute patches v Unpublish patches v Implement compliance recommendations to install missing patches v Monitor patch installation v Uninstall patches v Knowledge of the Red Hat Enterprise Linux operating system v Knowledge of the patch management life cycle v Knowledge of the patch management life cycle v Knowledge of the Red Hat Enterprise Linux operating system v Knowledge of the patch management life cycle
Server requirements: There are a number of requirements that must be met by the components in your configuration so that you can manage patches in Red Hat Enterprise Linux 6 and 5 environments. You must have cURL installed on the provisioning server. cURL is a free URL transfer library and supports several protocols such as FTP, HTTP, HTTPS, and LDAP. Note: For AIX systems, ensure that you use a cURL version with SSL support. You can install cURL from http://curl.haxx.se/. Target computer requirements: There are some requirements that must be met by the target computers so that you can manage patches in Red Hat Enterprise Linux 6 and 5 environments.
934
Red Hat Enterprise Linux 6 and 5 environments: This topic applies to patch management for Red Hat Enterprise Linux 6 and 5 environments.
v All files required for patch installation on the target computers are downloaded to the /tmp directory. Ensure that the file system where the directory is located has enough disk space to store at least all the patches you want to install in one installation or remediation task. v For information about the general requirements for Red Hat Enterprise Linux target computers, see Requirements for Red Hat Linux target computers on page 560. v For common agent support on RHEL 6.0, see Customizing the Red Hat Enterprise Linux 6.0 installation for common agent support on page 931. Part 1: Environment setup: Before starting to manage patches for Red Hat Enterprise Linux 6 and 5 environments, you must set up the servers depending on the configuration that you are using. Also, you must set up the scalable distribution infrastructure and install required software on your target computers.
Red Hat Enterprise Linux 6 and 5 environments: This topic applies to patch management for Red Hat Enterprise Linux 6 and 5 environments.
Discovering and grouping target computers: You must make your target computers known to the data model. To do this, you can run initial discovery, which searches for unknown resources and adds them to the data model. For existing resources, the data model is updated with any new or changed information. You can then group your target computers so that you can manage patches for multiple computers at the same time. Make sure that the following requirements are met: v Your user role is Provisioning Administrator, Provisioning Configuration Librarian, or equivalent. v Your target computers meet the requirements listed in Target computer requirements on page 934.
Red Hat Enterprise Linux 6 and 5 environments: This topic applies to patch management for Red Hat Enterprise Linux 6 and 5 environments.
To discover and group your target computers, perform the following steps. Tip: You can use the Computer Discovery, Common Agent Installation, and Inventory Discovery discovery wizard to run a network discovery of the computers, install the common agent on these computers, and run a hardware and software scan. For more information, see Discovering your environment using the ready-to-use network discoveries on page 231. 1. Click Go To > Discovery > Provisioning Discovery > Discovery Configurations. Tip: To perform this task from the Start Center, click Discovery Configurations under Provisioning administration applications or Discovery and task applications. 2. Find the discovery configuration called Initial Discovery and click its name on the list. 3. Click the IP Address Ranges tab. 4. Click New Row. 5. In the Start and End fields, type the IP addresses of your target computers. After each set of IP addresses, click New Row.
935
Tip: You can also specify subnetworks that you want to discover. If, for example, all the target computers that you want to discover are in a LAN, click the Subnetworks tab and specify the IP address and mask for the LAN. After specifying each subnetwork, click New Row. 6. Click the Credentials tab. 7. Click New Row. 8. Type the user name and password. After each set of credentials, click New Row. If you specify more than one set of credentials, those credentials are used on each target computer in the order that they are listed. If the logon attempt on a target computer is successful, the computer is added to the data model. Notes: v The system attempts to connect to each IP address using each user name and password provided until it finds a user name and password that can be used to connect successfully. This might cause user accounts to be locked out, depending on the security policy enforced on the target computers. v You might need to increase the default timeout value if you are on a slow network or you are attempting to discover slow computers. 9. In the Add Computers to Group field, click Select Value the target computer after running initial discovery. Tip: If you want to create a group, see Creating groups. . 10. Click Save 11. Click Run Discovery. 12. Under Scheduling, specify scheduling options if you want to schedule the task for a later time. 13. Under Notification, specify notification options if you want users to be notified about the task status. 14. Click Submit. 15. On the Provisioning Task Tracking page, click Refresh to update the task status until the task is completed. The discovery task is displayed with a status of Success on the Provisioning Task Tracking page and the discovered computers are recorded in the details of the discovery task. Configuring the YUM repository: Red Hat Enterprise Linux 6 or 5 uses Yellow dog Updater Modified (YUM) as its package management solution. Make sure that your user role is Provisioning Administrator or Provisioning Configuration Librarian.
Red Hat Enterprise Linux 6 and 5 environments: This topic applies to patch management for Red Hat Enterprise Linux 6 and 5 environments.
To define the YUM repository in the data model: 1. Click Go To > IT Infrastructure > Provisioning Inventory > File Repositories. Tip: To perform this task from the Start Center, click File Repositories under Infrastructure applications. 2. Click the File Repositories tab. . 3. Click New File Repository 4. In File Repository, type the file repository name and root path of the local YUM repository.
936
5. In Root Path, type the root path of the local YUM repository. The value depends on the configuration of the YUM repository and on the protocol you use. For example, if the YUM repository is configured with this structure, where repodata is in the /storage/repository/redhat/ yum/5/server/os/servers/fix/ path, depending on the protocol you use, the root path is as follows: SSH protocol /storage/repository Note: The SSH protocol is supported only if there is no proxy server between the provisioning server and the YUM repository. Prerequisite: The SSH protocol must be enabled on the repository. FTP protocol / Note: / represents the local_root variable in /etc/vsftpd/vsftpd.conf. For example, if local_root is set to /storage/repository/, then the root path in the user interface must be mentioned as /, and it affects the path added using the Add Path option, as described later in step 11. By default, local_root is set to /. Prerequisite: The FTP protocol must be enabled on the repository. HTTP or HTTPS protocols / Note: v / represents the DocumentRoot variable in /etc/httpd/conf/httpd.conf. For example, if DocumentRoot is set to /storage/repository/, then the root path in the user interface must be mentioned as /, and it affects the path added using the Add Path option, as described later in step 11. By default, DocumentRoot is set to /var/www/html/. v While using the HTTPS protocol, SSL certificates must be imported into the provisioning server. For more information, see Importing the SSL certificate on page 1064. Prerequisite: The HTTP and HTTPS protocols must be enabled on the repository. 6. When you select the Is YUM Repository check box, new fields are displayed to specify YUM configuration parameters. 7. In IP Address, type the IP address of the YUM repository. 8. In Protocol, select the supported protocol from the list. 9. If you need to change the default port number, which is populated when you select the protocol, type your port number in the Port field. 10. If authentication is required for the YUM repository, type a user name in the User Name field, a new password in the Password field, and retype it in the Confirm Password field. 11. Click Add Path and specify the information to dynamically configure the repository paths. For example, if the YUM repository is configured with this structure /storage/repository/redhat/yum/5/ server/os/servers/fix, as exemplified earlier in step 5, you use the following path: SSH protocol /redhat/yum/5/server/os/servers/fix/ FTP protocol /redhat/yum/5/server/os/servers/fix/ HTTP or HTTPS protocols /redhat/yum/5/server/os/servers/fix/ 12. Click Save .
937
Based on the information provided, the YUM repository, data model objects, software module, and credentials are created in the Provisioning Manager data model database to capture the YUM repository structure. Setting up the proxy server: When the provisioning server and the YUM repository are separated by a firewall, you must set up the proxy server. Make sure that your user role is Provisioning Administrator or equivalent.
Red Hat Enterprise Linux 6 and 5 environments: This topic applies to patch management for Red Hat Enterprise Linux 6 and 5 environments.
Defining the proxy server: To define the proxy server: 1. Click Go To > Deployment > Provisioning Computers. Tip: To perform this task from the Start Center, click Provisioning Computers under Automation development applications. 2. 3. 4. 5. 6. In the Computer field, type the name of the provisioning server. In the list, click the computer name. Click the Credentials tab. Click Add Credentials > New Service Access Point. Type a name for the service access point. In the Protocol Type field, click Network protocol IP.
7. In the Application Protocol field, click HTTP Access. 8. In the Context field, type URLGrabProxy. 9. Type the port number for the proxy server, for example, 3128. Note: Port 3128 is the default port for most proxy servers. If you are using a different proxy server port in your environment, type that proxy server number. 10. In the Domain field, type the fully qualified host name or IP address of the proxy server. 11. If the proxy server requires authentication, select the Authentication check box. Otherwise, leave this check box blank. 12. Click New Password Credential. 13. In the Search Key field, type a meaningful string. 14. Type the user name and the password for the proxy server, if required. . 15. Click Save Related information Configuring the YUM repository on page 936 Setting up the infrastructure Installing required software on target computers on page 940 Red Hat Enterprise Linux environments on page 928 Setting up the infrastructure: You can set up a region, a zone, and a depot server, which are used to distribute and install the patches on the target computers.
938
Setting up a region: Regions are used to group depot servers that are located near one another to optimize upload, replication, and download times. When you create a depot server, associate it with a region. You can assign a depot server to only one region. To set up a region: 1. Click Go To > Administration > Provisioning > Dynamic Content Delivery Configuration. Tip: To perform this task from the Start Center, click Dynamic Content Delivery Configuration under Provisioning administration applications. 2. Click the Regions tab. 3. Click New Row. 4. Type a name and a description for the new region. 5. Click Save Setting up a zone: Optionally, you can set up a zone to define an IP address range or a domain name within a region. Regions can be generic, without a real network definition, or they can be specific, when zones are used to define domain names within a region. Zones are used to logically group computers within regions. To set up a zone: 1. On the Dynamic Content Delivery Configuration page, click the Zones tab. 2. Click New Row. 3. Type a name and a description for the new zone. and click the region that you created in the previous task. 4. In the Regions field, click Select Value 5. Select Domain Name, and then specify the domain that your depot server and target computers are in. 6. Click Save . .
Setting up a depot server: A depot server is a system that stores files for distribution. Distribution files are uploaded to a depot server using a client. Uploaded files are stored in a directory that is specified when the depot server is installed. Depot servers can replicate uploaded files to other depot servers to optimize the network traffic. The target computers download the files from the depot servers. To set up a depot server: 1. On the Dynamic Content Delivery Configuration page, click the Depots tab. 2. Click New Row. 3. Type a name and description for the depot server. and click the region that you created in the previous task. 4. In the Region field, click Select Value This is the region that the depot server is assigned to.
Chapter 9. Deploying patches
939
Note: The depot server must not be included in your group of target computers. 6. In the Fully qualified host name field, type the fully qualified host name of the depot server that has already been discovered. 7. Select the Install the depot agent services check box to install the depot agent services on the depot server. and select the zone that you set up in the 8. In the Domain Zone Served field, click Select Value previous task. 9. Type the user name and password for the depot server. 10. If using only one depot server, select the Preferred upload server check box. At least one preferred depot server is required. . 11. Click Save Related information Configuring the YUM repository on page 936 Setting up the proxy server on page 938 Installing required software on target computers Red Hat Enterprise Linux environments on page 928 Installing required software on target computers: Install the common agent on the target computers. The common agent is a software product that is required for software distribution and software compliance management. Make sure that the following requirements are met: v Your user role is Deployment Specialist or equivalent. v The target computers meet the requirements listed in the Target computer requirements on page 934 topic.
Red Hat Enterprise Linux 6 and 5 environments: This topic applies to patch management for Red Hat Enterprise Linux 6 and 5 environments.
Installing the common agent: The common agent is a software product that provides infrastructure for management applications. The common agent installed on the target computers provides remote deployment capability, shared computer resources, secure connectivity, and a single entry point. The common agent can be installed once on each target computer. After the common agent is installed on a target computer, subsequent subagents can be installed on top of an existing common agent. To install the common agent, perform the steps listed later in this section. Note: If you used the Computer Discovery, Common Agent Installation, and Inventory Discovery discovery wizard to discover your computers, then the common agent is already installed. Proceed to Acquiring patches on page 941. 1. Click Go To > Deployment > Software Management > Common Agent Installation. 2. Click Select > Groups, and select your group of target computers, and then click OK. 3. Under Scheduling, specify scheduling options if you want to schedule the task for a later time. 4. Under Notification, specify notification options if you want users to be notified about the task status.
940
5. Click Submit. 6. On the Provisioning Task Tracking page, click Refresh to update the task status until the task is completed. The common agent installation task is displayed with a status of Success on the Provisioning Task Tracking page. Related information Configuring the YUM repository on page 936 Setting up the proxy server on page 938 Setting up the infrastructure on page 938 Red Hat Enterprise Linux environments on page 928 Part 2: Day-to-day tasks: After setting up the environment, there are a number of tasks that you must perform as day-to-day patch management activities to ensure that your target computers are always up-to-date with the required patches.
Red Hat Enterprise Linux 6 and 5 environments: This topic applies to patch management for Red Hat Enterprise Linux 6 and 5 environments.
Acquiring patches: Patch acquisition is the process of discovering available patches and importing the patch metadata from the YUM repository. Make sure that the following requirement is met: v Your user role is Provisioning Administrator or Provisioning Configuration Librarian.
Red Hat Enterprise Linux 6 and 5 environments: This topic applies to patch management for Red Hat Enterprise Linux 6 and 5 environments.
Note: When the provisioning server and the YUM repository are separated by a firewall, you must set up a proxy server. Ensure that the FTP user has the required access permissions to access the YUM repository. No error is displayed if the FTP user does not have the required access permissions. To acquire patches: 1. Click Go To > IT Infrastructure > Software Catalog > Patch Acquisition. Tip: To perform this task from the Start Center, click Patch Acquisition under Discovery and task applications. 2. In the Operating System list, click Select Value systems. 3. In the YUM File Repository field, click Select Value that you previously created. 4. Select the repository paths. and click Linux from the list of operating and click the name of the YUM repository
Note: Any subsequent patch scan, performed either using a compliance check or a YUM scan discovery, is performed on the patches acquired at patch acquisition time based on this selection.
941
5. Optional: To approve the acquired patches automatically, in the Initial Patch Status list, click Select and click APPROVED. This option is useful if you want to mark as approved all the Value patches that were made available by the vendor, without having to approve them in a later step. Under Scheduling, specify scheduling options if you want to schedule the task for a later time. Under Notification, specify notification options if you want users to be notified about the task status. Click Submit. On the Provisioning Task Tracking page, click Refresh to update the task status until the task is completed.
6. 7. 8. 9.
The patch acquisition task is displayed with a status of Success on the Provisioning Task Tracking page. The patches are brought into the data model. To view the patches catalog, in the Start Center, click Patches under Favorite applications. Note: After completing the patch acquisition, you can run the compliance scan and check directly if the scan settings required are identical to the settings you used for patch acquisition. For example, if you plan to scan for a certain level of patches on the repository paths defined at acquisition time. If you need to customize the scan for specific levels and architecture, use the YUM scan to set up specific scan settings, which must be a subset of selections made at acquisition time. Testing patches: It is recommended to test the released patches before installing them, to ensure that all possible conflicts have been identified in a test environment before installing them in the production environment. You can install the patches on a test computer using the Patch Installation application, but you need to test patches outside of the provisioning applications.
Red Hat Enterprise Linux 6 and 5 environments: This topic applies to patch management for Red Hat Enterprise Linux 6 and 5 environments.
Approving patches in the data model: After patches are acquired, the first step in the approval process is to approve the patches for the entire organization (at the data model level). Only the approved patches are considered when scanning the target computers for missing patches. For example, in some organizations all patches are approved at the data model level and then the compliance analyst decides which patches to approve for each provisioning group. This second step in the approval process is done when scanning for missing patches. In other organizations, there might be some patches that the compliance analyst does not want to approve immediately after acquisition, because further testing is required before approving. Make sure that your user role is Compliance Analyst or equivalent.
Red Hat Enterprise Linux 6 and 5 environments: This topic applies to patch management for Red Hat Enterprise Linux 6 and 5 environments.
To approve the acquired patches in the data model: 1. Click Go To > IT Infrastructure > Software Catalog > Patches. Tip: To perform this task from the Start Center, click Patches under Favorite applications. 2. Press Enter to display all patches from the catalog.
942
Tip: You can filter down the list of displayed patches by patch name, version, severity, vendor, release date, and so on. To search for a particular patch, type the patch name in the Patch field, for example, redhat-release-5Server. To use more search fields, click Advanced Search and customize the options in the window, then click Find. 3. Click Select Records and select the patches that you want to approve, then click Approve. Note: To select records, filter down your list of patches to a maximum of 200. If you want to approve more than 200 patches at the same time, filter down your patches, then click Approve and click OK on the confirmation message. Patches that you have approved are displayed with a status of Approved on the Patches page. Configuring the YUM scan discovery: Before running the compliance scan, you must configure the YUM repository in the YUM Scan discovery configuration and run the discovery configuration. Make sure that your user role is Provisioning Administrator or Provisioning Configuration Librarian or equivalent. To customize the scanning model: 1. Click Go To > Discovery > Provisioning Discovery > Discovery Configurations. Tip: To perform this task from the Start Center, click Discovery Configurations under Automation development applications . 2. Find the YUM Scan discovery configuration and click it. 3. Click Select Value for the YUM File Repository field, and select the repository where the scan is to be performed. 4. In the Select YUM Repository Paths section, select the architecture and level of updates to scan for. . 5. Click Save 6. Click Run Discovery. 7. Click Select > Groups and select the check box corresponding to your group of target computers, then click OK. 8. Click Submit. 9. On the Provisioning Task Tracking page, click Refresh to update the task status until the task is completed. The discovery task is displayed with a status of Success on the Provisioning Task Tracking page. You can now scan for missing patches. Setting up compliance: You can set up a compliance check to verify if patches are required on the target computers. Compliance checks define the compliance state of your target computers and are used to detect, report, and recommend how to fix noncompliance. Make sure that your user role is Compliance Analyst or equivalent.
Red Hat Enterprise Linux 6 and 5 environments: This topic applies to patch management for Red Hat Enterprise Linux 6 and 5 environments.
943
To set up compliance: 1. Click Go To > Deployment > Provisioning Groups. Tip: To perform this task from the Start Center, click Provisioning Groups under Provisioning administration applications. 2. Find your group of target computers and click its name in the list. 3. Click the Compliance tab. 4. Click New Compliance Check > Patch Check. 5. In the Patch Approval Group field, click Select Value scanned, then click Save. and select a group of patches to be
Tip: By default, all patches that have been approved in the data model are scanned, and target computers are verified against all approved patches to see if computers are compliant. You can also select a patch approval group, which is used to specify a set of allowed patches, or approval lists. The patch approval group limits the patches for which recommendations are generated to the specified set of patches only. You might want to use this option to tightly control patches for critical computers where more exhaustive testing of patches is needed before they are required to be installed. Do not perform the patch check using a software compliance check of type Software Group associated to the Patch Approval Group. Doing this can cause the following problems: v If a software patch contained in the Patch Approval Group is installed, target computers result as compliant. v The check is performed for the specific software patch installation and disregards any relation between the software patches, for example, superseding patches. v The check is performed on all computers belonging to the group and disregards if the software patch is applicable to only certain platforms. 6. Optional: To automatically approve recommendations when they are generated, click Enable Automatic Approval and click OK in the message box. All recommendations that are generated by this compliance check will be created in the Approved state. 7. Click Save .
The Operating System Patches and Updates compliance check is displayed in the list of compliance checks defined for the group of target computers. Scanning for missing patches: You can compare the software installed on your target computers with a list of the patches that have been approved for the entire organization, to see which patches are missing on which computers. By default, all patches that have been approved in the data model are scanned, and target computers are verified against all approved patches to see if computers are compliant. You can also select a patch approval group, which is used to specify a set of allowed patches, or approval lists. The patch approval group limits the patches for which recommendations are generated to the specified set of patches only. You might want to use this option to tightly control patches for critical computers where more exhaustive testing of patches is needed before they are required to be installed. Make sure that your user role is Provisioning Configuration Librarian or equivalent.
Red Hat Enterprise Linux 6 and 5 environments: This topic applies to patch management for Red Hat Enterprise Linux 6 and 5 environments.
To scan for missing patches: 1. Click Go To > Deployment > Provisioning Groups.
944
Tip: To perform this task from the Start Center, click Provisioning Groups under Provisioning administration applications. 2. Click your group of target computers. 3. Click the Compliance tab. 4. Click Run Scan and Check. Tip: If you want to schedule the task for a later time, click Schedule Scan and Check to specify scheduling options. 5. Click the Notification tab to specify notification options if you want users to be notified about the task status. 6. On the Provisioning Task Tracking page, click Refresh to update the task status until the task is completed. Attention: Wait until the task completes before starting another compliance scan task on the target computers. If you run concurrent compliance scan tasks on a target computer, the tasks might fail. The scanning and checking task is displayed with a status of Success on the Provisioning Task Tracking page. The recommendations to install missing patches are generated. On the Compliance tab for the group, the patch check displays either Yes or No in the Compliant column, depending on whether all required patches are installed on the target computers. If notification was set up, recipients are notified that recommendations must be approved. Approving compliance recommendations: After scanning your target computers to see which patches are missing on them, compliance recommendations are generated. Based on these recommendations, you can decide which patches you want to install on your target computers. Make sure that your user role is Compliance Analyst or equivalent.
Red Hat Enterprise Linux 6 and 5 environments: This topic applies to patch management for Red Hat Enterprise Linux 6 and 5 environments.
To approve compliance recommendations: 1. Click Go To > Deployment > Provisioning Groups. Tip: To perform this task from the Start Center, click Provisioning Groups under Provisioning administration applications. 2. Click your group of target computers. 3. Click the Recommendations tab. 4. In the recommendations list, select the check boxes corresponding to the missing patches that you want to approve and click Approve. The selected patches are displayed with a status of Approved on the Recommendations tab. Publishing patches to depots: After patches are approved, you can optionally publish them to the depots, then distribute, and install them on the target computers. During the publishing phase, the patch binaries are downloaded into the data model, and then the patch binaries and other files (for example cab file, vbscript) are published to a depot server. From the depot server, patches are distributed for installation on target computers. You can distribute patches immediately or schedule this task for a specified date and time. Make sure that your user role is Deployment Specialist or equivalent.
Chapter 9. Deploying patches
945
Red Hat Enterprise Linux 6 and 5 environments: This topic applies to patch management for Red Hat Enterprise Linux 6 and 5 environments.
Tip: You can also publish, distribute, and install patches in one step from the Recommendations tab for both Provisioning Computers and Provisioning Groups. To perform this operation: 1. Click Go To > Deployment > Provisioning Computers. or Click Go To > Deployment > Provisioning Groups. 2. Select the group or computer in the list and click it. 3. Select the Recommendations tab. 4. Select one or more patches and click Approve. The recommended actions can now be run or scheduled. The selected patches are published, distributed, and installed. To distribute patches: 1. Click Go To > Deployment > Patch Management > Patch Publishing. Tip: To perform this task from the Start Center, click Patch Publishing under Patch management applications. 2. Click Select Patches and select the patches that you want to distribute, then click OK. Tip: You can filter down the list of displayed patches by patch name, vendor, and version. To search for a particular patch, type the patch name in the Patch field, for example, redhat-release-5Server. If multiple software definitions are available for that patch number, select the check boxes for all the software definitions that match the patch number. The correct patch, based on the operating system on the target computer, are distributed to the appropriate target computer. To use more search fields, expand Advanced Search Options and customize the options in the window, then click Refine. 3. Click Select Depots and select one or more depots, then click OK. 4. Under Scheduling, specify scheduling options if you want to schedule the task for a later time. 5. Under Notification, specify notification options if you want users to be notified about the task status. 6. Click Submit. 7. On the Provisioning Task Tracking page, click Refresh to update the task status until the task is completed. The patch distribution task is displayed with a status of Success on the Provisioning Task Tracking page. Distributing patches: After patches are published to depots, you can optionally distribute them first and then install them on the target computers, or distribute and install them in one step. During distribution, the patch binaries are downloaded into the data model, and then the patch binaries and other files (for example cab file, vbscript) are published to a depot server. From the depot server, patches are distributed for installation on target computers. You can distribute patches immediately or schedule this task for a specified date and time. Make sure that your user role is Deployment Specialist or equivalent.
Red Hat Enterprise Linux 6 and 5 environments: This topic applies to patch management for Red Hat Enterprise Linux 6 and 5 environments.
Tip: You can also publish, distribute, and install patches in one step from the Recommendations tab for both the Provisioning Computers and Provisioning Groups. To perform this operation:
946
1. Click Go To > Deployment > Provisioning Computers. or Click Go To > Deployment > Provisioning Groups. 2. Select the group or computer in the list and click it. 3. Select the Recommendations tab. 4. Select one or more patches and click Approve. The recommended actions can now be run or scheduled. The selected patches are published, distributed, and installed. To distribute patches: 1. Click Go To > Deployment > Patch Management > Patch Distribution. Tip: To perform this task from the Start Center, click Patch Distribution under Patch management applications. 2. Click Select Patches and select the patches that you want to distribute, then click OK. Tip: You can filter down the list of displayed patches by patch name, vendor, and version. To search for a particular patch, type the patch name in the Patch field, for example, redhat-release-5Server. If multiple software definitions are available for that patch number, select the check boxes for all the software definitions that match the patch number. The correct patch, based on the operating system on the target computer, is distributed to the appropriate target computer. To use more search fields, expand Advanced Search Options and customize the options in the window, then click Refine. 3. Click Select > Groups and select your group of target computers, then click OK. 4. Under Scheduling, specify scheduling options if you want to schedule the task for a later time. 5. Under Notification, specify notification options if you want users to be notified about the task status. 6. Click Submit. 7. On the Provisioning Task Tracking page, click Refresh to update the task status until the task is completed. The patch distribution task is displayed with a status of Success on the Provisioning Task Tracking page. Installing patches: After patches are approved, you can install them on the target computers where they are missing. Make sure that your user role is Deployment Specialist or equivalent.
Red Hat Enterprise Linux 6 and 5 environments: This topic applies to patch management for Red Hat Enterprise Linux 6 and 5 environments.
Tip: You can also publish, distribute, and install patches in one step from the Recommendations tab for both the Provisioning Computers and the Provisioning Groups task. To perform this operation: 1. Click Go To > Deployment > Provisioning Computers. or Click Go To > Deployment > Provisioning Groups. 2. Select the group or computer in the list and click it. 3. Select the Recommendations tab. 4. Select one or more patches and click Approve. The recommended actions can now be run or scheduled. The selected patches are published, distributed, and installed. To install patches: 1. Click Go To > Deployment > Provisioning Groups.
Chapter 9. Deploying patches
947
2. 3. 4. 5. 6.
Tip: To perform this task from the Start Center, click Provisioning Groups under Provisioning administration applications. Click your group of target computers. Click the Recommendations tab. Select all the patches that are approved from the recommendations list and click Implement. Specify the options you want for installing and click Submit. On the Provisioning Task Tracking page, click Refresh to update the task status until the task is completed.
The patch installation task is displayed with a status of Success on the Provisioning Task Tracking page. Verifying compliance results: After installing patches on the target computers, you can verify that the patches installed successfully. Make sure that your user role is Compliance Analyst or equivalent.
Red Hat Enterprise Linux 6 and 5 environments: This topic applies to patch management for Red Hat Enterprise Linux 6 and 5 environments.
You can verify compliance results either by running the compliance check again and verifying the list of recommendations or by running patch reports that provide information about missing patches. Running the compliance check again: To run the compliance check: 1. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Groups. Tip: To perform this task from the Start Center, click Provisioning Groups under Provisioning administration applications. 2. Click your group of target computers. 3. Click the Compliance tab. 4. Click Run > Check to run a compliance check before displaying the recommendations so that the results are accurate. 5. Click the Recommendations tab. 6. In the list of recommendations, verify that the installed patches are no longer displayed as missing. 7. Click OK. Installed patches are no longer listed on the list of recommendations because they are not missing from the target computers.
948
Related information Testing patches on page 942 Approving patches in the data model on page 942 Configuring the YUM scan discovery on page 943 Setting up compliance on page 943 Scanning for missing patches on page 944 Approving compliance recommendations on page 945 Publishing patches to depots on page 945 Distributing patches on page 946 Installing patches on page 947
v Red Hat Enterprise Linux 4 AS/ES (IBM System p 32-bit/64-bit) v Red Hat Enterprise Linux 4 AS/ES (AMD 64-bit)
Components
This patch management solution requires the following Red Hat Linux components: Hosted model The following diagram illustrates the hosted model configuration.
949
Provisioning server
Firewall
Firewall
The target computers are connected to Red Hat Network over the Internet, and they exchange packages and information with the Red Hat Network servers. Your environment and system information is stored in the Red Hat Network database. To reduce download times and facilitate distribution, you can use a proxy server to cache packages locally. The target computers are connected to the Red Hat Network server with the Red Hat Network proxy server. Adding a proxy server improves performance on low-bandwidth networks. Satellite model The following diagram illustrates the satellite model configuration.
950
Provisioning server
Firewall
Firewall
In the satellite model, full Red Hat Network functions is available in your own environment. The satellite server is the only computer that is connected to Red Hat Network over the Internet to download the patches and all target computers are connected to the satellite server. If required, you can take your Red Hat Network solution completely offline using the satellite model. Your environment and system information is stored in a local database repository in your infrastructure. To reduce download times and facilitate distribution, you can use a proxy server to cache packages locally. The target computers are connected to the satellite server using the Red Hat Network proxy server. Adding a proxy server to remote locations with many systems improves scalability and performance.
Requirements
Verify that the following requirements are met depending on configuration: v The Red Hat Network satellite server is a computer that has Red Hat Linux 4 or 5 installed on it and has Internet access. This computer downloads the patches from Red Hat Network over the Internet. v In the configuration where the target computers are connected to Red Hat Network directly, they must have Internet access. In the configuration where a satellite server is present, Internet access for the target computers is not necessary. Additional target computer requirements are listed in the Requirements for Red Hat Linux target computers on page 560 topic. v User roles for patch management are listed in the Patch management basics on page 877 topic.
951
v In the satellite model, create a variable named ORG_CA_CERT and set its value to the full path and name of the Red Hat Network RPM used, for example, http://tpmserver.rhn.linux.ibm.com/pub/rhn-orgtrusted-ssl-cert-1.0-5.noarch.rpm. Set up this variable globally (for all computers) or at the group level. v In the satellite model, create a variable named sslCACert and set its value to the full path and name of the organizational certificate that you are using, for example, /usr/share/rhn/RHNS-CA-CERT. v In the satellite model, set up the value for the RHN.SERVER-SATELLITE variable to the fully-qualified name of the Red Hat Network satellite server, for example, xmlrpc.rhn.redhat.com. v If using a proxy server, create a variable named RHN.httpProxy and set its value to the fully-qualified name of the Red Hat Network proxy server. v To specify how long you want to wait when scanning for available patches, create a variable named RHN.timeout and set its value to the timeout, in seconds. This value must be an integer.
Automation packages
The following automation packages are used for Red Hat Linux patch management: v redhat-linux-operating-system v RedHat_EL_Update v For information about the automation packages, search for automation package descriptions in the information center.
Supported platforms
You can manage patches in SUSE Linux Enterprise Server 11 environments for the following operating systems: v SUSE Linux Enterprise Server Enterprise Server 11 (IBM System z 64-bit) v SUSE Linux Enterprise Server Enterprise Server 11 (x86 32-bit) v SUSE Linux Enterprise Server Enterprise Server 11 (x86 64-bit) You can manage patches in SUSE Linux Enterprise Server 10 environments for the following operating systems: v SUSE Linux Enterprise Server Enterprise Server 10 (x86 32-bit) v SUSE Linux Enterprise Server Enterprise Server 10 (x86 64-bit) v SUSE Linux Enterprise Server Enterprise Server 10 (IBM System z 64-bit)
952
Patch management includes the processes that are illustrated and detailed the information later in this section. Roles for each step in the process are noted in parentheses.
Discover computers
Set up environment
Acquire patches
Test patches
Set up compliance Scan for missing patches Approve compliance recommendations Install patches
Legend
Provisioning Administrator Provisioning Configuration Librarian Compliance Analyst Deployment Specialist
1. Discover computers and set up the environment (Provisioning Administrator) This process consists of the following tasks: v Run initial discovery to discover all computers and to add them to the data model. Initial discovery finds out what operating system is installed on your target computers, which is required to make sure that patches for that operating system are acquired in a later step in the process. As part of initial discovery, group the discovered target computers to manage patches for multiple computers at the same time.
953
Tip: The task of discovering computers can be performed also by the provisioning configuration librarian. v Depending on the configuration used in your organization, you might need to set up a proxy server for connecting the provisioning server and the SMT or YUM server. v Set up the scalable distribution infrastructure to manage distribution and installation of patches on the target computers. Tip: The task of setting up the infrastructure can be performed also by the provisioning configuration librarian. 2. Install required software on target computers (Deployment Specialist) This process consists of installing the common agent on the target computers. The common agent is a software product that is required for software distribution and software compliance management. 3. Acquire patches (Provisioning Configuration Librarian) This process consists of specifying which patches you want to acquire from those released by the vendor, and bringing those patches into the data model. 4. Test patches This process is recommended as part of the patch management life cycle process, to ensure that all possible conflicts have been identified in a test environment before installing the patches in the production environment. You can install the patches in defined test environments using the Patch Installation application, but the actual testing of patches is performed outside the provisioning applications. Therefore, this task does not have a role associated with it. Normally, the test engineer in your organization performs this task. 5. Approve patches (Compliance Analyst) This process consists of approving which patches you want to install. Two levels of approval are required: for the entire organization (at the data model level), and for each target computer or group of target computers, if a patch is missing on a specific group of computers. 6. Set up compliance (Compliance Analyst) This process consists of creating compliance checks to determine if the software installed on the target computers matches your requirements. Compliance checks define the compliant state of your target computers and are used to detect, report, and recommend how to fix noncompliance. Add a patch check to a group of target computers, and, optionally, identify specific patch approval groups to scan. 7. Scan for missing patches (Provisioning Configuration Librarian) This process consists of scanning the target computers and checking to see which patches are missing from the target computers. After the scan, a list of missing patches is generated and then the check creates compliance recommendations for each computer or group. 8. Approve compliance recommendations (Compliance Analyst) This process consists of approving which patches you want to install. You approve patches for each target computer or group of computers, if a patch is missing on the target computers. 9. Install patches and monitor patch installation (Deployment Specialist) This process consists of distributing and installing the patches on target computers. You can distribute and install patches at the same time or schedule these tasks separately. You can install patches on a specific target computer or multiple target computers as one task. You can also monitor the progress of patch installation. 10. Verify compliance results (Compliance Analyst) This process consists of validating that the patches were successfully applied to all the target computers you selected. Run the compliance check again to verify that the installed patches are no longer listed in the list of recommendations.
954
Internet
SMT/YUM Repository
You can install any supported operating system on the provisioning server. The provisioning server is connected to the SMT or YUM repository. If the provisioning server and the SMT or YUM repository are separated by a firewall, you must set up a proxy server. The patches are stored on the SMT or YUM repository.
Learning objectives
Supported environments: This topic applies to patch management for SUSE Linux Enterprise Server 11 environments only.
In this tutorial you learn how to: v Discover and group target computers.
Chapter 9. Deploying patches
955
v v v v v
Set up servers, infrastructure, and target computers. Acquire patches. Approve patches. Set up compliance for the target computers. Scan the target computers for missing patches.
v Distribute patches. v Install patches. v Verify compliance results. Allow several hours to discover your target computers, set up the infrastructure, set up the target computers, and install the patches on them. Acquiring the patches from the SMT or YUM repository might take from 30 minutes to a few hours, depending on the number of patches that are available, the connection speed, and the location of the SMT or YUM repository, if local or remote.
Prerequisites
Before you start, verify that you meet the requirements listed in Requirements for SUSE Linux Enterprise Server 11 environments. Modules in this tutorial v Requirements for SUSE Linux Enterprise Server 11 environments v Part 1: Environment setup on page 958 v Part 2: Day-to-day tasks on page 963 Requirements for SUSE Linux Enterprise Server 11 environments: Before you start managing patches in SUSE Linux Enterprise Server 11 environments, ensure that your system meets all of the requirements.
Supported environments: This topic applies to patch management for SUSE Linux Enterprise Server 11 environments only.
You can manage patches for the following SUSE Linux Enterprise Server operating systems and versions: v SUSE Linux Enterprise Server Enterprise Server 11 (x86 32-bit) v SUSE Linux Enterprise Server Enterprise Server 11 (x86 64-bit) v SUSE Linux Enterprise Server Enterprise Server 11 (IBM System z 64-bit) User roles and requirements: To complete the tasks in patch management, ensure that you have the required knowledge and access permissions to perform your role.
Supported environments: This topic applies to patch management for SUSE Linux Enterprise Server 11 environments only.
956
Table 171. Roles and skills for patch management in SUSE Linux Enterprise Server environments Role Provisioning Administrator Provisioning tasks v Discover and group target computers v Set up servers and infrastructure Skills v Knowledge of the provisioning environment v Knowledge of the SUSE Linux Enterprise Server operating system v Knowledge of Internet technologies v Knowledge of the scalable distribution infrastructure v Knowledge of how to configure the SMT or YUM repository Provisioning Configuration Librarian v Acquire patches v Scan the target computers for missing patches v Organize and maintain the patch catalog v Create and maintain patch groups, delete patches from the data model Compliance Analyst v Approve patches in the data model v Knowledge of the SUSE Linux Enterprise Server operating system v Set up compliance v Approve compliance recommendations v Verify compliance results Deployment Specialist v Install required software on target computers v Publish patches v Distribute patches v Unpublish patches v Implement compliance recommendations to install missing patches v Monitor patch installation v Knowledge of the SUSE Linux Enterprise Server operating system v Knowledge of the patch management life cycle v Knowledge of the patch management life cycle v Knowledge of the SUSE Linux Enterprise Server operating system v Knowledge of the patch management life cycle
Server requirements: There are a number of requirements that must be met by the components in your configuration so that you can manage patches in SUSE Linux Enterprise Server 11 environments. You must have cURL installed on the provisioning server. cURL is a free URL transfer library and supports several protocols such as FTP, HTTP, HTTPS, and LDAP. Note: For AIX systems, ensure that you use a cURL version with SSL support. You can install cURL from http://curl.haxx.se/. Target computer requirements: There are a number of requirements that must be met by the target computers so that you can manage patches in SUSE Linux Enterprise Server 11 environments.
Supported environments: This topic applies to patch management for SUSE Linux Enterprise Server 11 environments only.
Chapter 9. Deploying patches
957
All files required for patch installation on the endpoints are downloaded to the /tmp directory. Ensure that the file system where the directory is located has enough disk space to store at least all the patches you want to install in one installation or remediation task. Part 1: Environment setup: Before starting to manage patches for SUSE Linux Enterprise Server 11 environments, you must set up the servers depending on the configuration that you are using. Also, you must set up the scalable distribution infrastructure and install required software on your target computers.
Supported environments: This topic applies to patch management for SUSE Linux Enterprise Server 11 environments only.
Discovering and grouping target computers: You must make your target computers known to the data model. To do this, you can run initial discovery, which searches for unknown resources and adds them to the data model. For existing resources, the data model is updated with any new or changed information. You can then group your target computers so that you can manage patches for multiple computers at the same time. Make sure that the following requirements are met: v Your user role is Provisioning Administrator, Provisioning Configuration Librarian, or equivalent. v Your target computers meet the requirements listed in Target computer requirements on page 934.
Supported environments: This topic applies to patch management for SUSE Linux Enterprise Server 11 environments only.
To discover and group your target computers, perform the following steps. Tip: You can use the Computer Discovery, Common Agent Installation, and Inventory Discovery discovery wizard to run a network discovery of the computers, install the common agent on these computers, and run a hardware and software scan. For more information, see Discovering your environment using the ready-to-use network discoveries on page 231. 1. Click Go To > Discovery > Provisioning Discovery > Discovery Configurations. Tip: To perform this task from the Start Center, click Discovery Configurations under Provisioning administration applications or Discovery and task applications. 2. Find the discovery configuration called Initial Discovery and click its name on the list. 3. Click the IP Address Ranges tab. 4. Click New Row. 5. In the Start and End fields, type the IP addresses of your target computers. After each set of IP addresses, click New Row. Tip: You can also specify subnetworks that you want to discover. If, for example, all the target computers that you want to discover are in a LAN, click the Subnetworks tab and specify the IP address and mask for the LAN. After specifying each subnetwork, click New Row. 6. Click the Credentials tab. 7. Click New Row.
958
8. Type the user name and password. After each set of credentials, click New Row. If you specify more than one set of credentials, those credentials are used on each target computer in the order that they are listed. If the logon attempt on a target computer is successful, the computer is added to the data model. Notes: v The system attempts to connect to each IP address using each user name and password provided until it finds a user name and password that can be used to connect successfully. This might cause user accounts to be locked out, depending on the security policy enforced on the target computers. v You might need to increase the default timeout value if you are on a slow network or you are attempting to discover slow computers. 9. In the Add Computers to Group field, click Select Value the target computer after running initial discovery. Tip: If you want to create a group, see Creating groups. . 10. Click Save 11. Click Run Discovery. 12. Under Scheduling, specify scheduling options if you want to schedule the task for a later time. 13. Under Notification, specify notification options if you want users to be notified about the task status. 14. Click Submit. 15. On the Provisioning Task Tracking page, click Refresh to update the task status until the task is completed. The discovery task is displayed with a status of Success on the Provisioning Task Tracking page and the discovered computers are recorded in the details of the discovery task. Configuring the SMT or YUM repository: For SUSE Linux Enterprise Server 11 environments, you can use Subscription Management Tool (SMT) or Yellow dog Updater Modified (YUM) as your package management solution. Make sure that your user role is Provisioning Administrator or Provisioning Configuration Librarian.
Supported environments: This topic applies to patch management for SUSE Linux Enterprise Server 11 environments only.
To define the SMT or YUM repository in the data model: 1. Click Go To > IT Infrastructure > Provisioning Inventory > File Repositories. Tip: To perform this task from the Start Center, click File Repositories under Infrastructure applications. . 2. Click New File Repository 3. In the File Repository field, type the file repository name. 4. In Root Path field, type the root path of the local SMT or YUM repository. The value depends on the configuration of the SMT or YUM repository and on the protocol you use. For example, if the SMT repository is configured as follows: /srv/www/htdocs/repo/$RCE/SLES11-Updates/sle-11-x86_64depending on the protocol you use, the root path is as follows:
959
SSH protocol /srv/www/htdocs/repo/$RCE Note: The SSH protocol is supported only if there is no proxy server between the provisioning server and the SMT repository. FTP protocol /../srv/www/htdocs/repo/$RCE HTTP or HTTPS protocols /repo/$RCE 5. When you select the Is YUM or SMT Repository? check box, additional fields are displayed to specify the SMT or YUM configuration parameters. 6. In the IP Address field, type the IP address of the SMT or YUM repository server. 7. From Protocol menu, select the supported protocol from the list. 8. If you need to change the default port number, which is populated when you select the protocol, type your port number in the Port field. 9. If authentication is required for the SMT or YUM repository, type a user name in the User Name field, a new password in the Password field, and retype it in the Confirm Password field. 10. Click Add Path and specify the information to dynamically configure the repository paths. Enter values in the following fields: a. For the Operating System field, select suse. b. For the Version field, select 11. c. For Edition, select server. d. For the Category field, select os for SLES11-Pool, and updates for SLES11-Updates. e. For Architecture, select your architecture. f. In the Repository Path field, enter the path to the repository. For example, /suse/catalogs/ SLES11-Updates/sle-11-x86_64 11. Click Save .
Based on the information provided, the SMT or YUM repository, data model objects, software module, and credentials are created in the Provisioning Manager data model database to capture the SMT or YUM repository structure. Setting up the proxy server: When the provisioning server and the SMT or YUM repository are separated by a firewall, you must set up a proxy server. Make sure that your user role is Provisioning Administrator or equivalent.
Supported environments: This topic applies to patch management for SUSE Linux Enterprise Server 11 environments only.
Defining the proxy server: To define the proxy server: 1. Click Go To > Deployment > Provisioning Computers. Tip: To perform this task from the Start Center, click Provisioning Computers under Automation development applications. 2. In the Computer field, type the name of the provisioning server, then click the computer name.
960
3. 4. 5. 6. 7.
Click the Credentials tab. Click Add Credentials > New Service Access Point. Type a name for the service access point. In the Protocol Type field, click Network protocol IP. In the Context field, type URLGrabProxy.
8. In the Application Protocol field, click HTTP Access. 9. Type the port number for the proxy server, for example, 3128. Note: Port 3128 is the default port for most proxy servers. If you are using a different proxy server port in your environment, type that proxy server number. In the Domain field, type the fully qualified host name or IP address of the proxy server. If the proxy server requires authentication, select the Authentication? check box. Otherwise, leave this check box blank. Click New Password Credential. In the Search Key field, type a meaningful string. Type the user name and the password for the proxy server, if required.
. 15. Click Save Related information Configuring the SMT or YUM repository on page 959 Setting up the Infrastructure Installing required software on target computers on page 962 Setting up the Infrastructure: You can set up a region, a zone, and a depot server, which are used to distribute and install the patches on the target computers. Make sure that your user role is Provisioning Administrator or equivalent.
Supported environments: This topic applies to patch management for SUSE Linux Enterprise Server 11 environments only.
Setting up a region: Regions are used to group depot servers that are located near one another to optimize upload, replication, and download times. When you create a depot server, associate it with a region. You can assign a depot server to only one region. To set up a region: 1. Click Go To > Administration > Provisioning > Dynamic Content Delivery Configuration. Tip: To perform this task from the Start Center, click Dynamic Content Delivery Configuration under Provisioning administration applications. 2. Click the Regions tab. 3. Click New Row. 4. Type a name and a description for the new region. 5. Click Save Setting up a zone:
Chapter 9. Deploying patches
961
Optionally, you can set up a zone to define an IP address range or a domain name within a region. Regions can be generic, without a real network definition, or they can be specific, when zones are used to define domain names within a region. Zones are used to logically group computers within regions. To 1. 2. 3. set up a zone: On the Dynamic Content Delivery Configuration page, click the Zones tab. Click New Row. Type a name and a description for the new zone.
and click the region that you created in the previous task. 4. In the Regions field, click Select Value 5. Select Domain Name, and then specify the domain that your depot server and target computers are in. 6. Click Save .
Setting up a depot server: A depot server is a system that stores files for distribution. Distribution files are uploaded to a depot server using a client. Uploaded files are stored in a directory that is specified when the depot server is installed. Depot servers can replicate uploaded files to other depot servers to optimize the network traffic. The target computers download the files from the depot servers. To set up a depot server: 1. On the Dynamic Content Delivery Configuration page, click the Depots tab. 2. Click New Row. 3. Type a name and description for the depot server. and click the region that you created in the previous task. 4. In the Region field, click Select Value This is the region that the depot server is assigned to. 5. In the Computer field, click Select Value set up as a depot server. and click the name of the computer that you want to
Note: The depot server must not be included in your group of target computers. 6. In the Fully qualified host name field, type the fully qualified host name of the depot server that has already been discovered. 7. Select the Install the depot agent services check box to install the depot agent services on the depot server. 8. In the Domain Zone Served field, click Select Value previous task. 9. Type the user name and password for the depot server. and select the zone that you set up in the
10. If using only one depot server, select the Preferred upload server check box. At least one preferred depot server is required. . 11. Click Save Related information Configuring the SMT or YUM repository on page 959 Setting up the proxy server on page 960 Installing required software on target computers Installing required software on target computers:
962
Install the common agent on the target computers. The common agent is a software product that is required for software distribution and software compliance management. Make sure that the following requirements are met: v Your user role is Deployment Specialist or equivalent. v The target computers meet the requirements listed in the Target computer requirements on page 934 topic.
Supported environments: This topic applies to patch management for SUSE Linux Enterprise Server 11 environments only.
Installing the common agent: The common agent is a software product that provides infrastructure for management applications. The common agent installed on the target computers provides remote deployment capability, shared computer resources, secure connectivity, and a single entry point. You install the common agent once on each target computer. After the common agent is installed on a target computer, subsequent subagents can be installed on top of an existing common agent. To install the common agent, complete the following steps: Note: If you used the Computer Discovery, Common Agent Installation, and Inventory Discovery discovery wizard to discover your computers, then the common agent is already installed. Proceed to Acquiring patches on page 941. 1. Click Go To > Deployment > Software Management > Common Agent Installation. 2. Click Select > Groups, and select your group of target computers, and then click OK. 3. 4. 5. 6. Under Scheduling, specify scheduling options if you want to schedule the task for a later time. Under Notification, specify notification options if you want users to be notified about the task status. Click Submit. On the Provisioning Task Tracking page, click Refresh to update the task status until the task is completed.
The common agent installation task is displayed with a status of Success on the Provisioning Task Tracking page. Related information Configuring the SMT or YUM repository on page 959 Setting up the proxy server on page 960 Setting up the Infrastructure on page 961 Part 2: Day-to-day tasks: After setting up the environment, there are a number of tasks that you must perform as day-to-day patch management activities to ensure that your target computers are always up-to-date with the required patches.
Supported environments: This topic applies to patch management for SUSE Linux Enterprise Server 11 environments only.
Acquiring patches: Patch acquisition is the process of discovering available patches and importing the patch metadata from the SMT or YUM repository.
Chapter 9. Deploying patches
963
Make sure that your user role is Provisioning Administrator or Provisioning Configuration Librarian.
Supported environments: This topic applies to patch management for SUSE Linux Enterprise Server 11 environments only.
Note: When the provisioning server and the SMT or YUM repository are separated by a firewall, you must set up a proxy server. Ensure that the FTP user has the required access permissions to access the SMT or YUM repository. No error is displayed if the FTP user does not have the required access permissions. To acquire patches: 1. Click Go To > IT Infrastructure > Software Catalog > Patch Acquisition. Tip: To perform this task from the Start Center, click Patch Acquisition under Discovery and task applications. 2. In the Operating System list, click Select Value systems. and click Linux from the list of operating and click the name of the SMT or
3. In the YUM or SMT File Repository field, click Select Value YUM repository that you created previously. 4. Select the repository paths.
Note: Any subsequent patch scan, performed either using a compliance check or an SMT or YUM scan discovery, is performed on the patches acquired at patch acquisition time based on this selection. 5. Optional: To approve the acquired patches automatically, in the Initial Patch Status list, click Select and click APPROVED. This option is useful if you want to mark as approved all the Value patches that were made available by the vendor, without having to approve them in a later step. 6. Under Scheduling, specify scheduling options if you want to schedule the task for a later time. 7. Under Notification, specify notification options if you want users to be notified about the task status. 8. Click Submit. 9. On the Provisioning Task Tracking page, click Refresh to update the task status until the task is completed. The patch acquisition task is displayed with a status of Success on the Provisioning Task Tracking page. The patches are brought into the data model. To view the patches catalog, in the Start Center, click Patches under Favorite applications. Note: After completing the patch acquisition, you can run the compliance scan and check directly if the scan settings required are identical to the settings you used for patch acquisition, for example, if you plan to scan for a certain level of patches on the repository paths defined at acquisition time. If you need to customize the scan for specific levels and architecture, use the SMT or YUM scan to set up specific scan settings, which must be a subset of selections made at acquisition time. Note: deltarpm patches are not included in the patches that are imported. Testing patches: It is recommended to test the released patches before installing them, to ensure that all possible conflicts have been identified in a test environment before installing them in the production environment. You can install the patches on a test computer using the Patch Installation application, but the actual testing of patches is to be performed outside of the provisioning applications.
964
Supported environments: This topic applies to patch management for SUSE Linux Enterprise Server 11 environments only.
Approving patches in the data model: After patches are acquired, the first step in the approval process is to approve the patches for the entire organization (at the data model level). Only the approved patches are considered when scanning the target computers for missing patches. For example, in some organizations all patches are approved at the data model level and then the compliance analyst decides which patches to approve for each provisioning group. This second step in the approval process is done when scanning for missing patches. In other organizations, there might be some patches that the compliance analyst does not want to approve immediately after acquisition, because further testing is required before approving. Make sure that your user role is Compliance Analyst or equivalent.
Supported environments: This topic applies to patch management for SUSE Linux Enterprise Server 11 environments only.
To approve the acquired patches in the data model: 1. Click Go To > IT Infrastructure > Software Catalog > Patches. Tip: To perform this task from the Start Center, click Patches under Favorite applications. 2. Press Enter to display all patches from the catalog. Tip: You can filter down the list of displayed patches by patch name, version, severity, vendor, release date, and so on. To search for a particular patch, type the patch name in the Patch field, for example, glibc-devel. To use more search fields, click Advanced Search and customize the options in the window, then click Find. 3. Click Select Records and select the patches that you want to approve, then click Approve. Note: To select records, filter down your list of patches to a maximum of 200. If you want to approve more than 200 patches at the same time, filter down your patches, then click Approve and click OK on the confirmation message. Patches that you have approved are displayed with a status of Approved on the Patches page. Configuring the SMT or YUM repository discovery: Before running the compliance scan, you must configure the SMT or YUM repository in the SLES10 SDI Patch Scan or SLES11 SDI Patch Scan discovery configuration and run the discovery configuration. Make sure that your user role is Provisioning Administrator or Provisioning Configuration Librarian or equivalent. To customize the scanning model: 1. Click Go To > Discovery > Provisioning Discovery > Discovery Configurations. Tip: To perform this task from the Start Center, click Discovery Configurations under Automation development applications . 2. Find the SLES10 SDI Patch Scan or SLES11 SDI Patch Scan discovery configuration and click it. 3. Click Select Value for the YUM or SMT File Repository field, and select the repository where the scan is to be performed. 4. In the Select Repository Paths section, select the architecture and level of updates to scan for.
Chapter 9. Deploying patches
965
5. Click Save . 6. Click Run Discovery. 7. Click Select > Groups and select the check box corresponding to your group of target computers, then click OK. 8. Click Submit. 9. On the Provisioning Task Tracking page, click Refresh to update the task status until the task is completed. The discovery task is displayed with a status of Success on the Provisioning Task Tracking page. You can now scan for missing patches. Setting up compliance: You can set up a compliance scan to verify if patches are required on the target computers. Compliance checks define the compliance state of your target computers and are used to detect, report, and recommend how to fix noncompliance. Make sure that your user role is Compliance Analyst or equivalent.
Supported environments: This topic applies to patch management for SUSE Linux Enterprise Server 11 environments only.
To set up compliance: 1. Click Go To > Deployment > Provisioning Groups. Tip: To perform this task from the Start Center, click Provisioning Groups under Provisioning administration applications. 2. Find your group of target computers and click its name in the list. 3. Click the Compliance tab. 4. Click New Compliance Check > Patch Check. 5. In the Patch Approval Group field, click Select Value scanned, then click Save. and select a group of patches to be
Tip: By default, all patches that have been approved in the data model are scanned, and target computers are verified against all approved patches to see if computers are compliant. You can also select a patch approval group, which is used to specify a set of allowed patches, or approval lists. The patch approval group limits the patches for which recommendations are generated to the specified set of patches only. You might want to use this option to tightly control patches for critical computers where more exhaustive testing of patches is needed before they are required to be installed. Do not perform the patch check using a software compliance check of type Software Group associated to the Patch Approval Group. Doing this can cause the following problems: v If a software patch contained in the Patch Approval Group is installed, target computers result as compliant. v The check is performed for the specific software patch installation and disregards any relation between the software patches, for example, superseding patches. v The check is performed on all computers belonging to the group and disregards if the software patch is applicable to only certain platforms. 6. Optional: To automatically approve recommendations when they are generated, click Enable Automatic Approval and click OK in the message box. All recommendations that are generated by this compliance check will be created in the Approved state.
966
7. Click Save
The Operating System Patches and Updates compliance check is displayed in the list of compliance checks defined for the group of target computers. Scanning for missing patches: You can compare the software installed on your target computers with a list of the patches that have been approved for the entire organization, to see which patches are missing on which computers. By default, all patches that have been approved in the data model are scanned, and target computers are verified against all approved patches to see if computers are compliant. You can also select a patch approval group, which is used to specify a set of allowed patches, or approval lists. The patch approval group limits the patches for which recommendations are generated to the specified set of patches only. You might want to use this option to tightly control patches for critical computers where more exhaustive testing of patches is needed before they are required to be installed. Make sure that your user role is Provisioning Configuration Librarian or equivalent.
Supported environments: This topic applies to patch management for SUSE Linux Enterprise Server 11 environments only.
To scan for missing patches: 1. Click Go To > Deployment > Provisioning Groups. Tip: To perform this task from the Start Center, click Provisioning Groups under Provisioning administration applications. 2. Click your group of target computers. 3. Click the Compliance tab. 4. Click Run Scan and Check. Tip: If you want to schedule the task for a later time, click Schedule Scan and Check to specify scheduling options. 5. Click the Notification tab to specify notification options if you want users to be notified about the task status. 6. On the Provisioning Task Tracking page, click Refresh to update the task status until the task is completed. Attention: Wait until the task completes before starting another compliance scan task on the target computers. If you run concurrent compliance scan tasks on a target computer, the tasks might fail. The scanning and checking task is displayed with a status of Success on the Provisioning Task Tracking page. The recommendations to install missing patches are generated. On the Compliance tab for the group, the patch check displays the number of computers that are compliant in the Compliant column, depending on whether all required patches are installed on the target computers. If notification was set up, recipients are notified that recommendations must be approved. If target computers are not compliant, you can see a list of recommendations in the Recommendations tab. Approving compliance recommendations: After scanning your target computers to see which patches are missing on them, compliance recommendations are generated. Based on these recommendations, you can decide which patches you want to install on your target computers. Make sure that your user role is Compliance Analyst or equivalent.
Chapter 9. Deploying patches
967
Supported environments: This topic applies to patch management for SUSE Linux Enterprise Server 11 environments only.
To approve compliance recommendations: 1. Click Go To > Deployment > Provisioning Groups. Tip: To perform this task from the Start Center, click Provisioning Groups under Provisioning administration applications. 2. Click your group of target computers. 3. Click the Recommendations tab. 4. In the recommendations list, select the check boxes corresponding to the missing patches that you want to approve and click Approve. The selected patches are displayed with a status of Approved on the Recommendations tab. Publishing patches to depots: After patches are approved, you can optionally publish them to the depots, then distribute, and install them on the target computers. During the publishing phase, the patch binaries are downloaded into the data model, and then the patch binaries and other files (for example cab file, vbscript) are published to a depot server. From the depot server, patches are distributed for installation on target computers. You can distribute patches immediately or schedule this task for a specified date and time. Make sure that your user role is Deployment Specialist or equivalent.
Supported environments: This topic applies to patch management for SUSE Linux Enterprise Server 11 environments only.
Tip: You can also publish, distribute, and install patches in one step from the Recommendations tab for both Provisioning Computers and Provisioning Groups. To perform this operation: 1. Click Go To > Deployment > Provisioning Computers. or Click Go To > Deployment > Provisioning Groups. 2. Select the group or computer in the list and click it. 3. Select the Recommendations tab. 4. Select one or more patches and click Approve. The recommended actions can now be run or scheduled. The selected patches are published, distributed, and installed. To publish patches: 1. Click Go To > Deployment > Patch Management > Patch Publishing. Tip: To perform this task from the Start Center, click Patch Publishing under Patch management applications. 2. Click Select Patches and select the patches that you want to distribute, then click OK. Tip: You can filter down the list of displayed patches by patch name, vendor, and version. To search for a particular patch, type the patch name in the Patch field, for example, glibc-dlevel. If multiple software definitions are available for that patch number, select the check boxes for all the software definitions that match the patch number. The correct patch, based on the operating system on the target computer, are distributed to the appropriate target computer. To use more search fields, expand Advanced Search Options and customize the options in the window, then click Refine.
968
3. 4. 5. 6. 7.
Click Select Depots and select one or more depots, then click OK. Under Scheduling, specify scheduling options if you want to schedule the task for a later time. Under Notification, specify notification options if you want users to be notified about the task status. Click Submit. On the Provisioning Task Tracking page, click Refresh to update the task status until the task is completed.
The patch distribution task is displayed with a status of Success on the Provisioning Task Tracking page. Distributing patches: After patches are published to depots, you can optionally distribute them first and then install them on the target computers, or distribute and install them in one step. During distribution, the patch binaries are downloaded into the data model, and then the patch binaries and other files (for example cab file, vbscript) are published to a depot server. From the depot server, patches are distributed for installation on target computers. You can distribute patches immediately or schedule this task for a specified date and time. Make sure that your user role is Deployment Specialist or equivalent.
Supported environments: This topic applies to patch management for SUSE Linux Enterprise Server 11 environments only.
Tip: You can also publish, distribute, and install patches in one step from the Recommendations tab for both the Provisioning Computers and Provisioning Groups. To perform this operation: 1. Click Go To > Deployment > Provisioning Computers. or Click Go To > Deployment > Provisioning Groups. 2. Select the group or computer in the list and click it. 3. Select the Recommendations tab. 4. Select one or more patches and click Approve. You can run the recommended actions now or you can schedule them for later. The selected patches are published, distributed, and installed. To distribute patches: 1. Click Go To > Deployment > Patch Management > Patch Distribution. Tip: To perform this task from the Start Center, click Patch Distribution under Patch management applications. 2. Click Select Patches and select the patches that you want to distribute, then click OK. Tip: You can filter down the list of displayed patches by patch name, vendor, and version. To search for a particular patch, type the patch name in the Patch field, for example, glibc-devel. If multiple software definitions are available for that patch number, select the check boxes for all the software definitions that match the patch number. The correct patch, based on the operating system on the target computer, is distributed to the appropriate target computer. To use more search fields, expand Advanced Search Options and customize the options in the window, then click Refine. 3. Click Select > Groups and select your group of target computers, then click OK. 4. Under Scheduling, specify scheduling options if you want to schedule the task for a later time. 5. Under Notification, specify notification options if you want users to be notified about the task status. 6. Click Submit.
969
7. On the Provisioning Task Tracking page, click Refresh to update the task status until the task is completed. The patch distribution task is displayed with a status of Success on the Provisioning Task Tracking page. Installing patches: After patches are approved, you can install them on the target computers where they are missing. Make sure that your user role is Deployment Specialist or equivalent.
Supported environments: This topic applies to patch management for SUSE Linux Enterprise Server 11 environments only.
Tip: You can also publish, distribute, and install patches in one step from the Recommendations tab for both the Provisioning Computers and the Provisioning Groups task. To perform this operation: 1. Click Go To > Deployment > Provisioning Computers. or Click Go To > Deployment > Provisioning Groups. 2. Select the group or computer in the list and click it. 3. Select the Recommendations tab. 4. Select one or more patches and click Approve. You can run the recommended actions now or you can schedule them for later. The selected patches are published, distributed, and installed. To install patches: 1. Click Go To > Deployment > Provisioning Groups. Tip: To perform this task from the Start Center, click Provisioning Groups under Provisioning administration applications. Click your group of target computers. Click the Recommendations tab. Select all the patches that are approved from the recommendations list and click Implement. Specify the options that you want for installing and click Submit.
2. 3. 4. 5.
6. On the Provisioning Task Tracking page, click Refresh to update the task status until the task is completed. The patch installation task is displayed with a status of Success on the Provisioning Task Tracking page. Verifying compliance results: After installing patches on the target computers, you can verify that the patches installed successfully. Make sure that your user role is Compliance Analyst or equivalent.
Supported environments: This topic applies to patch management for SUSE Linux Enterprise Server 11 environments only.
You can verify compliance results either by running the compliance check again and verifying the list of recommendations or by running patch reports that provide information about missing patches. Running the compliance check again:
970
To run the compliance check: 1. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Groups. Tip: To perform this task from the Start Center, click Provisioning Groups under Provisioning administration applications. 2. Click your group of target computers. 3. Click the Compliance tab. 4. Click Run > Check to run a compliance check before displaying the recommendations so that the results are accurate. 5. Click the Recommendations tab. 6. In the list of recommendations, verify that the installed patches are no longer displayed as missing. 7. Click OK. Installed patches are no longer listed on the list of recommendations because they are not missing from the target computers. Related information Testing patches on page 964 Approving patches in the data model on page 965 Configuring the SMT or YUM repository discovery on page 965 Setting up compliance on page 966 Scanning for missing patches on page 967 Approving compliance recommendations on page 967 Publishing patches to depots on page 968 Distributing patches on page 969 Installing patches on page 970 Acquiring patches on page 963
Supported configurations
This patch management solution supports the following configurations. SUSE Linux patch server (ZENworks or YUP) model The following diagram illustrates the SUSE Linux patch server model.
971
Provisioning server
The target computers retrieve the patches from a patch server (ZENworks or YUP). The patch server is used as a patch repository for the patches downloaded from the SUSE Linux update site over the Internet. The SUSE Linux patch server communicates directly with the target computers. Optionally, you can use a proxy server to provide Internet access to the patch server. SUSE Linux update site model The following diagram illustrates the SUSE Linux update site model.
Provisioning server
The target computers are connected to the SUSE Linux update site over the Internet to download the patches. Optionally, you can use a proxy server to provide Internet access to the target computers.
Requirements
Verify that the following requirements are met depending on configuration: v The ZENworks server is a computer that has SUSE Linux 10 or SUSE Linux 10 SP1 and ZENworks Linux Management 7.2 installed, and has Internet access. This computer is used as a patch repository
972
for the patches downloaded from the SUSE Linux update site over the Internet. The system administrator must ensure that the latest patches exist on the ZENworks patch server. This is a manual process performed outside of the provisioning server. v The YUP server is a computer that has SUSE Linux 10 or SUSE Linux 10 SP1 and the Yum Update Proxy (YUP) package installed, and has Internet access. This computer is used as a patch repository for the patches downloaded from the SUSE Linux update site over the Internet. The system administrator must ensure that the latest patches exist on the YUP patch server. This is a manual process performed outside of the provisioning server. v The target computers have SUSE Linux 10 installed. In the configuration where the target computers are connected to the SUSE Linux update site directly, they must have Internet access. In the configuration where a patch server is present, Internet access for the target computers is not necessary. For additional requirements for the SUSE Linux target computers, see the Requirements for SUSE Linux Enterprise Server (SLES) target computers on page 561 topic. v User roles for patch management are listed in the Patch management basics on page 877 topic. Note: Do not add any target computer to more than one SUSE Linux Enterprise Server 10 patch management group because the property defined on first patch management group is used for patch management on the target computer.
973
Automation packages
The following automation packages are used for SUSE Linux patch management: v sles-operating-system v suse_patch For information about the automation packages, search for automation package descriptions in the information center.
974
Requirements
Verify that the following requirements are met: v You must have a valid Sun Online account to use Sun Update Connection. To sign up for a Sun Online account, go to the Sun Developer Network. Register each target computer with the Sun Update Connection. v The target computer requirements are listed in the Requirements for Solaris Operating Environment target computers on page 563 topic. v User roles for patch management are listed in the Patch management basics on page 877 topic.
Automation packages
The following automation packages are used for Solaris patch management: v Sun_Update_Connection for the Sun Update Connection solution For information about the automation packages, search for automation package descriptions in the information center.
975
1. Discover computers and set up the environment (Provisioning Administrator) This process consists of running initial discovery to discover all computers and to add them to the data model. Initial discovery identifies what operating system is installed on your target computers. This information is required to make sure that patches for that operating system are acquired in a later step in the process. As part of initial discovery, group the discovered target computers to manage patches for multiple computers at the same time. Tip: The task of discovering computers can be performed also by the provisioning configuration librarian. 2. Optional: Install required software on target computers (Deployment Specialist) This process consists of installing the common agent on the target computers. The common agent is a software product that is required for software distribution and software compliance management. 3. Set up compliance (Compliance Analyst) This process consists of creating compliance checks to determine if the software installed on the target computers matches your requirements. Compliance checks define the compliant state of your target computers and are used to detect, report, and recommend how to fix noncompliance. Add a patch check to a group of target computers, and, optionally, identify specific patch approval groups to scan. 4. Scan for missing patches (Provisioning Configuration Librarian) This process consists of scanning the target computers and checking to see which patches are missing from the target computers. After the scan, a list of missing patches is generated and then the check creates compliance recommendations for each computer or group. 5. Approve compliance recommendations (Compliance Analyst) This process consists of approving which patches you want to install. You approve patches for each target computer or group of computers, if a patch is missing on the target computers. 6. Install patches and monitor patch installation (Deployment Specialist) This process consists of distributing and installing the patches on target computers. You can distribute and install patches at the same time or schedule these tasks separately. You can install patches on a specific target computer or multiple target computers as one task. You can also monitor the progress of patch installation. 7. Verify compliance results (Compliance Analyst) This process consists of validating that the patches were successfully applied to all the target computers you selected. Run the compliance check again to verify that the installed patches are no longer listed in the list of recommendations.
976
Provisioning server
Firewall
Firewall
Note: The configuration displayed in this diagram is not applicable for patch management for Solaris non-global zone environments. Sun proxy server In environments where the Solaris computers are not connected directly to Sun Update Connection over the Internet, a Sun proxy server is used. This server acts as a gateway between the target computers and Sun Update Connection. In this configuration, the Sun proxy server is the only computer that connects to Sun Update Connection over the Internet to download the patches. All the target computers are connected to the Sun proxy server, and are configured to use the Sun proxy server as their only patch source. All the patch requests originating from the target computers are directed to the Sun proxy server. If a patch is not found in the local cache, the Sun proxy server retrieves it from Sun Update Connection, stores it in its cache for future references, and then distributes it to the target computer that issued the request. HTTP proxy server The target computers can either be connected directly to Sun Update Connection or to a Sun proxy server to retrieve the patches. Optionally, you can use an HTTP proxy server to provide Internet access to the Sun proxy server.
Learning objectives
In this tutorial, you learn how to: v Discover and group target computers. v Set up servers and target computers. v Set up compliance for the target computers.
Chapter 9. Deploying patches
977
v v v v
Scan the target computers for missing patches. Approving compliance recommendations Install patches. Verify compliance results.
Allow several hours to discover your target computers, set up the infrastructure, set up the target computers, and install the patches on them.
Prerequisites
Before you start, verify that you meet the requirements. Modules in this tutorial v Requirements for Solaris v Part 1: Environment setup on page 979 v Part 2: Day-to-day tasks on page 981 Requirements for Solaris: Before you start managing patches in Solaris environments, ensure that your systems meet all requirements. You can manage patches for the following Solaris operating systems and versions using Sun Update Connection (smpatch): v Solaris 10 (AMD 64-bit) v Solaris 10 (Sun SPARC) v Solaris 10 (x86 64-bit) v Solaris 9 (Sun SPARC) v Solaris 8 (Sun SPARC) User roles and requirements: To perform the tasks in patch management, ensure that you have the required knowledge and access permissions to perform your role.
Table 172. Roles and skills for patch management in Solaris environments Role Provisioning Administrator Provisioning tasks v Discover and group target computers v Set up servers and infrastructure Skills v Knowledge of the provisioning environment v Knowledge of the Solaris operating system v Knowledge of Internet technologies Provisioning Configuration Librarian v Scan the target computers for missing patches v Organize and maintain the patch catalog v Create and maintain patch groups, delete patches from the data model v Knowledge of the Solaris operating system v Knowledge of the patch management life cycle
978
Table 172. Roles and skills for patch management in Solaris environments (continued) Role Compliance Analyst Provisioning tasks v Set up compliance v Approve compliance recommendations v Verify compliance results Deployment Specialist v Install required software on target computers Skills v Knowledge of the Solaris operating system v Knowledge of the patch management life cycle v Knowledge of the Solaris operating system
v Implement compliance v Knowledge of the patch recommendations to install missing management life cycle patches v Monitor patch installation v Uninstall patches
Server requirements: There are a number of requirements that must be met by the components in your configuration so that you can manage patches in Solaris environments. There are no specific requirements for the provisioning server for patch management in Solaris environments. Target computer requirements: There are a number of requirements that must be met by the target computers so that you can manage patches in Solaris environments. All files required for patch installation on the target computers are downloaded to the /tmp directory. Ensure that the file system where the directory is located has enough disk space to store at least all the patches you want to install in one installation or remediation task. All target computers must have access to the Internet. Additionally, all target computers must have wget installed and available. wget is normally available on Solaris by default. Part 1: Environment setup: Before starting to manage patches for Solaris environments, you must complete some setup tasks. You need to discover your Solaris target computers and you need to add the Sun Update Connection to the data model. Discovering the Solaris target computers: You must make your Solaris target computers known to the data model. To do this, you can run discovery, which searches for unknown resources and adds them to the data model. For existing resources, the data model is updated with any new or changed information. Make sure that the following requirements are met: v Your user role is Provisioning Administrator, Provisioning Configuration Librarian, or equivalent. 1. Click Go To > Discovery > Provisioning Discovery > Discovery Configurations. Tip: To perform this task from the Start Center, click Discovery Configurations under Provisioning administration applications or Discovery and task applications. 2. Find the discovery configuration called Initial Discovery and click its name on the list.
Chapter 9. Deploying patches
979
3. Click the IP Address Ranges tab. 4. Click New Row. 5. In the Start and End fields, type the IP addresses of your target computers. After each set of IP addresses, click New Row. Tip: You can also specify subnetworks that you want to discover. If, for example, all the target computers that you want to discover are in a LAN, click the Subnetworks tab and specify the IP address and mask for the LAN. After specifying each subnetwork, click New Row. 6. Click the Credentials tab. 7. Click New Row. 8. Type the user name and password. After each set of credentials, click New Row. If you specify more than one set of credentials, those credentials are used on each target computer in the order that they are listed. If the logon attempt on a target computer is successful, the computer is added to the data model. Notes: v The system attempts to connect to each IP address using each user name and password provided until it finds a user name and password that can be used to connect successfully. This might cause user accounts to be locked out, depending on the security policy enforced on the target computers. v You might need to increase the default timeout value if you are on a slow network or you are attempting to discover slow computers. 9. In the Add Computers to Group field, click Select Value the target computer after running initial discovery. Tip: If you want to create a group, see Creating groups. . 10. Click Save 11. Click Run Discovery. 12. Under Scheduling, specify scheduling options if you want to schedule the task for a later time. 13. Under Notification, specify notification options if you want users to be notified about the task status. 14. Click Submit. 15. On the Provisioning Task Tracking page, click Refresh to update the task status until the task is completed. The discovery task is displayed with a status of Success on the Discovery Configurations page and the discovered computers are recorded in the details of the discovery task. Adding Sun Update Connection to the data model: You need to add Sun Update Connection to the data model. This is necessary to ensure that you receive the latest patches for your Solaris target computers. Make sure that the following requirements are met: v Your user role is Provisioning Administrator, Provisioning Configuration Librarian, or equivalent. v You require a Sun Online Account with user name and password credentials. To add the Sun Update Manager to the data model, complete the following steps: 1. Click Go To > Deployment > Provisioning Computers. 2. From the Select Action menu, click Add Computer. 3. In the Computer field on the Computer tab, type getupdates1.sun.com. and select the group in which to add
980
4. 5. 6. 7. 8.
Click the Hardware tab and click the Network Interface subtab. Click New Network Interface. Select the Dynamic check box. Click the Credentials tab. Click Add Credentials > New Service Access Point.
9. Complete the following steps on the Details subtab: v In the Service Access Point field, type the name of the service access point. v From the Protocol Type menu, select Network protocol IP. v In the Context field, type Sun Update Connection. v From the Application Protocol menu, select HTTP Secure Access. v In the Port field, type 443. 10. Click New Password Credentials. You need a Sun Online Account to complete this section. Type your Sun account details in the Password Credentials section of the screen. 11. Click the Save icon to save your settings. The task is displayed with a status of Success on the Provisioning Computer page. If you are planning to use a HTTP proxy server, you can proceed to set up the proxy server now. For information about how to set up the HTTP proxy server on Solaris, see ../../com.ibm.tivoli.tpm.apk.doc/ Sun_Update_Connection_package.html Part 2: Day-to-day tasks: After setting up the environment, there are a number of tasks that you must perform as day-to-day patch management activities to ensure that your target computers are always up-to-date with the required patches. Setting up compliance: You can set up a compliance check to verify if patches are required on the target computers. Compliance checks define the compliance state of your target computers and are used to detect, report, and recommend how to fix noncompliance. Make sure that your user role is Compliance Analyst or equivalent. To set up compliance: 1. Click Go To > Deployment > Provisioning Groups. Tip: To perform this task from the Start Center, click Provisioning Groups under Provisioning administration applications. 2. Find your group of target computers and click its name in the list. 3. Click the Compliance tab. 4. Click New Compliance Check > Patch Check. 5. In the Patch Approval Group field, click Select Value scanned, then click Save. and select a group of patches to be
Tip: By default, all patches that have been approved in the data model are scanned, and target computers are verified against all approved patches to see if computers are compliant. You can also select a patch approval group, which is used to specify a set of allowed patches, or approval lists. The patch approval group limits the patches for which recommendations are generated to the specified set
981
of patches only. You might want to use this option to tightly control patches for critical computers where more exhaustive testing of patches is needed before they are required to be installed. Do not perform the patch check using a software compliance check of type Software Group associated to the Patch Approval Group. Doing this can cause the following problems: v If a software patch contained in the Patch Approval Group is installed, target computers result as compliant. v The check is performed for the specific software patch installation and disregards any relation between the software patches, for example, superseding patches. v The check is performed on all computers belonging to the group and disregards if the software patch is applicable to only some platforms. 6. Optional: To automatically approve recommendations when they are generated, click Enable Automatic Approval and click OK in the message box. All recommendations that are generated by this compliance check will be created in the Approved state. 7. Click Save .
The Operating System Patches and Updates compliance check is displayed in the list of compliance checks defined for the group of target computers. Scanning for missing patches: You can compare the software installed on your target computers with a list of the patches that have been approved for the entire organization to determine which patches are missing on which computers. By default, all patches that have been approved in the data model are scanned, and target computers are verified against all approved patches to see if computers are compliant. You can also select a patch approval group, which is used to specify a set of allowed patches, or approval lists. The patch approval group limits the patches for which recommendations are generated to the specified set of patches only. You might want to use this option to tightly control patches for critical computers where more exhaustive testing of patches is needed before they are required to be installed. Make sure that your user role is Provisioning Configuration Librarian or equivalent. To scan for missing patches: 1. Click Go To > Deployment > Provisioning Groups. Tip: To perform this task from the Start Center, click Provisioning Groups under Provisioning administration applications. 2. Click your group of target computers. 3. Click the Compliance tab. 4. Click Run Scan and Check. Tip: If you want to schedule the task for a later time, click Schedule Scan and Check to specify scheduling options. 5. Click the Notification tab to specify notification options if you want users to be notified about the task status. 6. On the Provisioning Task Tracking page, click Refresh to update the task status until the task is completed. Attention: Wait until the task completes before starting another compliance scan task on the target computers. If you run concurrent compliance scan tasks on a target computer, the tasks might fail. The scanning and checking task is displayed with a status of Success on the Provisioning Task Tracking page. The recommendations to install missing patches are generated. On the Compliance tab for the group, the patch check displays the number of computers that are compliant in the Compliant column,
982
depending on whether all required patches are installed on the target computers. If notification was set up, recipients are notified that recommendations must be approved. Approving compliance recommendations: After scanning your target computers to see which patches are missing on them, compliance recommendations are generated. Based on these recommendations, you can decide which patches you want to install on your target computers. Make sure that your user role is Compliance Analyst or equivalent. To approve compliance recommendations: 1. Click Go To > Deployment > Provisioning Groups. Tip: To perform this task from the Start Center, click Provisioning Groups under Provisioning administration applications. 2. Click your group of target computers. 3. Click the Recommendations tab. 4. In the recommendations list, select the check boxes corresponding to the missing patches that you want to approve and click Approve. The selected patches are displayed with a status of Approved on the Recommendations tab. Installing patches: After patches are approved, you can install them on the target computers on which they are missing. Make sure that your user role is Deployment Specialist or equivalent. To install patches: 1. Click Go To > Deployment > Provisioning Groups. Tip: To perform this task from the Start Center, click Provisioning Groups under Provisioning administration applications. 2. Click your group of target computers. 3. Click the Recommendations tab. 4. Select all the patches that are approved from the recommendations list and click Implement. 5. Specify the options that you want for installing and click Submit. 6. On the Provisioning Task Tracking page, click Refresh to update the task status until the task is completed. The patch installation task is displayed with a status of Success on the Provisioning Task Tracking page. Verifying compliance results: After installing patches on target computers, you can verify that the patches installed successfully. Make sure that your user role is Compliance Analyst or equivalent. You can verify compliance results either by running the compliance check again and verifying the list of recommendations or by running patch reports that provide information about missing patches. Running the compliance check again:
983
To run the compliance check: 1. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Groups. Tip: To perform this task from the Start Center, click Provisioning Groups under Provisioning administration applications. 2. Click your group of target computers. 3. Click the Compliance tab. 4. Click Run > Check to run a compliance check before displaying the recommendations so that the results are accurate. 5. Click the Recommendations tab. 6. In the list of recommendations, verify that the installed patches are no longer displayed as missing. 7. Click OK. Installed patches are no longer listed on the list of recommendations because they are not missing from the target computers. Related information Scanning for missing patches on page 982 Approving compliance recommendations on page 983 Installing patches on page 983 Setting up compliance on page 981
984
Automation packages
The following automation packages are used for Solaris patch management: v Sun_Update_Connection_Enterprise for the Sun Update Connection Enterprise solution For information about the automation packages, search for automation package descriptions in the information center.
v The patch scan, download, and installation is done directly from getupdates1.sun.com. To 1. 2. 3. register one target computer only: Click Go To > Administration > Provisioning > Provisioning Workflows. Find the workflow called Sun_Update_Connection_Register and click Run Type the device ID for the target computer and click Run.
To register a group of computers: 1. Click Go To > Task Management > Provisioning Tasks > Provisioning Task Definitions. . 2. Click New 3. Type a name for the provisioning task and select Provisioning Workflow for the type. 4. In the Provisioning Workflow field, click Select Value Sun_Update_Connection_Register. 5. In the Target Parameter field, click Select Value 6. Leave the Default Value field empty. and click
. 7. Click Save 8. From the Select Action menu, click Run Provisioning Task. 9. Under Targets, click Select > Groups and select the group name, then click OK. 10. Click Submit.
985
Components
This patch management solution requires the following HP-UX components: SD-UX server The SD-UX server is an HP-UX 11i server where Software Distributor (SD-UX) is installed for managing patches. All released patches are downloaded from the IT Resource Center site and stored on the SD-UX server. This server also hosts a depot containing Software Assistant and Perl with the related dependencies, to be installed on the endpoints. This server must have enough disk space to create a patch depot at run time. The patch depot is required when installing patches on endpoints. The disk space can vary based on the site requirements and the number of patches stored on the SD-UX server. To store all patches from IT Resource Center site and to hold the temporary depot, 25+ GB disk space is sufficient. You can optionally use an FTP proxy to download patches.
HP IT Resource Center
Provisioning server
SD-UX server
FTP proxy server Optionally, you can use an FTP proxy server to provide Internet access to the SD-UX server.
Requirements
Verify that the following requirements are met: v The SD-UX server is an HP-UX computer with Ignite-UX, Software Distributor (SD-UX), and openSSH 4.4 or higher installed. This computer must run HP-UX 11i and must have Internet access to download the Security Catalog and patches from the HP ITRC (IT Resource Center) server or from an FTP Web site. Optionally, wget installed if using this tool to create the FTP mirror. The SD-UX server must have SSH service access points enabled so that the HP-UX target computers can access it. Patches are manually downloaded and stored on this server. v The target computer requirements are listed in the Requirements for HP-UX target computers on page 565 topic. v User roles for patch management are listed in the Patch management basics on page 877 topic.
986
987
3. Add all the dependencies of Perl to depot, unless all dependencies are satisfied by the target.
. 8. Click Save 9. Click the Variables tab and set up the following variables: v Patches Mirror Path to the directory used to download the patches, for example, opt/sd-ux. v Patches Temp Depot to the directory where temporary SD-UX depots will be created, for example, opt/sd-ux/depots. Note: These paths are relative to the Root Path defined for the file repository in the File Repository tab. 10. Click the Credentials tab and expand SSH Server. 11. Click New Password Credential and type the user name and password for a super user that has access to the SD-UX server. 12. Click Save .
First add HP-UX Software Assistant and Perl to a software depot on the SD-UX server using the swcopy command. After that, verify that the HP-UX Software Assistant and Perl software definitions are set up properly and that they match the depot configuration from the SD-UX server. To do this, you need to complete the following: 1. Click Go To > IT Infrastructure > Software Catalog > Software Products. 2. Search for the HP-UX Software Assistant software definition and click its name on the list. 3. From the Software Installables section on the Software Definition tab, click HP-UX Software Assistant. 4. Verify that Package Path is set to the directory depot that you created using the swcopy command. If, for example, your directory depot was /opt/sd-ux/tools, then Package Path must be set to opt/sd-ux/tools, which is relative to the Root Path of the HP SD-UX Server file repository. 5. Verify that File Repository is set to HP SD-UX Server. 6. Repeat steps 2 to 5 to verify that the Perl software definition is set up properly.
Automation packages
The following automation packages are used for HP-UX patch management: v HP-UX v HP_UX_SD_Patches For information about the automation packages, search for automation package descriptions in the information center.
988
The automation packages can use both Security Patch Check and Software Assistant.
Process
To demonstrate how components interact, the following steps outline the component interactions during a Windows patch installation in an environment that uses the scalable distribution infrastructure. 1. The task is submitted and activity plan engine starts task execution. 2. The patch files are published to the depot. 3. The job is submitted to device manager. 4. The target computer polls device manager for the job, and runs the following items: a. The patch files are downloaded from depot. b. The patch installation runs on the computer. c. The results of the patch installation are uploaded to the provisioning server queue. 5. The discovery engine worker processes the results, picking up the results from the queue. If an error occurs during discovery: 1. Verify that all requirements for discovery were met as described in the following topics: v v v v v
Windows AIX Solaris Red Hat
Requirements for Windows on page 895 Requirements for AIX on page 918 See Requirements in the Requirements for Solaris on page 978 topic.
See Requirements in the Requirements for Red Hat Enterprise Linux 6 and 5 environments on page 933 topic.
SUSE See Requirements in the Requirements for SUSE Linux Enterprise Server 11 environments on page 956 topic. 2. If an error message with a message ID is displayed, search for the message ID in the information center or see the Tivoli Provisioning Manager ../com.ibm.support.tpm.doc/messages/ rtrbmsg_tpm.dita section under Reference for a description of the error message.
1. Task status
Check the status of the patch management task. For information about task status, see Tracking a provisioning task on page 1165.
Chapter 9. Deploying patches
989
1. Check for error messages that might explain the source of the problem. 2. Check the following logs for errors relating to actions triggered from the interface:
%TIO_LOGS%\j2ee\console.log %WAS_HOME%\AppServer\profiles\ctgAppSrv01\logs\MXServer\SystemOut.log %WAS_HOME%\AppServer\profiles\ctgAppSrv01\logs\MXServer\SystemErr.log
UNIX Linux Windows
3. On the provisioning server, check the log files for the activity plan engine and the deployment engine. By default, the log level for console.log is info and the log level for trace.log is error. Change the log level to debug to obtain more troubleshooting information. For information about setting the log level, see Configuring log4j dynamically
Table 173. Log files Log file console.log Location
Windows
%TIO_LOGS%
Linux
UNIX
$TIO_LOGS
trace.log
Windows
%TIO_LOGS%
Linux
UNIX
$TIO_LOGS
The following excerpts from console.log show key messages for a successful patch management task: This line indicates that the task has started: The following lines show that permissions were successfully verified on the target computer:
2010-12-01 10:20:41,484 DEBUG [Install Patch 75,816(75816) from com.ibm.tivoli.tpm.activityplan.manager.AggregateTaskDispatcher] (WorkflowAccessManager.java:106) accesscontrol.WorkflowAccessManager: checking permission (target:6064)Device.ManagerSoftware Device.ManagerSoftware on 75424 succeeded
2010-12-01 10:20:40,828 DEBUG [Activity Plan Engine] ( TpmTask.java:55) manager.TpmTask: Task execution started: Install Patch 75,816
The following lines show that the provisioning workflow was started:
2010-12-01 10:20:41,859 INFO [Install Patch 75,816(75816) from com.ibm.tivoli.tpm.infrastructure.soa.OSGiSdiTaskDispatcher] (MessageTranslatorProxy.java:302) messagetranslator.MessageTranslatorProxy: createDeploymentRequest(workflowName=MS_SOA_InstallPatchS
2010-12-01 10:20:42,953 INFO [Deployment Request 18031] (DeploymentWorker.java:559) engine.DeploymentWorker: Deployment request star Id=18031, at Wed Dec 01 10:20:42 EST 2010 2010-12-01 10:20:42,984 INFO [Deployment Request 18031] (DeploymentWorker.java:275) engine.DeploymentWorker: Executing workflow: Name=MS_SOA_InstallPatchStack, id=6335
4. If the patch installation fails, check for an error message in the Workflow execution logs. For example, select MS_SOA_InstallPatchStack Provising Workflow Status to obtain the exception detail. Check the status of the MS_SOA_InstallPatchStack provisioning workflow execution log in the web interface to determine where the error occurred. The error messages in the log can help you to identify which component is the source of the problem. 5. Open the Workflow Execution Logs view if it is not displayed. a. From the Eclipse menu, click Window > Show View > Other. b. Expand Automation Package and click Workflow Execution Logs. c. Click OK. The Workflow Execution Logs page displays the provisioning workflow run history. There is a limit of 4000 characters for provisioning workflow output. If this limit is exceeded, the output is truncated.
990
2. Publish status
For an inventory scan with software signatures, verify that the software signature was published to the depot. 1. On the provisioning server, check console.log for the following message:
2010-12-01 10:20:48,984 DEBUG [Deployment Request 18031] (FileManager.java:337) cds.FileManager: Published file C:/Program Files/IBM/tivoli/tpm/repository/wua/patchinstall.vbs with taskId 75816 to CDS depots: depot.example.com
2. Verify in the dynamic content delivery console that the file is on the depot server. In a supported web browser, type the following URL:
https://host_name:9045/admin
3. Log on with the Tivoli Provisioning Manager administrator user name and password that you specified during core components installation. The default user is maxadmin. 4. If more information is required for the depot, check the following log files on the provisioning server:
Table 174. Log files Log file trace_cdsmgr.log Message and trace information for download plans as well as general message and trace information trace_cdssec.log Message and trace information for web services authentication and authorization trace_distribution.log Message and trace information for the distribution agent Location
Windows
%TIO_LOGS%\ctgde\logs
Linux
UNIX Windows
$TIO_LOGS/ctgde/logs
%TIO_LOGS%\ctgde\logs
Linux
UNIX Windows
$TIO_LOGS/ctgde/logs
%TIO_LOGS%\ctgde\logs
Linux
UNIX
$TIO_LOGS/ctgde/logs
3. Job status
Verify the status of the patch management job. 1. On the provisioning server, check console.log for a message to indicate that the job was submitted:
2010-12-01 10:21:06,343 INFO [Deployment Request 18031] (JobManagementServiceClient.java:542) client.JobManagementServiceClient: Submitted job to the job management server. Job id is: [129121686617127710]
2. If more information is required for device manager, check the following log files on the provisioning server.
Table 175. Log files Log file TraceDMSnumber.log Location
Windows
%TIO_LOGS%\ctgde\logs
Linux
UNIX
$TIO_LOGS/ctgde/logs
DMSMsgn.log
Windows
%TIO_LOGS%\ctgde\logs
Linux
UNIX
$TIO_LOGS/ctgde/logs
In TraceDMSnumber.log, search for the string jdml. The default DMS polling interval is 60 minutes, so the timestamp in the log might be as much as 60 minutes after the job was submitted. The Job Description Markup Language (JDML) provides details about the job.
991
4. Target status
Check the progress of the patch management job on the target computer for the patch management task. 1. On the target computer, verify that the patch management job was received for processing. Look in CA_HOME/logs/trace-log-number.xml CA_HOME The agent installation directory: v v v
Windows HP UX AIX
C:\Program Files\tivoli\ep
Linux Solaris
/opt/tivoli/ep
/usr/tivoli/ep
number A number such as 1. The following message shows that the patch management job was received:
2010-12-01T10:24:32.373-05:00 INFO JES023I Processing job: name = [WuaPatchInstall], requestId = [9dd1cdd0fd5e11df816e0050569c2b74]
If the job was not received, check the following items: a. Verify communication with the target computer. Run the TCA_PingAgent provisioning workflow. b. If the patch management task is taking a long time to complete, one possible cause is that the target computer is not polling for jobs, so the job is never received. To fix this problem, see Jobs not reaching target computer. 2. Verify that the patch installation ran in trace-log-number.log.
2010-12-01T10:24:32.373-05:00 INFO JES023I Processing job: name = [WuaPatchInstall], requestId = [9dd1cdd0fd5e11df816e0050569c2b74]
The following line indicates that the discovery results were uploaded to the provisioning server:
2010-12-01T10:30:55.164-05:00 INFO JES043I Done executing job: [WuaPatchInstall]
3. On the target computer, check the following log files for additional information:
Table 176. Log files Log file error-log-number.log For error messages generated during agent run time. Location v v v
Windows HP UX AIX
C:\Program Files\tivoli\ep
Linux Solaris
/opt/tivoli/ep
/usr/tivoli/ep
5. Results
Verify that the discovery results were processed. On the provisioning server, check console.log for the following information: This line shows the selection of the discovery scan results, and then the processing of the results: Related concepts Patch management troubleshooting checklist Patch management problems and limitations on page 997 Related links
2010-12-01 10:30:55,203 DEBUG [Discovery engine worker 1] (DiscoveryWorker.java:81) engine.DiscoveryWorker: Processed message: id 76
992
Information for troubleshooting and problem diagnosis: v General issues and identifying the problem v Platform-specific issues on page 994 v Gathering information for IBM Support on page 995
993
v Is your problem a patch acquisition problem? A common reason for patch acquisition problems is that variables are not configured correctly or the supported components are not set up properly. Review the patch acquisition documentation for your platform. v Is your issue a compliance scan and check issue? The patch compliance configuration is sometimes performed on the computer and on the group level. This creates inconsistencies in the scan and check results. A good practice is not to have overlapping compliance checks defined. If you do not have overlapping compliance checks defined, this improves the transparency of the scan and check results. v Are you getting false error messages? Large patch sets can result in false results. There are some known issues in the task and scalable distribution infrastructure design that can result in patches being installed, but errors displaying on the Tivoli Provisioning Manager user interface. v Did your problem occur when you were running a patch management workflow? To identify why your patch management workflow failed, you can use the web interface to see the run history of the workflow. You can also export the log files of your provisioning workflow history using the workflowLogExport command, as described in Workflow logs
Platform-specific issues
Check the list of supported features to identify what is supported for your platform Cross platform feature support on page 884. Use the information in the following table to troubleshooting common platform-specific issues:
Table 178. Common platform-specific issues Platform Windows Potential issues Is the correct version of Microsoft windows update agent installed and working? During patch scan and installation, have the correct files been downloaded to the target computers? To verify if the files have been downloaded to the target computers, check the %temp% directory on target computers or search for patch*.vbs. If the files are downloaded and scan and installation fails, check _scan_*.log on the target computers to identify where the process failed. If you are performing patch management on virtual machines, ensure that adequate resources, such as memory and CPU share, are allocated to the virtual machines. Installing multiple patches can sometimes cause corruption in Windows update cache. If this occurs, run the Microsoft cache cleanup workaround. The Microsoft cache cleanup is available from the Microsoft web site. When using the scalable distribution infrastructure for patch management, check for connectivity issues between Tivoli Provisioning Manager and the depot server and target computers. When a scalable distribution infrastructure patch installation job fails, check the target computers' log files for execution errors. Check for things such as the download plan created and run and patch installation related errors. If you are managing patches using the scalable distribution infrastructure on Windows, have you set the cabextract and WSUS environment variables at the same time? The cabextract and WSUS environment variables are mutually exclusive variables and you cannot use them together. For more information about troubleshooting the Microsoft windows platform see: v Microsoft Windows Update Agent: http://support.microsoft.com/kb/949104. v Resetting Microsoft Windows Update components: http://support.microsoft.com/kb/ 971058. v Reading the Windowsupdate.log file: http://support.microsoft.com/kb/902093.
994
Table 178. Common platform-specific issues (continued) Platform AIX Potential issues Did patch installation fail using the AIX_PATCH automation package? Patch installation using AIX_PATCH fails if you are running non-patch discovery against a target computer. If the discovery configuration is updated before installing previously generated AIX patch recommendations for the target computers, then the recommendations generated with the latest discovery configurations are installed on the target computer. The patch installation depends on the information that is stored in the discovery configuration. To resolve this issue, run the patch installation immediately after running the discovery configuration or before running any other discovery. Red Hat Enterprise Linux Have you configured the YUM repository correctly? For information about configuring the YUM repository, see Configuring the YUM repository on page 936. SUSE Linux Enterprise Server Solaris Have you configured the SMT or YUM repository correctly? For information about configuring the YUM repository, see Configuring the SMT or YUM repository on page 959. If you are managing patches for Solaris Zones, verify that your Global Zone is Solaris version 10. Your Global Zone must be Solaris version 10. If you are managing patches for Solaris Zones, are you using a HTTP proxy server? There is no support for an HTTP proxy server or Sun proxy server for the Solaris non-global zones.
Review the following table for information that you need to provide to IBM Customer Support.
Table 179. Information required by IBM Support for some common issues Issue Patch acquisition Required information v Document your configuration, for example, "I am using Tivoli Provisioning Manager v7.2 on Red Hat Enterprise Linux, with remote windows download server which uses a proxy for internet access." v Provide a screen capture of the variables that you configured, either cabextractcommand or wsus-download-server-name. v Provide a workflow log export of the failed patch acquisition workflow.
995
Table 179. Information required by IBM Support for some common issues (continued) Issue Required information
Large patch set gives a false v Provide the full set of Common Agent Services logs. positive v Provide a screen capture of the error message in Tivoli Provisioning Manager. v Provide a copy of Program Files\tivoli\ep\runtime\agent\service.bat> CASservice.zip v Provide the C:\Windows\windowsupdate.log and Task UI C:\Windows\temp\ <date>"_patchscan_<time>.log Compliance scan and check v Provide a screen capture of the compliance configuration at Group level. v Provide a screen capture of the compliance configuration at the individual Computer level. Problems with Windows v Provide the full set of Common Agent Services logs. update assistant or v Provide the C:\Windows\windowsupdate.log contents. Windows DLL configuration v Provide a screen capture of the error message that displays in Tivoli Provisioning Manager. Problems with AIX v Provide /var/adm/ras/install_all_updates.log files from the target computers. v Provide /tmp/<ServerName>_<DEReqID>_preview from the target computers.
Log files
Log files help in diagnosing problems and recording commands.
<systemdrive>:\Windows\windowsupdate.log <agent logs> /tmp/tpminstallupdates.log (on target computers) /tmp/tpmzypperinstallupdates.log (on target computers)
%TEMP%\<date>__patchscan__<time>.log <agent logs> /tmp/tpmscanupdates.log (on target computers) /tmp/tpmzypperscanupdates.log (on target computers)
996
Symptoms
Duplicate patch recommendations are listed in the OS Patches and Updates compliance check.
Causes
If your computer has compliance checks from both OS Patches and Updates and from its provisioning group, then the patch recommendations for it will be generated twice. For example, if your computer has 20 patch recommendations because of the OS Patches and Updates compliance check being run, these issues will be listed twice in the Recommendations tab (once for each check) and a total of 40 patch recommendations will be listed in the General tab for the computer. However, if you access the Issues and Recommendations tab for a specific check, the patch recommendations will only be listed once.
Symptoms
In a small Windows environment, after the following tasks are performed: 1. Acquire patches 2. 3. 4. 5. Set up compliance Scan for missing patches Generate the list of recommendation for the target computers Install the patches
When scanning for missing patches again to verify the compliance results, the patches that were installed are still displayed in the recommendations list. Also, if running an inventory scan on the target computers, the result of the scan shows that patches are not installed on the target computers.
997
Causes
The provisioning server does not communicate with the Microsoft Windows Server Update Services (WSUS) server. As a result, a patch that is approved on the web interface is not necessarily approved on the WSUS server.
Symptoms
When doing Windows patch management in large environments in the configuration where UNIX or Linux is installed on the provisioning server and a Microsoft patch download server is used, errors are generated when running Microsoft Updates Discovery. The following error might be generated:
COPDEX123E A ParsingFailure exception occurred. The exception was caused by the following problem: A Parsing Failure has occurred. xmlSource is located: /opt/IBM/tivoli/tpm/repository/wua/wsusscancab/update/package.xml.
Symptoms
You are managing patches in an AIX environment. When specifying the updates to scan for, you select Latest Level for the Maintenance Strategy Model field to scan for both technology levels and service packs. After following the steps in the information center to generate the patch recommendations, two recommendations are displayed for your target computers: v the latest technology level, for example AIX_TL 5300-07 v the latest service pack, for example, AIX_TL 5300-07-02 If approving the recommendation to install only the technology level on the target computer, both the technology level and the latest service pack for that technology level are installed on the target computer.
998
Symptoms
One or more Windows patches that require an interactive installation mode might fail in both the Deployment Engine (DE) and the Scalable Distribution Infrastructure (SDI) modes if the environment has been configured without the Microsoft Windows Server Update Services (WSUS) server.
Causes
Microsoft suppresses the silent installation of some of the newly released patches to ensure that system administrators are aware of the upgrade. Consequently, interactive patches, such as Windows Server 2008 R2 Service Pack 1 x64 Edition (KB976932) and Windows Internet Explorer 9 for Windows Server 2008 R2 for x64-based systems, cannot be installed in silent mode using Tivoli Provisioning Manager.
Procedure
1. Click Go To > IT Infrastructure > Software Catalog > Patches. . 2. Select the TLs, or SPs that you want to delete and click Delete 3. Click Go To > IT Infrastructure > Software Catalog > Patch Acquisition. 4. Click Refresh TL/SP Definitions to bring all available AIX patches into the data model. 5. Under Technology Levels and Service Packs, select the check boxes corresponding to the patches that you want to acquire and click Download Patches.
Symptoms
The task of downloading and distributing patches fails on AIX target computers.
Causes
The problem is caused by the large size of the files that are transferred, approximately 2-3 GB, between the AIX satellite server and the provisioning server. This also occurs in large file transfers between the provisioning server and target computers. The default settings for the file size prevent large files from being transferred, and causes the patch download and distribution to fail if the files being transferred are too large.
999
in both the default and root sections. 2. On the provisioning server, if UNIX or Linux is installed as the operating system, make sure that fsize is set as
fsize = -1
Causes
Insufficient memory on the provisioning server and the SUMA server.
Technology Level 00 patches are unavailable for AIX patch discovery setup with Custom: Technology Level + Service Pack Maintenance Strategy Model
Symptoms
After an AIX patch acquisition task that includes both AIX Service Pack (SP) and Technology Level (TL) patches completes successfully, TL 00 is not displayed in the patch list. When you attempt to set up a custom patch discovery configuration (for example, an AIX Patch Discovery for AIX 7.1 for the Custom: Technology Level + Service Pack model), the TL 00 Technology Level is unavailable for selection.
Causes
The Technology Level 00 is not available as a TL on the Fix server or on the eCC (Electronic Customer Care), therefore it is not listed in the data model.
Symptoms
You have added new AIX target computers to the data model, but you have not run a scan on the target computer yet. If you install the patches from the Patch Installation page instead of the Recommendations tab for the target computer, then the scan does not run for missing patches.
Causes
Because the scan was not done on the target computer, there is no discovery associated with the target computer.
Run the scan at least once for a target computer so that the scan works from the Patch Installation page as well.
Symptoms
If you complete a compliance scan and it returns a recommendation to install more than one exclusive patch, none of the exclusive patches are installed when you approve and implement all recommendations. However, the recommendation displays as implemented even though the patches have not been installed.
Causes
Exclusive patches require exclusive mode and therefore must be installed one at time. This issue occurs because the remediation task has run successfully, even if one or more patches have not been installed because they require an exclusive mode.
Patch acquisition problem in Red Hat Enterprise Linux environments using SSH protocol
You might have a problem acquiring patches using SSH protocol in Red Hat Enterprise Linux environments.
Symptoms
If you are acquiring patches in Red Hat Enterprise Linux environments using the SSH protocol, the patch acquisition process might fail. If this occurs, you might receive an error message similar to:
COPINF002E The file /usr/IBM/tivoli/tpm/repository/yum/repositories/32568/TPMREPO32570/ TPMREPO32570_headers.tar with the ID 32573 could not be published to dynamic content delivery depot servers. The error message is: CTGDEC030E The management center was unable to find potential depot servers to upload the file. The file, TPMREPO32570_headers.tar, could not be uploaded. Make sure that there is at least one active depot server available, that it has enough space to store the file, and that it is not in an unreachable or restricted zone.
Causes
This problem occurs because of a cURL limitation when you use the SSH protocol for patch acquisition in Red Hat Enterprise Linux environments. Instead of downloading just header files, cURL attempts to download the entire rpm file. If you do not have enough disk space on the depot server, the header .tar file cannot be published on the depot server. The patch acquisition process fails and you receive the error message.
1001
Patch acquisition problem in Red Hat Enterprise Linux environments using cURL with no SSL support
You might encounter a problem acquiring patches using a cURL version with no SSL support in Red Hat Enterprise Linux environments.
Symptoms
If you acquire patches in Red Hat Enterprise Linux environments using a cURL version with no SSL support, the patch acquisition process might fail with the following error message:
COPDEX123EworkflowThrownException curl: option --insecure is unknown curl: try curl --help for more information
Causes
For AIX systems, the --insecure option is available only with a cURL version with SSL support.
Patch scan problem on SUSE Linux Enterprise Server 10 SP1 and SP3
Symptoms
The patch scan on a SLES 10 target system might fail with the following key import error:
Exception: Error in creating zypper configuration file and directories: exceptions.SystemExit: 3654 zmd ZENworks Management Daemon is running. WARNING: this command will not synchronize changes. Use rug or yast2 for that. [2K /repodata/repomd.xml (file:/var/cache/zypper/TPMREPO7488) is signed with an unknown key id: 74CE60209B288F01, continue? [y/n]: Downloading metadata failed (is YUM source?) or user did not accept remote source. Aborting refresh. Service add for repository TPMREPO7488 failed. Exiting... For detail error log refer to: /tmp/tpmscanupdates.log file at target system] OutputStream: []
Causes
The time settings on the repository server and on the target system are incorrect. On the target system, the date of the certificate creation (the validity start date) is in the future, due to a wrong time setting at certificate generation on the repository server or to the setting in the past of the target system time.
Patch scan on SUSE Linux Enterprise Server fails due to catalog service name change
Symptoms
Changing the SUSELinux.Catalog.Name global variable without changing the SUSELinux.Update.Server.url causes the patch scan to first attempt to delete the old catalog service, and then catalog the new service. The patch scan might fail with the following error:
RETURNCODE:1, ERROR-MESSAGE:ERROR: Requested service not found (Novell.Zenworks.Zmd.Public.IService, Novell.Zenworks.Zmd.Public, Version=1.0.0.0, Culture=neutral, PublicKeyToken=48eafe5f49a143f5). No receiver for uri e5106190_8862_4ac1_bbfd_1491a8dda8e4/4d995dec_8.rem
1002
Causes
The SLES command to delete the catalog service is sometimes inconsistent. It deletes the service, but it still fails with the preceding error.
Symptoms
When you begin acquiring patches using a YUM repository in Red Hat Enterprise Linux or SUSE Linux Enterprise Server environment, the patch acquisition process might fail immediately. Because the process does not start, you cannot analyze log files. A message similar to the following might be available in the console.log file:
Error : ------- std out:<tio><setvar var="ReturnCode">1</setvar></tio> <tio><setvar var="ReturnResult"> </setvar></tio> <tio><setvar var="ReturnErrorString"> curl: (6) Couldnt resolve host in.ibm.com:[email protected] 4:21:20 PM: [email protected] - : 2010-04-13 17:54:53,218 DEBUG [Discovery.OnDevice(11626)] (LocalScriptletRunner.java:48) scriptlet.LocalScriptletRunner: Scriptlet execution finished. 2010-04-13 17:54:53,250 DEBUG [Discovery.OnDevice(11626)] (WorkflowExecutionMonitor.java:134) komodor.WorkflowExecutionMonitor: 0Failing workflow: LinuxPatch_Acquire_Metadata.java with exception: com.ibm.tivoli.orchestrator.de.engine.WorkflowThrownException: COPDEX123E A ExecuteCommand exception occurred. The exception was caused by the following problem: curl: (6) Couldnt resolve host in.ibm.com:[email protected] .at com.ibm.tivoli.ldo.runtime.WkfBase.throwException(WkfBase.java:11) at com.ibm.tivoli.tpm.wkf.core.Local_Execute_Command.execute(Local_Execute_Command.java:176)at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:79)at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)at java.lang.reflect.Method.invoke(Method.java:618)at com.ibm.tivoli.ldo.runtime.ServiceBase.invoke(ServiceBase.java:76)at com.ibm.tivoli.tpm.wkf.core.ServiceAccessPoint$ExecuteCommand.execute(ServiceAccessPoint$Execute \ Command.java:70 at com.ibm.
Symptoms
Chapter 9. Deploying patches
1003
Installation of a particular version of the Windows Update Agent fails during software installation on Windows 7 target computers.
Reference
Reference information supports the tasks that you want to complete.
Procedure
1. Click Go To > Deployment > Software Management > Software Product Publishing. 2. Select the Encrypt File check box if you want to enable encryption of the software installable.
1004
3. Click Select Software and select the software modules to be published, then click OK. 4. Click Select Depots and select one or more depot servers for the provisioning task, then click OK. Tip: The default path for publishing can be customized. v The default path is C:\Program Files\Tivoli\ep\runtime\agent\subagents\cds\depot\. v The relative path variable is \data. v The system creates subdirectories \files\1 under C:\Program Files\Tivoli\ep\runtime\agent\ subagents\cds\depot\data\. To publish to a specific subdirectory, for example, abcd, change the relative path. The files will be published at C:\Program Files\Tivoli\ep\runtime\agent\subagents\cds\depot\ abcd\files\1\. 5. Click Schedule to run the task now or to specify the date and time on which the provisioning task is scheduled to start. 6. Under Notification, specify notification settings for the task. 7. Click Submit.
Results
The publishing task is either run immediately or saved and run at the specified time. You can track the provisioning task status on the Provisioning Task Tracking page.
Publishing patches
To publish software patches to depot servers:
Procedure
1. Click Go To > Deployment > Patch Management > Patch Publishing. 2. Click Select Patches to select the patches that you want to publish, then click OK.
Windows To search for a particular patch, enter the patch name in the Patch field, for example KB921823. If multiple software definitions are available for that patch number, for example, Security Update for Windows Server 2003 and Security Update for Windows XP, select all the software definitions that match the patch number, and the provisioning server will publish them to the depots. 3. Click Select Depots and select one or more depot servers for the provisioning task, then click OK.
Tip: The default path for publishing can be customized. v The default path is C:\Program Files\Tivoli\ep\runtime\agent\subagents\cds\depot\. v The relative path variable is \data. v The system creates subdirectories \files\1 under C:\Program Files\Tivoli\ep\runtime\agent\ subagents\cds\depot\data\. To publish to a specific subdirectory, for example, abcd, change the relative path. The files will be published at C:\Program Files\Tivoli\ep\runtime\agent\subagents\cds\depot\ abcd\files\1\. 4. Click Schedule to run the task now or to specify the date and time on which the provisioning task is scheduled to start. 5. Click Submit.
1005
Results
The publishing task is either run immediately or saved and run at the specified time. You can track the provisioning task status on the Provisioning Task Tracking page.
Procedure
1. Click Go To > Deployment > Software Management > Software Product Unpublishing. 2. Type a relevant name for the provisioning task. You can use this name to view the provisioning task status on the Provisioning Task Tracking page. 3. Under Select Installables, specify the software modules for the provisioning task: a. From Views, select a software view to filter the list of software products. b. The Software Products type is selected by default. The Available Software table lists all available software modules that have at least one installation file. c. Select the software installation files for the provisioning task. The Selected Installables table lists the selected files. 4. Click Schedule to run the task now or to specify the date and time on which the provisioning task is scheduled to start. 5. Click Submit.
Results
The publishing task is either run immediately or saved and run at the specified time. You can track the provisioning task status on the Provisioning Task Tracking page.
Unpublishing patches
To unpublish software patches from depot servers, follow these steps:
Procedure
1. Click Go To > Deployment > Patch Management > Patch Unpublishing. 2. Type a relevant name for the provisioning task. You can use this name to view the provisioning task status on the Provisioning Task Tracking page. 3. Under Select Installables, specify the software patch-installation file pairs for the provisioning task: a. From Views, select a software view to filter the list of software patches. b. The Software Patches type is selected by default. The Available Software table lists all available software patches that have at least one installation file. c. Select the software installation files for the provisioning task. The Selected Installables table lists the installation files selected for the provisioning task. 4. Click Schedule to run the task now or to specify the date and time on which the provisioning task is scheduled to start. 5. Click Submit.
1006
Results
The publishing task is either run immediately or saved and run at the specified time. You can track the provisioning task status on the Provisioning Task Tracking page.
Unpublishing files
Files in a specified file repository, which are not associated with any installables, can also be unpublished from depot servers. To unpublish files from depot servers, follow these steps:
Procedure
1. Click Go To > Deployment > Software Management > File Unpublishing. 2. Click Unpublish > Files. 3. Type a relevant name for the provisioning task. You can use this name to view the provisioning task status on the Provisioning Task Tracking page. 4. Under Select Files, specify the files for the provisioning task: a. Select the file repository for the files to be unpublished. b. Search for and select the files for the provisioning task. The Selected Files table lists the files selected for the provisioning task. 5. Click Schedule to run the task now or to specify the date and time on which the provisioning task is scheduled to start. 6. Click Submit.
Results
The publishing task is either run immediately or saved and run at the specified time. You can track the provisioning task status on the Provisioning Task Tracking page.
Procedure
1. Click Go To > IT Infrastructure > Software Catalog > Patches. 2. 3. 4. 5. 6. 7. . Click New Type the name, description, vendor, and select the locale. In the Approval Status field, select the approval status of the patch. In the Severity field, select the importance of the patch. Type the version number. Select the appropriate check boxes: v Restart application indicates that customer application must be restarted. v Can request restart indicates that the operating system must be restarted.
1007
v Patch can coexist indicates that patched servers can coexist in the same application tier as servers that have not been patched. 8. In the Software Installables section, specify the actual installation file for the software. Click New Installable to add a file. Note: Use a single installable file if you only have a single software package or software image that is associated with the software definition. You can associate multiple installable files with a software definition if you have different mechanisms for installation. For example, you can include an .msi package for computers that have the Microsoft Software Installer and a compressed file for computers that have software to extract the contents of the file. At installation time, the requirement attributes of the installation files will be compared against the information about the target computer to determine which installation file to use. a. Specify the name, version number, and description. b. In the Status list, select the appropriate status of the file. c. If you are adding the file from a file repository, click the file repository name in the File Repository list. d. In the Installable Path field, type the path where the software package is stored. The path is relative to the root directory of the file repository. For example, if the repository path is configured as /share, and the package is stored in /share/package1, then the package path is /package1. e. In the File field, type the name of the file. f. If this file is specific to a locale, select the locale. g. Click Submit. An entry is added to the list of installation files. 9. Optional: In the Provisioning Groups section, you can add the software to a provisioning group to categorize and organize your software. Click Assign to Provisioning Group and select a provisioning group. 10. Requirements and capabilities for the software can be defined in several ways and will be explained in a later step. Create your software configuration templates with the specific installation parameters to use during installation of the software. For details see Creating software configuration templates on page 714. 11. Specify requirements for the software. v Define global requirements first in the Requirements section of the software. These requirements apply for any deployment of the software, regardless of which installation file is used or which software configuration template is used to perform configuration of the software during installation. a. Click Add Requirement. b. In the Requirement Type list, select the requirement type. c. If you only want to specify a requirement type, leave the Requirement field blank. If you want to add a requirement name, select a requirement name. d. If you selected a requirement name, select one or more values for it. You must specify at least one value. To add a value, type it in the Value field, and then click Add. e. If you are creating a hosting requirement, select the Hosting check box. Use this option when the software you are defining needs to run in the context of another software application. For example, a servlet requires a standalone servlet engine or an application server with servlet support to load the servlet. The servlet engine therefore acts as a container for running the software. If the servlet requires a specific container environment, such as WebSphere Application Server, you can specify a hosting requirement for it. f. If you want the provisioning server to reject a mismatched capability but accept a missing capability, select the Accept Non Existing Capability check box. g. Click Save.
1008
v If you added more than one file to the Installables list, expand the entry for each one in the Installable list and specify file-specific requirements. For example, if you have added different installation files for different hardware or different operating systems, specify the particular requirements for each file. v If you are using multiple software configuration templates to define different ways to configure the installation, specify requirements to check for each type of deployment. For example, if you are defining a J2EE application and want to deploy it to WebSphere Application Server and WebLogic Server, the software configuration templates that you create for each type of deployment can contain requirements for the type of J2EE server. 12. Capabilities identify attributes of the software that can be used for installation requirement validation. For example, if you are creating a software definition for a Example Patch version 5, you can specify the vendor (Example) and the version number (5). After you deploy Example Patch 5, other software deployments that require Example Patch 5 can verify whether a particular computer has the patch installed. a. Click Add Capability b. Specify the capability details. 1) In the Capability Type field, select the appropriate capability type. 2) In the Name section, specify the appropriate values for each capability name. 3) Click Save. 13. Click Save .
Results
The software definition for the software patch is created.
What to do next
To install the software, you must specify the provisioning workflows required for this software patch. For information about assigning provisioning workflows, see the provisioning workflows documentation.
Procedure
1. Click Go To > Deployment > Patch Management > Patch Installation. 2. To initiate a restart for the target computer, select the Reboot if required check box. 3. Click Select Patches and select the patches that you want to install. You can display patches based on Patch, Vendor, Version or you can expand Advanced Search Options for more options.
Chapter 9. Deploying patches
1009
4. Under Selected Targets, specify the target computers on which you want to install the patches. You can also expand Advanced Search for more options. 5. Under Scheduling, specify when you want to install the patches. 6. Under Notification, specify when and which users you want to be notified about the installation status. 7. If you want to select Recipients, click Add User and specify the user name. You can also specify an e-mail address by clicking Add E-mail. 8. If you want to select Events, click Add Event and specify the event type. 9. Click Submit.
Results
If you chose to install the software immediately, the installation starts. If you scheduled the provisioning task, the installation occurs at the specified date and time. You can track the installation progress on the Provisioning Task Tracking page.
Procedure
1. Click Go To > Deployment > Patch Management > Patch Installation. 2. Click Select Patches and select the patches that you want to install. You can display patches based on Patch, Vendor, Version or you can expand Advanced Search Options for more options. To search for a particular patch, type the patch number in the Patch field, for example KB921823. If multiple software definitions are available for that patch number, for example, Security Update for Windows Server 2003 and Security Update for Windows XP, select all the software definitions that match the patch number. Tivoli Provisioning Manager will install the correct patch based on the operating system on the computers. 3. Under Selected Targets, specify the target computers on which you want to install the patches. You can also expand Advanced Search for more options. 4. Under Scheduling, specify when you want to install the patches. 5. Under Notification, specify when and which users you want to be notified about the installation status. 6. Click Submit.
1010
Results
If you chose to install the software immediately, the installation starts. If you scheduled the provisioning task, the installation occurs at the specified date and time. You can track the installation progress on the Provisioning Task Tracking page.
Uninstalling patches
You can uninstall patches on some platforms. Before uninstalling patches, you need to be certain that there are no dependencies on the patches that you are uninstalling and you need an indepth knowledge of the platform and potential issues that might arise when patches are uninstalled. Do not uninstall patches unless you are certain that the patches are no longer required and that there are no adverse effects on your target computers or environment. The following table provides information about the platforms for which you can uninstall patches.
Procedure
1. Click Go To > Deployment > Patch Management > Patch Uninstallation. 2. Click Select Patches and select the check boxes corresponding to the patches that you want to uninstall, then click OK. Tip: To search for a particular patch, type the patch number in the Patch field, for example, AIX_SP 6100-00-01. 3. Click Select > Groups and select your group of target computers, then click OK. 4. Under Scheduling, specify scheduling options if you want to schedule the task for a later time. 5. Under Notification, specify notification options if you want users to be notified about the task status. 6. Click Submit. 7. On the Provisioning Task Tracking page, click Refresh to update the task status until the task is completed.
1011
Results
The patch uninstallation task is displayed with a status of Success on the Provisioning Task Tracking page.
1012
An overview
A virtual server is composed of software and acts like a complete hardware system from processor to network card in a self-contained, isolated software environment, enabling the simultaneous operation of otherwise incompatible systems. A virtual server has no hardware components at all. Virtual servers are based on host platform servers. A host platform server is a physical computer that has hosting capabilities and can host many virtual servers. Virtual server technology in Tivoli Provisioning Manager allows you to run multiple operating systems concurrently on a single physical host platform server. Virtual servers are created using a virtual server template to define the resource requirements that the virtual servers need. Using virtual server templates standardizes the configuration of virtual servers.
Virtualization basics
Find out more about the virtualization process, the key terms for virtualization, who are the users are and what are the requirements that you need to verify before managing virtualization. Review the troubleshooting information and the log files names and location for this feature and also additional resources that help you complete your virtualization tasks. v Process on page 1014 v User roles on page 1014 v Requirements on page 1014 v Key terms on page 1015 v Troubleshooting on page 1015 v Log files on page 1015 v Resources on page 1016
1013
Process
It is important to understand the overall virtualization process before you start managing virtualization with Tivoli Provisioning Manager. For more information about the virtualization process, see v VMware virtualization process on page 1059 v Solaris Zones virtualization process on page 1086
User roles
You must be assigned to the appropriate user role to manage virtual servers.
Table 181. User roles Role Provisioning Administrator Description This user can perform all of the provisioning tasks and manages the data model. v Discovers computers. v Creates virtual servers and virtual server templates. v Manages virtual servers. Deployment Specialist Provisioning Configuration Librarian v Installs software on target computers or virtual servers. Discovers computers. v Knowledge of operating systems. Skills v Knowledge of the provisioning environment. v Knowledge of operating systems. v Knowledge of virtualization technologies.
Requirements
User roles and requirements on page 1060 Hardware and software requirements for Solaris Zones on page 1087 Hardware and software requirements for VMware on page 1060
1014
Key terms
host platform server A physical server that has hosting capabilities for virtual servers. hypervisor A program or a portion of Licensed Internal Code that allows multiple instances of operating systems to run simultaneously on the same hardware. Typically, it represents the server that hosts the virtual servers. For ESX, for example, the hypervisor is the actual VMWare ESX server that hosts the virtual servers. LPAR Logical partition. One or more subsets of a single IBM System p logical partition that contains hardware resources and operates as an independent system.
software stack A list of software products, organized in the required installation order. A software stack can contain individual pieces of software and other software stacks. sparse root model A root file system model for non-global Solaris zones that contains only a subset of the Solaris packages. virtual server A server that shares its resources with other servers to support applications. virtual server template The template on which a virtual server is based. The virtual server is allocated using the hardware requirements of the template. virtualization A software technology that allows multiple operating systems to run on the same processor at the same time. whole root model A root file system model for non-global zones in Solaris which contains the Solaris package installation. WPAR Workload partition. Virtualized operating system environments that are created within a single AIX 6.1 image.
Troubleshooting
v Messages v Support information about virtual servers v Contacting support
Log files
For more information on recovering from virtualization problems, refer to one of the following topics: v LPAR problems v WPAR problems v Solaris Zone problems v VMWare problems v KVM problems v VMC problems
1015
Resources
To learn more about virtualization, refer to one of the following resources: v Tutorial: Managing virtual servers and host platform servers using VMware on page 1058 v Tutorial: Managing virtual servers and host platform servers using Solaris Zones on page 1084 v Virtual server states on page 1067 v Managing virtualization with LPARs v Managing virtualization with AIX WPARs on page 1026 v Managing virtualization with KVM v Live Partition Mobility for System p server on page 1056 v Managing IBM System p virtualization with VMControl on page 1040 v For a description of a field in the web interface, press Alt+F1.
Related links Chapter 10, Configuring virtual servers, on page 1013 Requirements on page 1060 Troubleshooting virtualization management on page 1095 Tutorial: Managing virtual servers and host platform servers using VMware on page 1058 Tutorial: Managing virtual servers and host platform servers using Solaris Zones on page 1084
LPAR quick reference Logical partitions (LPARs) are a virtualized subset of the hardware resources of a physical computer. An IBM POWER servers and blades can be partitioned into multiple LPARs. Each logical partition has a separate operating system. Hardware Management Console requirements Supported Hardware Management Console models: v For IBM eServer POWER4, Hardware Management Console (HMC), Release 3 Version 2.6 or later. v For IBM eServer POWER5, Hardware Management Console (HMC), Release 4 Version 4.0 or later. v IBM POWER6 and POWER7 Hardware Management Console (HMC). You can manage virtualization on the following microprocessors using HMC: v IBM POWER4 server v IBM POWER5 server v IBM POWER6 server v IBM POWER7 server Multiple SAN disk management is supported on HMC managed pSeries servers. SAN disks can be added to LPARs through a single path or multiple paths (MPIO). Integrated Virtualization Manager requirements
1016
You can manage virtualization on the following blade servers with Integrated Virtualization Manager enabled v Power5 Blades, VIO server version: 2.1.3.10-FP-23 or later v Power6 Blades, VIO server version: 2.1.3.10-FP-23 or later v Power7 Blades, VIO server version: 2.1.3.10-FP-23 or later Setting up the environment Use the following scenario to create your environment for LPAR virtualization: 1. Add the Hardware Management Console or the Integrated Virtualization Manager (IVM) computer to the provisioning data model Specify the name of the computer (using the fully qualified host name), identify the management IP address, and the subnet mask. 2. Add credentials to the Hardware Management Console or Integrated Virtualization Manager computer Define the credential pair type of SSH and SCP on the computer. Specify the user ID, the Search Key, and optionally the password if you want to use password credentials instead of RSA credentials. RSA credentials require the public key of the provisioning user tioadmin to be added to the authorized_keys2 file of the Hardware Management Console user ID. For HMC, the default user name can be hscroot, however, any user ID with the right privileges can be used. The default user name for IVM is padmin. 3. Run IBM Hardware Management Console (HMC) Discovery or IVM Discovery The discovery identifies all host platform servers managed by a Hardware Management Console or an Integrated Virtualization Manager and all the resources on those host platform servers, any existing LPARs and the resources on the LPARs. Important: Integrated Virtualization Manager machines that you created before Tivoli Provisioning Manager Fix Pack 2 do not have associated disk data objects. You must run the Integrated Virtualization Manager Discovery in Tivoli Provisioning Manager Fix Pack 2 to populate before saving a computer. If you do not run the discovery before saving a computer, you will not be able to restore the saved images. Note: If host platform servers have already been discovered using the VMControl Discovery, after running the IBM Hardware Management Console (HMC) Discovery, the pSeries host type will automatically change from VMControl to LPAR for the host platform servers displayed under Go To > IT Infrastructure > Provisioning Inventory > Virtualization Management. 4. Add hardware resources and credentials to the virtual server. Add the SSH and SCP credentials to the virtual server. This can be accomplished by running the Initial Discovery on the LPARs. Supported Activities The following table describes the types of activities supported for the LPAR virtualization technology. Important: For any of the activities below, the provisioning workflow fails if the LPAR name is not valid. The LPAR name must adhere to the following rules: v Must be 1 - 63 characters long. v Only contain letters the a through z (not case-sensitive), the numbers 0 through 9, and the hyphen (-) character. v Must begin with a letter. v Must end with a letter or a number. v The host name must be created in DNS and must have an IP address associated.
Chapter 10. Configuring virtual servers
1017
Table 182. Supported virtualization activities for LPARs Activity Create LPARs Details You can create LPARs using the resources that are marked as managed on a host platform server. Use a virtual server template to create an LPAR virtual server. The virtual server template specifies the size and types of resources that you allocate to the new virtual server. Create LPARs with multiple logical volume (LV) backed disks. (Supported for HMC and IVM environments) Increase the storage capability of new pSeries LPARs by adding additional hard disk requirements to the virtual server template before you create the virtual server. Select a virtual server template and add the additional Hard Disk resources. Specify the Host Platform Quantity and the Resource Group for each hard disk requirement that you add. If you do not specify the resource group, the disk requirement will be allocated on the first available group. Also, for each new hard disk resource requirement that you do not want to be used to deploy the AIX operating system, the following parameter must be defined: v Parameter: for_os_deployment v Value: false If this parameter is not added to each hard disk requirement, the disk will be used to deploy the AIX operating system. After the hard disks are added, create the new virtual server using the virtual server template. Hard disks cannot be removed from a virtual server, and the host platform quantity (the size of the hard disk) cannot be reduced. When the virtual server is deleted, the allocated hard disks are also deleted.
1018
Table 182. Supported virtualization activities for LPARs (continued) Activity Create LPARs with multiple SAN disks (Supported for HMC environments only) Details Add multiple SAN disks to the virtual server template before you create the virtual server. To request bootable disk requirements (belonging to rootvg), select a virtual server template and add additional Hard Disk resources. You do not have to specify the Host Quantity Platform and Resource Group for SAN disks. Add the required parameters and values to each new SAN disk that you add to the virtual server template. See the virtual template called Sample Multiple MPIO Disks Virtual Server Template for an example of the parameters that are required. Required parameters for each SAN disk to deploy AIX OS 1. PVID or SerialNumber: Specify the physical volume ID or the serial number of the SAN disk. 2. MPIO_policy: A string variable that is used for the MPIO policy definition for MPIO disk requirements. There are several possible values for this parameter: v An empty string. In this case, all VIO servers defined on CEC are used for the disk mapping. v MPIO_REQUIRED. Dynamically computes the VIO servers. v MPIO_NOT_REQUIRED. Uses the first VIO server for disk mapping. v The name of the VIO server: VIOServerName v A string with a list of VIO servers, separated by a semicolon. For example, VIOServerName1;VIOServerName2:VIOServerName3 3. vtscsiDeviceNameSchema: The VTSCSI device name schema for the SAN disk. 4. resource.id: skip_TPM_resource_allocation. Optional Parameters v client_adapter_is_required. The value for this parameter is either yes or no. If the value is yes, the SAN disk adapter in the LPAR profile is set to required. If the value is no, it is set to not required. SAN disk requirements, before Tivoli Provisioning Manager 7.2 FP2, used variables. These legacy SAN disk requirements are still supported. However, the legacy SAN disk will be ignored if there are new SAN disk requirements (using parameters) on the same virtual server template. To request disks that are not for AIX operating system deployment (belonging to non-rootvg), add the parameters and values listed above, and the following parameter and values to each new SAN disk: v Parameter: for_os_deployment v Value: false
1019
Table 182. Supported virtualization activities for LPARs (continued) Activity Details When the hard disks requirements are added, create the new virtual server using the virtual server template. Hard disks cannot be removed from a virtual server, and the host platform quantity cannot be reduced. If you are using a legacy SAN disk VST to create an LPAR and install AIX, by default Tivoli Provisioning Manager will install AIX on hdisk0. If you are creating an LPAR with AIX installed on multiple disks, do not use a legacy SAN disk VST. Instead use the disk resource requirement of the VST. Keep in mind that provisioning the AIX operating system with a SAN disk will erase all of the disk's data. If you are not using a disk to provision the AIX operating system, the data on the disk is not affected by removing or provisioning the LPAR. Discovering LPARs Use the discovery configuration called IBM Hardware Management Console (HMC) Discovery or IVM Discovery to discover all the host platform servers and the LPAR virtual servers defined on the host platform servers. The information is imported into the provisioning database. A provisioning workflow validates the LPAR to be powered on or off, performs the action, and then updates the state of the LPAR. Click refresh to see this updated state in the Web interface. A provisioning workflow validates the LPAR to be rebooted, performs the action, and then updates the state of the LPAR. Click refresh to see this updated state in the Web interface. This operation takes a few minutes to complete. Increasing the hard disk size: The disk size can only be increased, it cannot be reduced. 1. Click Go To > IT Infrastructure > Provisioning Inventory > Virtualization Management. 2. Select the host platform server that hosts the virtual server that you want to resize the hard disk on. 3. Beside the virtual server, click the Detail Menu and select Resource Allocations. 4. In the table, find the hard disk, for example hdd0, and change the Host Platform Size to the total size that you want that hard disk. 5. Click OK. Confirm the resource allocation change. A provisioning workflow is launched to complete the disk resizing.
1020
Table 182. Supported virtualization activities for LPARs (continued) Activity Changing CPU and RAM resources Details CPU and RAM resources can be increased or decreased on LPARs. 1. Click Go To > IT Infrastructure > Provisioning Inventory > Virtualization Management. 2. Select the host platform server that hosts the virtual server that you want to resize the hard disk on. 3. Beside the virtual server, click the Detail Menu and select Resource Allocations. 4. In the table, find the CPU or RAM resource and change the Virtual Size and Host Platform Size to the total size that you want the resource. For an explanation of Virtual Size and Host Platform Size, see Table 2. 5. Click OK. Confirm the resource allocation change.
1021
Table 182. Supported virtualization activities for LPARs (continued) Activity Adding additional hard disks to existing LPARs Details To increase its storage capabilities, add additional hard disk resources to provisioned LPARs. The virtual disks that are added to the LPAR are logical volumes from the storage pool managed by the VIO server. MPIO disks can be added in HMC environments by adding SAN disks. You can use the add disk function to add an additional path for a mapped SAN disk via another VIO server to an LPAR. You can do this if the SAN disk is managed by multiple VIO servers and it has been mapped to the LPAR using one or more VIO servers. If you do this, no additional disk is added to the LPAR but it provides a new path from the LPAR to the SAN disk. LPARs managed using HMC 1. Beside the LPAR, click the Detail Menu select Add Resource Allocations. 2. Click Add Resource Allocation > Add Disk Resource Allocation 3. Select the disk type for the new disk, either Logical Disk or SAN Disk. 4. If you selected Logical Disk, specify the following information: a. TheHost Platform Quantity. b. The Resource Group. If you do not specify the resource group, the disk will be allocated on the first available group. 5. If you selected SAN Disk, specify the following information: a. The Physical Volume ID or the Serial Number of the SAN disk. b. The Multipath Policy. If you select the Specify the VIO servers to configure multipath policy, select the VIO servers in the section below. c. Optional. Customize the device name within the Adapter Name Schema default name. Change only the device name part of the default name, MySANdisk. The remainder of the default name will be generated automatically. Restriction: If you replace the default device name, MySANdisk, with a unique name, the new name can only be 15 characters or less. The provisioning task will fail if a longer name is used. 6. Click Submit. and
1022
Table 182. Supported virtualization activities for LPARs (continued) Activity Details LPARs managed using IVM 1. Beside the LPAR, click the Detail Menu select Add Resource Allocations. 2. Click Add Resource Allocation > Add Disk Resource Allocation 3. Type the Host Platform Quantity and select the Resource Group. If you do not specify the resource group, the disk will be allocated on the first available group. 4. Click Submit. The hard disk is added to the LPAR. Hard disks that are added to LPARs cannot be removed. If an LPAR is moved to a different host platform server, the hard disks do not move, but they will still be accessible. When LPARs are deleted, any allocated hard disks are also deleted. Saving images of LPARs (Supported for IVM and HMC) Important: Virtual machines managed byIntegrated Virtualization Manager that you created before Tivoli Provisioning Manager v7.2 Fix Pack 2 do not have disk data objects. You must run the Integrated Virtualization Manager Discovery in Tivoli Provisioning Manager v7.2 Fix Pack 2 before saving a computer. If you do not run the discovery before saving a computer, you will not be able to restore the saved images.Using the Saved Images application in the Image Library, images of LPARs, with single or multiple virtual disks, can be saved so that you can backup various states of your virtual server. When the LPAR has been deleted, you can restore it using the saved image. For HMC, multiple LV-backed and SAN disks can be saved. The LPAR must have an AIX operating system. If the LPAR contains a disk that does not belong to the rootvg, the disk will be saved but the data is not saved. So, when the image is restored with the saved image, the non-rootvg disk is restored but any data that was on the disk is lost. When the image is restored to an existing LPAR, all non-rootvg disks are deleted and then restored with empty disks with the correct size from when the image was originally saved. See Saving images on page 519 for the detailed steps to save an LPAR image. Restoring images to create LPARs If it has been deleted, you can create the LPAR again by restoring the saved image of the LPAR. All of the virtual disks that were on the LPAR when the image was saved will be on the restored LPAR. See Creating or replacing virtual servers from saved images on page 520 for the detailed steps to restore an LPAR image. and
1023
Table 182. Supported virtualization activities for LPARs (continued) Activity Restoring images to replace LPARs Details An existing LPAR can be replaced by an image of a saved LPAR. For virtual servers with multiple disks, the existing LPAR typically contains more disks than the saved image. Only the disks on the saved image will be restored.Restoring a saved image will restore its saved hardware configuration and data on root volume group. If the LPAR contains a disk that does not belong to the rootvg, the disk will be saved but the data is not saved. So, when the image is restored with the saved image, the non-rootvg disk is restored but any data that was on the disk is lost. When the image is restored to an existing LPAR, all non-rootvg disks are deleted and then restored with empty disks with the correct size from when the image was originally saved. The following scenarios are supported: v HMC: LPARs with logical disks, with SAN disks, and with a mix of both logical and SAN disks. v IVM: LPARs with logical disks. See Creating or replacing virtual servers from saved images for the detailed steps to restore an LPAR image. Deleting LPARs A provisioning workflow validates the LPAR to be deleted and then deletes it. The provisioning data model is updated to remove the LPAR and all of its related objects. Multiple LPARs can be deleted at the same time using the Provisioning Computers application. The LPARs will be removed from the provisioning data model, but will not be deleted from the host platform server. For more information, see the topic called Deleting a virtual server on page 1077. Live Partition Mobility for System p server Using Live Partition Mobility, you can migrate LPARs running the AIX operating system and their hosted applications from one physical server to another without disrupting the infrastructure services. The migration operation maintains complete system transactional integrity and transfers the entire system environment, including processor state, memory, attached virtual devices, and connected users. For more information, click here.
Virtual server templates Use a virtual server template to create an LPAR. The template specifies the types and sizes of resources that you want to allocate to the new LPAR. You can add or change the resources in a virtual server template. You can add any of the following resource types to LPARs: v CPU v Hard Disk v Memory
1024
v NIC v Generic resource When you add a new resource type, you can specify the following options: v Optional. Shared. This property indicates if the resource allocated from the host platform server must be dedicated to the new LPAR or if it can be shared with other LPARs. If a resource is not shared with other LPARs, the corresponding resource on the host platform server is decremented when an LPAR is allocated. If the resource is shared with other LPARs, the corresponding resource on the host platform server is not decremented and the same resource can be simultaneously assigned to as many LPARs as needed. Important: Resource allocations created from one resource must either be all shared or all dedicated. You cannot mix shared and dedicated host platform server resources in the same LPAR. Tip: This property must be selected if you are requesting a virtual NIC resource. v Optional. Resource Group Name. A resource group is a logical group to which resources belong. For example, if you have multiple disks and you want to allocate them together, you can add them to a resource group. v Depending on the types of resources that you add to the template, you might be asked to specify the following properties:
Table 183. Resource type list Field Host Platform Quantity Description Host Platform Quantity: The amount of the host platform server resource that is allocated to this LPAR. For example, if you want to allocate 1200 MHz of CPU resource to the virtual server, enter 1200 for the Host Platform Quantity value. The host platform server must have more than 1200 MHz of CPU resource available. For each type of resource, the quantity is measured differently and refers to the quantity on the host platform server: v Hard Disk: Gigabytes (GB). v Memory: Megabytes (MB). v User defined resource: User-defined type. v CPU: MHz. Portion of the total CPU available. v Generic resource: No specific type.
1025
Table 183. Resource type list (continued) Field Virtual Quantity Description Virtual Quantity: The amount (size) of resource that is visible and available to the new LPAR. For example, for the CPU resource type, the Virtual Quantity value depends on whether you have indicated that the resource is Shared. v If you selected Shared, the CPU resource is shared with other virtual servers allocated to the host platform server. For example, you might type a Virtual Quantity value of 100 shares of the CPU resource on the host platform server. v If the CPU resource is not Shared, the CPU resource is dedicated to this virtual server. For example, you might type a Virtual Quantity value of 2. The virtual server behaves like it has 2 available CPUs. The host platform server must have more than 2 available CPUs in order for you to allocate 2 CPUs to the virtual server. For each type, the quantity is measured differently and refers to the quantity on the virtual server: v Memory: Megabytes (MB). v NIC: Only a whole NIC can be specified but there can be multiple NICs. v CPU: The number of virtual CPUs allocated to the virtual server. v Generic resource: No specific type.
For detailed information about the supported values for virtual quantity and host platform quantity, see section 5.0 Implementation and interfaces in the p-Series-Server automation package. LPAR automation package For more detailed information about LPARs, see the p-Series-Server automation package documentation. 1. Click Go To > Administration > Provisioning > Device Drivers. 2. In the Device Drivers list, type pSeries to see all the device drivers related to LPARs. 3. Click any device driver in the list to see details about the device driver, including a list of the workflows in the device driver. 4. Click the Documentation link that appears on same line as the device driver name, but on the right side of the window, to open a new browser window. Note: If you have software to block pop-up windows, it can interfere with the display of the new window. 5. Click the Automation Package link in the top left corner of the new window to view the general documentation about the package.
1026
WPAR quick reference AIX workload partitions (WPARs) are virtualized operating system environments within a single instance of the AIX 7.1 or 6.1 operating system that is defined on a host computer. They have no dependencies on hardware features. WPARs provide a solution for partitioning one AIX operating instance in multiple environments. Each environment, called a partition, can host applications and isolate them from applications running within other WPARs. Supported environments and operating systems You can manage virtualization on the following microprocessors: v IBM POWER7 server with AIX 7.1 v IBM POWER6 server with AIX 7.1 v IBM POWER7 server with AIX 6.1 v IBM POWER6 server with AIX 6.1 v IBM POWER5 server with AIX 6.1 v IBM POWER4 server with AIX 6.1 Hardware requirements Verify that the following requirements are met: v Credentials are configured on the host platform server. Configure SSH and SCP credentials (user ID root) so that the provisioning server can communicate with the host platform server to perform logical management operations. v Host platform resources The CPU, NIC, and RAM resources must be defined on the host platform server. These resources must all be marked as managed. v The WPAR host name must be created in DNS and must have an IP address associated. IP addresses for WPARs and LPARs must belong to the same subnetwork. Setting up the environment Use the following scenario to create your environment for AIX WPAR virtualization: 1. Discovery Use HMC discovery and Initial discovery (for LPARs) to identify the existing computers. 2. Add SSH/SCP credentials to the host platform server. To add credentials for a WPAR host platform: v Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Computers. v Click the Credentials tab of the provisioning server. v Click Add Credentials, and then select SSH and SCP. v Specify the Search Key, User Name (root or a user who can run the sudo command), and Password/Passphrase (depending on the Password Credential/RSA Credential and its confirmation). Note: a. This is the root password when a WPAR is created. b. If the root login is disabled for SSH, and the LPAR does not have an agent service access point (SAP), a user that can run the sudo command is required on the WPAR host platform, to be able to run the following commands without providing a password: clogin, mkwpar, lswpar, chwpar, startwpar, stopwpar, rebootwpar, syncwpar, rmwpar. For more information, see Running provisioning workflow commands using sudo.
Chapter 10. Configuring virtual servers
1027
If the root login is disabled for SSH, and the LPAR has the agent SAP, then the SSH/SCP SAP with password credentials for a user that can run sudo clogin is required. 3. AIX WPAR Discovery Run the WPAR discovery on the selected managed LPARs to discover all of the existing WPARs. This discovery adds the following resources to the WPAR virtual server: v CPU v Memory v NIC c. WPAR activities The following table details the types of virtualization activities that are supported for AIX WPARs. Important: For any of the activities below, the workflow fails if the WPAR name does not conform to the following rule: v Must be 1 - 63 characters long. v Must only contain letters 'a' through 'z' (not case-sensitive), the digits '0' through '9', and the hyphen. v Must begin with a letter. v Must end with a letter or a number. v The host name must be created in DNS and must have an IP address associated.
Table 184. Supported virtualization activities for WPARs Activity Create a WPAR virtual server. Details You can create a WPAR virtual server using the resources that are marked as management on a host platform server. Use a virtual server template to create a WPAR virtual server. The virtual server template specifies the size and types of resources that you allocate to the new virtual server. Dynamic resource allocation. Increase or decrease the amount of CPU and memory shares on the running WPAR virtual server by changing the resource allocation in the provisioning Web interface. Use the discovery configuration called AIX WPAR Discovery to discover all of the WPAR virtual servers defined on host platform servers. WPAR WPAR information, including operating system and resource allocation, are imported into the provisioning database. A provisioning workflow validates the WPAR to be powered on or off, performs the action, and then updates the state of the WPAR. Refresh to see this updated state. A provisioning workflow validates the WPAR to be rebooted, performs the action, and then updates the state of the WPAR . Refresh to see this updated state. A provisioning workflow validates the WPAR to be deleted, ensures that the WPAR is powered off, and powers it off if it is not already, and then deletes it. The provisioning data model is updated to remove the WPAR and all of its related objects. A provisioning workflow synchronizes software between a global system (LPAR) and a WPAR virtual server.
Discover WPARs
Reboot WPARs
Delete WPARs
Synchronize WPARs
1028
Use a virtual server template to create a WPAR. The virtual server template specifies the kinds and sizes of resources that you want to allocate to the new WPAR. You can add or change the resources in a virtual server template. When you add a new resource type, you can specify the following options: v Optional. Shared. This property indicates if the resource allocated from the host platform server must be dedicated to the new WPAR or if it can be shared with other WPARs. For WPARs, this property must be selected. If a resource is not shared with other WPARs, the corresponding resource on the host platform server is decremented when a WPAR is allocated. If the resource is shared with other WPARs, the corresponding resource on the host platform server is not decremented and the same resource can be simultaneously assigned to as many WPARs as needed. v Optional. Resource Group Name. A logical group that a resource belongs to. For example, if you want to allocate multiple disks to the WPAR, you can add them to a resource group so that they can be allocated at the same time. v Depending on the types of resources that you add to the virtual server template, you might be asked to specify the following properties:
Table 185. Resource type list Field Host Platform Quantity Virtual Quantity Description Host Platform Quantity: Disregard this property. It is not used for the creation of WPARs Virtual Quantity: The amount (size) of resource that will be visible and available to the new WPAR. For example, for the CPU resource type, the Virtual Quantity value depends on whether you have indicated that the resource will be Shared. v If you selected Shared, the CPU resource will be shared with other virtual servers allocated to the host platform server. For example, you might type a Virtual Quantity value of 100 shares of the CPU resource on the host platform server. v If the CPU resource is not Shared, the CPU resource is dedicated to this virtual server. For example, you might type a Virtual Quantity value of 2. In this case, thevirtual server has two available CPUs. The host platform server must have more than two available CPUs in order for you to allocate two CPUs to the virtual server. For each type, the quantity is measured differently and refers to the quantity on the virtual server: v Memory: Megabytes (MB). v NIC: Only a whole NIC can be specified but there can be multiple NICs. v CPU: The number of virtual CPUs allocated to the virtual server. v Generic resource: No specific type.
For detailed information about the supported values for virtual quantity and host platform quantity and the variables associated with them, see the Virtual server template information in the section called Implementation and interfaces in the AIX_WPAR_Virtual_infratructure automation package. AIX WPAR automation package For more detailed information about AIX WPARs, see the automation package documentation.
Chapter 10. Configuring virtual servers
1029
1. Click Go To > Administration > Provisioning > Device Drivers. 2. In the Device Drivers list, type WPAR to see all of the device drivers related to AIX WPARs. 3. Click any device driver in the list and you will see details about the device driver including a list of the workflow's in the device driver. 4. Click the Documentation link that appears on same line as the device driver name, but on the right side of the window, to open a new browser window. Note: If you have a software to block pop-up windows, it might interfere with the display of the new window. 5. Click the Automation Package link in the upper left corner of the new window to view the general documentation about the package.
KVM quick reference Kernel-based Virtual Machine (KVM) is a full native virtualization solution for Linux on x86 hardware containing virtualization extensions (Intel VT or AMD-V). Limited support for paravirtualization is also available for Linux and Windows guests in the form of a paravirtual network driver. KVM is currently designed to interface with the kernel via a loadable kernel module. A wide variety of guest operating systems work with KVM, including Linux, BSD, Solaris, Windows, Haiku, ReactOS and AROS Research Operating System. A patched version of KVM is able to run on Mac OS X. Note: KVM does not perform any emulation itself. Instead, a user-space program uses the /dev/kvm interface to set up a guest virtual server's address space, feed it simulated I/O and map its video display back onto the host's display. Requirements These items are required to run KVM virtualization: v Tivoli Provisioning Manager, Version 7.1.1 or later v A KVM hypervisor running on Red Hat Enterprise Linux (RHEL) 6 or RHEL 5 Update 6 For KVM requirements, see KVM hypervisor requirements. v Libvirt Supported Operating Systems for KVM deployment
Table 186. Supported Operating Systems for KVM deployment OS Redhat Enterprise Linux (RHEL) 6, and 5 Update 6 KVM Support Fully supported for deployment and capture. Host name, IP address, and networking information included in the .tcdriver file can be configured. Only support for deployment and capture. No support for configuration.
1030
Table 186. Supported Operating Systems for KVM deployment (continued) OS Windows KVM Support Only support for deployment and capture. No support for configuration.
Supported guests A KVM hypervisor running on Red Hat Enterprise Linux (RHEL) 6 or RHEL 5 Update 6 supports the guests listed in the topic called Virtualization Support in Red Hat Enterprise Linux: http:// www.redhat.com/rhel/server/advanced/virt.html Setting up the environment (KVM-side) Before a Tivoli Provisioning Manager administrator can manage a KVM hypervisor and its virtual servers, the following tasks must be completed successfully: 1. Installing KVM Red Hat Enterprise Linux (RHEL) 6 or 5 Update 6 For RHEL 6 installation information, see the Red Hat Installation Guide at http://docs.redhat.com/ docs/en-US/Red_Hat_Enterprise_Linux/6/html/Installation_Guide/index.html. For selecting general internet usage tasks: a. Select Virtualization, and click Next. b. Clear Virtualization (Xen package) and select KVM. c. (Optional) To customize the KVM installation, click Optional packages. 2. Creating a virtual server Create a new virtual server that can be discovered by Tivoli Provisioning Manager as a KVM master image. You can create a new virtual server using one of two methods: Using Virt-manager (GUI) a. To start the virtualization management tool, run the virt-manager command b. Click localhost. c. Click New and follow the step-by-step wizard. Note: Sharing a directory structure for virtual servers and master images is not supported. When specifying the master image directory to store the virtual machine, the default directory where the virtual machine is stored will be images/. Be sure to add two additional levels to the images directory to house the master image. For example, /var/lib/libvirt/images/imageDirectory1/ imageDirectory2/imageName.img. Using Virsh (command line) v For all procedures, including virtual machine creation using Virsh, refer to Chapter 24. Managing guests with Virsh in the Red Hat Enterprise Virtualization Guide. v To install Windows XP as a fully virtualized guest, refer to the Red Hat Installation Guide. 3. Create an XML data dump file for the virtual machine v Use Virsh to perform a data dump for an existing virtual machine. For the full procedure, see the Red Hat documentation: Configuring an XML dump section of the Red Hat Installation Guide. 4. (Optional) Enable the installation of the virtual server to a non-default location Note: If the Security-Enhanced Linux (SELinux) feature is enabled, ignore these steps. SELinux uses /var/lib/libvirt/images as the default location. If SELinux is disabled, perform the following steps to set a non-default directory for virtual image installation:
Chapter 10. Configuring virtual servers
1031
a. To set the correct SELinux type for the KVM folder, run cmd # semanage fcontext -a -t virt_image_t "/myfolder(/.*)?". b. To change the mount point from /virtstorage and all files contained to virt_image_t (restorecon and setfiles read the files in /etc/selinux/targeted/contexts/files/), run # restorecon -R -v /myfolder. For the full procedure, refer to Chapter 11. Security for virtualization of the Red Hat Installation Guide. Managing guests using Virsh v For the full procedure, refer to Chapter 24. Managing guests with Virsh in the Red Hat Enterprise Virtualization Guide. Network Configuration You can use two methods to share network connections: Network address translation (NAT) forwarding (also know as virtual networks), characterized by: v private network, 192.168.x.x v inaccessible from outside networks v able to access outside networks securely v For the full procedure, refer to Chapter 12. Network Configuration of the Red Hat Installation Guide. Bridged networking (also known as physical device sharing), characterized by: v Public network v For the full procedure, refer to Chapter 12. Network Configuration of the Red Hat Installation Guide. Setting up the environment (Tivoli Provisioning Manager-side) 1. Discover a server that hosts a KVM hypervisor. To discover a server that hosts a KVM hypervisor, use Initial Discovery. Note: A server object that hosts a KVM installation and an OS installation must exist before you can run discovery. 2. Install a file-based boot server The file-based boot server is used to capture and deploy master disk images of virtual servers. All disk images captured by this boot server are stored in the specified data directory on the endpoint that hosts a boot server installation. There can be multiple instances of the file-based boot server. The operating system of the endpoint that hosts the file-based boot server must be Linux. For the file-based boot server to capture a master image from a KVM virtual server, the virtual server must have an operating system software installation defined. The operating system must be either Windows or Linux. The recommended way to add the OS is either by running the Network Discovery or an Inventory Scan on the virtual server. Important: Since disk images are transferred from and to a file-based boot server, host and client SAPs must be defined under the system that hosts a file-based boot server installation. For information about how to add the client SAP to a file-based boot server, click here. To install a file-based boot server: a. From the Tivoli Provisioning Manager web interface, navigate to GoTo > Deployment > OS Management > Boot Server Installation. b. In the Task field, enter a descriptive name for the file-based boot server, or leave auto-generated name. c. In the Target Computer field, select a Linux system to be used as the file-based boot server.
1032
d. In the Boot Server Type field, select File-Based. e. In the Image Directory field, specify the directory on the target computer where the disk images are to be stored. The files for each image are contained in its own subdirectory under the data directory. f. Click Submit to initiate the installation task. This task does not install any software on the target computer. Instead, it creates the boot server object and attaches a file-based boot server software installation on the target computer. A KVM image repository is created with the same name as the target computer. The data directory is stored in the repository location of the image repository. The data directory may be remote, but it would must be network mounted in that case. Note: It is possible to select the KVM computer as the target computer for the file-based boot server. This makes the file-based boot server local to the KVM host platform. You must ensure that the data directory specified does not conflict with the location where the disk images of the virtual servers reside. The virtual servers must reside in a different path from where the file-based boot server stores the master images. This is to prevent the master images from overwriting the virtual server images and vice versa. 3. Discover a KVM hypervisor The discovery task starts an inventory scan on the target computer to update the hardware and software inventory in the data model. The discovery then creates a host platform of type KVM and attaches a device model to the host platform. Finally, the virtual server discovery is started to import all the virtual servers in the KVM host platform into the data model. Once the KVM host platform is created, it is possible to start just the virtual server discovery without starting the host platform discovery using the Libvirt Virtual Hosts Discovery discovery configuration. a. From theTivoli Provisioning Manager web interface, navigate to Go To > Discovery > Provisioning Directory > Discovery Configurations. b. Locate and click on the Libvirt HostPlatform Discovery discovery configuration. c. Click Run Discovery. d. In the Selected Targets section, click Select > Computers and select the system you discovered in step 1. Click OK. e. Click Submit. Once the discovery task completes, the data model records are synchronized and you can proceed with administrative tasks. Note: When the file-based boot server is installed on the KVM server itself, the re-execution of the Libvirt Host Platform Discovery removes the boot server entry from the Software tab of the KVM host, which makes the boot server nonfunctional. To resolve this issue, manually add an entry for the File-Based Boot Server for KVM and XEN Images to the Software tab of the KVM Server. 4. Discover Libvirt master image a. From the Tivoli Provisioning Manager web interface, navigate to GoTo > Discovery > Provisioning Directory > Discovery Configurations. b. Locate and click on the Libvirt Boot Server Virtual Images Discovery discovery configuration. c. Click Run Discovery. d. In the Selected Targets section, click Select > Computers and select the system you discovered in step 1. Click OK. e. Click Submit. 5. Add an SSH SAP client to the KVM hypervisor and the file-based boot server a. From the Tivoli Provisioning Manager web interface, navigate to Go To > IT Infrastructure > Provisioning Inventory > Provisioning Computers. b. In the list, click the virtual server that houses the KVM hypervisor.
Chapter 10. Configuring virtual servers
1033
c. Click the Credentials tab. d. Click Add Credentials > New Service Access Point. e. Populate the following fields (in the Details tab):
In this field... Service Access Point Protocol Type Context Application Protocol Domain Port Do this... Enter the name of the SAP, for example, SSH-Client. Select Network Protocol IP from the drop-down menu. Leave as NOCONTEXT. Select Remote Shell Execution from the drop-down menu. Leave blank. Enter any non-zero value. Ports are not used for client SAPs.
f. Make sure the Host check box is NOT selected. g. Click New Password Credential to define a new password for the SAP. h. Populate the following fields:
In this field... Search Key User Name Password Confirm Password Do this... Enter Master. Enter the user name used to login to the virtual server. Enter the password used to login to the virtual server. Re-enter the password used to login to the virtual server.
i. Click the Workflows tab j. Click >> against Currently Assigned Device Driver and select Select Value. The Select Value dialog displays. k. Enter SSH Service Access Point in the field provided and click Enter. l. Click SSH Service Access Point. m. Click the Save icon. Note: Verify that the added SSH SAP client is listed on the Credentials tab of the KVM server. 6. Create Image Repository Image repositories are used to specify the location where virtual server disk images, master, and saved disk images are stored. To create an image repository: a. From the Tivoli Provisioning Manager web interface, navigate to Go To > IT Infrastructure > Image Library > Image Repositories. b. From the Select Action drop down menu, select New KVM Repository. c. In the Repository field, enter a name for your KVM image repository. d. e. f. g. h. (Optional) In the Description field, enter a short description for your KVM image repository. (Optional) In the Available Space field, enter, in megabytes, the space available to the repository. (Optional) In the Total Space field, enter, in megabytes, the total space reserved for the repository. (Optional) In the Created By field, enter your user name. Select the following to specify the type of images to be stored in the repository:
1034
Description For master enabled images, the repository location is used to associate the repository with the boot server. The directory is the location where the images are stored. For instance and saved enabled images, a mount point is used to specify the location on the host platform where these images are stored. All saved and instance images are stored locally on the host platform. They can be stored on a local file system or be network mounted. A mount point must be created for each host platform in order to use the image repository.
Note: The file-based boot server installation creates an image repository that is maser image enabled by default. It is recommended that you keep the instance images in a separate repository from the master and saved images. A separate image repository is to be created for instance images, saved image, and master images. If these are on the same server, they are to point to a different location. i. Click Submit to save the image repository. Supported Activities The following table describes the types of activities supported for KVM virtualization technology.
Table 187. Supported virtualization activities for KVM Activity Access guests from the KVM console Details Access the guests using virt-manager. For more information refer to Chapter 23. Managing guests with the Virtual Machine Manager of the Red hat Installation Guide. You can also use Virtual Network Computing (VNC) locally or remotely. For security reasons, remote access is disabled by default. You can enable remote access by setting VNC to listen on all public network interfaces (address 0.0.0.0) using the following procedures: v From virt-manager, click the Hardware tab. v Remove the default display and add a new graphic. v Check listen on all public network interface. or... v in the xml file, change the following: graphics type=vnc port=5900 autoport=yes listen=0.0.0.0 keymap=en-us/ Discover the server that hosts the KVM hypervisor Discover the KVM hypervisor See Discover a server that hosts a KVM hypervisor. See Discover the KVM hypervisor
1035
Table 187. Supported virtualization activities for KVM (continued) Activity Create a virtual server Details You can chose to create a new virtual server on a KVM hypervisor managed by the Tivoli Provisioning Manager. Before you can do this, you need a Virtual Server Template (VST) definition, which contains the resource requirements such as the amount of memory, cpu, disk space to allocate to the virtual server. The sample VST called KVM Sample VST can be used as a reference. Optionally, you can specify a software stack so that it gets installed automatically after the virtual server is created. VSTs that are associated to an image ("KVM Image <VST name>") automatically install the associated software stack even if a software stack is not selected. To create a virtual server: 1. From the Tivoli Provisioning Manager web interface, navigate to GoTo > IT Infrastructure > Provisioning Inventory > Virtualization Management. 2. Click a KVM host platform. 3. Click Create Virtual Server. 4. In the Virtual Server field, enter either a short host name or a fully qualified host name. 5. In the Virtual Server Template field, virtual server template. 6. In the Software Stack field, stack of an OS image. select a
select a software
7. In the Variables section, go to the target.folderpath variable and enter the directory where the virtual machine images are stored in the Value field. Do not use a directory where master images are stored. 8. Click OK to start the image deployment task.
1036
Table 187. Supported virtualization activities for KVM (continued) Activity Capture virtual server image (file-based boot server operation) Details To capture a disk image from an existing virtual server, follow these steps: 1. From the Tivoli Provisioning Manager web interface, navigate to GoTo > Deployment > OS Management > Image Capture. 2. In the Source Computer field, select a virtual server from which to capture a disk image. 3. In the Boot Server Type field, select File-Based.
4. In the Image field, enter the name for the image. 5. Click Select Boot Server, and click a file-based boot server from the list. 6. Click Submit. Upon a successful completion of the image capture task, the following data model objects are created: v Image - a Tivoli Provisioning Manager representation of a disk image captured from a source computer. v Software Stack - a collection of software resources from a source computer. v Software Stack Entries - a set of cloned software resources from a source computer. There must be at least one OS installation stack entry from a source computer. v Software Stack Template - a placeholder template attached to the software stack. v Master Image Library Entry - a master image library entry with additional information such as hypervisor, image repository, and repository relative path. Deploy virtual server image (file-based boot server operation) Important: A root password change and a network (re)configuration are supported only for RedHat RAW images in the automation package release. For all other OS distributions and image formats, such as cow, qcow, and qcow2, the root password and network configuration are ignored. To deploy a disk image to an existing virtual server perform these steps: 1. From the Tivoli Provisioning Manager web interface, navigate to GoTo > Deployment > OS Management > Image Deployment. 2. In the Selected Image section, click Select Image and, from the Select Value dialog, select the image to deploy. 3. In the Selected Targets section, click Select > Computers and select a target virtual server to which the image is deployed. 4. Click Submit to start the image deployment task.
1037
Table 187. Supported virtualization activities for KVM (continued) Activity Clone a virtual server and re-configure it Details To clone a KVM: 1. From theTivoli Provisioning Manager web interface, navigate to Go To > IT Infrastructure > Provisioning Inventory > Virtualization Management. 2. Click a KVM host platform. 3. Place a checkmark next to a chosen virtual server. 4. Click Management > Clone 5. Specify the name of the new server in the New Virtual Server field. 6. Click to select the VST on which the new virtual server is based. 7. Click OK. The new virtual server is created on the same hypervisor as the source virtual server. The disk files from the source virtual server are copied to the new virtual server. Power a virtual server from the KVM hypervisor on and off To turn a virtual server on and off from the KVM hypervisor: 1. From the Tivoli Provisioning Manager web interface, navigate to Go To > IT Infrastructure > Provisioning Inventory > Virtualization Management. 2. Click a KVM host platform. 3. Place a checkmark next to a chosen virtual server. 4. Click Management. v To turn off the virtual server, go to Manage > Power Off. v To turn on the virtual server, go to Manage > Power On. Restart a virtual server from a KVM hypervisor To restart the virtual server from the KVM hypervisor: 1. From the Tivoli Provisioning Manager web interface, navigate to Go To > IT Infrastructure > Provisioning Inventory > Virtualization Management. 2. Click the KVM host platform. 3. Place a checkmark next to a chosen virtual server. 4. Click Management and go to Manage > Generic Restart. Delete a virtual server from a KVM hypervisor. To delete the virtual server from the KVM hypervisor, follow this procedure: 1. From the Tivoli Provisioning Manager web interface, navigate to Go To > IT Infrastructure > Provisioning Inventory > Virtualization Management. 2. Click the KVM host platform. 3. Place a checkmark next to a chosen virtual server. 4. Click Management and go to Delete.
1038
Table 187. Supported virtualization activities for KVM (continued) Activity Move a virtual server to another KVM hypervisor Details When moving a virtual server to another KVM hypervisor, the virtual server is defined and the disk files are transferred to the target hypervisor. A device.copy operation is used to transfer the disk files between the hypervisors. This operation requires that the source host platform in Tivoli Provisioning Manager contains a defined client SSH SAP. To move a virtual server to another KVM hypervisor, follow this procedure: 1. From the Tivoli Provisioning Manager web interface, navigate to Go To > IT Infrastructure > Provisioning Inventory > Virtualization Management. 2. Click the KVM host platform. 3. Place a checkmark next to a chosen virtual server. 4. Click Management and go to Move. Adjust resource allocation to a virtual server For the detailed instructions on allocating resources, see the topic called Changing resource allocations on a virtual server.When you change the resource allocations of a virtual server, click OK to save your changes. Note: Administrator users will see a Save Only option for resource changes. Save Only updates the values in the provisioning database only. OK updates the provisioning database and the virtual server in the KVM hypervisor. Increasing the hard disk size: Increasing the size of the virtual disk is done on the host platform server, not the virtual server. The disk size can only be increased, it cannot be reduced. 1. Click Go To > IT Infrastructure > Provisioning Inventory > Virtualization Management. 2. Select the host platform server that hosts the virtual server that you want to resize the hard disk on. 3. Beside the virtual server, click the Detail Menu and select Resource Allocations. 4. In the table, find the hard disk, for example hdd0, and change the Host Platform Size. 5. Click OK. Confirm the resource allocation change. A provisioning workflow is launched. If the virtual server is running, it will be stopped before the disk is resized and then powered back on when the resize is complete. Suspend virtual server There is no Tivoli Provisioning Manager web interface action used to suspend a virtual server. To suspend a virtual server, run the workflow "Libvirt_VirtualMachine_Suspend". For more information about workflows, see Running provisioning workflows from the Web interface..
1039
Table 187. Supported virtualization activities for KVM (continued) Activity Resume virtual server Details There is no Tivoli Provisioning Manager web interface action used to resume a suspended virtual server. To resume a suspended virtual server, run the workflow "Libvirt_VirtualMachine_Resume". For more information about workflows, see Running provisioning workflows from the Web interface..
VMControl quick reference VMControl is a plug-in of IBM Systems Director. IBM System p virtualization and image management can now be managed using VMControl. In previous Tivoli Provisioning Manager versions, IBM System p virtualization was managed solely using Hardware Management Console (HMC) commands. Image management was done solely by directly calling the Network Installation Management (NIM) computer. These methods are still available, however, VMControl provides an alternative way to provide the virtualization and image management function. Requirements These items are required to use VMControl with Tivoli Provisioning Manager:
Table 188. Requirements Requirement Tivoli Provisioning Manager Host platform server VMControl (on IBM Systems Director) IBM Systems Director Image Hardware Management Console (HMC) Version Version 7.2 or later POWER7 CECs, POWER6, or POWER5 Version 2.3.1.2 Version 6.2.1.2 Single LPAR AIX 7.1 SP1 or AIX 6.1 or AIX 5.3 v POWER7: V7R7.1.0 or later v POWER6 and POWER5: V7R 3.5.0 or later Virtual I/O Server (VIOS) POWER firmware (POWER7 or POWER6 or POWER5) 2.1.0 or later v POWER7: firmware 7.1 or later v POWER5 and POWER6: firmware 3.5 or later
For more information about VMControl, see the section on VMControl V2.3 in the IBM Systems Director Information Center: http://publib.boulder.ibm.com/infocenter/director/v6r2x/index.jsp?topic=/ com.ibm.director.vim.helps.doc/fsd0_vim_main.html Setting up the environment
1040
Before a Tivoli Provisioning Manager administrator can manage IBM System p computers using VMControl, the following tasks must be completed: 1. Creating a VMControl computer. 2. Copying the SSL certificate from IBM Systems Director to the provisioning server. 3. Creating a service access point on the VMControl virtual server on page 1042. 4. Registering a VMControl boot server on page 1043. 5. Verifying that the VMControl boot server exists on page 1043. 6. Running the VMControl discovery on page 1043.
5. Click Save
The computer is added to the provisioning database. This computer represents the VMControl virtual server.
2. Specify the following items to create the credentials for the key file on the provisioning server: v Path v User name v Password v Key fingerprint of the truststore file If you use this method, you must specify the SSL key file when you create the service access point on the VMControl computer. Method 2: Import the IBM Systems Director VMControl SSL certificate to the default Java truststore file. Note: You must restart the provisioning server. 1. Copy the keystore to the provisioning server. 2. Run the following commands to extract and then import the certificate: a. Run the following command:
Windows
%TIO_HOME%\tools\setupCmdLine.cmd
UNIX
1041
Windows
cd %JAVA_HOME%\jre\lib\security
UNIX
cd $JAVA_HOME/jre/lib/security
c.
UNIX
su root
d. Ensure that the keytool command is accessible from your path. You can test this by typing keytool at the prompt. If the keytool command does not run, update the environment PATH variable with the directory that contains the keytool command. v
Windows
set PATH=%PATH%;"%JAVA_HOME%\bin
UNIX
export JAVA_HOME= to the value returned by echo $JAVA_HOME from the tioadmin
1042
i. Optional. In the Key Fingerprint field, type the location of the SSL key file. If you used Method 1 in the Copying the SSL certificate on page 1041 task, the Key Fingerprint must be specified. IBM Systems Director generates an SSL key file when installed. Copy this file from the IBM Systems Director directory to the Tivoli Provisioning Manager directory specified in the Key Fingerprint field. j. Confirm the passwords. v In the Password and Confirm Password fields, type the passwords for the User Name (for example, root or administrator) on the VMControl computer. v Optional. In the Enable Password and Confirm Enable Password fields, enter the password used for the SSL key file. If you used the default SSL key, the password is ibmpassw0rd. If you used Method 1 in the Copying the SSL certificate on page 1041 task, the Key Fingerprint must be specified. 6. Click Save .
3. Beside the Boot Server Type field, click Select Value 4. Click Submit. The VMControl boot server is registered.
1043
1044
v The IP address of the virtual server is set for the target computer. v The computer state is running. Note: A virtual server deployed using VMControl, by default, is not a capture candidate. To capture a disk image from an existing virtual server, follow these steps: 1. Click Go To > Deployment > OS Management > Image Capture. 2. Beside Source Computer, click Select Value image. 3. Beside Boot Server Type, click Select Value 4. In the Image field, type the name for the image. 5. Click Select Boot Server, and click a file-based boot server from the list. 6. Click Submit. When the image capture task is complete, the following data model objects are created: v Image - a Tivoli Provisioning Manager representation of a disk image captured from a source computer. v Software Stack - a collection of software resources from a source computer. v Software Stack Entries - a set of cloned software resources from a source computer. There must be at least one OS installation stack entry from a source computer. v Software Stack Template - a placeholder template attached to the software stack. v Master Image Library Entry - a master image library entry with additional information such as hypervisor, image repository, and repository relative path. v Virtual server templates - two are created. One to deploy from the host computer, and one for deploying from the VSP. and choose a virtual server from which to capture an
1045
4. Add the following information to the NIC Resource Type. v Is management?(Yes or No).value - Use this parameter to set the NIC resource type as the Tivoli Provisioning Manager management interface. v product.aim_fvt_mymksysb.com.ibm.ovf.vim.2.networkport.4.ip - Use this as the IP address of the virtual server. v product.aim_fvt_mymksysb.com.ibm.ovf.vim.2.networkport.4.netmask - Use this as the netmask address of the virtual server. v product.aim_fvt_mymksysb.com.ibm.ovf.vim.2.networkport.4.gateway - Use this as the getaway address of the virtual server. 5. Add VLAN mapping information under Generic Resource Type. v virtualnetworks - The VLAN ID to which the virtual server belongs. 6. Click Save .
The target computer must satisfy all the hardware resources, such as CPU, memory, and disk that are specified in the Open Virtualization Format (OVF) of the image. The recommended requirements can be found in the virtual server template of the image that is generated during VMControl discovery. To deploy a disk image to an existing virtual server, complete these steps: 1. Click Go To > Deployment > OS Management > Image Deployment. 2. In the Selected Image section, click Select Image and, from the Select Value dialog, select the image that you want to deploy. 3. In the Selected Targets section, click Select > Computers and select a target virtual server to which the image is deployed. 4. Click Submit to start the image deployment task. Powering virtual servers on and off. To turn a virtual server on and off: 1. Click Go To > IT Infrastructure > Provisioning Inventory > Virtualization Management. 2. Click a VMControl host platform server. 3. Place a checkmark next to the virtual server that you want to power on or off. 4. Expand Management. v To turn off the virtual server, click Manage > Power Off. v To turn on the virtual server, click Manage > Power On. Deleting virtual servers. To delete a virtual server, follow these steps: 1. Click Go To > IT Infrastructure > Provisioning Inventory > Virtualization Management. 2. Select a VMControl host platform server. 3. Place a checkmark next to the virtual server that you want to delete. 4. Click Management > Delete. To delete multiple virtual servers from the data model at the same time, see Deleting a virtual server on page 1077.
1046
1047
Table 190. virtual server template parameters used when creating a VMControl virtual server on IBM System p.
Parameter Resource Requirement - NIC networks <empty> The VLAN ID configured in IBM System p. The possible values are found in the others resource tab of the IBM System p that have the resource group name called networks. Value (default) Description
Resource Requirement - CPU maxcpu.value <empty> The maximum number of virtual processors allowed. The possible values are found in the cpu resource tab of the IBM System p host platform server. The minimum number of processing units allowed. The possible values are found in the cpu resource tab of the IBM System p host platform server. The maximum number of virtual processors allowed. The possible values are found in the cpu resource tab of the IBM System p host platform server. The minimum number of virtual processors allowed. The possible values are found in the cpu resource tab of the IBM System p host platform server. The CPU priority ID. Possible values are: v 1 - None (capped) v 64 - Low (64) v 128 - Medium (128) v 255 - High (255) Resource Requirement - MEMORY maxmem.value 1024 The maximum memory in MB allowed. The possible values are found in the memory resource tab of the IBM System p host platform server. The minimum memory in MB allowed. The possible values are found in the memory resource tab of the IBM System p host platform server.
mincpu.value
<empty>
maxcpushare.value
<empty>
mincpushare.value
<empty>
cpupriority.value
-1
minmem.value
256
1048
b. In the Discovery Configurations list, find the VMControl discovery. c. Highlight the discovery configuration by clicking the row. to remove the discovery configuration. d. Click Delete 2. At a command prompt, change the directory to TIO_HOME/tools. 3. Run the command to delete the automation package:
Windows
Hyper-V quick reference Hyper-V is a Microsoft technology that provides a virtualization platform to dynamically manage both physical and virtual resources. Using Hyper-V, you can migrate running virtual machines from one physical computer to another, and add or remove storage from a virtual machine while it is running. New with Tivoli Provisioning Manager 7.2.0.1 (7.2 Fix Pack 1), the HyperV_Virtual_Infrastructure automation package makes it possible for Hyper-V host platform servers and their virtual machines to be managed through Tivoli Provisioning Manager. Requirements The following are the requirements to use Hyper-V with Tivoli Provisioning Manager:
Table 191. Supported operating systems and technology versions for Hyper-V virtualization Requirement Tivoli Provisioning Manager System Center Virtual Machine Manager (SCVMM) Hyper-V Supported guest operating systems Supported Version Version 7.2.0.1 (7.2 Fix Pack 1) and later Windows Server 2008 R2 - Datacenter or Enterprise or Standard edition Windows Server 2008 R2 - Datacenter or Enterprise or Standard edition Versions: v Windows Server 2008 R2 - Datacenter or Enterprise and Standard edition v Windows Server 2008 - Datacenter or Enterprise and Standard edition, 32-bit and 64-bit v Windows Server 2003 - Enterprise and Standard edition, 32-bit and 64-bit Note: For Windows Server 2003, ensure that the integration service is installed on the guest operating system, to enable SCVMM to communicate with the guest operating system. See the Microsoft documentation for more details.
1049
For more information about Hyper-V, see the documentation for the HyperV_Virtual_Infrastructure automation package. Setting up the environment Before a Tivoli Provisioning Manager administrator can manage virtual servers using Hyper-V, the following tasks must be completed. Hyper-V setup On the SCVMM host, complete the following steps: 1. Enable the Hyper-V role on the Windows 2008 Server. 2. Ensure that Microsoft Active Directory is installed on the SCVMM server. All the Hyper-V hosts must belong to the same domain. 3. Install Microsoft System Center Virtual Machine Manager 2008 R2 (usually referred to as SCVMM 2008 R2 or SCVMM 4). 4. Enter the following command to update the PowerShell execution policy on the SCVMM host to RemoteSigned (or UnRestricted, if required):
Set-ExecutionPolicy RemoteSigned
Tivoli Provisioning Manager setup On Tivoli Provisioning Manager, complete the following steps: 1. Configure the RXA discovery to discover the Windows 2008 R2 server that hosts the SCVMM, using the domain account. If SCVMM is running on a virtual machine, the RXA discovery must be run against the virtual machine. 2. Run the RXA discovery and verify that the task completes successfully. 3. Run the Hyper-V SCVMM discovery. Specify the provisioning computer discovered in step 2 as a target. This task discovers the information about all the Hyper-V hosts, virtual servers, and templates that are controlled by the target SCVMM. Supported activities The following table describes the types of activities supported with the Hyper-V virtualization technology.
1050
Table 192. Supported virtualization activities for Hyper-V Activity Create a virtual server Details You can choose to create a new virtual server on a Hyper-V hypervisor managed by the Tivoli Provisioning Manager. Before you can do this, you need a virtual server template definition, which contains the resource requirements such as the amount of memory, CPU, and disk space to allocate to the virtual server. When creating a new virtual server, you must specify a virtual server template. When the virtual server template is not associated with any SCVMM template, the hardware resource definition in the virtual server template will be used to create a new, empty virtual server. When you create a virtual server, a bare metal computer will be created. No image will be deployed on the computer. To create a virtual server: 1. From the Tivoli Provisioning Manager web interface, navigate to Go To > IT Infrastructure > Provisioning Inventory > Virtualization Management. 2. Click a Hyper-V host platform. 3. Click Create Virtual Server. 4. In the Virtual Server field, type a name for the virtual server. 5. In the Virtual Server Template field, virtual server template. 6. Click OK to start the provisioning task. Note: For virtualization management, the Software Stack field enables you to select the software image for deployment. But in order to install an application software, for example, the TCA stack, you must use the server provisioning application: click Go To > Deployment > Server Provisioning, and select the application by clicking the Select Software button. The Software Stack selection in both the virtualization management and the server provisioning applications can be used to select the image stack only. Create a virtual server from a SCVMM template You can create a virtual server using the resources that are marked as management on a host platform server. When creating a new virtual server, you must specify a virtual server template. When the selected virtual server template is associated with a SCVMM template, then the virtual machine is created from that SCVMM template. The template specifies the size and types of resources that you allocate to the new virtual server. select the
1051
Table 192. Supported virtualization activities for Hyper-V (continued) Activity Clone a virtual server and re-configure it Details To clone a virtual server: 1. From theTivoli Provisioning Manager web interface, navigate to Go To > IT Infrastructure > Provisioning Inventory > Virtualization Management. 2. Click a Hyper-V host platform. 3. Select a virtual server. 4. Click Management > Clone 5. Specify the name of the new server in the New Virtual Server field. 6. Click to select the virtual server template on which the new virtual server is based. 7. Click OK. The new virtual server is created on the same hypervisor as the source virtual server. The disk files from the source virtual server are copied to the new virtual server. Delete a virtual server from a Hyper-V hypervisor To delete the virtual server from the Hyper-V hypervisor, follow this procedure: 1. From the Tivoli Provisioning Manager web interface, navigate to Go To > IT Infrastructure > Provisioning Inventory > Virtualization Management. 2. Click the Hyper-V host platform. 3. Select the virtual server. 4. Click Management and click Delete. Move a virtual server to another Hyper-V hypervisor When moving a virtual server to another Hyper-V hypervisor, the virtual server is defined and the disk files are transferred to the target hypervisor. A device.copy operation is used to transfer the disk files between the hypervisors. This operation requires that the source host platform in Tivoli Provisioning Manager contains a defined client SSH SAP. To move a virtual server to another Hyper-V hypervisor, follow this procedure: 1. From the Tivoli Provisioning Manager web interface, navigate to Go To > IT Infrastructure > Provisioning Inventory > Virtualization Management. 2. Click the Hyper-V host platform. 3. Select the virtual server. 4. Click Management and go to Move.
1052
Table 192. Supported virtualization activities for Hyper-V (continued) Activity Power a virtual server from the Hyper-V hypervisor on and off Details To turn a virtual server on and off from the Hyper-V hypervisor: 1. From the Tivoli Provisioning Manager web interface, navigate to Go To > IT Infrastructure > Provisioning Inventory > Virtualization Management. 2. Click a Hyper-V host platform. 3. Select the virtual server. 4. Click Management. v To turn off the virtual server, go to Manage > Power Off. v To turn on the virtual server, go to Manage > Power On. Restart a virtual server from a Hyper-V hypervisor To restart the virtual server from the Hyper-V hypervisor: 1. From the Tivoli Provisioning Manager web interface, navigate to Go To > IT Infrastructure > Provisioning Inventory > Virtualization Management. 2. Click the Hyper-V host platform. 3. Select the virtual server. 4. Click Management and go to Manage > Generic Restart. Discover everything on the SCVMM server To run an initial discovery against the SCVMM server: 1. Create a Remote Execution and Access (RXA) Service Access Point (SAP) on the provisioning computer for SCVMM. 2. Create a credential for the SAP, which contains a user name and user password. The credential must be the Administrator built-in account of the active directory domain that SCVMM belongs to. 3. Run the initial discovery against the SCVMM server to create a provisioning computer in Tivoli Provisioning Manager data model. 4. Run the Hyper-V SCVMM Server Discovery against the SCVMM host to discover all the Hyper-V hosts and virtual servers defined on the host platform. Discover the virtual machines on the Hyper-V host platform server Use the discovery configuration called Hyper-V SCVMM discovery to discover all of the virtual servers defined on the host platform server. Hyper-V information, including operating system and resource allocation, will be imported into the provisioning database. To modify the resources of the virtual server: 1. From the Tivoli Provisioning Manager web interface, navigate to Go To > IT Infrastructure > Provisioning Inventory > Virtualization Management. 2. Click the Hyper-V host platform. 3. Select the detail menu <may be you can add image here> against the virtual server. 4. Click Resource Allocation.
Modify the hardware resources of the virtual server (CPU, memory, disk)
Known limitations
Chapter 10. Configuring virtual servers
1053
You can use the following information to troubleshoot the HyperV_Virtual_Infrastructure automation package: Enable PowerShell to run script files By default, PowerShell has a restricted execution policy, which does not permit to run any script files. Because the automation package runs PowerShell script files on SCVMM server, this policy must be changed to RemoteSigned, as follows: 1. Open a command prompt with elevated Administration privilege. Use built-in administrator of SCVMM server machine or domain. 2. Enter the following command to change the policy. PowerShell remembers the execution policy:
PowerShell -Command Set-ExecutionPolicy RemoteSigned
Operation too slow Symptoms The operation on SCVMM is very slow. Cause Adding the SCVMM snap-in to the PowerShell file might take longer. Resolving the problem Adding the SCVMM snap-in to the PowerShell file might take longer. 1. Log in to the SCVMM server machine with built-in Administrator account of your domain. 2. From the control panel, open Internet Options. 3. Select the Advanced tab. 4. Under Security, clear the following two options: v Check for publisher's certificate revocation. v Check for server certificate revocation. 5. Click OK to close the Internet Options. Error creating a virtual machine Symptoms The creation of the virtual machine from a SCVMM template might fail with the following error message:
Tivoli Provisioning Manager is not able to access virtual server with any of IP address virtual server currenly has. No IP configuration is possible.
Cause This message is issued when Tivoli Provisioning Manager determined that the IP address needs to be configured with configuration command, but unable to access to created virtual machine with RXA. Resolving the problem Verify whether the created virtual machine: v Is connected to the virtual network accessible from Tivoli Provisioning Manager. v Can receive the IP address from the DHCP server. v Satisfies the requirements for Windows target computers. For example, the Internet Connection Firewall is enabled and blocks the TCP/IP ports required for RXA. For more information, see the Requirements for Windows target computers on page 556. Error customizing a virtual machine Symptoms The creation of the virtual machine from a SCVMM template might fail with the following error message: Cause The deployment of the virtual server failed.
Progress = 94 % Virtual Machine Manager cannot detect a heartbeat from the specified virtual machine. Eithe
1054
Resolving the problem Verify that the provided product key is valid for the corresponding operating system. Note: The failed virtual machine will be kept to investigate the cause of the failure. Remove the failed virtual machine after the troubleshooting is complete. If you do not want to retain the failed virtual server for troubleshooting purposes, set the value of the hyperv.keepvm.onerror variable to zero during the virtual server creation. For more known limitations, see the documentation for the HyperV_Virtual_Infrastructure automation package.
SSH or other Tivoli Provisioning Manager supported protocol such as Tivoli Common Agent
Client data
Virtualization System p Server automation package SSH or telnet NIM step 6 NIM step 5
System p Server
LPAR1 SSH LPAR steps 1 - 4 NIM step 4 Hypervisor VIOS1 Hardware Management Console LPARn
VIOSn
1055
What is Live Partition Mobility? Live Partition Mobility allows you to migrate LPARs running the AIX operating system and their hosted applications from one physical server to another without disrupting the infrastructure services. The migration operation maintains system transactional integrity and transfers the entire system environment, including processor state, memory, attached virtual devices, and connected users. Supported features The following Live Partition Mobility features are supported:
1056
v Inactive Live Partition Mobility (between servers that are managed by the same Hardware Management Console (HMC)) v Active Live Partition Mobility (between servers that are managed by the same HMC) v Inactive and active migration of an LPAR that has multiple SAN disks v Multiple SAN disks are supported - LPAR is moved, all disks are mapped to the target virtual I/O server and are available to the LPAR. Features not supported The following Live Partition Mobility features are NOT supported: v Remote Live Partition Mobility (the ability to migrate an LPAR between two System p servers; each managed by a separate HMC) v Live Partition Mobility using Integrated Virtualization Manager (IVM) Hardware requirements The following hardware components are required for Live Partition Mobility: v Two IBM POWER6 servers running PowerVM Enterprise Edition 1.5 or higher and controlled by the same HMC. v Virtual I/O server LPARs (at least one on each POWER6 servers). These LPARs must be configured as mover service partitions on the source and target systems. v The ability to migrate an LPAR between the two POWER6 servers. Activation entries in the view history log of the HMC console screen for both POWER6 servers must have the following enabled: 1. Advanced POWER Virtualization Enterprise Edition code 2. Inactive partition mobility capability 3. Active partition mobility capability v At least one storage area network (SAN) that provides connectivity to all of the mobile LPAR disks to the virtual I/O server LPARs on both the source and destination POWER6 servers. The mobile LPAR must access all disks to be migrated through a virtual fiber channel, or virtual SCSI, or a combination of the two devices. The logical unit numbers (LUN) used for the virtual SCSI must be zoned and masked to the virtual I/O servers on both systems. Hardware-based iSCSI connectivity can be used in addition to a SAN. SCSI reservation must be disabled. The mobile LPAR virtual disks must be mapped to LUNs and cannot be part of a storage pool or logical volume on the Virtual I/O Server The LPAR cannot have any of its virtual SCSI disks defined as logical volumes in any virtual I/O server. All virtual SCSI disks must be mapped to LUNs visible on a SAN or iSCSI. Logical host ethernet adapter (LHEA) devices are not to be configured. Software requirements The following software components are required for Live Partition Mobility: v An operating system running on the mobile LPAR must be AIX. v A virtual I/O server LPAR or an LPAR running the IBM i operating system cannot be migrated. The operating system must be at one of the following: AIX 5L Version 5.3 Technology Level 7 or later (the required level is 5300-07-01) AIX Version 6.1 or later (the required level is 6100-00-01) Creating an LPAR to be used with Live Partition Mobility To create an LPAR that can be migrated using Live Partition Mobility (map a SAN disk to a LUN), you must do the following:
Chapter 10. Configuring virtual servers
1057
1. Create the environment for LPAR virtualization. 2. Set the following three variables in the Virtual Server Template (VST): Note: MPIO disks are not supported by Live Partition Mobility. The following three variables must be set for each SAN disk, where X represents the disk number.
Table 193. VST variables used for Live Partition Mobility Variable DISKX.PVID Definition Use this physical volume identifier (PVID) variable to identify your disk(s), where PVID is the disk ID property. For example, define each disk as DISK1.<PVID>, DISK2.<PVID>, and so on. Specify the vtscsi device name schema for your disk(s). A string variable that is used to define policy for MPIO disks. This variable must be set to MPIO_NOT_REQUIRED or the VIO server name.
VIO.vtscsiDeviceNameSchemaX DISKX.MPIO_policy
Migrating an LPAR using Live Partition Mobility To migrate an LPAR: 1. Click Go To > IT Infrastructure > Provisioning Inventory > Virtualization Management. 2. Click the host platform server where the LPAR resides. 3. Select the virtual server where the LPAR resides. 4. Click Management > Move. 5. In the Move Virtual Servers dialog, specify the Target Host Platform and click OK.
Tutorial: Managing virtual servers and host platform servers using VMware
This tutorial demonstrates how to maximize your IT resources by using VMware virtual servers. VMware virtualization uses the hardware resources of a physical computer to create a virtual machine, or virtual server. The virtual server thinks and acts like a physical computer, it runs its own operating system and applications. In fact, an operating system cannot recognize any differences between a virtual server and a physical computer. A software layer resides on the host platform server and dynamically allocates hardware resources. Multiple virtual servers share hardware resources with each other but do not interfere with each other. Tivoli Provisioning Manager supports VMware Infrastructure 3 (VI3) and VMware vSphere 4.
Learning objectives
In this tutorial you will: v Learn how to deploy ESX servers. v Learn how to discover computers using the VMware discovery. v Learn how to add credentials to a computer. v Learn how to run an inventory scan and install the Tivoli Common Agent. v Learn how to add virtual servers using a virtual server template. v Learn how to power off and on, add resources to, and delete virtual servers.
1058
Prerequisites
Ensure that you meet all requirements described in Requirements on page 1060 before beginning the tutorial. Modules in this tutorial v Requirements on page 1060 v Part 1: Configuring and deploying the ESX server and the VMware VirtualCenter on page 1061 v v v v Part Part Part Part 2: 3: 4: 5: Setting up the environment on page 1064 Discovering VMware virtual servers on page 1066 Creating a virtual server on page 1071 Performing virtual server activities on page 1075
Discover computers
Legend
Provisioning Administrator Deployment Specialist
1. Configuring and deploying the ESX server and the VMware VirtualCenter (Provisioning Administrator) This process involves creating an image of the ESX server 3.5 from the CD media using Tivoli Provisioning Manager for OS Deployment. After the image is created, you can install the image on a physical computer. After you have the ESX server created, download the VirtualCenter from the VMware Web site. You will use the VirtualCenter to manage multiple ESX servers. Note: You can manage ESX servers one by one. 2. Setting up the environment (Provisioning Administrator) This process consists of importing the SSL certificate so that the provisioning server can use the HTTPS protocol to connect to the VirtualCenter or to the ESX servers. After you have imported the SSL certificate, you must add HTTP or HTTPS service access points and corresponding credentials to ensure communication between the provisioning server and the VMware VirtualCenter server.
Chapter 10. Configuring virtual servers
1059
3. Discovering computers (Provisioning Administrator) This process consists of running the VMware Virtual Center Discovery discovery configuration to discover all of the VMware clusters, ESX servers, and existing virtual servers and templates to add them to the data model. The discovery configuration identifies VMware clusters and ESX servers as host platform servers and creates a virtual server template for each discovered ESX server and VMware template. Tip: The task of discovering computers can also be performed by the deployment specialist and the provisioning configuration librarian. 4. Creating a virtual server (Provisioning Administrator) This process consists of selecting a virtual server template to create the virtual server with. You can also select a software stack to add software to the virtual server. Tip: The task of creating virtual servers can also be performed by the deployment specialist. 5. Deleting a virtual server. (Provisioning Administrator) This process consists of removing the virtual server from the host platform server and the provisioning data model.
Requirements
Before you start working with virtualization, ensure that you meet all requirements.
Hardware requirements
v For specific hardware requirements for VMware VirtualCenter, see the VMware documentation: http://www.vmware.com/support/ v To access the virtual server targets, Tivoli Provisioning Manager uses the HTTP or HTTPS protocol to connect to the VMware VirtualCenter. v To facilitate the connection, the following configuration procedures are required: 1. Enable the VMware VirtualCenter server to accept HTTPS connections. Ensure that the HTTPS certificate is loaded onto your provisioning server. For more information, see the Importing the SSL certificate on page 1064 topic.
1060
2. Create an HTTP or HTTPS service access point (SAP) on the server object representing the VMware VirtualCenter that has just been added to the data model. For HTTPS, ensure that the SSL certificate has been imported, or change the configuration of the VirtualCenter to accept the HTTP connection. 3. Create a credential for the newly created service access point, and provide it with a user name and password. To enable the discovery of all targets, it is recommended that you use the user with Administrator priviledge on VMware VirtualCenter. For more information, see the Adding service access points and credentials to the VirtualCenter on page 1065 topic. Note: If you are using a single ESX server, complete the previous connection steps on the ESX server. Use the root user name for the ESX server when you are creating a credential for the service access point.
Software requirements
v VMware ESX 4.0 or ESX 3.5 v VMware VirtualCenter with 4.0 or 2.5 v VMware Tools. For downloading instructions, see the VMware documentation: http:// kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC &externalId=1014294 v An automation package called VMware_Virtual_Infrastructure.tcdriver is used for creating and managing virtual servers using a VMware ESX server and VMware VirtualCenter. This automation package is provided with Tivoli Provisioning Manager Additional details about using the VMware_Virtual_Infrastructure automation package are available in the automation package documentation. To view the documentation: 1. Click Go To > Administration > Provisioning > Device Drivers. 2. 3. 4. 5. In the Device Drivers list, type VMware to see all of the device drivers related to VMware. Click the any device driver. Click the Documentation link. Click the Automation Package link.
Part 1: Configuring and deploying the ESX server and the VMware VirtualCenter
In this part, you will learn how to configure and deploy a VMware ESX server. The ESX server is the host platform server that will host your virtual servers. You will use the VirtualCenter to manage multiple ESX servers.
1061
1. 2. 3. 4.
Click Go To > Deployment > OS Management > Unattended Setup Image. Select Unattended setup in the first pane of the wizard and click Next. Select your operating system from the list and click Next. Follow the instructions of the wizard. Note: Do not close the browser when the image is being uploaded. If you do, the upload might be cancelled.
5. You will have to choose the computer where the material to create your unattended setup image can be found and this computer must have the web interface extension installed on it. The web interface extension is automatically installed on all Tivoli Provisioning Manager for OS Deployment servers, however, only the web interface extension on the parent server can be detected. If you have changed the parent server, or you are trying to work with a child server, you must manually install the web interface extension on the source computer before it can be detected. For information on how to do this, see Installing an uninstalling the Web interface extension. The ESX server image has been created. Now you can install the image onto the target computer.
7. Click Advanced. 8. Change the various settings to your own preference. 9. Click Submit. The task will be started. Monitor its progress until the task has completed. The ESX server image has now been deployed on the target computer. Now that you have created the ESX server, download the VMwareVirtualCenter; the application that manages multiple ESX servers, from the VMware Web site.
1062
Now that you have the VMware infrastructure set up, you can add the ESX server host computer to the VirtualCenter. Registering the ESX server to the VirtualCenter enables you to manage the ESX server from the VMware Virtual Infrastructure Client.
1063
Now that you have the VMware infrastructure set up, continue configuring the provisioning environment with the SSL certificate so that the provisioning server can communicate with the VMware VirtualCenter.
To enable the HTTPS connection, first you need to import the SSL certificate into the provisioning server. To import the SSL certificate: 1. Log on to the provisioning server as: v
Windows
: Administrator
UNIX : root v 2. Copy the certificate to the provisioning server. v ESX server: /etc/vmware/ssl/rui.crt or /etc/vmware/ssl/rui.cer
v Virtual Center server: *:\Documents and Settings\All Users\Application Data\VMware\VMware VirtualCenter\SSL\*.crt or *:\Documents and Settings\All Users\Application Data\VMware\VMware VirtualCenter\SSL\*.cer 3. Import the certificate: a. Change to the %TIO_HOME%\tools ( b. Source the environment: v
Windows Windows
) or $TIO_HOME/tools (
UNIX
) directory.
setupCmdLine.cmd
UNIX
echo $TIO_HOME
Note down the displayed value, for example, /opt/IBM/tivoli/tpm. In the earlier session, set the $TIO_HOME:
export TIO_HOME=/opt/IBM/tivoli/tpm . ./setupCmdLine.sh echo $JAVA_HOME
Make a note of the path returned by the echo $JAVA_HOME command. c. Change directories: v
Windows
cd %JAVA_HOME%\jre\lib\security
UNIX
cd $JAVA_HOME/jre/lib/security
1064
Type keytool at the command prompt. If the command does not run, update the PATH environment variable with the directory that contains the keytool command.
set PATH=%JAVA_HOME%\jre\bin;%PATH%
UNIX
Linux
Update the PATH environment variable with the directory that contains the keytool command.
export PATH=$JAVA_HOME/jre/bin:$PATH
where alias-name is any name. The suggested value is the host name of the VirtualCenter or ESX server. f. Ensure that the certificate has been imported. Run the following command:
keytool -list -alias alias-name -storepass changeit -keystore cacerts
where alias-name is any name. The suggested value is the host name of the VirtualCenter or ESX server. 4. Restart the provisioning server. For more information, see Starting or stopping the provisioning server on Windows or Starting or stopping the provisioning server on UNIX. The SSL for the HTTPS connection is now imported into Tivoli Provisioning Manager.
1065
e. Ensure that Authentication is selected. f. Click New Password Credential. g. Enter a User Name, for example Administrator or root, a Password, and a Search Key. h. Click Save. The host HTTP or HTTPS service access point is now created and password credentials are now set up for the host service access point that you have created on the VirtualCenter server. Now that the VMware VirtualCenter and provisioning server are configured for virtualization, you can discover the existing VMware clusters, host platform servers, and virtual servers in your environment.
1066
Restriction: You must choose the correct discovery configuration for the target of the discovery. Do not run this discovery against an ESX server. Use the VMware HostPlatform Resource and Virtual Machine Discovery discovery configuration to discover VMware clusters, ESX servers and all of their virtual servers. Note: The following optional parameters can be used to limit the scope of the VMware Virtual Center Discovery: Discovery Level Limits the discovery to discover all data, only virtual machines, or only templates. Possible values for this parameter are All (default), Servers, or Templates. Cluster List Limits the discovery to discover data from specified clusters. Multiple values can be provided for this parameter. When the list is empty, all hosts and clusters under the virtual center are discovered. The cluster names must be in the format Data_Center_Name - Cluster_Name, which is used by Tivoli Provisioning Manager to uniquely identify clusters. Any combination of the Discovery Level and Cluster List parameters can be used to limit the scope of the discovery on the virtual center. 3. Click Run Discovery. 4. Click Select > Computers and select the VirtualCenter server. Click OK. 5. Accept the default name for the Provisioning Task, or type a new name. Click Submit. 6. In the message box that is displayed, click OK to go to the Provisioning Task Tracking page so that you can monitor the discovery task. 7. Click Refresh to update the task status until the task is completed. When the provisioning workflow completes successfully, all of the VMware clusters, host platform servers and virtual servers defined with the specified VirtualCenter are discovered and their data is imported into the provisioning data model. The VMware discovery creates a virtual server template for each ESX server that was discovered. View the virtual servers and resources of the discovered host platform server. 1. Click Go To > IT Infrastructure > Provisioning Inventory > Virtualization Management. 2. From the list, select a host platform server or a cluster. On the Host Platform tab, you will see a list outlining the relationship of the cluster or host platform server and all of the associated virtual servers. 3. Click the Hardware and Software tabs to view the resources of the host platform server. Now that you have discovered the host platform servers and virtual servers, you can continue to the next tutorial lesson and add credentials to the virtual servers. Credentials are required so that you can run an inventory scan or install the common agent on the discovered virtual servers. Alternately, you can skip these next few optional lessons and jump to Part 4 of this tutorial to create a virtual server. Virtual server states: Various states are possible for virtual servers in the provisioning database. Review the meaning of the virtual server status, and the cross-references to the technology-specific states. In the Virtualization Management application, you can view the virtual servers that are assigned to each host platform server. The Host Platform tab lists the virtual server and the Status of the virtual server.
1067
All of the states are defined in the list below. Also, most virtualization technologies have their own terms for virtual server states. See the table below to identify how the provisioning term relates to the technology-specific term. States Aborted An error has occurred during either the creation or discovery of the virtual server. The error needs to be corrected before the virtual server can be used. Configured The configuration of the virtual server has completed and is committed. Deploying The process to create a virtual server has begun, but has not yet completed. This is a temporary state, leading to Deployed. Deployed The process to create a virtual server has completed. Ready The virtual server has been created successfully. Rebooting The virtual server is in the process of loading its configured operating system and software. This is a temporary state, leading to Running. Resuming The virtual server is in the process of returning its configured operating system and software to the exact same state that it was in before the virtual server was suspended. This is a temporary state, leading to Running. Running The virtual server booted successfully and is now able to respond to commands and do work. Stopping The virtual server is in the process of ending the execution of its software applications and unloading its operating system. This is a temporary state, leading to Stopped. Stopped The virtual server has ended the execution of its software applications and unloading its operating system. Suspending The virtual server is in the process of saving the state of its running operating system and software. This is a temporary state, leading to Suspended. Suspended The virtual server that was running has been paused such that its configured operating system and software can be returned to the exact same state they were in before the virtual server was suspended. Uninstalling The virtual server is in the process of ending the execution of its software applications and unloading its operating system. This is a temporary state, leading to the removal of the virtual server. Unknown The state of the virtual server cannot be determined. For AIX WPARs, this state is also used to represent the transitional state when there is no context available to determine the states between which the WPAR is transitioning.
1068
States names by virtualization technology The standard status names and mappings for each supported virtualization technology are shown in the table below. For WPARs, the Transitional state will be mapped to the appropriate transitional state in provisioning terms. For example, if the WPAR is stopping, the state of the WPAR will be mapped to Stopping. However, when the Transitional state is discovered, then it will be mapped to Unknown because in that case the context is not known.
Table 195. State names by virtualization technology Standard Configured Deploying Deployed Ready Running Suspending Suspended Resuming Stopping Stopped Uninstalling Rebooting Aborted Unknown v Transitional v Broken v Frozen v Loaded Active Transitional Paused Transitional Transitional Defined Transitional Rebooting Rebooting Crashed No State Shutting Down Not Activated Running Powered On Suspending Suspended Resuming Stopping Powered Off Shutting down Down In shutdown Stopped Paused Transitional Starting / Open Firmware Deploying Deployed WPAR LPAR VMware Solaris Configured Incomplete Installed Ready Running Running KVM
1069
1070
To learn more about the common agent, see the topic called Installing Tivoli Common Agent Services. Note: This is an optional task. The common agent does not need to be installed on a virtual server to be able to perform virtualization activities such as moving, deleting, or powering on and powering off the virtual server. The provisioning server uses the Tivoli Common Agent for some software management features, including software distribution and software compliance management. The common agent is a program that automatically performs some service, such as data collection. Installing the common agent on the virtual server also permits the provisioning server to access the computer without needing to know the credentials of the computer. See the Tivoli Common Agent documentation to learn more about this feature. Follow these steps to install the common agent on the virtual server. 1. Click Go To > IT Infrastructure > Provisioning Inventory > Virtualization Management. 2. In the list, click the host platform server. 3. Select the virtual server. 4. Click Management > Software > Install Common Agent. 5. Type a name for the installation task. 6. Click Submit. The Tivoli Common Agent is now installed on the virtual server. Users can now manage the virtual server without knowing its credentials and you can use the software distribution and scalable distribution infrastructure feature of the provisioning server. The common agent can also be deployed to the virtual server as part of a standalone image. For more information, see the topic called: Installing the common agent and subagents using a stand-alone installation. You have installed the common agent and run an inventory scan on the discovered virtual servers. Now, create a virtual server on the discovered host platform server.
1071
4. In the Virtual Server Template field, type a new name for the template. 5. Select the Virtualization Type. 6. Click Save .
The new virtual server template is created. Hardware resources can be added to the template before you create new virtual servers. When you have allocated the resources that you want to the virtual server template, use the template to create new virtual servers. Adding hardware resources to virtual server templates: Specify which hardware resources you want to add, remove or change on an existing virtual server template. After you clone an existing virtual server template, you can make changes to the resources. For example, the virtual server template that was created during the discovery might have multiple hard disks. You can remove some of the hard disks and then increase the size of the remaining hard disks. Or, to add additional storage capability of the virtual server, you can add additional hard disks. To add hardware resources to a virtual server template: 1. Click Go To > IT Infrastructure > Provisioning Inventory > Virtual Server Templates. 2. Select a virtual server template in the list. 3. Click New Resource Requirement. 4. In the Resource Type field, select a resource type, for example, Hard Disk. Some other possible options are: v CD-ROM v Memory v v v v NIC CPU Fibre Channel Port Floppy Disk
v Generic resource v Hardware Platform 5. Indicate whether the requirement needs to be dedicated to the virtual server by selecting Shared. Note: v If a resource is not shared with other virtual servers, the corresponding resource on the host platform server is decremented when a virtual server is allocated. v If the resource is shared with other virtual servers, the corresponding resource on the host platform server is not decremented and the same resource can be simultaneously assigned to as many virtual servers as needed. to see a list of the available resource 6. Optional: Select a Resource Group Name. Click Select Value groups. A resource group is a logical group to which resources belong. For example, if you have multiple disks and you want to allocate them together, you can add them to a resource group. 7. The following fields might display depending on the selection in the Resource Type list.
1072
Description Host platform quantity applies only to Hard Disk for VMware. The host platform quantity is the actual physical resource on the host platform server. For example, if you want to allocate 5 GB to the virtual server, enter 5 for the Host Platform Quantity value. The host platform server must have more than 5 GB of resource available.
Virtual Quantity
The virtual quantity specifies how many units of the physical resource will be visible and available to the new virtual server. For example, for the CPU resource type, the Virtual Quantity value depends on whether or not you have indicated that the resource will be Shared. v If you selected Shared, the CPU resource will be shared with other virtual servers allocated to the host platform server. For example, you might type a Virtual Quantity value of 100 shares of the CPU resource on the host platform server. For each type, the quantity is measured differently and refers to the quantity on the virtual server: v Memory: Megabytes (MB). v NIC: Only a whole NIC can be specified but there can be multiple NICs. v CPU: The number of virtual CPUs allocated to the virtual server. v Generic resource: No specific type.
Tip: For more information about customizable variables for virtual server templates and guest operating system ID short names, see the Troubleshooting section of the VMware_Virtual_Infrastructure automation package. 8. Click Save .
The virtual server template is updated with the new resource requirements. When the hardware resource allocation is complete and the new virtual server template is ready, you can use it to create a virtual server.
1073
4. Type the name of the new virtual server. > Select Value and select the virtual 5. In the Virtual Server Template field, click Detail Menu server template that you created in the previous task. a. Optional. You can make changes to a virtual server template directly from the Create Virtual Server > Go To Virtual pop-up window. Beside the Virtual Server Template field, click Detail Menu Server Templates. This will redirect you to the Virtual Server Templates application. From the list, select the virtual server template that you want to change. For detailed information about the Resource Requirements and Variables that are required or that can be changed, see the VMware automation package documentation. When you are finished making your changes, click Save and click Return With Value to return with your changes to the Create Virtual Server pop-up window. > Select Value and select a software 6. Optional. In the Software Stack field, click Detail Menu stack that is appropriate to the creation of this virtual server. For example, if this is an empty virtual server with no operating system, select a software stack that has an operating system image included. Software stacks can be nested but the stack with an image must be installed first. Note: If you select a software stack with an operating system, the virtual server will be created with the credentials of the operating system. a. Optional. You can make changes to a software stack directly from the Create Virtual Server pop-up > ->Go To Software Stacks. This window. Beside the Software Stack field, click Detail Menu will redirect you to the Software Stacks application. From the list, select the software stack that to save your you want to change. When you are finished making your changes, click Save changes and click Return With Value to return with your changes to the Create Virtual Server pop-up window. 7. To schedule the virtual server to be created, click Schedule. Accept the default, Run Now, to create the virtual server immediately, or select Scheduled Start and then click the calendar button to choose the date and time that you want the virtual server to be created. Click OK. 8. Click OK. 9. A task is launched. At the prompt, you can choose to jump to the Provisioning Task Tracking application to monitor the task. The virtual server is now created and added to the provisioning data model. For a complete view of the host platform server, or cluster, and the assigned virtual servers, 1. Click Go To > IT Infrastructure > Provisioning Inventory > Virtualization Management. 2. From the list, select a host platform server or a cluster. On the Host Platform tab, is a list outlining the relationship of the cluster or host platform server and all of the associated virtual servers associated. 3. Click the Hardware and Software tabs to view the resources of the host platform server. Removing empty virtual servers: Configure the host platform server so that empty virtual servers are removed if they fail to be created without the intended software stack deployment. When you create a virtual server and deploy a software stack on the virtual server in the same task, if the software stack deployment fails, the empty virtual server will still be created. You can configure the host platform server so that the empty virtual server will be deleted automatically. Otherwise, you have to manually find and delete the virtual server from the Virtualization Management application.
1074
Follow these steps to configure the host platform server: 1. Click Go To > IT Infrastructure > Provisioning Inventory > Virtualization Management. 2. Select the host platform server from the list. 3. On the Variables tab, click New Row. 4. In the following fields, specify the following information: v Variable: Type Roll_Back. v Component: Select Entire system. v Value: Type true. 5. Click Save .
Any virtual servers that are created on this host platform server without the intended software stack will be automatically deleted.
When the provisioning task completes successfully, the virtual server is started or powered on. The displayed state of the virtual server will change. Note: If necessary, refresh the page to see the change.
1075
1. VMware Tools are installed. For installation instructions, see the VMware documentation: http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC &externalId=1014294 2. The target virtual server has a management IP address assigned and credentials are set. To verify these requirements, navigate to the Provisioning Computers applications and search for the virtual server. Verify the information on the Credentials tab. If the information is missing, run an Initial Discovery on the virtual server. Hard disks that are added to provisioned virtual servers, cannot be removed. When virtual servers are deleted, all hard disks that are associated with the virtual server are also deleted and removed from the provisioning database. Procedure To add additional hard disks to your virtual server, follow these steps: 1. Click Go To > IT Infrastructure > Provisioning Inventory > Virtualization Management. 2. Select the host platform server that the virtual server is associated to. > Add Resource Allocations. 3. Beside the virtual server, click Detail Menu 4. Click Add Resource Allocation > Add Disk Resource Allocation. 5. In the Details section, specify the following required fields: v Host Platform Quantity: The size of the hard disk to be added to the virtual server. The value is specified in gigabytes (GB) and must be an integer value greater than 0. v Disk Mode: Choose one of three modes. For an explanation of the VMware disk modes, see Step 8 in the VMware documentation: http://pubs.vmware.com/vsp40_i/admin/ t_add_a_hard_disk_to_a_virtual_machine.html. v File System Type: Select the appropriate type. To add multiple disks, repeat steps 4 and 5 for each additional hard disk. 6. Click Submit. The new disks will be added to the virtual server. The provisioning database and the VMware VirtualCenter are updated with the new resources. Considerations for additional hard disks v If you move the virtual server to a new host platform server, the additional hard disks are not moved to the new host platform server, but they will still be accessible. v If you save the virtual server, by creating a saved image in the image library, the image will contain all of the additional hard disks. v When you restore a saved image of the virtual server, the restored virtual server will only contain those disks that were present when the virtual server was saved.
1076
4. In the Resource Allocation window, the Hard Disk, CPU, and RAM resources can be changed. a. To increase the Hard Disk, type the new size in the Host Platform Size field. The hard disk will be increased to the new size that you type. Hard disk can only be increased, it cannot be decreased. b. To increase or decrease the CPU and RAM resources, the VMware virtual server must be stopped. For VMware vSphere 4, some operating systems do support adding CPU and RAM when the virtual server is running. For more information on the supported platforms, see the following document: http://xtravirt.com/vmware-hot-add-memorycpu-support. 5. Click OK. Note: MAXADMIN and TPDEVELOPER users will also see the Save Only option in this window. Save Only saves the changes to the provisioning server but does not update the VMware VirtualCenter. This option is typically used for testing purposes.
5. To schedule the virtual server to be deleted, click Schedule. Accept the default, Run Now, to delete the virtual server immediately, or select Scheduled Start and then click the calendar button to choose the date and time that you want the virtual server to be deleted. Click OK.
1077
6. Click one of the following, depending on whether you want to delete the virtual server from the provisioning data model or destroy it: v Click Delete Record to delete the virtual server from the provisioning data model. Note: Only the MAXADMIN and TPDEVELOPER users can see the Delete Record option in this window. Delete Record saves the changes to the provisioning server but does not update the VMware VirtualCenter. This option is typically used for testing purposes. v Click OK to destroy the virtual server. When the provisioning task completes successfully, the virtual server is removed from the host platform server and the provisioning data model. Deleting multiple virtual servers from the data model: Multiple virtual servers can be deleted from the data model at the same time using the Provisioning Computers application. 1. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Computers. 2. To enable selecting multiple computers, click the Select Records checkbox at the bottom of the list of computers. 3. Select the virtual servers that you want to delete from the data model. 4. Click Select Action > Delete Computers. The virtual servers that you selected for deletion are listed. 5. Click one of the following, depending on whether you want to delete the virtual servers from the provisioning data model or destroy them: v Click Delete Record to delete the selected virtual servers from the provisioning data model. Note: Only the MAXADMIN and TPDEVELOPER users can see the Delete Record option in this window. Delete Record saves the changes to the provisioning server but does not update the VMware VirtualCenter. This option is typically used for testing purposes. v Click OK to destroy the selected virtual servers. You can also click Schedule to schedule deletion. When the provisioning task completes, the selected virtual servers are removed from the provisioning data model or destroyed, depending on the option you selected.
1078
As well as providing you with the ability to create LPARs with virtual Fibre Channel adapters, you can also use Tivoli Provisioning Manager to add virtual Fibre Channel adapters to existing LPARs. You can discover existing NPIV resources already set up on your system. There is also an email notification feature. NPIV functionality is not supported for Linux LPARs. SAN switch and backend storage management is not supported by the pSeries automation package. Nor is NPIV configuration using IVM. This tutorial describes how to use the NPIV features in Tivoli Provisioning Manager, also known as virtual Fibre Channel adapters. It describes how the NPIV features work and covers how to create an LPAR with NPIV capability. It also describes how to add a virtual Fibre Channel adapter to an existing LPAR, how to discover NPIV resources, and how to set up email notification.
Learning objectives
In this tutorial you learn how to: v Discover NPIV resources v Create an LPAR with virtual Fibre Channel adapter v Add a virtual Fibre Channel adapter to an existing LPAR v Set up email notification to send details of LPAR creation to administrators v Delete a virtual Fibre Channel adapter
Time required
This tutorial should take approximately 90 minutes to complete. If you explore other concepts related to this tutorial, it could take longer to complete.
Skill level
Advanced. Modules in this tutorial v Requirements v Part 1 Adding virtual Fibre Channel adapters to LPARs on page 1080 v Part 2 Setting up email notification and deleting virtual Fibre Channel adapters on page 1083
Requirements
Before you begin creating LPARs with virtual Fibre Channel adapters, make sure that your system meets all of the requirements.
1079
Table 196. User roles Role Provisioning Administrator Description This user can perform all of the provisioning tasks and manages the data model. v Discovers computers and devices. including NPIV resources. v Creates virtual servers, virtual server templates, and LPARs. v Manages virtual servers. Deployment Specialist Provisioning Configuration Librarian v Installs software on target computers or virtual servers. Discovers computers. v Knowledge of operating systems. Skills v Knowledge of the provisioning environment. v Knowledge of operating systems. v Knowledge of virtualization technologies.
Hardware and software requirements for creating virtual Fibre Channel adapters
To create LPARs with virtual Fibre Channel adapters, your system must meet the hardware and software requirements listed here.
Hardware requirements
The minimum hardware requirements to add virtual Fibre Channel adapters to LPARs are as follows: v Any POWER6-based system, or later. You must install a minimum System Firmware level of EL340_039 for the IBM Power 520 and Power 550, and EM340_036 for the IBM Power 560 and IBM Power 570. v A minimum of one 8 GB PCI Express Dual Port Fibre Channel Adapter (Feature Code 5735). v An NPIV-enabled SAN switch. Only the first SAN switch attached to the Fibre Channel adapter in the virtual I/O server must be NPIV-capable. Other switches in your SAN environment do not need to be NPIV-capable.
Software requirements
The software requirements are as follows: v HMC V7.7.1 SP2, or later. v Virtual I/O Server Version 2.1 with Fix Pack 20.1, or later. v AIX 6.1 TL2, or later; AIX 5.3 TL9, or later. v SDD 1.7.2.0 + PTF 1.7.2.2. v SDDPCM 2.2.0.0 + PTF v2.2.0.6. v SDDPCM 2.4.0.0 + PTF v2.4.0.1.
Learning objectives
After completing the lessons in this module, you will know how to do the following: v Discover NPIV resources and add them to the Data Center Model v Create LPARs with virtual Fibre Channel adapters v Add virtual Fibre Channel adapters to existing LPARs v Create a virtual server with a virtual Fibre Channel adapter
1080
Time required
This module should take approximately 60 minutes to complete.
Prerequisites
Before you begin, ensure that your system meets the minimum requirements described in Requirements on page 1079.
You have run the IBM Hardware Management Console Discovery to discover NPIV-enabled resources.
1081
Table 197. Resource requirement parameters Property NPIV.order storage.speed Description The order to allocate the virtual Fibre Channel adapters. Adapters with a lower number are allocated first. The speed of the Fibre Channel adapter storage, for example, Medium or Fast. This is used only for email notifications to the SAN administrator, if you set up email notification. The storage size, for example, 50 GB or 100 GB. This is used only for email notifications to the SAN administrator, if you set up email notification.
storage.size
9. Repeat steps 2 to 8 to add more Fibre Channel adapter resource requirements. This is required if you configure a SAN LUN with multiple paths through dual VIO servers. For a dual VIOS configuration, create two Fibre Channel adapter resource requirements, with corresponding NPIV resource groups (NPIV.<vios1_name>.<fcs_name1>, NPIV.<vios2_name>.<fcs_name2>) 10. Save the changes. You have created an LPAR with a virtual Fibre Channel adapter. The LPAR configuration is saved in the Data Center Model and you can view in the resource allocation screen for the virtual Fibre Channel adapter.
Storage Size
7. Save the changes. You have added a NPIV resources to an existing LPAR.
1082
Creating a virtual server with virtual Fibre Channel adapters and configuring the backend storage
Create a virtual server with virtual Fibre Channel adapter. When the virtual Fibre Channel adapter has been allocated, you can configure the backend storage either manually or using Tivoli Provisioning Manager automation integration. You need to configure the backend storage manually or using the either using the Tivoli Provisioning Manager preconfigured storage automation solution. To create a virtual server with virtual Fibre Channel adapter, complete the following steps: 1. Click Go To > IT Infrastructure > Provisioning Inventory > Virtualization Management. 2. Select a host platform and create a virtual server using the virtual server template with Fibre Channel adapter resource requirements. For information about how to create a virtual server using a virtual server template, see Creating virtual servers on page 1073. 3. When the virtual Fibre Channel adapter has been allocated, go to the Virtualization Management application. Click Go To > IT Infrastructure > Provisioning Inventory > Virtualization Management. 4. Click a host platform and virtual server. 5. Select the Fibre Channel Adapter resource allocations for the virtual server. The following properties are available for each Fibre Channel adapter resource allocation.
Table 199. Post VFC adapter allocation configuration Property Name vio.server vio.client_slot_num vio.server_slot_num vio.vfchost vio.fcs vio.wwpns Description The name of VIO server. The Fibre Channel adapter slot number for the LPAR. The Fibre Channel adapter slot number for VIO server. The virtual Fibre Channel host name. The fcs name. Two comma-separated WWPN numbers.
6. Manually configure the SAN switch using the vio.wwpns value. WWPNs are automatically generated during the virtual Fibre Channel adapter allocation. The WWPNs are displayed as the vio.wwpns property in the Resource Allocation screen for the LPAR virtual server. You have created a virtual server with virtual Fibre Channel adapter and configured the backend storage.
Part 2 Setting up email notification and deleting virtual Fibre Channel adapters
You can use Tivoli Provisioning Manager v7.2.0.2 to set up email notification for NPIV-enabled resources. You can set up email notification for administrators or others to receive emails about the status of virtual Fibre Channel adapter allocations to LPARs.
Learning objectives
After completing the lessons in this module you will know how to do the following: v Set up email notification v Delete virtual Fibre Channel adapters
Time required
This module should take approximately 30 minutes to complete.
1083
Prerequisites
Ensure that your system meets all of the requirements as described in Requirements on page 1079.
To remove a virtual Fibre Channel adapter from the Tivoli Provisioning Manager user interface, complete the following steps: 1. Click Go To > IT Infrastructure > Provisioning Inventory > Virtualization Management. 2. Search for and click the host platform. 3. Choose your LPAR, click the Detail Menu button and click Resource Allocations. 4. Click the Delete button beside the virtual Fibre Channel adapter. 5. Click OK. The logical device operations HostPlatform.DeallocateVirtualResource workflow is called to remove the virtual Fibre Channel adapter from the LPAR and related configuration on the VIO server. You have deleted a virtual Fibre Channel adapter from an existing virtual server.
Tutorial: Managing virtual servers and host platform servers using Solaris Zones
This tutorial demonstrates how to maximize your IT resources by using the Solaris Zones virtualization technology.
1084
Solaris Zones virtualization is on the operating system level. The Solaris Zones technology provides a virtual operating system environment within a single instance of the Solaris 10 operating system. Each virtualized environment, called a Solaris Zone, has its own identity that is separate from the underlying hardware. Each Solaris Zone appears to be a completely separate system to applications and users. A Solaris Zone has its own users, root user, files, IP addresses, IP ports, host name, and so on. It can act like an independent computer from the application perspective. Using Solaris Zones with Tivoli Provisioning Manager, you can create and delete whole root and sparse root zones. Performing provisioning tasks is supported for whole root zones. There is limited support for performing tasks on sparse root zones. For example, you can run an inventory scan on a sparse root zone but installing the Tivoli Common Agent is not supported for sparse root zones. Whole root zones contain all of the Solaris 10 packages. Sparse root zones contain only a subset of the system packages and the required host file systems are shared as read-only. In this tutorial, any general reference to Solaris Zones will refer to whole root Zones. Note: You can install applications, for example, Websphere Application Server or Oracle Database, on sparse zones but the software configuration template must be changed first. Because the sparse zone has only a subset of the Solaris 10 operating system files, the typical install path parameters specified in the software configuration template, for example, /opt/ or /user, cannot be used. Change the software configuration template for the application to ensure that the application installation will not choose these directories on the Solaris sparse zone. Note: Tivoli Provisioning Manager software deployment does not support installation of DB2 in Solaris Zone.
Learning objectives
In this tutorial you will: v Learn how to discover computers using the initial discovery. v v v v v Learn Learn Learn Learn Learn how how how how how to to to to to discover which computers have Solaris Zones capabilities using the Solaris discovery. add credentials to a Solaris Zone. create a Solaris Zone using a virtual server template. run an inventory scan and install the Tivoli Common Agent on a Solaris Zone. power on and off, change resource allocations on, and delete Solaris Zones.
An automation package called SolarisZones_Virtual_Infrastructure can be used for creating and managing virtual servers using Solaris Zones technology. This is provided with Tivoli Provisioning Manager Additional details about using the SolarisZones_Virtual_Infrastructure automation package are available in the automation package documentation. To view the documentation: 1. 2. 3. 4. 5. Click Go To > Administration > Provisioning > Device Drivers. In the Device Drivers list, type Solaris to see all of the device drivers related to Solaris Zones. Click any of the Solaris Zone device drivers. Click the Documentation link. Click the Automation Package link.
Prerequisites
Ensure that you meet all requirements described in the Requirements on page 1087 before you begin the tutorial.
1085
Modules in this tutorial v Requirements on page 1087 v Part 1: Setting up the environment on page 1087 v Part 2: Creating a Solaris Zone on page 1089 v Part 3: Performing Solaris Zone activities on page 1093
Initial discovery
Computers
Perform tasks
Deploy patches Solaris - HostPlatform and Zones Discovery Resource allocation Deploy software
Install TCA
1. Discovering computers (Provisioning Administrator) This process consists of running initial discovery to discover all of the Solaris computers to add them to the data model. After the computers are found, run the Solaris discovery. This discovery configuration identifies the computers that have capabilities and marks those computers as host platform servers. Tip: The task of discovering computers can also be performed by the provisioning configuration librarian. 2. Creating the virtual server (Provisioning Administrator) This process consists of selecting a virtual server template to create the virtual server with. You can also select a software stack to add software to the virtual server. 3. Performing tasks on the Solaris Zones virtual servers (Deployment Specialist) This process consists of performing activities on the virtual servers. You can install the Tivoli Common Agent and deploy software and patches on the virtual servers.
1086
Tip: Resource allocations can only be done by the provisioning administrator. The provisioning administrator can also perform all of the other tasks on Solaris Zones. 4. Deleting a virtual server. (Provisioning Administrator) This process consists of removing the virtual server from the host platform server and the provisioning data model.
Requirements
Before you start working with virtualization using Solaris Zones, ensure that you meet all requirements.
Hardware requirements
v Target computers with the Sun Solaris 10 operating system installed.
Software requirements
v Sun Solaris 10 operating system. Note: Only Solaris 10 or later offers for support for CPU and memory allocation. v The Sun Solaris 10 operating system requires the zoneadm and zonecfg tools. These tools are typically present by default in a standard installation of the Solaris 10 operating system. v An automation package called SolarisZones_Virtual_Infrastructure is used for creating and managing Solaris Zones virtual servers. This automation package is provided with Tivoli Provisioning Manager Additional details about using the SolarisZones_Virtual_Infrastructure automation package are available in the automation package documentation. To view the documentation: 1. Click Go To > Administration > Provisioning > Device Drivers. 2. In the Device Drivers list, type Solaris to see all of the device drivers related to Solaris Zones. 3. Click any of the Solaris Zone device drivers. 4. Click the Documentation link. 5. Click the Automation Package link.
1087
The discovery task is displayed with a status of Success on the Provisioning Task Tracking page and the Solaris computers that can be used as host platform servers are recorded in the details of the discovery task.
1088
Run the Initial Discovery to discover all of the Solaris computers in your environment. The Solaris discovery configuration will identify the selected Solaris computers in the provisioning data model that have the capability to host Solaris Zones. All Solaris 10 computers must have this capability by default. The discovery will continue and identify any existing Solaris Zones and their resource allocation To discover the Solaris computers, follow the steps below: 1. Click Go To > Discovery > Provisioning Discovery > Discovery Configurations. 2. Search for the discovery configuration called Solaris - HostPlatform and Zones Discovery and click its name on the displayed list. 3. Click Run Discovery.. 4. Click Select > Computers and select the Solaris computer that you discovered in the Initial Discovery. Click OK. 5. Type a name for the discovery task and click Submit. 6. In the message box that is displayed, click OK to go to the Provisioning Task Tracking page so that you can monitor the discovery task. 7. Click Refresh to update the task status until the task is completed. After the discovery completes successfully, the Solaris host platform servers and virtual servers are defined in the data model. To view the discovered Solaris host platform servers and virtual servers follow the steps below: 1. Click Go To > IT Infrastructure > Provisioning Inventory > Virtualization Management. 2. From the list, select the discovered host platform server. You will see the list of all of the Solaris Zones allocated to the host platform server. 3. Click the Hardware and Software tabs to view the resources of the host platform server. Now that you have discovered the Solaris host platform servers, you can continue to the next tutorial lesson and create a Solaris Zone.
1089
1. 2. 3. 4.
Click Go To > IT Infrastructure > Provisioning Inventory > Virtual Server Templates. Click the existing Solaris virtual server template, SolarisZones_TEMPLATE. Click Select Action > Duplicate Virtual Server Template. Type a unique name for the new virtual server template. Note: The name of a virtual server template is not related to the name of the virtual servers you create with it.
5. Click Save
The virtual server template is successfully added. Now you can add hardware resources to the virtual server template. Adding hardware resource requirements: You can add new resources or change the hardware resources on the cloned virtual server template. To add a hardware resource requirement on the virtual server template: 1. Click New Resource Requirement. 2. In the Resource Type field, select the resource type that you want to add. The following resource types are supported for Solaris Zones: v Generic resource v CPU v Memory v NIC v Disk Partition For information about the parameters that can be defined for these resource types, see the Solaris Zones Virtual Infrastructure automation package. 3. Indicate whether the requirement needs to be dedicated to the virtual server by selecting Shared. Note: v If a resource is not shared with other virtual servers, the corresponding resource on the host platform server is decremented when a virtual server is allocated. v If the resource is shared with other virtual servers, the corresponding resource on the host platform server is not decremented and the same resource can be simultaneously assigned to as many virtual servers as needed. to see a list of the available resource 4. Optional: Select a Resource Group Name. Click Select Value groups. A resource group is a logical group to which resources belong. For example, if you have multiple disks and you want to allocate them together, you can add them to a resource group. 5. The following fields will display depending on the selection in the Resource Type list.
Field Host Platform Quantity Description Not applicable. This is not used for the Solaris Zones virtualization technology.
1090
Description The virtual quantity specifies how many units of the physical resource will be visible and available to the created Solaris Zone. For example, for the CPU resource type, the Virtual Quantity value depends on whether or not you have indicated that the resource will be Shared. v If you selected Shared, the CPU resource will be shared with other Solaris Zones allocated to the host platform server. For example, you might type a Virtual Quantity value of 100 shares of the CPU resource on the host platform server. v If the CPU resource is not Shared, the CPU resource is dedicated to this Solaris Zone. For example, you might type a Virtual Quantity value of 2. The Solaris Zone will think that it has 2 available CPUs. The host platform server must have more than 2 available CPUs in order for you to allocate 2 CPUs to the Solaris Zone. For each type, the quantity is measured differently and refers to the quantity on the virtual server: v Memory: Megabytes (MB). v NIC: Only a whole NIC can be specified but there can be multiple NICs. v CPU: The number of virtual CPUs allocated to the virtual server. v Generic resource: No specific type.
6. Click Save. The virtual server template is updated with the new requirement.
Configuring netmask and root password on virtual server templates for new Solaris Zones
You can configure the netmask setting in a virtual server template for the network interface card for a new Solaris Zone that you are creating. You can also define the root password for a Solaris Zone in a virtual server template for a new Solaris Zone. You can configure both of these features or you can configure them independently of each other. If you do not configure these parameters or if you specify incorrect information, the default values of the Solaris host platform are used. You must have a Solaris Zone virtual server template created and available. This task describes how to configure the root password and netmask using a virtual server template. You must have Perl installed on the host platform to enable encrypting of the root password. In this tutorial, you first define the root password using a Solaris Zone virtual server template. Then you configure the netmask for the Solaris Zone. Both of these configuration tasks are optional. 1. 2. 3. 4. Click Go To > IT Infrastructure > Provisioning Inventory > Virtual Server Templates. Click the Solaris virtual server template that you are using to create the new Solaris zone. Click the Variables tab. Click New Row to add a new variable: a. In the Variable field, enter the variable name for the root password, admin.password. b. For Component, select Entire system.
1091
c. In the Value field, enter your password. Use only alphabetic characters in your password. Do no use shell script sensitive characters in your password because they might not be encrypted correctly. 5. d. Click Save. The password is encrypted. Now that you have configured the root password for your new Solaris Zone, you can also configure the netmask value. Click Go To > IT Infrastructure > Provisioning Inventory > Virtual Server Templates. Click your Solaris Zone virtual server template. Click your NIC resource. Click New Row to add a new parameter for the netmask: a. Enter the name for the netmask parameter, netmask. b. Enter the netmask value that you want to specify, such as 255.0.0.0. c. Click Save. You have configured the root password and netmask for your new Solaris Zone. After the Create Virtual Server deployment request has completed, verify that you can log in to the new Solaris Zone with the password you specified. You can do this by running zlogin -C <zone_name> on the host platform, using the root password that you defined in the procedure. Alternatively, you can use remote login protocols. If you configured the netmask setting, you can verify your netmask configuration by entering ifconfig -a in a command prompt. After you have verified that the configuration is correct, you can proceed to the next lesson to create your Solaris Zone.
6. 7. 8.
a. Optional. You can make changes to a virtual server template directly from the Create Virtual > Go Server pop-up window. Beside the Virtual Server Template field, click Detail Menu To Virtual Server Templates. This will redirect you to the Virtual Server Templates application. From the list, select the virtual server template that you want to change. For detailed information about the Resource Requirements and Variables that are required or that can be changed, see the VMware automation package documentation. When you are finished making your changes, and click Return With Value to return with your changes to the Create Virtual click Save Server pop-up window. 6. Optional. You can make changes to a virtual server template directly from the Create Virtual Server > Go To Virtual pop-up window. Beside the Virtual Server Template field, click Detail Menu Server Templates. This will redirect you to the Virtual Server Templates application. From the list, select the virtual server template that you want to change. When you are finished making your to save your changes and click Return With Value to return with your changes, click Save changes to the Create Virtual Server pop-up window. Note: For more information on Customized variables for Virtual Server template deployments see the tables at the bottom of this page.
1092
7. Optional. In the Software Stack field, click Select Value and select a software stack that is appropriate to the creation of this virtual server. For example, since the Solaris Zone virtual server is created with an operating system, select a software stack to add in addition to the operating system, such as Tivoli Common Agent. Note: If you create a virtual server using a software stack that includes the Tivoli Common Agent and the Tivoli Common Agent installation fails, the virtual server will still be created. To change this behavior so that the virtual server will be destroyed add a variable called Roll_Back on the host platform server and give the variable a value of true. 8. Optional. You can make changes to a software stack directly from the Create Virtual Server pop-up > Go To Software Stacks. This will window. Beside the Software Stack field, click Detail Menu redirect you to the Software Stacks application. From the list, select the software stack that you want to save your changes and to change. When you are finished making your changes, click Save click Return With Value to return with your changes to the Create Virtual Server pop-up window. 9. To schedule the virtual server to be created, click Schedule. Accept the default, Run Now, to create the virtual server immediately, or select Scheduled Start and then click the calendar button to choose the date and time that you want the virtual server to be created. Click OK. 10. Click OK. 11. A task is launched. At the prompt, you can choose to jump to the Provisioning Task Tracking application to monitor the task. The virtual server is now added. Now that the virtual server has been created, you can perform activities like adding credentials, installing the Tivoli Common Agent and running an inventory scan.
The credentials are now successfully added to the Solaris Zone. Now you can perform tasks on the Solaris Zones virtual server. For example, you can install the Tivoli Common Agent and run an inventory scan.
1093
6. Click Submit. The Tivoli Common Agent is now installed on the virtual server. Users can now manage the virtual server without knowing its credentials and you can use the software distribution and scalable distribution infrastructure feature of the provisioning server.
1094
Verifying results
Verify the virtualization information in your data model using the available predefined reports. There are a few inventory reports available that provide information about the virtual servers in your data model.
Table 201. Reports for virtualization Report description How many virtual servers are created on a specific host platform server? What servers are in the data model? What are the server details, including networking and other resource details? How many servers are installed with which operating systems? Results This report identifies the virtual servers that are installed on a specific host platform server. This report identifies all of provisioning servers in the data model. This report shows all of the information about provisioning servers. This report identifies the number of servers that are installed with each operating system.
What to do next
You can create your own custom reports for specific virtual server information. For more information on creating your own reports, see the Report Developer Guide in the Developer Guide section of the information center.
1095
Procedure
1. Verify that all prerequisite requirements for the scenario were met, as described in the technology specific prerequisite check list: v VMware: Requirements on page 1060 v Solaris Zones: Requirements on page 1087 2. If an error message with a message ID is displayed, search for the message ID in the information center or see the Tivoli Provisioning Manager Troubleshooting Guide for a description of the error message. 3. If a provisioning task fails during the tutorial, check any error messages generated by the provisioning workflows that are part of the task. For more information, see the Viewing workflow execution status from the Web interface topic. 4. Check the log files for error messages. The following log files contain information for the scenario.
Table 202. Log files Log file General deployment engine error messages. Location
UNIX Windows Linux Solaris
$TIO_LOGS/console.log
%TIO_LOGS%\console.log
Linux Solaris
Debugging By default, messages are not copied to the log files. To get more log file information, enable debugging in the log4j.prop file. For detailed steps on enabling debugging, see the document called Deployment engine logs.
UNIX Windows
$TIO_HOME/config
%TIO_HOME%\config
5. Check the Tivoli Provisioning Manager Support technotes and FAQs or the latest available fix pack readme file for information about known issues or updates to the documentation. 6. See the Log files page.
Log files
The following tables help you to recover from virtualization problems. v LPAR problems v v v v v WPAR problems on page 1097 Solaris Zone problems on page 1098 VMware problems on page 1099 KVM problems on page 1100 VMControl problems on page 1101
Note: Many of the log files mentioned in the following tables are located in the TIO_LOGS directory.
LPAR problems
Step where the problem occurs: Creating LPAR virtual servers Check errors in: v Provisioning workflow log v Tivoli Provisioning Manager console log Log files: v HostPlatform.CreateVirtualServer v %TIO_LOGS%\console.log
1096
Check errors in: 1. Provisioning workflow log 2. Tivoli Provisioning Manager console log 3. Check if the discovery output file exists
$TIO_LOGS/console.log
%TIO_LOGS%\console.log
Linux
$TIO_LOGS/console.log
%TIO_LOGS%\console.log
Linux
$TIO_LOGS/console.log
%TIO_LOGS%\console.log
Linux
$TIO_LOGS/console.log
Deleting LPARs
%TIO_LOGS%\console.log
Linux
$TIO_LOGS/console.log
Performing a Multipath 1. Provisioning I/O (MPIO) workflow log 2. Tivoli Provisioning Manager console log
%TIO_LOGS%\console.log
Linux
$TIO_LOGS/console.log
WPAR problems
Step where the problem occurs: Creating WPAR virtual servers Check errors in: 1. Provisioning workflow log 2. Tivoli Provisioning Manager console log Performing dynamic resource allocation 1. Provisioning workflow log 2. Tivoli Provisioning Manager console log Log files: v HostPlatform.CreateVirtualServer provisioning workflow log v v
Windows UNIX
%TIO_LOGS%\console.log
Linux
$TIO_LOGS/console.log
%TIO_LOGS%\console.log
Linux
$TIO_LOGS/console.log
1097
Check errors in: 1. Provisioning workflow log 2. Tivoli Provisioning Manager console log 3. Check if the discovery output file exists
%TIO_LOGS%\console.log
Linux
$TIO_LOGS/console.log
%TIO_LOGS%\console.log
Linux
$TIO_LOGS/console.log
1. Provisioning workflow log 2. Tivoli Provisioning Manager console log 1. Provisioning workflow log 2. Tivoli Provisioning Manager console log
%TIO_LOGS%\console.log
Linux
$TIO_LOGS/console.log
Deleting WPARs
%TIO_LOGS%\console.log
Linux
$TIO_LOGS/console.log
Synchronizing WPARs
%TIO_LOGS%\console.log
Linux
$TIO_LOGS/console.log
%TIO_LOGS%\console.log
Linux
$TIO_LOGS/console.log
%TIO_LOGS%\console.log
Linux
$TIO_LOGS/console.log
1098
Check errors in: 1. Provisioning workflow log 2. Tivoli Provisioning Manager console log 3. Run command from the Solaris host platform server
%TIO_LOGS%\console.log
Linux
$TIO_LOGS/console.log
Powering on and off 1. Provisioning Solaris Zones, workflow log rebooting Solaris Zones 2. Tivoli Provisioning Manager console log
%TIO_LOGS%\console.log
Linux
$TIO_LOGS/console.log
3. Run command from v the Solaris host platform server Deleting Solaris Zones 1. Provisioning workflow log 2. Tivoli Provisioning Manager console log
%TIO_LOGS%\console.log
Linux
$TIO_LOGS/console.log
VMware problems
Step where the problem occurs: Creating VMware virtual servers Check errors in: 1. Provisioning workflow log 2. VMware console 3. Tivoli Provisioning Manager console log Performing dynamic resource allocation 1. Provisioning workflow log 2. VMware console 3. Tivoli Provisioning Manager console log v
UNIX
%TIO_LOGS%\console.log
Linux
$TIO_LOGS/console.log
v HostPlatform.ExpandResourceAllocation and HostPlatform.ReduceResourceAllocation provisioning workflow logs v The vmware.log is located in the data store of each virtual server. It is accessible in the VMware console
Windows UNIX
v v
%TIO_LOGS%\console.log
Linux
$TIO_LOGS/console.log
1. Provisioning workflow log 2. VMware console 3. Tivoli Provisioning Manager console log
v VMware discovery provisioning workflow log v The vmware.log is located in the data store of each virtual server. It is accessible in the VMware console
Windows UNIX
v v
%TIO_LOGS%\console.log
Linux
$TIO_LOGS/console.log
1099
Step where the problem occurs: Powering on and off, rebootingVMware virtual servers
Check errors in: 1. Provisioning workflow log 2. VMware console 3. Tivoli Provisioning Manager console log
Log files: v Device.PowerOn, Device.PowerOff and Device.HardwareReboot provisioning workflow logs v The vmware.log is located in the data store of each virtual server. It is accessible in the VMware console
Windows UNIX
v v
%TIO_LOGS%\console.log
Linux
$TIO_LOGS/console.log
1. Provisioning workflow log 2. VMware console 3. Tivoli Provisioning Manager console log
v HostPlatform.DestroyVirtualServer provisioning workflow log v The vmware.log is located in the data store of each virtual server. It is accessible in the VMware console
Windows UNIX
v v
%TIO_LOGS%\console.log
Linux
$TIO_LOGS/console.log
KVM problems
Step where the problem occurs: Creating KVM virtual servers Check errors in: 1. Provisioning workflow log 2. Tivoli Provisioning Manager console log Performing dynamic resource allocation 1. Provisioning workflow log 2. Tivoli Provisioning Manager console log Discovering a KVM hypervisor 1. Provisioning workflow log 2. Tivoli Provisioning Manager console log Discovering a KVM virtual server 1. Provisioning workflow log 2. Tivoli Provisioning Manager console log Powering on and off, rebooting a KVM virtual server 1. Provisioning workflow log 2. Tivoli Provisioning Manager console log Log files: v HostPlatform.CreateVirtualServer provisioning workflow log v v
Windows UNIX
%TIO_LOGS%\console.log
Linux
$TIO_LOGS/console.log
%TIO_LOGS%\console.log
Linux
$TIO_LOGS/console.log
%TIO_LOGS%\console.log
Linux
$TIO_LOGS/console.log
%TIO_LOGS%\console.log
Linux
$TIO_LOGS/console.log
%TIO_LOGS%\console.log
Linux
$TIO_LOGS/console.log
1100
Deleting a KVM virtual 1. Provisioning server workflow log 2. Tivoli Provisioning Manager console log
%TIO_LOGS%\console.log
Linux
$TIO_LOGS/console.log
VMControl problems
For all errors that occur during the install of the VMControl_Virtual_Infrastructure.tcdriver, refer to the following log files: Note: By default, debug messages are not copied to the log files. To get more log file information, change the setting on TIO_HOME/config/log4j.prop to: v log4j.appender.errorfile.threshold=debug v log4j.appender.consolefile.threshold=debug For more information about the log4j tool, see the topic called Configuring logs with log4j.
Step where the problem occurs Check errors in: Log files 1. v v 2. v v 3. v %TIO_HOME%\logs\tcdrivermanager\ objectDump.xml
UNIX Linux Windows Windows UNIX Windows UNIX
Installing the 1. Tivoli Provisioning VMControl automation Manager error log package 2. Tivoli Provisioning Manager console log 3. objectDump.xml
%TIO_HOME%\logs\tcdrivermanager\error.log
Linux
$TIO_HOME/logs/tcdrivermanager/
error.log
%TIO_HOME%\logs\tcdrivermanager\console.log
Linux
$TIO_HOME/logs/tcdrivermanager/
console.log
$TIO_HOME/logs/tcdrivermanager/
objectDump.xml
Symptoms
An error occurs when creating a VMware virtual server using a ESX server. If an inventory discovery has been run for a ESX server and it is selected to create a virtual server, the creation workflow might fail with the following error:
1101
COPDEX040E An unexpected deployment engine exception occurred: COPCOM606E The system cannot find managed memory type hardware resource on host platform {ESX server name}.
Causes
This error occurs because the inventory discovery cannot discover the memory that is allocated to the virtualization management.
Symptoms
For a ESX server with multiple CPUs, the VMware HostPlatform Resource and Virtual Machine discovery will not work if the inventory discovery against it has been run first. The following error is returned:
COPDEX172E The CPUResID variable is a single value variable, cannot assign an array value to it
Causes
This limitation occurs because VMware expects only one CPU resource when allocating the resource allocations to virtual servers.
Symptoms
During an LPAR creation, the following error occurs:
COPCOM123E A shell command error occurred:....
Causes
1102
The error might occur because the virtual I/O server name does not conform with the DNS naming rule. Virtual server names are required to be defined in DNS and resolved to an IP address. Therefore, the name must conform to both HMC and DNS naming rules.
Symptoms
The following error displays when running the VMware - Virtual Center Discovery:
Cannot connect to URL https://<Virtual Center IP Address>/sdk using user <user name> because:; nested exception is: javax.net.ssl.SSLHandshakeException: com.ibm.jsse2.util.h: NO trusted certificate found.
Causes
The keytool command was run in the wrong directory. It must be run in the $JAVA_HOME/jre/lib/ security directory. In this directory, you can find an existing cacerts file.
Symptoms
When you try to install the Tivoli Common Agent on an AIX WPAR, the installation task fails with the error message COPDEX123E.
Causes
The Tivoli Common Agent cannot be installed on AIX WPARs. Shared or non-shared (dedicated) WPARs are determined by the value of the WPAR.privateusr variable in the virtual server template. To view the virtual server template, navigate to Go To > IT Infrastructure > Provisioning Inventory > Virtual Server Template and then select the server template that was used to create the WPAR. A value of no for the WPAR.privateusr variable means that the server template will create a shared WPAR. Installing Tivoli Common Agent to a WPAR that has been created with this setting will fail.
1103
Note: Because Tivoli Common Agent cannot be installed on any shared WPARs, this issue also applies to shared Solaris Zone. However, if the installation fails with Solaris, no error message is given.
Symptoms
Attempting to synchronize an AIX WPAR with its host LPAR fails with the following error message:
COPCOM123E A shell command error occurred: Exit code=70, Error stream="syncroot: ATTENTION, Root part is currently synchronized, but there are other SWVPD inconsistencies. Please execute "/usr/bin/lppchk -v" for more information. syncroot: Returns Status = FAILURE /usr/lib/wpars/wparinstcmd: 0960-231 ATTENTION: /usr/sbin/syncroot -X failed with return code 1. syncwpar: 0960-264 Error synchronizing workload partition nc117195. Return Status = FAILURE.", Output stream="***************** ************************************************************** Synchronizing workload partition nc117195 (1 of 1). **************************************************** Executing /usr/sbin/syncroot -X in workload partition nc117195. syncroot: Processing root part installation status.".
Causes
This is a known limitation with AIX 6.1 LPARs.
After the file sets have been removed, run the synchronization again.
Libvirt host platform discovery successful when virtual host discovery fails
The Libvirt host platform discovery completes successfully even though there may be failures in its virtual host discovery task. When running Libvirt host platform discovery, check the error log file for specific errors that are symptoms of a failed virtual host discovery.
Symptoms
A failed virtual host discovery might not be apparent when the Libvirt host platform discovery returns successfully. Be sure to check for the following errors to verify if virtual host discovery has failed:
Failed workflow: Core_Helper_HP_GetNativeVLAN Failed workflow: Libvirt_GetDomainDisks Failed workflow: Libvirt_VirtualMachine_Discovery_Helper Discovery code has failed to import the content of <directory of image .xml file> Exception message: An invalid string has been returned by scriptlet code. Disk information could not be retrieved for virtual machine id: <xxxx>.
1104
Failed workflow: Libvirt_Discover_VirtualMachines Virtual machines discovery completed on host platform id: <xxxx (address of virtual machine)> with errors. Failed to discover the following virtual machines: <name of virtual machine>.
Causes
It is by design that the virtual Libvirt host platform discovery returns successfully even though its virtual host discovery task fails.
Symptoms
When running libvirt virtual host discovery, some virtual servers are not added to the Tivoli Provisioning Manager data model.
Causes
This problem occurs when the new virtual server has the same MAC address as an existing virtual server in the Tivoli Provisioning Manager data model.
Symptoms
When you create a dedicated WPAR you specify the values for the /usr and /opt file system sizes in the virtual server template. The creation of the WPAR might fail with the following error message:
mkwpar: 0960-287 Error: /usr requires at least 2288096 blocks
Causes
The /usr and /opt file system sizes are too small. The sizes must be large enough to copy all of the required files from the /usr and /opt directories of the host platform server.
1105
The number in the error message, for example, 2288096 blocks, is displayed in 512KB blocks. When you set the WPAR.size values, convert the size to megabytes (MB). Tip: To calculate the minimum size required, divide the number in the error message by 2048. For example, if the size on the host platform server is 2288096 blocks, use the following calculation:
2,288,096 / 2,048 = 1,117MB
So, the minimum file size required for the dedicated WPAR is 1,117MB.
Symptoms
Running a VMware HostPlatform Resource and Virtual Machine Discovery shows error messages in the log that refer to a host platform server that does not exist in the provisioning data model.
Causes
The discovery is working as designed. The provisioning server can discover virtual server names from the VMwareVirtualCenter even when it does not have access to those virtual servers. The discovery looks for the fully qualified domain name (FQDN). If the FQDN matches, it is possible that the name of the host platform server was changed but not all the configuration files were updated.
Symptoms
The List tab in Virtualization Management application takes a long time to display.
Causes
If there are many objects, it can take some time for the application to load and display the list of host platform servers and the tree hierarchy view.
1106
To verify that the variable has changed the behavior of the application, navigate to the Virtualization Management application. The List tab should display more quickly and you will see only the list of host platform servers. The Host Platforms Tree View is displayed when you select a host platform server from the list.
Symptoms
The following error occurs when you submit the task to add MPIO hard disks to an LPAR:
COPCOM123E A shell command error occurred: Exit code=1, Error stream="", Output stream="HSCL2970 The IOServer command has The DeviceName parameter cannot exceed 15 characters in length.
Causes
The Adapter Name Schema name is too long. The default name is MySANdisk%vhostnumber%_%lparid%_ %hdnumber%. Users can customize the device name section of the name, MySANdisk. The device name section can be no longer than 15 characters. The remainder of the name is generated when the provisioning task is submitted and the workflow runs.
Symptoms
The discovery fails to identify the virtual servers or templates with manually configured MAC addresses.
Causes
Discovery fails to identify virtual servers because they have the same MAC address.
1107
1108
Key terms
Key terms High availability Pertaining to a clustered system that is re-configured when node or daemon failures occur, so that workloads can be restarted. Disaster recovery The process, policies and procedures of restoring operations critical to the resumption of business. High availability disaster recovery A disaster recovery solution that uses shared storage or replication solutions and provides data to a standby system if a partial or complete site failure occurs on a primary system.
Resources
Resources To learn more about disaster recovery, refer to one of the following resources: v High availability considerations and provisioning architecture on page 1110 v Solution constraints on page 1113 v Solution architecture on page 1116 v Solution installation and configuration on page 1120 v Disaster recovery on page 1127 v Alternative technologies on page 1129
1109
Architecture overview
Review the provisioning architecture diagram in Figure 1. Note, for the solution, the Tivoli Provisioning Manager Common Agent Services, Dynamic Content Delivery, and device manager services are part of the configuration. This group of agents is often referred to as the Tivoli Provisioning Manager scalable distribution infrastructure.
MXServer
Web interface
Deployment engine
WSRF
Agent shell
Help
Policy engine
MXServer
Provisioning database
APDE
MXServer
1110
The web interface status can be found by logging in to the Tivoli Provisioning Manager web interface. In the event of a failure, user operations that are in progress and have not been committed will be broken. Users might need to log in again after the web interface is restarted.
1111
The depot shown in Figure 1 is also part of Dynamic Content Delivery. The depot is a computer that acts as a distribution point or a seed peer. The file distribution performed by Tivoli Provisioning Manager in conjunction with Dynamic Content Delivery is a two stage distribution. In the first stage, the file is published to the depots that will be involved in the distribution. In the second stage, the targets will download the file from the depots specified in the download plan and share the file with its peers. In the event of a failure of the Dynamic Content Delivery Manager, targets will not be able to get a download plan. This will prevent targets that are not already downloading the file from starting the download. Any in-progress transactions that are not committed will be rolled back by the database. Dynamic Content Delivery Manager works with WebSphere Application Server clustering to provide a scaling solution with high availability. In the event of the failure of a Dynamic Content Delivery depot, the file distribution will not be able to continue unless another depot or peer has a complete version of the file. To mitigate this risk publishing to two or more depots is recommended to maintain a high availability state for file distributions. In order to use multiple depots and ensure that file distributions are successful if there are depot failures, the distribution process must involve first publishing the file and then distributing the file to all depots. In order to enforce this two step process, the CDS_DynamicPublishEnable setting must be deselected. When this setting is not enabled, all files must be published before distribution.
Help
The help component is a prepackaged Web server which provides help documents to the Tivoli Provisioning Manager web interface The content of the help component is static and it does not process any information. In the event of a failure, restart the help. Help is also accessible through the information center which is published on the IBM Web site. The help component is considered non-critical. If it is unavailable, the Tivoli Provisioning Manager information center can be used.
Deployment engine
The deployment engine is a virtual server that is designed to run provisioning workflows. Provisioning workflows are used for specific automation tasks which cannot be done through the scalable distribution infrastructure. Provisioning workflows can also operate on target computers that do not have Tivoli Common Agent installed on them. An instance of a provisioning workflow being run against a target computer is called a deployment request. In the event of a failure, any current deployment requests will fail. This can leave the target computer in an unknown state; the deployment engine operations are not truly transaction safe. A script must be run to clean up the deployment requests that were in progress when the deployment engine failed. The script will mark the deployment requests as abandoned. When the deployment engine is restarted it will process the next set of deployment requests that are queued in the database. For more detailed information about the script, see the clean-up-deployment-requests command documentation.
WSRF engine
The WSRF/SOAP engine is the Tivoli Provisioning Manager equivalent of a command line tool. It provides interfaces for a set of operations that can also be done through the web interface In the event of a failure, any requests that are in progress but are not committed will be rolled back by the database.
1112
MX server
The MX server is the Tivoli Process Automation engine. The MX server is required in all of the Java virtual servers in order to access the database.
Solution constraints
The high availability disaster recovery (HADR) solution has a number of basic constraints that are described in this section.
1113
Shared storage
Shared storage is available between the primary and secondary, and is considered necessary for the described solution. With additional effort, it is possible to implement a similar solution based on replication technology. Shared storage is not an option for failover across sites, primarily because of the site definition and associated geographical constraints and the need for redundancy in the event of a total site failure.
Service IP addresses
A service IP address, also referred to as a virtual host name, is a TCP/IP host name and associated address that specify a specific computer but are not bound to a physical network card on that computer. Service IP addresses will be used in order to provide a layer of abstraction for transparent management of the failover from the primary and secondary. Note for a service IP address, uniqueness is required in the enterprise. For example, when a system at the primary site goes down, it is possible to reuse the same IP address at the secondary site. The DNS server and associated caches must be aware of the change, and each IP address must be unique on the network at any point in time. Figures 1, 2, and 3 provide a conceptual overview of the service IP address. Note the existence of physical addresses bound to each server with the service IP address capable of being associated with another computer upon failover. Any computer dependent on a service IP address (for example a Tivoli
1114
Provisioning Manager Dynamic Content Delivery depot or target computer) typically needs its associated Address Resolution Protocol cache to expire in order to properly resolve the service IP address upon failover.
Router
DBMS server
Managed target
Router
DBMS server
Managed target
1115
Router
DBMS server
Managed target
Database technology
The solution is dependent on shared storage for the DBMS containers. Therefore, the solution is supported for both DB2 and Oracle database management systems in shared storage configurations . Note the shared storage technology used must be endorsed by the database vendor as a suitable technology for storing DBMS containers. Using shared storage technology not endorsed by the database vendor has the potential to introduce database consistency or corruption issues. Replication based solutions for the DBMS typically require DBMS level support.
LDAP technology
Any Tivoli Provisioning Manager supported LDAP solution is supported. Given the customer can use an existing LDAP implementation, the LDAP implementation outside of the core HADR proposal is generally considered. Note: Tivoli System Automation for Multiplatforms provides a preplanned policy, a predefined high availability solution for LDAP.
Solution architecture
This section describes the general high availability solution. The recommended solution will meet the following criteria. v The solution will focus on failover within a single site. v The solution will use a service IP address. The service IP address will be used to permit a consistent server identity when failing over from the primary to the secondary. v Shared storage will be used to provide data integrity upon failover. This typically implies network storage (for example NFS, SAN) based upon RAID technology (for example RAID 1+0). Once again, it is important to ensure that network storage solutions are recognized as being supported by the appropriate database vendor.
1116
v The automation of the provisioning server is done by Tivoli System Automation for Multiplatforms (TSA MP). This includes starting and stopping the provisioning server environment. Furthermore Tivoli System Automation for Multiplatforms will automatically recover Tivoli Provisioning Manager after a failure (hardware or software) and restart failed components in place or failover instances to a backup server. The solution will be described in terms of the server architecture and TSA MP integration within this architecture.
Solution architecture
The solution architecture consists of a two server topology with shared storage. 1. The provisioning server (including the Tivoli Provisioning Manager engine, Common Agent Services, Dynamic Content Delivery, device manager service, and inventory upload servlet components). 2. The database server. Having a distinct database server is the recommended approach when using commodity hardware because it has the potential to dedicate more resources to the database. In addition, a 64bit database computer can be run which also has advantages. For the multi-node server case, it is also recommended to have a dedicated high bandwidth connection (1Gbps Ethernet or better) between the primary provisioning server and database servers.
1117
Failover
Monitor
Monitor
Monitor
Failover
Failover
LDAP
Shared storage
LDAP
DBMS
DBMS
Provisioning server
Provisioning server
Distribution layer
Depot 1
Depot 2
Target layer
Target 1
Target 2
Target 2
Dynamic Content Delivery depots are not considered in the Tivoli System Automation for Multiplatforms high availability setup. The general high availability requirement is to have multiple depots and to ensure you publish to them to ensure redundancy. If one depot fails, the other depots can continue service and the failing depot can be restarted. For using multiple depots to ensure that file distributions are successful if there are depot failures, the high availability best practise is to have a two step process: publish the file to all depots and then distribute the file to all depots. In order to enforce this two step process, the CDS_DynamicPublishEnable setting must be deselected. When this setting is not enabled, all files must be published before distribution. To disable the CDS_DynamicPublishEnable setting:
1118
1. Click Go To > Administration > Provisioning > Provisioning Global Settings. 2. Click the Variables tab and find the CDS_DynamicPublishEnable variable. 3. Expand the variable. Ensure that the Component value is Entire System. Type false in the Value field. Note: If the variable is not in the list, click New Row and add the variable. Set the Component and Value fields. 4. Click Save .
Note: In the solution, for every computer a set of n standby servers are provided for failover. Tivoli System Automation for Multiplatforms permits the designation of a set of servers for failover that can be shared by a number of applications. You do not need a strict one to one mapping of standby servers for failover. For example, three application servers can failover to a single standby. This approach offers a cost-effective way of managing high availability.
Tiebreaker support
An important aspect of the Tivoli System Automation for Multiplatforms implementation is tiebreaker support. In the case of a node or network failure, the tiebreaker is required to determine one node in the cluster as leader to continue. The other nodes are not allowed to continue on their own. The tiebreaker ensures integrity by preventing the scenario where, in the event of a failure, both the primary and secondary are available at the same time (potentially causing odd behavior or corruption). The integrity of tiebreaker support is tied to the Tivoli System Automation for Multiplatforms version and associated infrastructure. For example, in version 2.3, the disk tiebreaker is limited to SCSI-2 locking for shared disks. For the network tiebreaker, the ability for a node to ping the network gateway is typically used. This requires the IP address of both nodes and the gateway to be in the same physical subnet to avoid the situation where both can reach the gateway but not each other. For more details on Tivoli System Automation for Multiplatforms implementation options and tiebreaker support, consult the reference Tivoli System Automation for Multiplatforms documentation.
1119
7. Disable the Tivoli Provisioning Manager for OS Deployment automatic startup by running disable-autostart.sh. You can find the script in the following locations: v v
Windows Linux
%TIO_HOME\repository\tpmfosd\windows\disable-autostart.vbs
UNIX
$TIO_HOME/repository/tpmfosd/linux/disable-autostart.sh
1120
Note: The following installation instructions are for UNIX systems only. On Windows systems, imaging is recommended. The following steps must be observed when installing Tivoli Provisioning Manager on the secondary: 1. User and group creation. 2. TivGUID installation 3. DBMS client installation
TivGUID installation
A GUID is a Globally Unique Identifier used for uniqueness in cross-system applications. TivGUID is an implementation of such a unique identifier used by Tivoli Provisioning Manager, and is essential to the correct operation of Tivoli Provisioning Manager. 1. Ensure that the TivGUID installation directory on the secondary computer matches the TivGUID home folder from the primary provisioning server server. For example /opt/tivoli/guid. 2. After the TivGUID installation, perform the following operations to set up both primary and secondary Tivoli Provisioning Manager computers with the same GUID: a. On the primary provisioning server, retrieve the value of the current GUID.
bc1ha9:/opt/tivoli/guid # ./tivguid Show Tivoli GUID utility - Version 1, Release 3, Level 0. (C) Copyright IBM Corporation 2002, 2004 All Rights Reserved. Guid:0b.0b.34.6c.4d.0f.11.dc.ac.03.00.09.6b.00.c5.11
b. On the secondary provisioning server, set up the same GUID value as the primary.
bc1ha6:/opt/tivoli/guid # ./tivguid -Write -guid=0b.0b.34.6c.4d.0f.11.dc.ac.03.00.09.6b.00.c5.11 Tivoli GUID utility - Version 1, Release 3, Level 0. (C) Copyright IBM Corporation 2002, 2004 All Rights Reserved. Guid:0b.0b.34.6c.4d.0f.11.dc.ac.03.00.09.6b.00.c5.11
1121
2. Create the first level automation domain. a. Run the preprpnode command on every node that will be part of the automation domain. For example:
preprpnode bc1ha9 bc1ha6
b. Create the automation domain. For example, a single automation domain can be created (tpm_SA_Domain) comprising of two servers (bc1ha9, bc1ha6). This command must be issued only once on any of the servers that are part of the automation domain. For example:
mkrpdomain tpm_SA_Domain bc1ha9 bc1ha6
Now, any Tivoli System Automation for Multiplatforms or RSCT command can be issued from any node in the automation domain. c. The newly created automation domain has an operational state (OpState) of offline. The operational state must be changed by issuing a startrpdomain command to bring the newly defined automation domain online. For example:
startrpdomain tpm_SA_Domain
1122
bc1ha9:/usr/bin # lsrsrc -l IBM.ServiceIP Resource Persistent Attributes for IBM.ServiceIP resource 1: Name = "tpm_SIP" ResourceType = 0 AggregateResource = "0x2029 0xffff 0x33f1af4a 0x46b43e08 0x90889ef1 0x0582b800" IPAddress = "9.31.26.12" NetMask = "255.255.255.240" ProtectionMode = 1 ActivePeerDomain = "tpm_SA_Domain" NodeNameList = {"bc1ha9.tod.tpmserver.example.com"} resource 2: Name = "tpm_SIP" ResourceType = 0 AggregateResource = "0x2029 0xffff 0x33f1af4a 0x46b43e08 0x90889ef1 0x0582b800" IPAddress = "9.31.26.12" NetMask = "255.255.255.240" ProtectionMode = 1 ActivePeerDomain = "tpm_SA_Domain" NodeNameList = {"bc1ha6.tod.tpmserver.example.com"} resource 3: Name = "tpm_SIP" ResourceType = 1 AggregateResource = "0x3fff 0xffff 0x00000000 0x00000000 0x00000000 0x00000000" IPAddress = "9.31.26.12" NetMask = "255.255.255.240" ProtectionMode = 1 ActivePeerDomain = "tpm_SA_Domain" NodeNameList = {"bc1ha6.tod.tpmserver.example.com", "bc1ha9.tod.tpmserver.example.com"}
1123
2. Create the application resource configuration file. For example /opt/IBM/tioadmin/ tpm.resourcedef.IBM.Application. For example:
PersistentResourceAttributes:: Name="tpm" StartCommand="/usr/local/IBM/TSAMP/scripts/tpm.sh start" StopCommand="/usr/local/IBM/TSAMP/scripts/tpm.sh stop" MonitorCommand="/usr/local/IBM/TSAMP/scripts/tpm.sh status" MonitorCommandPeriod=60 MonitorCommandTimeout=60 NodeNameList={"bc1ha6","bc1ha9"} StartCommandTimeout=120 StopCommandTimeout=120 UserName="tioadmin" ResourceType=1
1124
InstanceLocation = "" SetHealthState = 0 MovePrepareCommand = "" MoveCompleteCommand = "" MoveCancelCommand = "" CleanupList = {} ActivePeerDomain = "tpm_SA_Domain" NodeNameList = {"bc1ha6.tod.tpmserver.example.com"} resource 3: Name = "tpm" ResourceType = 1 AggregateResource = "0x3fff 0xffff 0x00000000 0x00000000 0x00000000" StartCommand = "/usr/local/IBM/TSAMP/scripts/tpm.sh StopCommand = "/usr/local/IBM/TSAMP/scripts/tpm.sh MonitorCommand = "/usr/local/IBM/TSAMP/scripts/tpm.sh MonitorCommandPeriod = 60 MonitorCommandTimeout = 60 StartCommandTimeout = 120 StopCommandTimeout = 120 UserName = "tioadmin" RunCommandsSync = 1 ProtectionMode = 0 HealthCommand = "" HealthCommandPeriod = 10 HealthCommandTimeout = 5 InstanceName = "" InstanceLocation = "" SetHealthState = 0 MovePrepareCommand = "" MoveCompleteCommand = "" MoveCancelCommand = "" CleanupList = {} ActivePeerDomain = "tpm_SA_Domain" NodeNameList = {"bc1ha6.tod.tpmserver.example.com", "bc1ha9.tod.tpmserver.example.com"}
1125
The recommended steps to achieve this follow. 1. Define the relationship between our service IP resource (tpm_SIP) and the network interface equivalency (tpm_nieq) with the following command:
# mkrel -p DependsOn -S IBM.ServiceIP:tpm_SIP -G IBM.Equivalency:tpm_nieq tpm_SIP_dependson_tpm_nieq
2. Define the relationship between Tivoli Provisioning Manager application (tpm) and the service IP (tpm_SIP) with the following command:
# mkrel -p DependsOn -S IBM.Application:tpm -G IBM.ServiceIP:tpm_SIP tpm_dependson_ip
4. Create the relationship between the Tivoli Provisioning Manager application the database. The LDAP server is optional and is not part of this solution. a. Add database resource group to the Tivoli Provisioning Manager resource group.
# addrgmbr -g tpm_rg IBM.ResourceGroup:db2hadr_maxdb71-rg
2. The environment is now fully defined and configured. Verify the status of the resource group with the following command:
bc1ha9:/usr/bin # lsrg -g tpm_rg Displaying Resource Group information: For Resource Group "tpm_rg". Resource Group 1: Name = tpm_rg MemberLocation = Collocated Priority = 0 AllowedNode = ALL NominalState = Online ExcludedList = {} Subscription = {} Owner = Description = InfoLink = ActivePeerDomain = tpm_SA_Domain OpState = Online TopGroup = tpm_rg ConfigValidity = TopGroupNominalState = Online
1126
2. In the config.csv file in the /opt/IBM/tpmfosd_files/global/rad directory, modify the host name into the service host name. 3. Load the rembo.conf file you modified by running the command:
rembo -d -v 4 -c rembo.conf -exit
Disaster recovery
This section provides a detailed description of required steps for disaster recovery. For a disaster recovery approach, a number of objects must be managed for manual recovery and restart upon failover. The required objects break down into the following categories. 1. Tivoli Provisioning Manager operational objects. 2. Tivoli Provisioning Manager maintenance objects. 3. Database objects. A detailed discussion will be given for each category. Note the management of LDAP objects are not described. LDAP solutions typically have their own replication scenarios and the solutions for the specific LDAP implementation must be referenced. Where the objects have been described, a general description of the disaster recovery steps is provided. Tivoli Provisioning Manager operational objects Tivoli Provisioning Manager operational objects involve objects with a relatively high rate of change that can change with the daily operation of Tivoli Provisioning Manager. These objects must be managed by high frequency file system replication or disk mirroring solutions. The following list contains the file system objects that need to be managed between primary and secondary sites: 1. $TIO_HOME/repository This is the local file repository. Note this is the default location and can be specified otherwise at installation. 2. $TIO_HOME/config/tcm.xml 3. $TIO_HOME/xml 4. $CYG_ROOT/home/tioadmin 5. $TIO_LOGS This is optional. It can be helpful to preserve the logs for serviceability when the provisioning server fails. If there are other file repositories created on the provisioning server the root directories of those file repositories must be replicated as well.
1127
Database objects
Database objects can be managed by supported database replication scenarios (for example, DB2 high availability disaster recovery (HADR) support) or lower level disk mirroring. The solution selected must be approved by the appropriate database vendor (DB2 or Oracle). For the DB2 scenario, some brief notes follow. 1. In general, DB2 high availability disaster recovery is our standard cross-site solution. This includes the default HADR_TIMEOUT interval (120 seconds) and near synchronous mode (which offers a combination of good performance and high availability). 2. The secondary DB2 server must be available for replication to work properly. In the event the secondary goes down, it will resynchronize with the primary after it comes back up.
Recovery steps
The following general recovery steps are considered part of a successful disaster recovery scenario. 1. Suitable provisioning server mirroring/replication/backup mechanisms are in place. 2. Failure occurs on the primary. The primary server entity is shut down. 3. Control is passed to the secondary. This consists of: a. Activation of the replicated objects. b. Preserving the provisioning server IP address wherever possible. c. Startup of Tivoli Provisioning Manager. 4. Remapping of the distribution layer. 5. Remapping of the endpoint layer. Note steps one through three are considered constant time operations. They are essentially independent of the size of the deployment. Steps four and five have the potential to be dependent on the number of distribution layer or endpoint layer objects involved. The preferred implementation needs to be to manage at the IP layer, essentially in constant time, by preserving the IP address of the primary while failing over to the secondary. An installation option is available to indicate whether the Tivoli Provisioning Manager agents must be configured using an explicit IP address or a host name for the provisioning server. In the event the agent is configured with a host name, DNS updates and cache invalidation must be sufficient for the agents to communicate with the new server. This is considered the preferred method of configuring Tivoli
1128
Provisioning Manager for a disaster recovery scenario where the server IP address might change but the host name remains fixed and appropriate DNS support is in place. Note: The server IP change feature is not supported In the case where the IP address is not preserved on failover or the DNS is unavailable, then failover will involve the reestablishment of all distribution and endpoint layer objects (essentially, reregistering and rediscovering all managed objects).
Alternative technologies
This section provides a brief guide to using alternative technologies for failover. High availability solutions typically have many common aspects. Whether the implementation is done using Tivoli System Automation for Multiplatforms, HACMP, Veritas, or Redhat Heartbeat, the general concepts of component monitoring, failover, IP management, and volume management are persistent. The solution described here is based upon service/virtual IP addresses and a script for monitoring, starting, and stopping Tivoli Provisioning Manager. It also uses Tivoli System Automation for Multiplatforms predefined policies for the database server and the LDAP server. Volume management is typically implementation-dependent. Our solution can be adapted to these technologies through some fairly straightforward customization effort. Consider the following areas for customization: v Integration of Tivoli Provisioning Manager heartbeat methods. See the script in the IBM Integrated Service Management Library. v Integration of Tivoli Provisioning Manager failover methods. This script is also available in the Integrated Service Management Library. v Service IP management. v Volume management. v Database server and LDAP server management. Replacements for the predefined policies are provided by Tivoli System Automation for Multiplatforms.
1129
1130
1131
Related tasks Subnetworks on page 1138 Trunking negotiation on page 1144 Managing switches
Managing switches
Switches provide a way for all the data model objects to connect to each other. For information to pass in and out of a switch, a logical endpoint known as a port must exist. A switch port allows you to logically connect computers to switches. Related concepts Trunking on page 1140 Chapter 12, Managing network resources, on page 1131
Adding a switch
To add a switch:
Procedure
1. Click Go To > IT Infrastructure > Provisioning Inventory > Switches. . 2. Click New 3. Type a unique name for the new switch in the Name field. 4. 5. 6. 7. If the device is in a failed state, select the Failed check box. Type the number of ports for the switch in the Port field. Click the Locale list and then select the locale. Click Save.
Results
You have finished adding your new switch. You can add ports to the switch and turn the switch on and off. A switch can be also configured to act as a router. Switches can increase performance and reduce the burden on the existing network infrastructure. A router table can be created and maintained on a router to hold a list of valid paths through which hosts can communicate with other hosts. The routing table can hold static routes and dynamic routes.
Procedure
1. Click Go To > IT Infrastructure > Provisioning Inventory > Load Balancers 2. Click the name of the load balancer. 3. Click the Networking tab.
1132
4. Click the New NIC Resource button. 5. Enter a name for the load balancer's NIC within the NIC field, and the MAC address of the load balancer within the MAC field. 6. Click the Network Interface tab. 7. Click the New Network Interface button. 8. Enter a name for the load balancer's network interface within the Network Interface field, and the IP address of the load balancer within the IP Address field. 9. Click the Save Load Balancer button within the toolbar.
Procedure
1. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Computers. 2. Identify and click the computer that you want to edit. 3. 4. 5. 6. 7. Click the Hardware tab. In the Hardware Resources list click the Other tab. Click New Other Resource. The Resource window is displayed. In the Resource Type list, click the type of resource that you want to add. In the Resource field, type the name of the resource.
8. In the Group field, type the name of the resource group for this resource. This name enables you to refer to multiple resources in the same resource group from workflows. 9. If you want Tivoli Provisioning Manager to have control over the resource, select the Managed. When enabled, the device to which the interface is assigned remains accessible, even after any network configuration changes are made to it. 10. If the resource can be partitioned, select the Partitionable. . 11. Click Save 12. Expand the parameter list for the resource that you created and make any other required changes.
Results
The resource appears in the Other Resource list.
1133
v Binary subnet mask. If the resulting binary address is equal to the network address assigned to the subnetwork, then the assigned IP address is on the correct subnetwork that has been assigned to it. For example, assume that the subnet pair assigned to an interface had the following information:
Table 204. Example of the subnet pair Component Subnet Mask Subnet Address Decimal Address 255.255.255.240 10.1.1.16 Binary Address 11111111.11111111.11111111.11110000 00001010.00000001.00000001.00010000
A good example of an IP address assigned to the interface is the following, where, the resulting binary address is equal to the network address assigned to the subnetwork.
Table 205. Good example Component Subnet Mask IP Address Decimal Address 255.255.255.240 10.1.1.23 10.1.1.16 Binary Address 11111111.11111111.11111111.11110000 AND 00001010.00000001.00000001.00010111 00001010.00000001.00000001.00010000
A bad example of an IP address assigned to the interface is the following, where, the resulting binary address is not equal to the network address assigned to the subnetwork.
Table 206. Bad example Component Subnet Mask IP Address Decimal Address 255.255.255.240 10.1.1.13 10.1.1.0 Binary Address 11111111.11111111.11111111.11110000 AND 00001010.00000001.00000001.00001101 00001010.00000001.00000001.00000000
Procedure
1. 2. 3. 4. 5. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Computers. Identify and click the computer to which you want to add a NIC. Click the Hardware tab. In the Hardware Resources list click the NIC tab. Click New NIC Resource.
6. In the NIC field, type the name of the new network interface card. 7. In the MAC field, type the media access control (MAC) address of the NIC. 8. In the Group field, type the name of the logical group to which you want to assign the resource. 9. Select the Managed check box if you want to use workflows to configure the network interface card. Workflows use this option to identify which resources they can configure. If this option is enabled, workflows can provision the resource. If this option is disabled, workflows will consider the resource unavailable for provisioning.
1134
10. Select the Management check box, for this resource to be managed by the application. If this option is enabled for a network interface card and an associated network interface for a device, the selected pair determines the main management IP address to use for communication with the device. You can only specify one management network interface card and network interface for a device. 11. Select the Failed check box, only if the device is in a Failed state. 12. Select the Netboot Enabled check box if you want to allow workflows to boot this device remotely. 13. Click Save.
Results
A new network interface card is now added.
What to do next
Next steps: Defining network interfaces for computers
Procedure
1. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Computers. 2. Click the computer that you want to configure a network interface for. 3. 4. 5. 6. 7. 8. Click the Hardware tab. Expand NIC. Identify and expand the NIC to which you want to add a new interface. Click the Network Interface tab. Click New Network Interface. The Network Interface window is displayed. In the Network Interface field, type a name for the new network interface.
9. Select the Failed check box, only if the device is in a Failed state. 10. Select the Managed check box if you want to use workflows to configure the network interface card. Workflows use this option to identify which resources they can configure. If this option is enabled, workflows can provision the resource. If this option is disabled, workflows will consider the resource unavailable for provisioning. Tivoli Provisioning Manager can perform operations on the device, for example, you might have a private IP address that is not reachable from Tivoli Provisioning Manager, but Tivoli Provisioning Manager might still shut or unshut the interface. 11. Select the Management check box, if you want to use workflows to configure the interface. This interface is used by Tivoli Provisioning Manager to connect to the device. Only one interface can be marked as Management. 12. Select the Is Dynamic check box if the associated network interface has Dynamic IP address capability (DHCP) configured. In the Network Web interface there are two fields showing the management IP of the server. One is directly related to the interface, the other one is located at the top of the page. They must have the same content. When marking the Management Interface as Is Dynamic, Tivoli Provisioning Manager queries the content of the upper management IP box, which is also the content that is displayed by the first summary page of Provisioning Computers.
Chapter 12. Managing network resources
1135
13. In the IP Address field, type the IP address for the new network interface. 14. From the Subnetwork list select a subnet for the new network interface. 15. Click Save.
Results
The new network interface is now added to the computer.
What to do next
You can remove an existing interface on the Hardware tab of the selected computer. Expand the name of the NIC. Identify the interface to remove and click Mark Row for Delete.
Procedure
1. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Computers. From the list, identify and click the computer for which you want to configure the routing. 2. 3. 4. 5. 6. Click the Hardware tab. Expand NIC, and identify the network interface that requires a new routing configuration. Click the Network Interface tab. Locate the network interface to which you want to add the routing configuration, and expand it. Under Route for, click the Maximize button at the right to expand the section.
7. Click New Route. 8. In the Destination field, choose the IP address of the destination subnet from the list. 9. Type in the IP address of the enabled router that you want to use in the Gateway field, and click Save. 10. Repeat steps 2 to 5 to define more routes for the router. If applicable, instead of defining one route after another, you can select the Apply Routing Table menu option. The Apply Routing Table dialog box is displayed. 11. In the Routing Table list, click the routing table that you want to apply to the router. 12. Select the Remove existing routes check box if you want to remove all the individual routes that have been previously configured for this device, and click Save.
Procedure
1. Click Go To > IT Infrastructure > Provisioning Inventory > Load Balancers. The Load Balancer Inventory page displays all the load balancers that are currently available.
1136
2. 3. 4. 5. 6.
Click New . In the Load Balancer field, type a unique name for the new load balancer. From the Type list, select a driver class type for the new load balancer. Select the Failed check box if the device is in a failed state. Select the locale from the Locale list.
7. Click Save.
Results
A new load balancer is now added.
What to do next
A network interface is required to make a load balancer accessible in the system. Using the IP address you specify, other devices can address the load balancer properly. You can also assign virtual IP addresses to a load balancer. You can configure multiple servers with real IP addresses to use the virtual IP address. External requests from the Internet can be directed to the virtual IP address on the load balancer. Depending on the volume of requests received, the requests are routed to the available server. Note: If you want to remove a load balancer later, ensure that the load balancer is not connected to real IP addresses in the data model. An attempt to remove a load balancer related to real IPs will result in an error.
Procedure
1. Click Go To > IT Infrastructure > Provisioning Inventory > Load Balancers. . 2. Click the Switch tab to display the switch configuration for the load balancer.
1137
Procedure
1. 2. 3. 4. Click Go To > IT Infrastructure > Provisioning Inventory > Load Balancers. Select the load balancer name that you want to configure. Select the Networking tab. Select the router check box to enable the load balancer to act as a router.
5. Select the firewall check box to enable the router to act as a firewall. 6. Click Save 7. Add a route to the interface that you want to configure. a. Choose the IP address of the destination subnet from the Destination list and then enter the gateway for the enabled router. b. Click Save. Repeat this step to define more routes for the router. 8. If applicable, instead of defining one route after another, you can click Apply Routing Table. Note: This action will invoke the IPSystem.ApplyRoutingTable logical device operation.
Subnetworks
Networks can be divided into smaller interconnected but independent subgroups, called subnetworks, that are identified by their Internet Protocol (IP) addresses. Also, a range of IP addresses that need to be blocked can be set up as a subnetwork. Addition of a subnetwork to an existing network reduces the network traffic and increases performance and security. You might divide your network into smaller subnetworks for the following reasons: v Any problems encountered in a subnetwork such as network hardware failures and software failures can be limited, and will not impact the entire network. v Makes the network more secure. v Reduces CPU usage. Related concepts Trunking on page 1140 Chapter 12, Managing network resources, on page 1131
Procedure
1. Click Go To > IT Infrastructure > Provisioning Inventory > Subnetworks. In the list, identify and click the subnet that you want to add blocked IPs to. 2. Click the Blocked IP Addresses tab and enter the required information in the fields. 3. Click Save Subnetwork .
1138
Results
The blocked IP addresses are now configured for the subnetwork. You can perform the following actions after configuring a blocked IP address range on a subnetwork: v To edit blocked IPs for a subnetwork, click the Blocked IP Addresses tab and modify the IP Start Range and IP End Range fields. v To remove a blocked IP address range, click .
Note: To remove a smaller range of IP addresses from within a larger range, but to keep the ranges on either side of the change blocked, you need to alter the existing range to match one of the new ranges, then add a new range for the remaining addresses to be blocked.
Procedure
1. Click Go To > IT Infrastructure > Provisioning Inventory > Virtual LANs. 2. Click New VLAN . The VLAN window is displayed. .
3. Complete the fields on the VLAN window and click Save VLAN
Results
You have finished adding your new VLAN. You can perform the following actions with an existing VLAN: v To change the VLAN properties, click on the VLAN you want to work with. Complete the required fields. Click .
. Before removing a VLAN, ensure that it is not related to v To remove a VLAN, click Delete VLAN any other object in the data model. VLANs are used by the entire Tivoli Provisioning Manager system. Removing a VLAN can affect more than one customer application.
1139
Procedure
1. 2. 3. 4. Click Go To > IT Infrastructure > Provisioning Inventory > Switches. Select the switch to which you want to add a VLAN. Go to the VLANs tab. Click New VLAN. The Create VLAN to this Switch window is displayed. To add a new VLAN, enter the required information for a new VLAN and then click Save.
Results
The VLAN is now added to the selected switch.
Trunking
A trunk connection is a link that carries VLAN information between VLAN-aware Layer 2 devices. These devices can be two switches, a switch and a router, or even a switch and an end station. The advantage of the trunk is that through one connection, many VLANs can be transported between the two switches; therefore we do not have to implement a dedicated (and costly) connection for each VLAN. Trunking can dramatically improve the performance, manageability, and reliability for applications. For example, a link is connected between the ports of two switches. If the switch ports defined on the switches are members of the same VLAN, the ports will pass any traffic only for the VLAN associated with their port connections. By default, the ports are in a non- trunk mode called an Access link. If you want the traffic to pass between multiple VLANs established on multiple switches, you will need to first establish a trunk connection between the switch ports. Note: When a VLAN is split and the trunk connection is disabled between the two switches or endpoints, a single VLAN is divided into two new VLANs, one for each of the broadcast domains. All the switches in the domains are updated with the correct VLAN ID, based on which domain it was originally in. The NIC templates however do not get updated with the new VLAN ID information after the trunking is disabled between the switches. You will need to manually update the NIC templates, with information about one of the new VLAN IDs. The main capabilities of trunking are: v Aggregating multiple switches into a single logical trunk group, supports efficient high-speed communications throughout the network. v Network congestion is decreased, by optimizing available switch resources. v Administrative workload is reduced, as the switches or devices connected using the trunk connection can be managed as a single entity rather than individually. v Trunking significantly increases data availability. For example, even if an individual switch failure occurs, the input and output can continue at a reduced bandwidth as long as at least one switch or router in the trunk group remains available. There are two main types of trunks: v Trunk between two switches. v Trunk between a switch and an workstation or a router: For example, in a network topology, a database server belongs to a database-VLAN whereas a Web server belongs to a Web-VLAN. For a client to talk at Level 2 with these two servers (without any routing device), two network interfaces are required, one configured in the database-VLAN, the other in the Web-VLAN. A trunking connection eliminates the need for two interfaces, and requires only one VLAN-aware network interface that will forward traffic from both VLANs. v Trunk between a switch and an endstation or a router: For example, in a network topology, a database server belongs to a database-VLAN whereas a Web server belongs to a Web-VLAN. For a client to talk
1140
at Level 2 with these two servers (without any routing device), two network interfaces are required, one configured in the database-VLAN, the other in the Web-VLAN. A trunking connection eliminates the need for two interfaces, and requires only one VLAN-aware network interface that will forward traffic from both VLANs. Other concepts that you must be aware of include: v Frame tagging: The mechanism used for VLAN identification is frame-tagging. Frame tagging is a way of keeping track of users and frames as they travel through the switch. Using a trunking connection, a VLAN ID is "tagged" to the MAC address of the device. When such a frame reaches the other end of the trunk, the VLAN-aware port (located on a switch that is configured to support VLAN) identifies the VLAN ID and forwards it to the appropriate VLAN. v Native VLAN: The initial VLAN to which a switch port belonged before becoming a trunking port. If the trunking port becomes an access port, in most of the cases, that port will go back to its native VLAN. Traffic coming from the initial VLAN is untagged. To avoid VLAN hopping, do not to use this VLAN for other purposes. v Protocol Endpoint: A communication point from which data can be sent or received. It represents communication points at various levels on an Open Systems Interconnection (OSI) structure. v VLAN Switch Endpoint: A protocol endpoint representing a switch port and its VLAN-specific attributes. v VLAN Endstation Endpoint: A protocol endpoint representing an endstation network port and its VLAN-specific attributes. Related tasks Subnetworks on page 1138 Trunking negotiation on page 1144 Managing switches on page 1132
Trunk encapsulation
Trunk encapsulation specifies the way in which the VLAN IDs are tagged or identified on a trunk and also defines the VLAN services that are available. There are three types of trunking encapsulations: Inter-Switch Link (ISL) Protocol A Cisco systems proprietary trunking protocol. IEEE 802.10 (DOT1Q) A Cisco proprietary method for transporting VLAN information inside standard Fiber Distributed Data Interface (FDDI) frames Negotiate the two ports will negotiate a protocol.
Trunk negotiation
Trunk negotiation is the process of determining whether two devices in a VLAN can be connected using a trunk link. The Dynamic Trunking Protocol (DTP) supports five different trunking modes: Access Forces the port into a permanent non-trunk mode. Trunk Forces the port into a permanent trunk mode and negotiates with the connected device on the other side to convert the link to trunk mode. Auto The port becomes a trunk port if the neighboring port is in a Trunk or Desirable mode. This is the default mode.
Desirable The port attempts to become a trunk port if the neighboring port is in a Trunk , Desirable or Auto mode.
Chapter 12. Managing network resources
1141
NoNegotiate The port becomes a trunk port but does not use DTP Note: The difference between the Auto and Desirable modes is that the former attribute indicates a static property and the port will not initiate the trunking link, if the neighbor does not initiate it. An auto linked to another auto endpoint cannot become a trunk.
Remote administration
Tivoli Provisioning Manager provides support for some technologies that use out-of-band access to remote devices, providing an alternative path to in-band network management. A network can be managed In-band and Out-band. In-band network locally manages the network. This is one of the most common ways to manage the network. The downside to this type of network management is that if the network is down, you cannot use the same network path to access the affected devices. Using Tivoli Provisioning Manager, you can configure the following assets for remote administration in your enterprise: v Power units and power outlets v Terminal servers v Blade servers
1142
Action Turning power units off Turning power outlets on Turning power outlets off Cycling power on a power outlet
Device operation Device.PowerOff, where Device is the name of the power unit that you want to turn off. PowerUnit.TurnOutletON PowerUnit.TurnOutletOFF PowerUnit.CycleOutlet
Terminal servers
Terminal servers are hardware devices that provide network access to other devices (terminals) that have no built-in network support. Terminal servers that connect to managed network devices allow secure and remote out-of-band access to the management ports of enterprise equipment. These terminals connect to the terminal servers through TCP/IP using the RS-232/423 interface. The terminal servers in turn connect the terminals to the network (typically Ethernet) through the network interface cards (NICs). After you add a terminal server, you must add a network interface card to the terminal server is to serve as a physical link to the rest of the network. If you use a serial card for serial connections to a terminal server (for terminal communication, for example), you need to define the serial card for the terminal server. A terminal server with multiple interfaces can be configured act as a router.
Blade servers
Blade servers are systems that are used primarily to reduce space restrictions and redundancy. While blade servers appear no different than regular servers, they are physically located in their parent chassis. They must be created from the Blade Server Chassis Inventory page instead of a server inventory page because servers cannot be reassigned from one chassis to another. Blade servers are configured, for the most part, the same way traditional computers are configured. Adding a blade expands the network infrastructure but decreases deployment costs considerably. Using Tivoli Provisioning Manager, you can configure blade servers for remote administration in your enterprise. Before you can create a blade server, you need to have created a blade server chassis and the computer template that you want to use must be defined. A computer template essentially defines a set of required software that must be installed on a group of managed computers. The template is used to identify non-compliant computers that are missing software or have software that is not listed in the computer template. A network interface is required to make the blade server chassis accessible in the system. Using the IP address you specify, other devices can address the blade server properly.
Initializing devices
Initializing devices resets the devices to the starting value. This value is the value before the device was configured. Initializing managed devices can be done by initiating the workflow triggered by the Device.Initialize logical management operation where Device is the name of the device that is being initialized.
1143
Rebooting
A device reboot is typically required when the device has stopped responding and you need to power it off and on again. A software reboot is typically required when the system encounters an error and cannot recover. Hardware reboot The hardware reboot is performed by initiating the workflow that implements the Device.HardwareReboot logical operation, where Device is the name of the device on which you want to perform the hardware reboot. Generic reboot The generic reboot is a combination of software and hardware reboot mechanisms, and is performed by initiating the workflow that implements the Device.Reboot logical management operation where Device is the name of the device on which you want to do a generic reboot. The following steps are taken during a generic reboot: 1. The system verifies whether a reboot_preference data center model property is defined for the device you want to reboot. This data center model property specifies which reboot method to use for that specific device. If none found, an asynchronous software reboot is initiated first. 2. If the asynchronous software reboot fails, a synchronous software reboot is attempted. 3. If the synchronous software reboot is unsuccessful, a hardware reboot is performed. Software reboot The asynchronous software reboot is initiated by the workflow that implements the Device.SoftwareRebootAsync logical management operation, where Device is the name of the computer. The synchronous software reboot is initiated by the workflow that implements the Device.SoftwareRebootSync logical operation, and a confirmation that the rebooted computer is back up and running is required. To perform a device reboot:
Trunking negotiation
Trunk negotiation is the process of determining whether two devices in a VLAN can be connected using a trunk link. The Dynamic Trunking Protocol (DTP) supports five different trunking modes. The trunk mode forces the port on the switch into a permanent trunk mode and negotiates with the connected device on the other side to convert the link to trunk mode. Related concepts Trunking on page 1140 Chapter 12, Managing network resources, on page 1131
Procedure
1. Add two new switches named switch_1 and switch_2. Note: Switches provide a way for all the data model objects to connect with each other and pass information. For more information, refer to the section, Managing switches on page 1132. 2. Add ports to the newly created switches. Select Trunk as the trunking mode for both the switches, from the options provided in the drop-down list.
1144
Note: For information to pass in and out of a switch, a logical endpoint known as a port, needs to exist. A port allows you to logically connect two switches or servers to switches. 3. Create new VLANs with the same VLAN number. For more information on creating new VLANs, refer to the section, Adding a new VLAN on page 1139. Note: In this example, although the VLAN number defined for both switches are the same, both the VLANs will have different data model ids . They are essentially two different data model objects in Tivoli Provisioning Manager, with the same VLAN number. 4. Add the VLANs to the switches. 5. To represent the physical connection between the two switches, edit the network interface card properties of the switch. To connect both newly created switches, select switch_1 and edit the following NIC properties of the switch: v Select switch_2 from the switch list. v Enter the port number for the switch as 1. At this point the two switches are physically connected to each other, but the trunking connection is not yet established, since the ports are both in access mode. The VLANs ids have also not merged because the switches are not yet in trunking mode. To establish the trunking connection, complete the tasks below. 6. Edit the ports to the newly created switches: from the options provided in the drop down list, select a Switch Port Mode and Switch Port Encapsulation Type that result in a trunk.
Results
The switches now have trunking established and the VLAN ids of both the switches have merged, because of the trunking. To add a VLAN to a switch in trunking mode (This property is enabled, only if the switches are in trunking mode): 1. Click the Connect Switch Port to another Switch Port icon. Select the switch to which you want to add a VLAN. For example, select switch_1. 2. Click Add VLAN. From the drop-down list, select the VLAN to which this switch is associated to. 3. Click Save. 4. Repeat the same for switch_2. Note: When a VLAN is split and the trunk connection is disabled between the two switches or endpoints, a single VLAN is divided into two new VLANs, one for each of the broadcast domains. All the switches in the domains are updated with the correct VLAN ID, based on which domain it was originally in. The NIC templates, however, do not get updated with the new VLAN ID information after the trunking is disabled between the switches. You will need to manually update the NIC templates, that reference the old VLAN ID, with information about one of the new VLAN IDs.
1145
Access rules are access criteria specified for the ACLs. These rules help determine what packets can be passed through or dropped through a router. Refer to the links below for information about configuring access rules for an ACL. To add a new access control list:
Procedure
1. Click Go To > IT Infrastructure > Provisioning Inventory > Access Control Lists. The Inventory ACLs page lists all the currently available ACLs. . 2. Click New 3. Type the name of the new ACL, and then click Save.
Results
You have finished adding your new ACL.
Procedure
1. Click Go To > IT Infrastructure > Provisioning Inventory > Access Control Lists. Select the ACL that you want to work with. 2. Click Add Access Rule. 3. Under Target, specify permit or deny as the type of access. 4. Specify the protocol for the access rule in the Protocol field. 5. Select the Source IP address from the drop-down list and specify the corresponding port range. 6. Select the Destination IP address from the drop-down list and specify the corresponding port range.
Results
The access rule is now added to the ACL. Notes: v The mappings for the parent ACL are checked. v The old ACL is deleted from any firewall where it was used. v The new ACL is updated on any previously used firewalls.
1146
v A DNS server or a hosts file must be configured to resolve the host names of managed computers with the common agent. Ensure that IP addresses configured for managed computers resolve to the same fully qualified domain name. v Depots must be configured to support IP communication in the format used by the servers and target computers in your environment. For example: If all computers are configured for IPv4 communication, the depots can be configured for IPv4 only or IPv4 and IPv6 communication. If you have a mix of IPv4 and IPv6 computers, you must configure the depot for IPv4 and IPv6 support. For more information, see IPv6 addressing on page 1148. v If you have migrated or updated Tivoli Provisioning Manager from a previous version, upgrade the common agent before performing any actions that require communication over IP or discovery of IP addresses. For agent upgrade instructions, see Upgrading the common agents on page 667. During Tivoli Provisioning Manager installation, you can choose the method that common agent uses to communicate with the agent manager. v Using the fully qualified domain name v Using an IP address You can verify the current configuration by looking at the value of the global variable SDI.Use.Hostname. A value of true means that communication with host names is configured. A value false means that IP address communication is configured. If you want to use IP addresses that are configured on managed computers, use IP addresses for communication with the common agent. There are two provisioning workflows you can use to change the communication method. One provisioning workflow configures the provisioning server and the other configures managed computers.
Procedure
1. Configure the sdi.conf file as follows: a. Login to Provisioning Manager as tioadmin. b. Browse to the $TIO_HOME/config directory. c. Create a file with name sdi.conf. d. Specify the cell name for the casprofile profile. The cell name is the same as the directory name at "$WAS_HOME/profiles/casprofile/installedApps". e. Save the file. 2. Click Go To > Administration > Provisioning > Provisioning Workflows. a. Search for the SDI_SetHostConfig provisioning workflow. b. From the Select Action menu, click Run Workflow. c. In the IpAddress field, specify the IP address of the provisioning server. d. Click Run. The provisioning workflow configures the provisioning server for communication using the IP address that you specified. Note: If you have a customized installation with scalable distribution infrastructure server components that are not on the provisioning server, manually configure the remote components with the assistance of IBM Global Technology Services. 3. Restart the provisioning server. 4. Configure managed computers. a. Create a provisioning group with all the computers where the common agent is installed. For instructions, see Creating groups on page 39.
Chapter 12. Managing network resources
1147
b. Create a Provisioning Task definition using the workflow SDI_Agent_SetHostConfig and the target parameter of DeviceID. For instructions see Running a provisioning task on page 1164. Note: If you change from IP address to host name, set the HostName field instead of theIpAddress field.
Results
The provisioning workflow collects the configuration of all scalable distribution infrastructure server components and sends them to managed computers to configure the common agent. The common agent is restarted for the changes to take effect. To check the status of either provisioning workflow that you ran: 1. Click Go To > Task Management > Provisioning Tasks > Provisioning Workflow Status. 2. Search for the provisioning workflow in the list. The scalable distribution infrastructure is now configured to support IP communication with managed computers that have an IP address. After host name communication is configured, the actual IP address used for communication depends on the IP address that is resolved first by the DNS server or hosts file on a managed computer. The scalable distribution infrastructure tries to resolve host names to IP addresses first.
IPv6 addressing
Currently, the dominant IP address format is IPv4. IPv6 is a revised version of the IP address format that offers several benefits over IPv4. An IPv4 address is a 32-bit numeric address written as four numbers separated by periods. For example:
1.160.10.240
An IPv6 address is a 128-bit numeric address. The full format for an IPv6 address is eight numbers separated by colons. For example:
fec0:fff:0000:0000:0000:0000:0000:1
There are alternate ways to abbreviate or represent an IPv6 address. For example an IPv6 address can be abbreviated by collapsing the contiguous fields that contain only zeros. For example, 0009:0000:0000:0000:0000:0008:0007:0006 can be written as 9::8:7:6. IPv6 is designated as the successor to IPv4 by the Internet Engineering Task Force (IETF). Details about the IPv6 addressing standard and the various formats for writing an IPv6 address are described in the IETF document RFC 4291. Key benefits of IPv6 include: More available addresses IPv4 addresses are 32 bits long; IPv6 addresses are 128 bits long. The longer address format means that more unique IP addresses are available, and more individual devices can have a unique IP address directly on the Internet instead of a private IP address within a specific network. Integrated security IPv6 includes encryption, authentication, and data integrity checks. Improved routing An IPv6 network has smaller and more efficient routing tables. The IP addressing structure is hierarchical and the IPv6 header is simplified.
1148
Autoconfiguration IPv6 includes automatic address configuration and renumbering of IP addresses in networks and subnetworks. It also provides discovery of a nearby device or router. Quality of service IPv6 provides a mechanism to prioritize types of information. A device can use the information types to take appropriate action. For example, devices that support IPv6 can prioritize IP audio information so that it arrives at the destination device without significant disruption. Tivoli Provisioning Manager provides a dual stack environment that supports communication using either IPv4 and IPv6 addressing. IPv6 adoption is not yet widespread and many software applications and devices only support IPv4 addressing, including some Tivoli Provisioning Manager software components or software that Tivoli Provisioning Manager interacts with. In addition, a dual stack environment helps organizations to move their network from IPv4 to IPv6 addressing. By default, IPv6 support is not enabled. If you want to use IPv6 support, you must enable it after installation.
IPv6 support
When IPv6 support is enabled, the environment is configured to support both IPv4 and IPv6 addresses.
1149
v If you only want to discover IPv6 addresses, you can enable IPv6 address discovery in Tivoli Provisioning Manager. v If you want to support communication using IPv6 addresses in Tivoli Provisioning Manager, the operating system on the provisioning server must be configured as dual stack to support IPv4 and IPv6 addresses. The management IP address of the provisioning server can be an IPv4 address. The provisioning server can then communicate with: A managed computer that supports IPv4 addresses only. A managed computer that supports IPv6 addresses only. A managed computer that supports both IPv4 and IPv6 addresses. A managed computer with or without the common agent. The following scenarios are supported: Using the scalable distribution infrastructure The scalable distribution infrastructure can support all communication over both IPv4 or IPv6. For the common agent to communicate using IPv6, the following requirements must be met: v The scalable distribution infrastructure must be configured to use host names for communication. v Managed computers must be configured to use DNS or hosts files to resolve host names. v The provisioning server must be configured with a host name that resolves to an IPv4 and IPv6 address. The following scenarios have been tested using the scalable distribution infrastructure: v Inventory discovery v Software distribution and software installation using the scalable distribution infrastructure v Patch management in a large Windows environment Using the deployment engine infrastructure The following scenarios in the deployment engine infrastructure are tested for IPv6 support: v Network discovery using RXA. Network discovery using SNMP does not support IPv6 addresses. v Inventory discovery v Acquiring patches with a WSUS server on page 912 v Installation of the common agent Web services You can use Web services commands to communicate with managed computers with IPv6 addresses. XML import You can use the xmlimport tool to import IPv4 and IPv6 addresses for managed devices.
Limitations
Because IPv6 support is not widespread, there are some limitations to IPv6 communication when IPv6 support is enabled in Tivoli Provisioning Manager. v Windows environments have a dependency on Cygwin to perform network operations such as ssh, ping, telnet, and ftp. Cygwin 1.7 or later is required to support IPv6 addresses. v All communication between server-side components in Tivoli Provisioning Manager uses IPv4 because the middleware installer does not support IPv6 addressing. All server configurations will use IPv4 addresses. v IP-based configuration for the scalable distribution infrastructure uses IPv4 addressing. The scalable distribution infrastructure can be configured using IP addresses or host names. To use IPv6 addressing, host names must be used to manage the common agent on managed computers.
1150
The default setting during installation is host name configuration, but this setting can be changed to IP address configuration either during installation or after installation. The default setting during installation in previous versions of Tivoli Provisioning Manager is IP address configuration. v The IPv4 and IPv6 address configured for the provisioning server must map to the same fully qualified domain name. If a DNS server is not used to resolve the host name, you can use a hosts file to resolve host names. The hosts file must contain both the IPv4 and IPv6 addresses, and both addresses must resolve to the same fully qualified domain name. v High availability and disaster recovery implementations based on a service IP require specific IPv6 support from the cluster manager. The technology used to manage the service IP requires proper management of IPv4 and IPv6 communication. v The following list summarizes main features that do not support IPv6. It is not a complete list of all IPv6 limitations. The policy engine, firewall proxy, router, and ACL management functions Tivoli Provisioning Manager for OS Deployment TADDM discovery and Microsoft Active Directory discovery. For TADDM releases before TADDM v7.2, if resources are discovered IPv6 address information is not imported, even if an IPv6 address is configured for the resources.
Procedure
v Cygwin 1.7 or above is required on the provisioning server. Previous versions of Cygwin do not support IPv6 addresses. v To be able to use the ping.exe utility, create an alias: alias ping=/cygdrive/c/Windows/System32/ PING.EXE . The Cygwin ping.exe utility is not supported with IPv6. By creating the alias, you point to the Windows ping.exe command. v In Windows XP, 2003 and Vista, you can control the precedence IP address formats using the prefix policy netsh command. The following commands are available. Refer to the Windows documentation for more information. Show the local policy
netsh interface ipv6 show prefixpolicy
1151
v On Windows Vista and Windows 2008, privacy addresses are enabled by default. Windows generates random interface IDs for each IPv6 interface and uses them for privacy addresses. To disable privacy extensions
netsh interface ipv6 set global randomizeidentifiers=disabled
Procedure
The vsftp command supports IPv6. On SLES it is not installed by default.
Procedure
v To configure IPv6 stateless addresses to persist after a reboot: 1. Open /etc/rc.tcpip in a text editor 2. Uncomment and add the -A parameter to the following line:
#start /usr/sbin/autoconf6 ""
3. Start the ndpd-host daemon. Uncomment the following line in the file:
start /usr/sbin/ndpd-host "$src_running"
v To change SSH to listen on IPv6: 1. Ensure that you are using the latest version of OpenSSH. 2. Open /etc/ssh/sshd_config in a text editor. 3. Uncomment the following lines:
ListenAddress 0.0.0.0 ListenAddress ::
1152
Procedure
1. To enable IPv6 support on the provisioning server. a. Open the following configuration file in a text editor. v
UNIX
$TIO_HOME/config/system.properties
Windows %TIO_HOME%\config\system.properties v b. In the file, change the value of the ipv6-enabled parameter to true.
c. Save your changes to the file. d. Restart Tivoli Provisioning Manager. 2. To obtain IPv6 addresses for existing managed devices or new devices that have not been discovered, run network discovery. 3. If you have configured an IPv6 management IP for the provisioning server in the operating system, run network discovery against the provisioning server so that the new IPv6 address information is updated in the data model.
Results
IPv6 support is enabled. You can now discover IPv6 address information and perform actions on IPv6 addresses. For features that support IPv6 addressing, the appropriate IPv4 and IPv6 addresses are displayed for devices based on the information stored in the data model.
1153
5. Click Save.
Managing storage
Although there are many storage architecture models in use today, Tivoli Provisioning Manager supports the two most common: Direct attached storage (DAS) and Storage area networks (SAN). Direct attached storage (DAS) DAS, or direct attached storage device (DASD) as it is more often referred to as, is the most common form of storage in use today. It existed before computing devices were networked together, and has made the transition into the networked environment with its client/server architecture paradigm. In this architecture, storage devices of all types are attached directly to the system through which they are accessed. While its low cost and universal compatibility can make it a good choice, limited performance, lack of robustness, and management difficulties make this a less than optimum solution. Storage area network (SAN) SAN is a dedicated, high-performance network specifically designed so that multiple computers can communicate with multiple storage devices. Typically implemented using a fibre channel network with a hub or switch controlling the data flow, a SAN will out perform a DAS solution. Designed to be reliable and scalable, a SAN can scale independently of the user network, eliminating impact on the corporate network. Highly fault tolerant with simplified, centralized management, SANs also facilitate computer consolidation, allowing any given computer to access any storage device. A fibre channel also has a higher data transfer rate than Ethernet does. Fibre channel switches (FCS) FCS, or fibre channel switches, provide a way for all the data model objects to connect to each other. For information to pass in and out of a switch, a logical endpoint known as a port must exist. A switch port allows you to logically connect computers to switches. Adding a fibre channel switch to a SAN fabric allows you to manage ports for a particular switch. Once a computer or subsystem port is physically connected with a switch port, then the computer or subsystem is connected to the fabric associated with the switch.
SAN optimization
Storage provisioning is the process of assigning storage, typically in the form of server disk drive space, in order to optimize the performance of a storage area network. SAN storage environments are complex and require many skills and a good understanding of the task being performed. Many storage arrays have limitations around the number of hosts per adapter or LUNs per adapter. Additionally, there are accepted rules around SAN zoning of not mixing UNIX and Windows hosts in the same zones. As a consequence, over a number of years, many organizations have developed policies and best practices that have been adopted to avoid misconfiguration of storage subsystems and storage networks. These ensure that environments are configured correctly and avoid problems, but the
1154
occasional human error can still occur. In addition, manual storage provisioning can introduce undesirable delays and corresponding dropoffs in service. The typical storage administrator has many demands on their time and might not be able to immediately respond to an urgent storage provisioning request. Automated storage provisioning addresses these issues by enabling best practices to be implemented using storage workflows. Workflows are reusable elements that capture expert know-how, and represent the steps that must be followed in order to carry out a particular operation. These are repeatable and help reduce the possibility for error, and allow for prompt and reliable execution, as the workflows will consistently implement the rules and policies time after time. Storage provisioning in Tivoli Provisioning Manager includes: v Automated storage provisioning for new computers v Storage reconfiguration for reusing computers v v v v An application-centric policy for configuring storage End-to-end computer deployment with predetermined storage configurations Collaboration of DASD and SAN storage through automation Storage manager function management
1155
allocate space on mass storage devices using a method that is more flexible than conventional partitioning schemes. They are made up of volume containers, which are in turn made up of logical and physical volumes. A logical volume is built from physical volumes through disk partitions and is used for file system creation, and a physical volume is composed of one or more disks and presented to the operating system as a single storage device. Storage templates A storage template is a reusable set of storage requirements and configurations with a hierarchy that mirrors the model to be realized. Templates can be defined once, and each provisioning workflow operation will take its input values from the currently selected template. You can add empty volume containers to your storage template, and then add logical volume settings (used for file system creation) and physical volume settings (used for storage devices) to it. When the appropriate provisioning workflow runs, volume container settings are used to create volume containers within a storage manager. You can make use of numerous data paths, providing faster and more robust data transfer. Data path settings specify how the data transfer between the computer and the storage volume is managed.
Procedure
1. Click Go To > IT Infrastructure > Provisioning Inventory > Fibre Channel Switches. 2. Fill in the fields as necessary. 3. Click Save.
Results
The fibre channel switch is added to the SAN fabric and listed in the SAN fabric details page. You can now add a fibre channel port to your fibre channel switch. Fibre channel ports are connection points for interface cards.
1156
1157
User roles
You must be assigned to the appropriate user role to manage tasks.
Table 208. User roles Role Provisioning Administrator Deployment Specialist Configuration Librarian Description v Create provisioning task definitions v Submit and schedule provisioning tasks Access rights Full access to all task management functions: v Provisioning Task Definitions v Provisioning Task Tracking Full access to the following management functions:
v Track submitted provisioning tasks v Provisioning Workflow Status Compliance Analyst v Submit and schedule provisioning tasks
v Track submitted provisioning tasks v Provisioning Task Tracking v Provisioning Workflow Status
Note: The permissions are checked during the execution of provisioning workflows by the provisioning server. If you do not have the required permissions to run a specific provisioning workflow or you do not have the required permissions to work with specific data of the data model, an error message is displayed.
Requirements
User roles and requirements on page 1160 Before running a provisioning task against one or more computers with parameters that you specify, ensure you set up the following prerequisites for all computers involved by this task: v Service access points v Credentials Before creating a provisioning task which is the type activity plan, ensure you have SUN Java JRE 1.5 as a local plugin for your Web browser. If it is not found, it will be automatically installed. Before running a provisioning task which is the type activity plan against one or more computers, ensure that the related activity plan was not saved as a draft.
1158
Key terms
provisioning task An action that runs a deployment job on one or more target computers. A deployment job can include one or more job items that correspond to provisioning workflows. provisioning workflow A program that is used to manage an environment. The program consists of a sequential series of steps that are performed to accomplish a particular provisioning task. activity plan A group of activities where the execution can be scheduled, submitted, and monitored. script role A series of commands, combined in a file, that carry out a particular function when the file is run. Scripts are interpreted while they are run. A set of job responsibilities related to a service management process. Each role is implemented as a security group, which gives users with that role access to a set of applications and a start center with role-appropriate information.
Troubleshooting
v Troubleshooting task management on page 1180 v Task management messages v Support information about task management v Contacting Support
Log files
The following log files contain information for task management.
Table 209. Log file locations Log file Deployment engine logs Log description Contains diagnostic information for the deployment engine. Contains diagnostic information about the scalable distribution infrastructure jobs that are running on the target computer. Location
Windows UNIX
%TIO_LOGS%\console.log
Linux
$TIO_LOGS/console.log
Windows UNIX
%TCA_HOME%\logs\trace-log-0.xml
Linux
$TCA_HOME/logs/trace-
log-0.xml
Contains the history of Viewing provisioning workflow logs provisioning workflows recorded in the provisioning workflow logs.
1159
Resources
To learn more about task management, refer to one of the following resources: v Provisioning tasks: provisioning workflows, scripts, and activity plans on page 1161 v Submitting and tracking provisioning tasks on page 1164 v Chapter 13, Managing provisioning tasks, on page 1157 v Retrieving provisioning task information on page 1173 v For a description of a field in the web interface, press Alt+F1.
Related links Chapter 13, Managing provisioning tasks, on page 1157 Requirements Troubleshooting task management on page 1180
Requirements
Before you start working with tasks, ensure that your system meets all of the requirements for tasks. For example, ensure that service access points and credentials are set up correctly for the provisioning tasks.
v Track submitted provisioning tasks v Provisioning Workflow Status Compliance Analyst v Submit and schedule provisioning tasks
v Track submitted provisioning tasks v Provisioning Task Tracking v Provisioning Workflow Status
Note: The permissions are checked during the execution of provisioning workflows by the provisioning server. If you do not have the required permissions to run a specific provisioning workflow or you do not have the required permissions to work with specific data of the data model, an error message is displayed.
1160
activity plan It consists of a group of activities that can have dependencies associated to them. These dependencies define the circumstances under which the activity is performed. The operation defined in the activity is performed by the application to which the operation belongs. When you submit tasks based on activity plans, you typically specify if you want to install, distribute, or uninstall a software product and on which target computers in your environment this task is performed.
1161
Procedure
1. Click Go To > Task Management > Provisioning Tasks > Provisioning Task Definitions. 2. Click New . 3. Type the provisioning task name. 4. If you want to create a provisioning workflow task: v Select the Provisioning Workflow option. v Specify the name of an available provisioning workflow or your own provisioning workflow name. Specify the target parameter. When you run the workflow, the parameter value will be set by the target computers. The Workflow Parameters indicate the default values for the remaining provisioning workflow parameters. You can override them when running the provisioning workflow task. 5. If you want to create a script task: v Select the Script option. v v Specify the Timeout by which the script must be completed. The timeout interval begins when the task execution actually starts on the target computer and not at the task submission time. v Click New Command Option to specify the parameters with which to run the provisioning task. v Click Add Associated file to associate the script file to run on the provisioning task. Specify the necessary information, such as file repository, file path, processing command, operating system, and script file to run. 6. If you want to create an activity plan task: v Select the Activity Plan option v Specify Draft if you want to submit the activity plan later or Template if you want to run it as it is. v Define the activity plan as decribed in Creating an activity plan from the web interface 7. Click Save .
Results
The provisioning task is created and ready to be run.
Procedure
1. Click Go To > Administration > Provisioning > Provisioning Global Settings.. 2. Click the Variables tab. 3. Locate the default concurrency level and change its value.
1162
Results
You have defined a default concurrency level for all the available provisioning tasks.
Procedure
1. 2. 3. 4. Click Go To > Task Management > Provisioning Tasks > Provisioning Task Definitions. Locate and click the provisioning task that you want to run. From the Select Action menu, click Run Provisioning Task. In the Provisioning Workflows section of the dialog, specify a value in the Concurrency Level field.
5. After specifying the remainder of the information in the dialog, click Submit.
Results
You have defined a concurrency level for a specific provisioning task.
Procedure
1. Click Go To > Task Management > Provisioning Tasks > Provisioning Task Tracking. 2. Locate and click the scheduled provisioning task for which you want to modify the concurrency level. 3. From the Select Action menu, click Change Concurrency Level. 4. In the Set Concurrency Level dialog, specify a value in the Concurrency Level field. 5. Click OK.
Results
You have defined a concurrency level for a provisioning task that is still in scheduled state.
Procedure
1. 2. 3. 4. Click Go To > Task Management > Provisioning Tasks > Provisioning Task Definitions. In the list of provisioning tasks, find the provisioning task that you want to share and click it. From the Select Action menu, click Share Provisioning Task. Click New User. .
1163
Results
The provisioning task definition is shared by the users you specified. They can see the shared definition in the Provisioning Task Definitions application in their login session. They can both use it and modify it.
Procedure
1. Click Go To > Task Management > Provisioning Tasks > Provisioning Task Definitions. 2. In the list of provisioning tasks, find the provisioning task definition that you want to unshare and click it. 3. From the Select Action menu, click Remove Shared Task.
Results
The provisioning task definition is no longer displayed in the list of your provisioning task definitions.
Procedure
1. Click Go To > Task Management > Provisioning Tasks > Provisioning Task Definitions. 2. In the list of provisioning task definitions, find the provisioning task definition and click it. 3. Select the Show History check box. A History table is displayed with the history of all the instances of this provisioning task definition. 4. (Optional) To see additional details, click Detail Menu .
Results
You displayed the history of your provisioning task definition.
1164
Procedure
1. Click Go To > Task Management > Provisioning Tasks > Provisioning Task Definitions. 2. In the list of provisioning task definition, find the provisioning task definition that you want to run and click it. 3. From the Select Action menu, click Run Provisioning Task. 4. In the Run Provisioning Task window, Targets section, click Select and select the computers on which you want to run the provisioning task. 5. In the Provisioning Workflows section, specify the concurrency level for the workflow. 6. In the Workflow Parameters section, specify the new values of the provisioning task parameters that you want to override before submitting the task. 7. In the Scheduling section, specify when you want to run the task. If you are scheduling a task, you can set in Start Window (minutes) the start time window, specified in minutes, after which the task is canceled if it could not be run. 8. In the Recipient section inside the Notification section, specify either the name of the users by clicking Add Recipient or the addresses of the users to be notified by clicking Add E-mail. 9. In the Event section inside the Notification section, you can choose to be notified about a variety of events by clicking Add Event to define the type of events that generate the notification. 10. Verify your selections and click Submit.
Results
After the submission, the provisioning task is displayed automatically in the Task page of the Provisioning Task Tracking application.
Procedure
1. Click Go To > Task Management > Provisioning Tasks > Provisioning Task Tracking. The provisioning tasks are displayed in chronological order. You can filter the provisioning task display sorting by task ID, by task names, by tasks that are in a certain state, by names of the user that started or scheduled the task, by the time the task has started or is scheduled to start, by the provisioning task type. To see the latest status of the provisioning tasks, click the Refresh page icon on the toolbar.
Chapter 13. Managing provisioning tasks
1165
2. To see additional details on one of the provisioning tasks, click the task name. A page with all the information about the provisioning task information is displayed. 3. You can see information about the provisioning task definition by clicking Look Up from
Definition. This Definition and the related Look Up are displayed only if the provisioning task instance has an associated task definition. To see the latest status of the provisioning task, click the on the toolbar. Refresh page icon 4. In the Provisioning Workflows section, you can expand your workflow and see in the Targets page, the list of resources on which that specific provisioning workflow is running and the provisioning workflow status. For further information on the target, you can click the target name and the related resource application is displayed. 5. If the provisioning task, that you have submitted, has multiple workflows, such as the Compliance Scan and Check provisioning task, the Provisioning Workflows table is populated with multiple entries. You can expand those entries to see the details of each workflow. In the Target tab, the Provisioning Workflow Log is populated with the deployment request ID. You can use this link to go to the Provisioning Workflow Status application and check the workflow status and the workflow log details. 6. (Optional) If you want to perform some actions on some instances of a provisioning task, from the Select Action menu, you can select one of the following actions depending on the provisioning task status: v Cancel Task. v Reschedule Task v Refresh Target List v Delete Task v Run Task Again v Run Reports
Results
You have monitored the provisioning task progress and, if needed, you have performed the appropriate actions on the task.
Procedure
1. Click Go To > Task Management > Provisioning Tasks > Provisioning Task Tracking. 2. In the list of provisioning tasks, locate the provisioning task whose list of targets you want to refresh. 3. Check that the provisioning task is not running and is not in completed status and select it. 4. From the Select Action menu click Refresh Target List.
Results
You refreshed the list of targets of the selected provisioning task and kept an accurate tracking of the provisioning task on all the targets involved.
1166
Procedure
1. Click Go To > Task Management > Provisioning Tasks > Provisioning Task Tracking. The provisioning tasks are displayed in chronological order. 2. Click the Advanced Search filtering option. The More Search Fields panel is displayed. close to Target. The Select Value panel is displayed. 3. Click Select Value 4. Select from the list one or more computers on which you want to track the running provisioning tasks. If you do not see your computer, it means that it does not have any provisioning task associated. 5. Click OK to go back to the More Search Fields panel. 6. (Optional) Specify a time interval, setting a start date and time and an end date and time, during which the provisioning tasks you want to monitor are running. 7. (Optional) Click Revise if you want to modify your current query using one of the following options: Clear Query and Fields to clear your existing query and all its current fields. Clear All Fields to clear all the current fields of your query. Change Query to redefine the query that your search is based on. Restore Default Query to perform a search based on the default query. The default query means taking into account all the objects which are defined in the system. 8. Click Find. A list of all provisioning tasks related to the specified computers is displayed. 9. (Optional) Click the Save Query option if you intend to perform this query again. v v v v
Results
You have monitored the progress of provisioning tasks which involve a specific computer or a subset of computers of your environment. For repeating tasks, the displayed start date refers to the date when the next task execution is scheduled.
Procedure
1. Click Go To > Task Management > Provisioning Tasks > Provisioning Task Tracking. 2. In the list of provisioning tasks, find the provisioning task that you want to rerun and click it. 3. From the Select Action menu click Run Task Again. The Run Task Again dialog opens.
1167
4. Specify the scheduling options. You can either decide to run the provisioning task immediately or set a start date. If you are scheduling a task, you can set in Start Window (minutes) the start time window, specified in minutes, after which the task is canceled if it could not be run. 5. (Optional) Select the Run task with failed target only check box if you want to rerun the provisioning task only against the failed target computers.
Results
You submitted again the provisioning task. The newly submitted task is displayed to be monitored.
To set a time limit for a provisioning task, perform the following steps:
Procedure
1. Click Go To > Task Management > Provisioning Tasks > Provisioning Task Tracking. 2. Locate the provisioning task that you want to run or rerun and click it. 3. From the Select Action menu, click Run Task Again. 4. Specify in Start Window (minutes) the start-time-window, specified in minutes, after which the provisioning task will be canceled if it could not be performed before the time window you set. Note: The start-time-window is not supported for hour and minute options. You can only specify a value in minutes. Otherwise the start window feature will not work. Note: The Start Window (minutes) field is pre-filled with the default value you specified in the Provisioning Global Settings application. Note: If you leave the Start Window (minutes) field empty, the scheduling function does not take into account a task time limit.
1168
Procedure
Click Go To > Security > Security Groups. Locate and open the security group you want to modify. Click the Applications tab. On the Applications list, click filter and under Description type Provisioning Task Tracking and press enter. 5. Double-click Provisioning Task Tracking. 6. Under Options for Provisioning Task Tracking select Run Task Again. 1. 2. 3. 4. 7. Click Select Action. 8. On the dialog, search for TPTSKOWRRUN. 9. Choose the TPTSKOWRRUN condition. . 10. Click Save 11. (Optional) Restarting the Tivoli Provisioning Manager server is recommended but not required.
Procedure
1. Click Go To > Task Management > Provisioning Tasks > Provisioning Task Tracking. 2. From the Select Action menu, select Refresh Interval. When the Provisioning Task Tracking page is loaded, the Off option is checked by default. 3. Select from the list the number of seconds you want for the refresh time interval of this page. 4. When the menu is closed, the refresh time interval is set.
Results
You have enabled an option to automatically refresh the Provisioning Task Tracking page according to the time interval set. The refresh time interval you set is maintained until you leave the Provisioning Task Tracking page. Next time you log on to the Provisioning Task Tracking application, the Refresh Interval option is set to Off again.
1169
Procedure
1. From the start center, click Graphical View on the Status of my recent provisioning tasks application. 2. Under the Status column, depending on the status of your provisioning task, one of the following numbers is displayed:
Option Status ID 0 1 2 3 4 5 6 7 8 9 10 11 12 Description Description Not started. Submitted. In progress. Suspended. Suspend pending. Resume pending. Cancel pending. Success. Timeout. Failed. Canceled. Canceled by condition. Scheduled.
1170
v v v v v v v
Software Installation task Software Uninstallation Software Upgrade Publishing Patches Acquire Patches Patch Distribution Install Windows Update Agent
Procedure
1. 2. 3. 4. Click Click Go To > Task Management > Provisioning Tasks > Provisioning Task Tracking. In the list of provisioning tasks, find the provisioning task that you want to edit and click it. From the Select Action menu, click Edit Task. It brings you to the original application, such as Patch Installation. You can easily add, remove, and modify the settings using the same interface with which you create the related provisioning task definition. 5. After modifying the provisioning task settings, click Submit to process the same provisioning task instance.
Results
You have modified the parameters of the provisioning task instance using the original application that created the provisioning task definition.
Procedure
1. Click Go To > Task Management > Provisioning Tasks > Provisioning Task Tracking. In the list of provisioning tasks, find the provisioning task that you want to reschedule and click on it. 3. From the Select Action menu click Reschedule Task. The Reschedule Task window is displayed and you can modify the computers on which to run the provisioning task and the scheduling. For example, if you scheduled a patch installation on multiple computers and you want to add additional target computers, you can update the patch installation task before the scheduled start time for the task. 2.
Results
You rescheduled the provisioning task to run on different computers and at a different time.
1171
You can cancel all the scheduled or running provisioning tasks that are in one of the following status: deployed, scheduled, submitted, in-progress. Before you canceled a provisioning task, review its details to identify the computers that were already changed by the provisioning task. The action to take depends on the type of change that you made and its impact. For example, if you canceled the deployment of a patch, it is not rolled back on systems where it is already installed. If you cancel a task that is in progress, the following steps occur: 1. For target computers that have started deployment, the deployment continues. Tivoli Provisioning Manager waits for currently running workflows to finish. During this time, the status of the task is Canceling. 2. When the currently running workflows are finished, pending workflows are canceled, and Tivoli Provisioning Manager changes the task status to Canceled. To cancel a task:
Procedure
1. Click Go To > Task Management > Provisioning Tasks > Provisioning Task Tracking. 2. In the list of provisioning tasks, find the provisioning task that you want to cancel. 3. From the Select Action menu, click Cancel Task.
Results
Any deployments for the provisioning task that are in progress are completed, and then the provisioning task is canceled.
Procedure
1. Click Go To > Task Management > Provisioning Tasks > Provisioning Task Tracking. 2. In the list of provisioning tasks, find the provisioning task that you want to delete. 3. Check that its status is one of the following: failed, success, timeout, cancelled, cancelled by condition. 4. Click Mark for Delete . 5. If you want to remove multiple tasks at the same time, you can either select Select Records and then multiselect the tasks that you want to delete or use the available filters to find the tasks you want to delete. After you selected the provisioning tasks to be deleted, select Delete Task from the Select Action menu. 6. If you are in the Task tab, to delete the provisioning task select Delete Task from the Select Action menu. 7. If the provisioning task status is scheduled or deployed, before deleting it you must cancel it by selecting Cancel Task from the Select Action menu.
1172
Results
You deleted the provisioning tasks that you did not want to be displayed in the list.
Procedure
1. Click Go To > Task Management > Provisioning Tasks > Provisioning Task Tracking. 2. From the Select Action menu, click Run Reports. 3. You can choose one of the predefined reports to display how many tasks have been started on a given date and are in a specific state or what is the state of all tasks. 4. A report request page is displayed, you can run the report immediately, schedule the report to be run at specific date and time, or repeatedly for a specified interval, and send the report to a list of people.
Results
A provisioning task report that provides provisioning task state information is generated.
What to do next
You can now use this report to monitor deployment, verify compliance, troubleshoot errors, and forecast future activity.
Procedure
1. To bookmark a provisioning task definition Click Go To > Task Management > Provisioning Tasks > Provisioning Task Definitions. To bookmark a provisioning task instance Click Go To > Task Management > Provisioning Tasks > Provisioning Task Tracking. icon next to the provisioning task description or Bookmarks at the 2. Click the Add to Bookmarks top of the List tab. 3. If you are in the Task tab, you can bookmark the current provisioning task by selecting Add to Bookmarks from the Select Action menu.
Results
You bookmarked a provisioning task that you can retrieve by clicking Bookmarks icon in the Provisioning Task Definitions or in the Provisioning Task Tracking applications. The bookmarked tasks are available by clicking the Bookmarks icon on the top of the List tab of the task management applications.
1173
Procedure
1. 2. 3. 4. Click Go To > Task Management > Provisioning Tasks > Provisioning Task Tracking. Identify and select the provisioning task to use to create a group. From the Select Action menu, click Create Group. Specify a name for the group.
5. Select one or more provisioning workflows that you want to perform on the target computers included in the group. 6. Select one or more states that the target computers must be included in the group.
Results
After the creation, the group is displayed in the List page of the Provisioning Groups application.
1174
v Create assisted workflows to integrate software deployment, software management, and patch deployment. You can use Jython scripting to run software product uninstall and device ping operations, or create your own custom Jython script to call any provisioning workflows. v Enable the Automation Scripts application in Tivoli Provisioning Manager for Jython to call in provisioning tasks. Information about how to use and import samples can be found in the IBM Service Management integration tutorial. v Close the loop of service request and work order/tasks. For more information about IBM Service Management, see the TPM 7.2 Enhanced integration with IBM Service Management tutorial .
Planning Time
v Add a task with provisioning classification to a work order. In Tivoli Provisioning Manager 7.2, we provide a Job Plan template that defines a provisioning task. When running an automated route from a work order to a service ticket, the Job plan automatically associates itself to the work order. You can customize the Job Plan template from the Job Plan application UI. v Attach Provisioning assisted workflow to the task. v A change manager or change owner, or a user with a provisioning administrator role can perform process manager operations from the process manager applications. For information about change management roles, refer to the Change and Configuration Management Database (CCMDB) documentation.
Execution Time
v Claim task and run assisted workflow to create a provisioning task. v Return to the base task from the provisioning task. v Execution steps can be performed by a user with the deployment specialist role. Note: In order to run an assisted workflow, in Tivoli Provisioning Manager 7.2, you need to implement it based on a work order task that is waiting for approval. You would have to get the work order task approved and the work order task is moved to 'In Progress' state before the assisted workflow can be executed.
Requirements
The base services included in Tivoli Provisioning Manager provide the basic capability to implement provisioning tasks in higher level processes. To take advantage of the full integration, the following products are recommended: v Tivoli Application Dependency Discovery Manager (TADDM) for discovery and generation of Globally Unique Identifiers (GUIDs) v Change and Configuration Management Database (CCMDB) for change and release management v IBM Tivoli Service Request Manager to manage service requests For more information about change, release, and service request management processes, see the ISM information center at http://publib.boulder.ibm.com/infocenter/tivihelp/v10r1/index.jsp. A prerequisite to working with work orders and related objects is to do initial data configuration for base services. You must follow the instructions in the topic Initial data configuration in the Change and Configuration Management database information center.
1175
Tasks can be created at any time during a process, as part of a work order or derived object (like change or release). When you create a work order, you typically create a sequence of tasks that is sufficient to define the overall structure of the work plan. Tasks are defined in greater detail during the Plan phase of a process. Related tasks can be grouped into activities as a way to efficiently organize the work plan. Tasks to be classified as provisioning tasks must be at the lowest level of granularity, when the activities have been broken down to a level where the task is owned by a specific person, affects a specific set of configuration items (CIs), and is implemented in a specific time window. All this refinement is done at the process manager level. To create a task, perform the following steps:
Procedure
1. Open the Plans tab in one of the following records: v The work order for which you want to create the task. Click Go To > Work Orders > Work Order Tracking. v The activity in which you want to place the task. Click Go To > Work Orders > Activities and Tasks. 2. Click New Row in the Tasks section. 3. Assign a Provisioning classification in the Classification field. Tivoli Provisioning Manager provides the following classifications: v Provisioning Task Definition Provisioning task templates which can be used to run scripts, provisioning workflows or activity plans. v Agent Installation v Software Installation v Patch Installation Additional attributes are added to the task when the classification is applied. Provisioning Task Definition ID Identifier for the provisioning task template associated with this task. Provisioning Task ID Identifier for the provisioning task instance associated with this task. These attributes are filled in when the assisted workflow runs. Alternatively, you can reuse existing provisioning tasks by filling in these IDs using the details menu for these attributes. 4. If the task involves configuration items such as sources or targets, or if it impacts one or more CIs, select the Implementation task check box. 5. Enter information into the other fields in the section as needed to define the task you are creating. 6. Click Save .
Results
The task is created. You can add tasks later to job plans, which are attached to a work order. The creation of a task on a job plan is similar to the process described above, except that it is done in the Job Plan application.
1176
The assisted workflow can be thought of as a kind of wizard. When you perform an assisted workflow task, applications that you need to perform the task are opened in the correct order, and the applications are prepared for the performance of the task. Tivoli Provisioning Manager includes a predefined assisted workflow that you can use to automatically create a provisioning task from a task. This assisted workflow creates the necessary provisioning objects, filling in the additional attributes for the task, and converting any information in the task which can be reused in the provisioning task. This information includes: v Target configuration items (CIs) v Scheduled start date The conversion of targets CIs to data model objects depends on these objects being linked with a Globally Unique Identifier (GUID). To meet this requirement, Tivoli Application Dependency Discovery Manager (TADDM) must discover computers which are loaded into Change and Configuration Management Database (CCMDB) as Actual CIs. These Actual CIs must be promoted to Authorized CIs. On the Tivoli Provisioning Manager side, TADDM discovery must be run to create data model objects for these computers with GUIDs. When both sides have the objects with the same GUID, they are automatically linked together. This linkage can be seen in the Provisioning Computers application as well as in the Configuration Items Application. To attach the assisted workflow provided with Tivoli Provisioning Manager to a task, perform the following steps:
Procedure
1. Open the task that you want to modify. v In the work order that you created in Adding provisioning tasks to processes on page 1175, click beside the Reference WO field and select the task. Detail Menu v Click Go To > Work Orders > Activities and Tasks. Search for the task and click the name in the search results. beside the Assisted Workflow field, and click Select Value 2. In the task, click Look Up 3. In the Select Value widow, filter for TPCREATTASK and select it. 4. Specify any additional details for the task as required: .
v You can select a scheduled start for the task. If you do so, this information is converted and handled by the provisioning task. v If you have CIs that are affected by this task and are linked to data model objects, select them in the target list. 5. Save the task.
Results
The assisted workflow is attached to the task. The task planning is complete, and can be implemented using a provisioning task. At this point the task can be assigned to an specific owner and it state can be changed to approved or in progress. The assignment of owner to the task and the state of the task is part of the overall process management, and is not automated or enforced by Tivoli Provisioning Manager. In order to claim and initiate a provisioning task, the user who claims the task must belong to the MAXADMIN, TPADMIN or TPDEPLOYMENTSPECIALIST group.
1177
Typically, you run the assisted workflow only once to execute the task in a overall process. The TPCREATASK assisted workflow provides the following functionality: v Creates the necessary provisioning objects and attempts to convert the target configuration items (CIs) and scheduled start date of the base services task to the equivalent attributes on the created provisioning object. v Links the base services task with the provisioning objects by filling in the classification attributes: Provisioning Task Definition ID Provisioning Task ID v Opens the provisioning application that handles this specific classification of task. Reusing task definitions or tasks For TPTASKDEFINITION classification: v If you reuse a task definition (providing a value for TPTDEFID either from a previous run or manually filling it in), the assisted workflow will attempt to reuse the existing task definition (and any predefined workflows and default parameters included in it). v If you also include a task (by providing a value for TPTASKID), the assisted workflow will still create a task and replace this TPTASKID number, but it will attempt to reuse the targets from the original TPTASKID. If target CIs are available in the base task, these targets will take precedence and be used in the new task. For all other provisioning classifications: v If you reuse a task (by providing a value for TPTASKID), and that task is in a final state (failed, successful, cancelled, timeout), a copy of this task will be created so that its parameters can be reused. Target CIs specified in the base task override reused task targets. v Otherwise, the same task will be reused by the assisted workflow. To claim and run a provisioning task as part of a process, perform the following steps:
Procedure
1. On the Start Center in the My Tasks section, click the name of the implementation task. The Activities and Tasks application opens the task and information about the task is displayed. If this is a provisioning classified task, the TPCREATASK assisted workflow must be attached to the base services task, with TPCREATASK displayed in the Assisted Workflow field. In addition, the Start Assisted Workflow button is enabled. Alternatively, you can go directly to the Activities and Tasks application and filter the list to find the task. 2. Click Start Assisted Workflow to launch the appropriate Provisioning application which handles this classification of task. 3. Information from the original task is converted and filled in for you in the provisioning task when available. Enter any additional required fields for the task and submit the task. You can override settings converted from the original task as required, such as the scheduled start time. When the classification selected for the ISM task is TPTASKDEFINITION, the assisted workflow will open the task definitions application. In this application, task definitions can be created, and instances of these definitions can be run as tasks. First, you will need to provide additional information about this task definition (such as a workflow name and target parameter) and save it. After that, when you select to Run Task Definition, any information passed from the ISM task (that is, target CIs and schedule) will appear in the Run dialog. Note: If you select Activity Plan as the type of the task definition, you will use the Activity Plan Editor to create the task definition. Information about targets coming from the ISM task are not passed to this editor, so you will need to specify a target for the activity plan created. The target (if any) converted from the ISM task will be available when you Run Task Definition.
1178
Results
You can check the status of the provisioning task in the Provisioning Task Tracking application. It is possible to return from that provisioning task instance to the Activities and Tasks application for the equivalent task by selecting Go To Activities and Tasks from the detailed menu of the base services task field.
Procedure
1. Check the Default Value for the Work Order Number: a. Click Go To > System Configuration > Platform Configuration > Database Configuration. b. Search for an object WORKORDER. c. Click the object WORKORDER, then click the Attributes tab. d. Verify the following: v The Default Value is set to &AUTOKEY&. If not, change the value to &AUTOKEY&. Click Admin mode, then click Apply Configuration Changes, turn off Admin mode after the configuration change is applied. v Autonumber is set to WORKORDERNUM. If not, write down the name and remember it for later. v If the work order number needs to be longer than 10 (including the prefix), you need to change the Length. Click Admin mode, then click Apply Configuration Changes, turn off Admin mode after the configuration change is applied. Note: The Length is Prefix + the numeric value of 1xxx. As an example, if the Prefix is ABC, and the numeric value is 1234, then the Length would be 7. 2. Set the Prefix to the Work Order Number for each of the sites. a. Click Go To > Administration > Organizations. b. List all of the Organizations, and perform the following steps for each organization: 1) Click the Organization. 2) Click Select Action > Autonumber setup > Organization Level. 3) Search for WORKORDERNUM. If the value of WORKORDERNUM was different, use that value instead. 4) Set the Prefix. The maximum length is 6 by default. If your numeric value is 4, then the Length would be 10. 3. Verify that the Work Order Number appends the Prefix. a. Log on as a user whose default site is what is configured above. b. ClickClick Go To > Work Orders > Work Order Tracking. c. Click the New Work Order icon. d. Verify that the Work Order contains the Prefix which was defined.
Results
The Work Order Number is now set.
1179
Procedure
1. Verify that all requirements for the scenario were met as described in Requirements on page 1160. 2. If an error message with a message ID is displayed, search for the message ID in the information center or see the Tivoli Provisioning Manager Troubleshooting Guide for a description of the error message. 3. If a provisioning task fails during the tutorial, check any error messages generated by the provisioning workflows that are part of the task. For more information, see the Viewing workflow execution status from the Web interface topic. 4. Check the log files for error messages. The following log files contain information for the scenario:
Table 212. Log file locations Log file Deployment engine logs Log description Contains diagnostic information for the deployment engine. Contains diagnostic information about the scalable distribution infrastructure jobs that are running on the target computer. Location
Windows UNIX
%TIO_LOGS%\console.log
Linux
$TIO_LOGS/console.log
Windows UNIX
%TCA_HOME%\logs\trace-log-0.xml
Linux
$TCA_HOME/logs/trace-
log-0.xml
Contains the history of Viewing provisioning workflow logs provisioning workflows recorded in the provisioning workflow logs.
5. Check the Tivoli Provisioning Manager Support technotes and FAQs or the latest available fix pack readme file for information about known issues or updates to the documentation.
Causes
The default encoding used by the Tivoli Provisioning Manager server is not UTF-8.
1180
1. On the Tivoli Provisioning Manager server, add the line -Dfile.encoding=UTF-8 to the TPM.javaopt file located in the %TIO_HOME%/lwi/conf/overrides directory. 2. Restart the Tivoli Provisioning Manager server.
Symptoms
The Tivoli Provisioning Manager web interface does not refresh with new data. In addition the SystemOut.log file (%WAS_HOME%\logs) displays the following out of memory exception under base services:
java.lang.OutOfMemoryError at java.net.InetAddress.getLocalHost(InetAddress.java:1463) at com.ibm.db2.jcc.t4.b.k(b.java:3473) at com.ibm.db2.jcc.t4.b.Uc(b.java:2283) at com.ibm.db2.jcc.t4.b.b(b.java:716) at com.ibm.db2.jcc.t4.b.a(b.java:409) at com.ibm.db2.jcc.t4.b.<init>(b.java:345) at com.ibm.db2.jcc.DB2Driver.connect(DB2Driver.java:197) at java.sql.DriverManager.getConnection(DriverManager.java:572) at java.sql.DriverManager.getConnection(DriverManager.java:165) at psdi.server.DBManager.createConnection(DBManager.java:653) at psdi.server.DBManager.createUserConnection(DBManager.java:596) at psdi.server.DBManager.getConnectionDetail(DBManager.java:1293) at psdi.server.DBManager.getConnection(DBManager.java:1179) at psdi.server.AppService.getDBConnection(AppService.java:549)
The out of memory exception results because of accumulating web interface sessions / transactions during an inconsistent database connection.
Causes
The Tivoli Provisioning Manager losses connection to the database because of an outdated IBM WebSphere Application Server JDBC driver used by base services.
$TIO_HOME/lwi/runtime/tpm/eclipse/plugins/tpm_pmp/maximoLibs to $MAXIMO_HOME/maximo/applications/maximo/lib
UNIX
Note: For the default location of MAXIMO_HOME, click here. 2. Rebuild and redeploy the Maximo ear file by following steps 8 to 23 outlined in section 2.6 of the Tivoli Provisioning Manager 7.1.1: A DBMS Movement Solution white paper.
1181
Symptoms
A provisioning task cannot be scheduled and submitted from the web interface.
Causes
The activity plan was saved as a draft, which can only be done in the Activity Plan Editor.
5. Click Schedule to specify some scheduling options for the provisioning task. 6. Click Submit to run the provisioning task.
Symptoms
You cannot delete multiple provisioning tasks in the Provisioning Task Definitions application and instead receive an information message that tells you that shared provisioning tasks can only be deleted by their owners.
Causes
Shared provisioning tasks can only be deleted by their owners. If the provisioning tasks that you have selected include shared provisioning tasks created by other owners, you cannot delete them directly.
This action will unshare the provisioning task for the current user, and the shared provisioning task will be removed from the current list.
1182
Symptoms
If the Tivoli Provisioning Manager server was interrupted in any way (for example, due to a power failure or the deployment engine being stopped) while a task is in progress, that task remains in progress even after Tivoli Provisioning Manager recovers. Any objects that the task is holding will not be released.
Causes
When the provisioning server is reset, tasks that are in progress will fail with a Java Virtual Machine error.
Symptoms
The following error occurs when a task is running:
>@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY! Someone could be eavesdropping on you right now (man-in-the-middle attack)! It is also possible that the RSA host key has just been changed. The fingerprint for the RSA key sent by the remote host is 4c:e2:db:b3:38:de:5f:f3:54:34:47:50:33:a0:be:86. Please contact your system administrator. Add correct host key in /home/tioadmin/.ssh/known_hosts to get rid of this message. Offending key in /home/tioadmin/.ssh/known_hosts:3 RSA host key for 9.23.17.47 has changed and you have requested strict checking. Host key verification failed.
Causes
1183
This error occurs when SSH between the provisioning server and the target computer detects a change in the RSA key. For example, this might occur when a particular target computer is re-imaged, because then the SSH keys would no longer match with the keys from the provisioning server. It is a built-in SSH mechanism that prevents access from other computers that try to impersonate a known computer. This error message tells the system administrator that the target computer is no longer the same. If the system administrator determines that the computer is not an offending computer (which is the case when re-imaging) then the provisioning server provides a convenient way to solve this.
This workflow will remove the existing keys of the target computers from the provisioning server. After running this workflow, the error will not occur when the task is run again.
Symptoms
If you do an install software task using the following steps, the task will fail: 1. Go to IT Infrastructure > Software Catalog > Software Product Import. 2. Enter the data for all of the fields. 3. Select Windows OS. 4. Select Custom Extract and Install. 5. Set the Configuration template parameter for the created software product as:
Extract command - unzip <file name> Install command - <file name> -q
6. Run the task on a Windows computer with Cygwin installed. The following message appears:
COPCOM123E A shell command error occurred: Exit code=1, Error stream="Access is denied", Output stream=""
Note: v The file will extract using the unzip command but the extracted file does not have read and run permissions. v The workflow will assign the required permissions for the extracted file.
Causes
This is caused by the coexistence of Windows and Cygwin while using the extraction utility. The extraction utility will not correctly set the permission of unpacked files when Cygwin is installed.
1184
Symptoms
After you run the clean-up-deployment-requests command, the following deployment task error message occurs:
COPDEX029E The system cannot continue the deployment request from a previous deployment engine JVM session.
Causes
Another user has already run the clean-up-deployment-requests command on the provisioning server.
1185
1186
Discovery Configurations Discovery reports show the last discovery scan results by target computer and discovery scan type. Provisioning Task Tracking Provisioning Task Tracking reports show the tasks that are in a specific state and show the status of all tasks. Provisioning Global Settings Provisioning Global Settings reports show information about event notification for users. Provisioning Workflows Provisioning Workflows reports show summary information about the workflows that have been run. Virtualization Management Virtualization Management reports show information about virtual servers and their host platform servers. Saving report results All reports and report results can be saved to allow you to run a report again or see past results at any time. You can run a report immediately or schedule the report to run at a later time. If you schedule the report to run at a later time, the report results are sent in a PDF file to the specified email address. Reports can only be saved in either PDF or comma-separated value (CSV) format. Saving reports in HTML format is not supported. When you save a report in CSV format, only the data contained in the top-level report is saved. The subreports within a report are not saved. Go to each subreport report and save the report in CSV format to obtain all of the information. For example, if you run a report to get server details and save the report
Copyright IBM Corp. 2003, 2011
1187
in CSV format, only two fields are saved: server name and server ID. The other networking and resource details contained in the subreports are not saved. If you want to save hardware information or the status of the target provisioning computers, select and run these two reports directly, and then save the reports in CSV format. Tip: Viewing run reports Administrators can view the history of all reports that have run in a selected time frame. 1. Click Reports > Administration > Reporting > Report Administration. 2. Click the Report Usage report. 3. Enter the required information in the Request Page. 4. Click Submit. Note: Creating and running your own reports can affect system performance. When you are creating reports, including too many objects in the reports reduces your system performance. Use filters, if possible, to minimize the effect on system performance. For more information, see the Maximo Report Performance Guide. To access this guide, go to http://www-01.ibm.com/software/sysmgmt/products/ support/IBMMaximoAssetManagement.html and search using document reference number 1305031. You can set up a secondary database to move the workload of running reports to a second database, replicating the production database. Setting up the secondary database minimizes the performance impact on your production database. For information about how to set up a secondary database, go to http://www.ibm.com/support and search using document reference number 1304936. For more information about running reports, customizing reports, and creating new reports in BIRT (Business Intelligence and Reporting Tool), see the Report Developer Guide in the information center. You can also access useful information about reports in the following documentation, available at the IBM Support website http://www-01.ibm.com/software/sysmgmt/products/support/ IBMMaximoAssetManagement.html: v Configuring BIRT Designer 2.3.2 with V7 Products (document reference number 1390372) v V7 Reporting Feature Guide (document reference number 1305020) v Designing V7 Reports (document reference number 1305009) v Tivoli Provisioning Manager Reporting white paper (http://www-01.ibm.com/software/brandcatalog/ ismlibrary/details?catalog.label=1TW10107Y) You can access up-to-date articles and information about developing reports from the Maximo wiki https://www.ibm.com/developerworks/wikis/display/maximo/Reports. Related concepts Creating ad hoc reports on page 1196 Running reports on page 1200
1188
Note: Only the MAXADMIN security group has the authority to give other groups access to specific reports. Generate Request Pages Before you can run a report, you need to load the necessary XML presentation files for the report request page. This is known as generating the request page for the report. You do this once for each report. The request page for a report displays selections that a user can make. A user can specify the following information: v Report parameters. v Schedule report to run. You can run the report immediately, run it at a specific date and time, or run it on a specified interval. v Send the report results to other users using email. The request page must be generated for predefined reports and newly imported reports. To generate the request pages for reports, follow these steps: 1. Click Go To > Administration > Reporting > Report Administration. 2. You can click Generate Request Pages to generate the request pages for all reports. Alternatively, if you want to generate the request page for a particular report, search for the report that you want to run. Then click on the report file name and click Generate Request Pages. When the request page has been generated, you can run the report. Note: After you have generated the request page for a report, if you change the report parameters, you must generate the request page for that report again. If you do not generate the request page again, you will see the previous report request page when you run the report. Ensure that you can receive scheduled reports If you schedule reports to be run at a later date and time, the report results will be sent to the specified email address. There are two areas that need to be defined so that you can receive report results by email: 1. SMTP mail server properties. Ensure that a valid email server is defined in the system properties. a. Click Go To > System Configuration > Platform Configuration > System Properties. b. In the Global Properties list, find the mail.smtp.host property. c. Expand the mail.smtp.host property and define a valid email server in the Global Value field. For example, na.relay.ibm.com. . d. Click Save e. Select the check box beside the Global Property that you have just changed f. Click Live Refresh Note: You cannot specify the SMTP user name and password for the SMTP server. This is a limitation for the current release. For more information about system properties, see the System Administrator Guide. 2. Email address. You must have a valid email address defined in your user profile, even if you are planning to send the reports to another user. The reports are sent from your email address. a. Click Go To > Security > Users. b. In the Users list, locate and click your user name. c. Enter a valid email address in the Primary Email field.
1189
Remember: If you manually add an email address to a user profile, and there is a different email address configured in the LDAP server, the email address that you manually entered will be overwritten during any synchronization with the LDAP server. Contact your system administrator for more information. d. Click Save .
Running multiple reports at the same time The recommended number of reports to schedule to run at the same time is 5 or fewer. This will ensure that you receive the results for all of the scheduled reports. The value of the global setting mxe.report.birt.maxconcurrentrun specifies this recommendation. It considers that some reports might take longer to run than others, so if you schedule more than five reports to run, you might not get results for all of the reports. For example, if you schedule 10 reports to run and one of the reports takes longer to run, the other reports might complete after the scheduled time and therefore be cancelled. To view the global setting, click Go To > System Configuration > Platform Configuration > System Properties. Related tasks Reporting extended attributes on page 1202
Predefined reports
Use the predefined reports to quickly and easily retrieve information for common inquiries. There are predefined reports in several of the applications. Any of the predefined reports can be edited or copied so that you can customize the report to return specific results. Predefined reports are available for the following applications: v Provisioning Computer reports v Provisioning Groups compliance report on page 1193 v Patch reports on page 1193 v v v v v v Discovery Configuration reports on page 1194 Provisioning Task Tracking reports on page 1194 Provisioning Global Settings report on page 1195 Provisioning Workflows report on page 1195 Virtualization Management report on page 1195 Other reports on page 1196
Tip: To search for a specific predefined provisioning report, click Go To > Administration > Reporting > Report Administration. Search for the report by Report Name, Description, or Application. Related tasks Reporting extended attributes on page 1202
1190
tp_ patchCompliance.rptdesign
What is the patch compliance This report displays the patch compliance results of all result of all provisioning provisioning servers. servers? Who receives compliance notifications? What is the result of the security compliance check? What servers have patches approved for installation? What patches are missing on what servers? Do Windows servers comply with the patch policy? What patches are missing on what Windows servers? What is the software configuration compliance result of all provisioning servers? This report displays the users who receive compliance event notifications. This report displays the security compliance check result. This report displays the servers that have patches approved for installation. This report displays what patches are missing on what servers. This report displays whether Windows servers comply with the patch policy. This report displays the patches that are missing on Windows servers. This report displays the compliance result for software configurations on all provisioning servers in the data model.
Chapter 14. Managing reports
tp_complianceNotification.rptdesign
tp_securityCompliance.rptdesign
tp_patchApproved.rptdesign
tp_patchMissing.rptdesign
tp_patchComplianceForWindow.rptdesign
tp_patchMissingForWindows.rptdesign
tp_softwareConfigurationCompliance.rptdesign
1191
Description
Report Detail
What provisioning groups do This report identifies the not have compliance checks? provisioning groups that do not have compliance checks. What servers do not have compliance checks? This report displays a list of all provisioning servers in the data model that do not have compliance checks. This report identifies the number of servers that are installed with each operating system. This report lists the provisioning servers This report displays a list of all provisioning servers and the hardware that is installed on them. This report identifies provisioning servers that have patches installed on them. This report identifies all of provisioning servers in the data model. This report shows all of the information about provisioning servers. This report identifies the software that is installed on each provisioning server.
tp_noComplianceCheck.rptdesign
tp_osOnServerChart.rptdesign
How many servers are installed with which operating systems? What is the status of all provisioning target computers? What hardware is on what server?
tp_endpoints.rptdesign
tp_hardware.rptdesign
tp_patches.rptdesign
tp_servers.rptdesign
What servers are in the data model? What are the server details, including networking and other resource details? What software is installed on what servers?
tp_serverDetails.rptdesign
tp_software.rpt
tp_virtualServers.rptdesign
How many virtual servers are This report identifies the virtual servers that are created on a specific host installed on a specific host platform server? platform server. What patches are installed on This report displays patches what servers? that are installed on servers, listed by patch name. What common agent is This report displays agent installed on what computers? information for the Tivoli Common Agent that is installed on each provisioning server. What is the maintenance window for TCA agents? This report displays the maintenance window information for the target computers which have a maintenance window definition.
tp_patchesOnServers.rptdesign
tp_tcaOnComputers.rptdesgin
tp_maintenanceWindow.rptdesign
1192
Patch reports
Patch reports show successful and failed deployments of software and the status of patches, which include deployments in progress, not yet started, successful, failed, and submitted.
Report File Name tp_deploymentSummaryChart.rptdesign Description What is the status of all software deployments? Report Detail This report displays the status of software deployments has been deployed within a given date range. The status includes software deployments that have succeeded, have failed, have been Canceled, have been scheduled, or that are in progress.
tp_softwareDeployment.rptdesign
What is the status of software This report displays what deployments that ran on each software deployment ran on server? specific servers and the status of the software deployment. Optionally, this report can be filtered by the target deployment status. What is the status of patch deployments? Given a date range, this report displays how many patch deployments have been deployed successfully or have failed, have been Canceled or scheduled, or are in progress. This report displays the patch deployments that ran on specific servers. Optionally, this report can be filtered by the target deployment status. This report displays all patches in the data model. This report displays the servers that have patches approved for installation. This report displays whether Windows servers comply with the patch policy.
tp_patchdeploymentSummaryChart.rptdesign
tp_patchDeployment.rptdesign
tp_datacenterPatches.rptdesign tp_patchApproved.rptdesign
What patches are in the data model? What servers have patches approved for installation? Do Windows servers comply with the patch policy?
tp_patchComplianceForWindows.rptdesign
1193
Report Detail There are two tp_patchMissing.rptdesign reports, one for the TPMSERVERS application, one for the TPSWPATCH application. These reports display what patches are missing on what servers. You might have to generate request pages for each of these reports separately. This report displays the patches that are missing on Windows servers. This report displays servers that have patches installed.
tp_patchMissingForWindows.rptdesign
What patches are missing on what Windows servers? What servers have what patches installed?
tp_patches.rptdesign tp_patchesOnServers.rptdesign
What patches are installed on This report displays patches what servers (list by patch that are installed on servers. name)? What is the patch compliance This report displays the patch result of all provisioning compliance results of all servers? provisioning servers.
tp_ patchCompliance.rptdesign
tp_objectsDiscovered.rptdesign
What objects were discovered This report displays the by what discovery objects that were discovered configuration? by a particular discovery configuration. Optionally, this report can be filtered by the object type.
1194
Report Detail This report displays the status of all tasks or tasks of a specified status.
tp_pauseResume.rptdesign
What are the task targets and This report displays task the maintenance windows information for the information for each target? provisioning task target computers, as well as maintenance window information for each task target computer.
How many virtual servers are This report identifies the created on a specific host virtual servers that are platform server? installed on a specific host platform server.
1195
Other reports
This report displays the login history of the different users on the Tivoli Provisioning Manager server.
Report File Name tp_loginTrackingDetail.rptdesign Description What is the user history on the server? Report Detail This report displays the login history of the different users on the Tivoli Provisioning Manager server: v Users who logged on v Users who logged off v Times users logged on and off v The client on which users logged on and off It identifies user information such as login ID and login name. It identifies the result of the login attempt, for example, login, logout, restart, timeout. It also identifies the time stamp and client host from which the user performed the action.
1196
1197
4. Click the Select tab and complete the following actions: a. Select the Apply the Current Query and Filter from the Application? check box if you want to run the report based on the filter or query that has been applied for the application level. Each application can have a query associated with it or it can have a current filter to limit the object entries in that application. For example, you can filter by computer name, or sometimes status. Clear this check box to query everything in the view. If you select this check box you might get unexpected results. Unexpected results can occur because conditions might be appended from the application in which you are creating the report. If you get these unexpected results, they are displayed as a Dynamic Where Clause field in the report, followed by the query applied. b. From the report object structure tree, select TPSOFTWAREPATCH. The available fields for the TPSOFTWAREPATCH report object structure appear in the Available Fields list. c. Add Device model Id to the report by clicking the associated Select Field icon. Device model Id opens in the Selected Fields list. Note: The Selected Fields list might be pre-populated with default values. You can keep these values and add others or you can remove these values and add your own. From the report object structure tree, select the COMPLIANCE_PATCH_VIEW report view object. The available fields for the COMPLIANCE_PATCH_VIEW report view object appear in the Available Fields list. Click the Select Field icon for OS_NAME and OS_VERSION. OS_NAME and OS_VERSION appear in the Selected Fields list. Click the Select Field icon for IS_COMPLIANT. It is added to the Selected Fields list. Use the Column Order and Report Label fields to define the order in which you want the fields to appear on the report. To change the order and name for a field, select the field and change the value.
d.
e. f. g.
Note: If you are not sure about the properties for particular report object structures or report view objects, you can access descriptions from the Database Configuration screen. Click Go To > System Configuration > Platform Configuration > Database Configuration. In the Object field on the Database Configuration screen, type the name of the report view object for which you want a description and press Enter. The description is displayed on the screen. 5. Click the Format tab and arrange the appearance and formatting of the report. See the Maximo documentation for information about how to format your report. 6. Click the Submit tab to specify when you want to run the report and enter the values. See the Maximo documentation for information about how to enter values in the Submit tab. 7. Click the Submit button to run the report. Related concepts Chapter 14, Reports, on page 1187 Report object structures and report view objects
1198
Currently, not all provisioning applications have ad hoc reporting functionality enabled and therefore not all provisioning applications have corresponding report object structures. Report view objects are predefined views from which you can query and select columns. Report view objects are nested within a report object structure and you can only access report view objects from within a report object structure. Normally, there are several report view objects available within each report object structure. For each report view object, there are several fields that you can select for inclusion in your ad hoc report. The predefined report object structures and report view objects provide you with easy access to commonly used database objects within provisioning applications. Using the report object structures and report view objects, you can create custom ad hoc reports that provide you with the specific information that you require in your reports. When you create ad hoc reports in provisioning applications, you can select report view objects and combine them with other report view objects. You can access report object structures and associated report view objects for the following provisioning applications: v Provisioning Computers v Patches v Provisioning Task Tracking v Discovery Configurations You can access the report object structures and report view objects to create ad hoc reports, as follows: v From the Reports menu item on the Start Center. From the Reports menu, you can select each of the provisioning applications that have the ad hoc report creation feature, as follows: Reports->Provisioning Reports->Discovery Configurations Reports->Provisioning Reports->Patches Reports->Provisioning Reports->Provisioning Computers Reports->Provisioning Reports->Provisioning Task Tracking v Using the Create Reports icon in the following provisioning applications: Discovery Configurations Patches Provisioning Computers Provisioning Task Tracking v From the Select Action menu within provisioning applications, you can select Run Reports->Create Report for the following provisioning applications: Discovery Configurations Patches Provisioning Computers Provisioning Task Tracking
1199
Running reports
You can run predefined reports and ad hoc reports. You use the same procedure to run all reports, whether they are ad hoc reports that you created or predefined reports. Before you can run any reports, you need to generate the request pages for the report.
Prerequisites
Before you can run any predefined or newly imported reports, you need to generate request pages. You do this once for any report or you can generate the request page for all reports at one time. To generate request pages for reports, complete the following: 1. Click Go to->Administration->Reporting->Report Administration. 2. You can click Generate Request Pages to generate the request pages for all reports. Alternatively, if you want to generate the request page for a particular report, search for the report that you want to run. Then click on the report file name and click Generate Request Pages.
1200
1201
4. Click the Submit tab and specify the options for running the report. 5. Click the Submit button to run the report. The report runs. Related concepts Chapter 14, Reports, on page 1187 Report object structures and report view objects on page 1198
Procedure
1. Create a separate report that lists out all, or selected, extended attributes of a specified object. 2. Change a predefined report, for example, change the How many servers are in the data model? report to link to the separate report and pass the ID of the server to the separate report.
Example
The query of this report is shown below:
select from where and ; property, property_value object_properties_view dcm_object_id = ? property in (extended attribute name 1, extended attribute name 2, ...)
If you can impose a naming convention on the name of extended attributes, for example, always starting the naming with extended_, the report query can be simplified. With this simplified query, this report can be used to list all the extended attributes of any object.
select from where and ; property, property_value object_properties_view dcm_object_id = ? property like 'extended_
If you want to use extended attributes to group predefined reports, first copy the predefined reports and then change the SQL statement to join with the object_properties_view and select the properties that you want. Use the Business Intelligence and Reporting Tools (BIRT) report designer to add the extended attributes to the report and group on the extended attributes.
1202
Procedure
1. Use the Configuration Item Details report to see all the extended attributes of all Configuration Items 2. Copy the Configuration Item Details report and change it to add a report parameter that accepts a Global Unique Identifier (GUID) string, and change an applicable predefined report to link to this changed report.
Example
For the second option, the SQL statement of the Configuration Item Details report needs to be changed as shown below:
select ci.status, ci.assetnum, ci.cinum, ci.description, longdescription.ldtext, ci.location, ci.itemnum, ci.assetlocsiteid, ci.assetlocorgid, ci.itemsetid, ci.service, ci.servicegroup, ci.classstructureid, ci.actcinum, ci.cilocation from ci, left outer join actci, on ci.actcinum = actci.cinum LEFT OUTER JOIN longdescription ON longdescription.ldownertable = CI and longdescription.ldownercol = DESCRIPTION where actci.guid=? ;
If you want to use extended attributes to group predefined reports, copy the predefined reports and change the SQL statement to join with following tables to select the Configuration Item attributes that you want: v actci on GUID v ci table on actcinum v cispec on cinum Also, use the BIRT report designer to add the extended attributes to the report and group on the extended attributes.
1203
Tivoli Provisioning Manager provides key performance indicators for the following: v Successful automation tasks (any provisioning task, per target computer) v Successful patch deployments v Successful software deployments v Successful servers provisioned (includes virtual servers created using Create Virtual Server and includes servers built by installing an operating system, for example, bare metal installations using Tivoli Provisioning Manager for Operating System Deployment) For software and patch deployments, the KPIs indicate the number of successful deployments per target computer. So if you completed a patch management task on 20 target computers, the KPI would display as 20 successful deployments.
Procedure
1. Log on to the Tivoli Provisioning Manager web user interface. 2. Click the tab for the Provisioning Administrator. 3. Click Update Start Center. Note: You can only load the graph for the KPIs for the Provisioning Administrator Start Center. For each of the other provisioning roles, you manually add the graph for the KPIs. 4. Click Yes to confirm.
Results
The KPIs are loaded in the Start Center for the provisioning administrator and you can begin using them. You can refresh the data for any KPI by clicking Update. For any other provisioning role, you can manually add the graph for the KPIs.
Procedure
1. From the Start Center, click the provisioning role for which you want to add KPIs, for example, Deployment Specialist. 2. Add the business value KPI for the Deployment Specialist, as follows: a. Click Change Content/Layout. b. From the Right Column section, click Select Content.
1204
c. Click KPI Graph. d. Click OK. You return to the Start Center and the graph with the KPIs is displayed. 3. Click Edit Portlet to open the configuration screen, from which you can configure the KPIs. 4. Make changes to the KPI, as required: v To change the display name of the KPI, enter the name in the Display Name field. v To remove a task from the KPI list, click the Delete icon. v To add new tasks to the KPI list, click Select KPIs. From the dialog box that displays, search for and click the KPI that you want to include in the list. You can add any KPI to any role. v Click OK. 5. Click Finished.
Results
The KPIs that you want to include are displayed in the Start Center. Repeat this procedure for each of the other provisioning roles, as required.
Symptoms
Reports that are exported to Comma Separated Values (CSV) file format can then be imported to spreadsheet applications, such as Microsoft Excel. When trying to import non-English CSV reports into Excel , the text becomes garbled.
Causes
CSV files are written in UTF-8 format (abbreviation for Universal Transformation Format). UTF-8 converts 16-bit unicode characters into 8-bit ASCII characters. Microsoft Excel does not currently support UTF-8 in CSV format.
1205
b. In the second step, clear Tab and select Comma. c. Click Finish before going to step 3. After performing the steps described previously, the CSV report can be opened in Excel with all characters displayed properly. Solution 2: 1. Open the <Report_name>.csv file in Notepad, and then save it as ANSI, renaming it to <Report_name>_ansi.csv. 2. Open the<Report_name>_ansi.csv file in Excel. The characters are properly displayed. Solution 3:You can convert the CSV file from UTF-8 to native encoding using a code conversion tool. You can use the native2ascii command line utility that is provided with the Java JDK toolkit. The tool can be found in the %WAS_HOME%/AppServer/java/bin directory. 1. Open a command prompt window, and change directories until you reach the location of the native2ascii tool. Alternatively, you can set the value of Path, the system variable for the operating system, to include the location of the Java JDK toolkit. 2. Enter the following command:
native2ascii -encoding UTF-8 <Report_name>.csv | native2ascii -reverse -encoding <Language_code> > <Report_name>_output.csv
where<Language_code> is the locale code for the language that you are interested in. For example, GB2312 is the code for simplified Chinese. 3. Open the <Report_name>_output.csv file in Excel. All characters are properly displayed. Instead of running the previous command more than once for converting more CSV files, you might want to create a script file that uses the command in step 2 and specifies the names of all the CSV files that require conversion. You can run the script to convert all the required files at once. In addition to the solutions described previously, the following operating system and Excel requirements must be met before the characters are displayed properly: Operating system requirements Try matching the language of the imported CSV report with the operating system language. For example, for Japanese, try importing the file on a computer that is running a Japanese operating system. If you cannot meet this requirement, set the user locale of your system to the language of your choice, so that you can use the standard settings for that language. To do this, perform the following steps: 1. Click Start > Settings > Control Panel, and then open Regional Options. 2. On the General tab, change the user locale to the language you are interested in. 3. Click OK. Excel requirements You can set the Microsoft Office language settings to the language of your choice by performing the following steps: 1. Click Start > Programs > Microsoft Office Tools > Microsoft Office XP Language Settings 2. On the Enabled Languages tab, set the Default version of Microsoft Office to the language of your choice. 3. Ensure that the language that interests you is on the Enabled languages list: a. In the Available languages list, click the language that interests you. b. Click Add to add the selected language to the Enabled languages list. c. Click OK.
1206
Symptoms
Unknown characters appear when generating a report that contains double-byte characters (for example, Cyrillic, Chinese, or Japanese characters) after exporting the report as CSV file.
Causes
Some applications do not support UTF-8 encoding or open CSV files (that use UTF-8) using ASCII encoding, which results in garbled text being displayed.
Symptoms
When you run a report that provides detailed information, only some of the results are printed in the exported report in Common Separated Value (CSV) format. For example, if you run the report called tp_serverDetails.rptdesign to see server details (including networking and other resource details) the exported CSV formatted report results only provide the server name and server ID details.
Causes
The other result fields for a report are created in sub-reports under the top-level report. In this example, the hardware resource and networking details are provided in the sub-reports.
Chapter 14. Managing reports
1207
Symptoms
Using the importreports.cmd command to import a report results in the error Unable to locate tools.jar.
Causes
An extra library is referenced in the environment script.
Symptoms
Microsoft Internet Explorer version 7 hangs if you are using the Web browser to view multiple report results.
Causes
There is a memory leak in Microsoft Internet Explorer version 7. The memory usage of the iexplore.exe file grows even after you have closed the report results.
Symptoms
When you click Generate Request Pages, the action seems to perform correctly but you cannot open the report.
Causes
The request pages did not generate properly.
1208
:%WAS_HOME%\profiles\ctgAppSrv01\logs\MXServer
Linux
: $WAS_HOME/profiles/ctgAppSrv01/logs/MXServer
SystemErr.log
Windows UNIX
:%WAS_HOME%\logs\server1
Linux
: $WAS_HOME/logs/server1
Symptoms
If you export the current page of an ad hoc report to PDF, the PDF file is corrupted and does not open.
Causes
When you generate an ad hoc report, the report that is created can span several pages. If you are not on the first page of the report when you attempt to export the report, and if the Current Page option is selected, the exported file might be corrupted. The page breaks in the report cause an invalid PDF file to be created.
1209
1210
Procedure
1. Check the directory server registry that you are using with Tivoli Provisioning Manager for the user wasadmin. If the user wasadmin exists in the LDAP registry, you must assign a different user as the application server administrator for Tivoli Provisioning Manager and then remove the wasadmin user. The wasadmin user name is in one of the Tivoli Monitoring repositories. If you do not remove wasadmin from your LDAP registry, you will have two wasadmin users when you configure Tivoli Monitoring to use the Tivoli Provisioning Manager LDAP server, and you will not able to access the Tivoli Enterprise Portal Server extended services (TEPS/e). To configure a new user as the Tivoli Provisioning Manager application server administrator and remove the existing wasadmin user: a. Log into the WebSphere Application Server console:
(http://host_name:port/admin)
Replace host_name with the host name of the Tivoli Provisioning Manager server and port with the port number for the console. The default port number is 9060. b. Click Security > Secure administration, applications, and infrastructure. c. Select the federated repository in Available realm definitions, and click Configure. d. Change the Primary administrative user name to another existing user in the directory server. For example, maxadmin. e. Click OK and then click Save to save the changes. You might be prompted to enter the password for the new administrator. f. Stop and restart WebSphere Application Server. You can do this by stopping and restarting Tivoli Provisioning Manager. g. Delete the wasadmin from LDAP registry with the following command
Copyright IBM Corp. 2003, 2011
1211
2. The application server administrator for the agent manager must have the same user name and password as the application server administrator for Tivoli Provisioning Manager. If you changed the application server administrator in step 1, you must also change the application server administrator for the agent manager. a. Log on to the console for the agent manager profile with the existing administrator name and password. Use the user name and password for the original Tivoli Provisioning Manager server. b. Click Users and Groups > Manage Users. c. Search for the user name that you configured as the new Tivoli Provisioning Manager application server administrator. If the user does not exist, create the user. 1) Click Create. 2) Enter the user information. Specify the same user name and password that you configured for the new Tivoli Provisioning Manager application server administrator in step 1. 3) Save your changes. d. Click Security > Secure administration, applications and infrastructure. e. Select the federated repository in Available realm definitions, and click Configure. f. Change the Primary administrative user name to the new application server administrator user name. g. Click OK and then click Save to save the changes. You might be prompted to enter the password for the new administrator. h. In a command window, change to the agent manager profile directory. The default location is: WAS_HOME/profiles/casprofile/bin i. Stop and restart the agent manager profile with the following commands:
stopserver server1 -user old_user_name -password old_password startserver server1
UNIX Windows
old_user_name The original application server administrator user name for the agent manager profile. old_password The password for the specified user name. 3. Configure Tivoli Provisioning Manager for single sign-on. Detailed steps are available in the Tivoli Monitoring documentation. http://publib.boulder.ibm.com/infocenter/tivihelp/v15r1/topic/ com.ibm.itm.doc_6.2.1/auth_cfg_ds_isclite.htm#auth_cfg_ds_isclite The following steps describe the high level configuration process: a. Enable the TEPS/e console and log on to the console by following the instructions in "Starting the TEPS/e administration console" at the previous link. Open the console in your browser with the following URL:
http://localhost:15205/ibm/console.
b. Click Security > Secure administration, applications, and infrastructure > Select Federated repositories > Configure > Manage repositories. c. Add a new repository. For the new LDAP repository, copy the values configured for the Tivoli Provisioning Manager LDAP repository in the Tivoli Provisioning Manager application server console. Note: To replicate the Tivoli Provisioning Manager LDAP configuration settings: 1) Log on to the Tivoli Provisioning Manager application server.
1212
d. e. f.
g. h.
2) Click Security > Secure administration, applications, and infrastructure. Select Federated repositories > Configure > Manage repositories. 3) Click the Tivoli Provisioning Manager repository identifier. 4) Copy the values in the configuration tab to the newly created LDAP repository on the TEPS/e console. Click OK and save the changes. Click Security > Secure administration, applications, and infrastructure > Select Federated repositories > Configure > Add base entry to realm. Select the new LDAP repository that you created and provide the distinguished name of the base entry. The default distinguished name is ou=SWG,o=IBM,c=US . Use the same value that is configured in the Tivoli Provisioning Manager application server console. Save the changes. Use the same realm name in the WebSphere Application Server federated repositories configuration of both Tivoli Monitoring and Tivoli Provisioning Manager. The Tivoli Provisioning Manager federated repositories configuration uses the ISMRealm realm name by default. To update the Tivoli Monitoring federated repositories configuration: 1) Click Security > Secure administration, applications, and infrastructure > Select Federated repositories > Configure. 2) Change the realm name to ISMRealm. Apply and save the configuration.
i. Click Security > Secure administration, applications, and infrastructure > Web Security > Single Sign-On (SSO). j. Enable the single sign-on and enter the domain name. For example, mydivision.mycompany.com. You must configure the same value in this field and in the next step in the Tivoli Provisioning Manager application server console. k. Save and restart the TEPS/e server. 4. Create a user in Tivoli Provisioning Manager LDAP registry. For detailed instructions on how to map a user, see: http://publib.boulder.ibm.com/infocenter/tivihelp/v15r1/topic/com.ibm.itm.doc_6.2.1/ auth_mapping.htm#auth_mapping 5. Configure Tivoli Provisioning Manager for single sign-on. a. Log on to Tivoli Provisioning Manager application server console. b. Click Security > Secure administration, applications, and infrastructure > Web Security > Single Sign-On (SSO). c. Enable the single sign-on and enter the domain name that you specified for Tivoli Enterprise Portal. d. Save the changes. e. Stop and restart WebSphere Application Server. You can do this by stopping and restarting Tivoli Provisioning Manager. 6. Export the LTPA keys from the Tivoli Provisioning Manager server. a. Log on to the Tivoli Provisioning Manager application server console. b. Click Security > Secure administration, applications, and infrastructure > Authentication mechanisms and expiration. c. Export the LTPA key. 7. Import the LTPA keys into the Tivoli Monitoring server. a. Copy the exported Tivoli Provisioning Manager LTPA key to the Tivoli Monitoring server. b. Start the TEPS/e administration console. c. Click Security > Secure administration, applications, and infrastructure > Authentication mechanisms and expiration. d. Import the LTPA key. e. Restart the Tivoli Enterprise Portal Server (TEPS) and the Tivoli Monitoring server.
Chapter 15. Integrating with IBM products
1213
8. On the Tivoli Monitoring server, go to Tivoli Enterprise Monitoring Services > Tivoli Enterprise Portal Browser. Right-click and then click Advanced > Edit variables. a. Double-click cnp.cookie.domain and enter the domain that you specified earlier. For example, mydivision.mycompany.com. Select the In Use check box and then click OK. b. Change the TEP Server Host name to the fully qualified host name. For example, tepserver.domainname Perform the same steps for the Tivoli Enterprise Portal desktop. Restart the Tivoli Enterprise Portal Server (TEPS) and the Tivoli Monitoring server. 9. To configure a link to a specific Tivoli Provisioning Manager object, you specify a URL with the Tivoli Provisioning Manager object ID and the name of the Tivoli Provisioning Manager application. If the Tivoli Provisioning Manager server name is not resolved with full domain name in Tivoli Enterprise Portal (the full domain name is visible in Tivoli Enterprise Portal), you must modify the URL in a browser view of Tivoli Enterprise Portal to use the same domain name that you configured earlier. Note: If the Tivoli Provisioning Manager server name is already resolved with full domain name in Tivoli Enterprise Portal, make sure that you use same domain name everywhere while configuring SSO. a. In the Tivoli Enterprise Portal navigation tree, click TPM server > Tivoli Provisioning Manager > Task > Task Details Workspace > properties > Browser view. b. Select Use Provided Location and replace DomainName with the correct domain name.
https://$TPMServer$.DomainName:9443/maximo/ui/?event=loadapp&value=tptask&uniqueid=$TPMTaskID$
Results
Single sign-on is now configured.
1214
Note: Tivoli Storage Productivity Center Version 3.3.2, Fix Pack 1 does not support single sign-on. The first time that you launch a Tivoli Storage Productivity Center console instance, you must specify the user name and password. Required roles: To view in a Tivoli Provisioning Manager computer in Tivoli Storage Productivity Center, your user account in each product must be associated with a role that has appropriate permissions. Tivoli Provisioning Manager Any role. Tivoli Storage Productivity Center Any of the following roles: v Superuser v Productivity Center Administrator v Data Operator v Data Administrator When the integration is configured, you can select a computer in Tivoli Provisioning Manager and then view details about the computer in Tivoli Storage Productivity Center.
Procedure
1. If you are using Tivoli Storage Productivity Center Version 4.1 Fix Pack 2, configure the product for single sign-on. a. Open the Tivoli Integrated Portal in a Web browser:
http://tpc_hostname:16310
where tpc_hostname is the host name of the computer where Tivoli Storage Productivity Center is installed. b. Log on as a user with administrative privileges. c. Click Security > Secure administration, applications, and infrastructure > Web Security > Single Sign-On. Verify that single sign-on is enabled and a valid domain name is configured. d. Click Security > Secure administration, applications, and infrastructure > Authentication mechanisms and expiration. e. In 1) 2) 3) the Cross-cell single sign-on section, enter the following information: Enter and confirm a Tivoli Integrated Portal key file password of your choice. Enter a Tivoli Integrated Portal name of your choice. Click Export Keys.
f. Log out of the Tivoli Integrated Portal. 2. If you are using Tivoli Storage Productivity Center Version 4.1 Fix Pack 2, configure Tivoli Provisioning Manager for single sign-on. a. On the provisioning server, log on to the WebSphere Application Server administrative console.
http://host_name:port/admin
Replace host_name with the host name of the provisioning server and port with the port number for the console. The default port number is 9060. b. Log on as a user with administrative privileges. c. Click Security > Secure administration, applications, and infrastructure > Web Security > Single Sign-On. Verify that single sign-on is enabled and that the domain name matches the one you used to configure single sign-on for Tivoli Storage Productivity Center.
Chapter 15. Integrating with IBM products
1215
d. Verify that the same LDAP relam name is configured for both Tivoli Provisioning Manager and Tivoli Storage Productivity Center. 1) Click Security > Secure administration, applications, and infrastructure. 2) Under Account Repository, click Configure. 3) Under General Properties verify the Realm name. e. Click Security > Secure administration, applications, and infrastructure > Authentication mechanisms and expiration. f. In the Cross-cell single sign-on section, enter the following information: 1) Enter and confirm the Tivoli Integrated Portal key file password. 2) Enter theTivoli Integrated Portal key file name. 3) Click Import Keys. g. Log out of the WebSphere Application Server administrative console. h. Restart Tivoli Provisioning Manager. 3. Define the Tivoli Storage Productivity Center server in Tivoli Provisioning Manager by running the provisioning workflow TPC_DefineTPCServer.wkf. You must perform these steps for each Tivoli Storage Productivity Center that you want to add to Tivoli Provisioning Manager. a. Click Go To > Administration > Provisioning > Provisioning Workflows. b. Search for TPC_DefineTPCServer in the list. c. From the Select Action menu, click Run. d. Select the provisioning workflow . e. Provide the following parameters and then click Run. hostname The host name of Tivoli Storage Productivity Center Server. ipaddress The IP address to use for communication with the Tivoli Storage Productivity Center Server. portnum The port number to connect to the Tivoli Storage Productivity Center Device server. The default is 9550. username The user name that has Superuser privileges on the Tivoli Storage Productivity Center server. password The password to match the provided user name. The provisioning workflow defines a new Tivoli Storage Productivity Center server as data model object in Tivoli Provisioning Manager and the server is added to the TPC Servers group. It stores the user name and password in a new service access point (SAP). The SAP is used by the Tivoli Storage Productivity Center discovery for communicating with the Tivoli Storage Productivity Center server. The default device server HTTPS port (9551) and data server port (9549) are stored as variables of the Tivoli Storage Productivity Center server object. 4. Ensure that Tivoli Storage Productivity Center is running so that it can be discovered. 5. Run TPC discovery to populate the Tivoli Storage Productivity Center data, such as storage subsystems, storage pools, fabrics, and managed computers, in Tivoli Provisioning Manager. To run TPC Discovery: a. Click Go To > Discovery > Provisioning Discovery > Discovery Configurations. b. In the list of discovery configurations, click TPC Discovery. c. Click Run Discovery. d. Select the Tivoli Provisioning Manager as the target server of the discovery and then click Submit.
1216
Each managed computer that TPC Discovery adds to Tivoli Provisioning Manager has a property called ManagedByTPCServer associated with it. The value of this property is be the IP address of the Tivoli Storage Productivity Center management server. When launching the Tivoli Storage Productivity Center console from the Tivoli Provisioning Manager, the value of ManagedByTPCServer is used to find the Tivoli Storage Productivity Center server that manages the selected computer. If the message "An unexpected deployment error occurred" is displayed, verify that Tivoli Storage Productivity Center is running and then try the discovery again. 6. If Tivoli Storage Productivity Center device sever and data server are not using the default ports (9551 and 9549 respectively) you must modify the variables that define the ports. These ports are used in the URL that launches the Tivoli Storage Productivity Center console. a. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Computers. If you have Provisioning Configuration Librarian authority, you can also launch the Provisioning Computers application directly from the Favorite applications portlet in the Start Center. b. Search for the host name of the Tivoli Storage Productivity Center, and then click the computer in the list. c. Click the Variables tab. d. Update the values for the DeviceServerHTTPSPort and DataServerPort variables with the correct values for the HTTPS device server port and data server port. The link to the Tivoli Storage Productivity Center console from this computer is now configured. 7. To view storage details for a selected computer in the Tivoli Storage Productivity Center console, perform the following steps: a. Click Go To > IT Infrastructure > Provisioning Inventory > Provisioning Computers. If you have Provisioning Configuration Librarian authority, you can also launch the Provisioning Computers application directly from the Favorite applications portlet in the Start Center. b. Search for the computer that you want to view and then click its name in the list. The computer must be a computer that is managed by Tivoli Storage Productivity Center. Computers that are managed by Tivoli Storage Productivity Center have a ManagedByTPCServer variable defined on the Variables tab of the computer. The variable identifies the Tivoli Storage Productivity Center server that manages the computer. c. From the Select Action menu, click Select > Open Storage Management Server Console. Note: The Open Storage Management Server Console action is only visible for computers managed by managed by the Tivoli Storage Productivity Center server (computers that have the ManagedByTPCServer variable). The process to launch the Tivoli Storage Productivity Center console starts. The URL to launch the console is created using the computer host name and the values for the variables ManagedByTPCServer (Tivoli Storage Productivity Center server name), DeviceServerHTTPSPort (device server port), and DataServerPort (data server port). The following steps occur to launch the console: a. The Tivoli Storage Productivity Center console is started with Java Web Start. b. Java Web Start connects to the Tivoli Storage Productivity Center device server. c. Java Web Start downloads the SSL certificate and displays a message that asks if you want to accept and trust the device server Web site. d. To continue, click OK to accept and trust the Web site. The Web browser downloads TSRMgui.jar to start the console. e. If you are prompted to log on, specify the user name and password that you configured in step 3 on page 1216. The first time you launch a Tivoli Storage Productivity Center Version 3.3.2 session, you must log on. If you launch the same console instance again, you are not prompted to log on. Note: Tivoli Storage Productivity Center launch in context does not support single sign-on. Tivoli Storage Productivity Center credentials must be provided to log into Tivoli Storage Productivity
Chapter 15. Integrating with IBM products
1217
Center when you launch it from Tivoli Provisioning Manager for the first time. You can find out more information about which role you can use to log on: Required Roles The console is displayed with the storage information for the selected computer. Note: If the computer record was deleted from Tivoli Storage Productivity Center, a blank page is displayed. This is a known limitation of Tivoli Storage Productivity Center.
Procedure
v To display a specific object, you can launch Tivoli Provisioning Manager object ID. Use the following format: For a secure HTTP connection:
https://host_name:port/maximo/ui/?event=loadapp&value=application_name&uniqueid=object_id
host_name The Tivoli Provisioning Manager is installed. application_name The name of application to launch. For provisioning task and activity plan objects managed by Provisioning Task Tracking, use the application name tptask For provisioning workflow objects managed by Provisioning Workflow Status, use the application name tpwfstat For all other objects, use the application name tpdcmfind dcm_object_id The object ID in the data model of the object that you want to display. You must specify a valid application name and a valid object that is managed by the application. The following example shows the URL to display an object with the ID 3293:
https://tpmserver.example.com:9443/maximo/ui/?event=loadapp&value=tpdcmfind&uniqueid=3293
The link displays the main tab of the specified object. v To display a set of objects based on specific attribute values, you can launch Tivoli Provisioning Manager using a primary Maximo business object attribute name and value pairs in the format:
1218
host_name The Tivoli Provisioning Manager is installed. application_name The name of application to launch. For provisioning task and activity plan objects managed by Provisioning Task Tracking, use the application name tptask For provisioning workflow objects managed by Provisioning Workflow Status, use the application name tpwfstat For all other objects, use the application name tpdcmfind, but you can only provide the search criteria on persistent attributes of the Maximo business object TPDCMOBJECT. If you want to provide search criteria on attributes other than the Maximo business object TPDCMOBJECT or you want to list out only specific type of objects then you must use the specific application which must have the type of object you are searching for as primary Maximo business object. For information about the relationship between data model objects and the corresponding applications, see Data model object to application mapping on page 1221. attribute_name Name of the persistent attribute of the primary Maximo business object of the application. attribute_value The value of the attribute You must specify a valid application name and valid attribute names and values that are managed by the application. The following example shows the URL to display all objects with the name sun-fire-280-1:
https://tpmserver.example.com:9443/maximo/ui/login?event=loadapp&value=tpdcmfind&additionalevent =useqbe&additionaleventvalue=Name=sun-fire-280-1
This URL redirects to the List tab of the specified application and lists objects that meet the specified attribute values. To list specific a type of the object, you must use the specific application name. For example, to list all computers with the name sun-fire-280-1, the Provisioning Computers (tpservers) application is included in the URL because that application manages computer objects.
https://tpmserver.example.com:9443/maximo/ui/login?event=loadapp&value=tpservers&additionalevent =useqbe&additionaleventvalue=Name=sun-fire-280-1
This example shows how to list all the software products from specific vendor. In this situation, TPDCMOBJECT does not have VENDOR as a persistent attribute, so you cannot use the tpdcmfind application. Instead, you must use specify the tpsoftware application that manages software objects.
https://tpmserver.example.com:9443/maximo/ui/login?event=loadapp&value=tpsoftware&additionalevent =useqbe&additionaleventvalue=VENDOR=IBM
v To display a set of objects, you can also launch Tivoli Provisioning Managerby providing a SQL query in the URL: For a secure HTTP connection:
https://host_name:port/maximo/ui/?event=loadapp&value=application_name &additionalevent=sqlwhere&additionaleventvalue=sqlWhereClause
1219
host_name The Tivoli Provisioning Manager is installed. application_name The name of application to launch. For provisioning task and activity plan objects managed by Provisioning Task Tracking, use the application name tptask For provisioning workflow objects managed by Provisioning Workflow Status, use the application name tpwfstat For all other objects, use the application name tpdcmfind, but you can only provide the search criteria on persistent attributes of the Maximo business object TPDCMOBJECT. If you want to provide search criteria on attributes other than the Maximo business object TPDCMOBJECT or you want to list out only specific type of objects then you must use the specific application which must have the type of object you are searching for as primary Maximo business object. For information about the relationship between data model objects and the corresponding applications, see Data model object to application mapping on page 1221. sqlWhereClause A SQL expression that uses a standard SQL where clause. You must specify a valid application name and SQL query. The following example shows the URL to display all computers with name sun-fire-280-1 in the Computer application:
https://tpmserver.example.com:9443/maximo/ui/login?event=loadapp&value=tpservers&additionalevent =sqlwhere&additionaleventvalue=Name=sun-fire-280-1
This URL redirects to the List tab of the specified application and lists objects that meet the specified SQL expression. v To launch to an application in portlet mode so that the Go To menu and other menus on the header bar are not accessible, add the parameter &portalmode=true. The following examples show this parameter:
https://tpmserver.example.com:9443/maximo/ui/login?event=loadapp&value=tpdcmfind&additionalevent =useqbe&additionaleventvalue=Name=sun-fire-280-1&portalmode=true https://localhost:9443/maximo/ui/?event=loadapp&value=tpdcmfind&uniqueid=1058&portalmode=true
Results
When you launch the Tivoli Provisioning Manager web interface using the previous URLs, you will be prompted for user credentials. You must supply credentials with the appropriate privileges for the application you are launching.
1220
Procedure
1. Click Go To > Change > Change Window. 2. Add a change window. For instructions see the Change and Configuration Management Database information center. 3. After the change window is configured, perform the following steps to view the change window from a managed computer: a. Click Go To > Deployment > Provisioning Computers. b. Search for the computer you want to view and then click its name in the search results. c. Next to Configuration Item, click computer. d. Next to Change Window, click to view the corresponding configuration item for this to view the change window.
Results
The change window is displayed.
1221
Table 213. (continued) data model object VOLUME_MANAGER STORAGE_ALLOCATION_POOL SAN_FRAME SERVER_TEMPLATE SOFTWARE_MODULE IMAGE CLUSTER_DOMAIN STORAGE_TEMPLATE SOFTWARE_RESOURCE SOFTWARE_INSTALLATION SOFTWARE_INSTANCE SOFTWARE_CONFIGURATION SOFTWARE_APPLICATION_DATA GROUP COMPUTER_GROUP DCD_MANAGEMENT_CENTER Description Volume manager Storage allocation pool Storage Subsystem Computer template Software definition Image Cluster domain Storage template Software resource Software installation Software instance Software configuration Software application Data Group Computer Group Object that represents the dynamic content delivery management center Application name TPSTGMGR TPSTPOOL TPSTSUBST TPCMPTMPL TPSOFTWARE TPIMAGE TPCLSTDMN TPSTGTMPL TPSWRES TPSWRES TPSWRES TPSWRES TPSWRES TPGROUP TPGROUP TPDCD
Procedure
1. For this extension mechanism to work a valid configuration item (CI) must be linked to the business object. For example, the TPSERVER object has a Global Unique Identifier (GUID) attribute which enables the linking to exist between the TPSERVER and the CI. When this link is established a relationship named CI must exist and point to a valid CI instance. A business object defines an object in Tivoli Provisioning Manager. So, for a computer that is the TPSERVER business object. For a SWITCH, it is the TPSWITCH business object.
1222
2. Add a new attribute following the steps described detailed in section 4.2.2 of the IBM Tivoli CCMDB Implementation Recommendations document. The new attribute, to store the name of the owner, must be named, for example, OWNERNM (using the Attribute field) and have a Data Type of ALN. 3. Add a new relationship to the CI object: a. Go to the Database Configuration application ( Go to > System Configuration > Platform Configuration > Database Configuration ) and filter on the TPSERVER object. b. Click the Relationships tab, then click New Row. c. In the Relationship field, type CISPECOWNERNM d. In the Where Clause field, type refobjectid=:ciid and ASSETATTRID=OWNERNM, where OWNERNM is the attribute name you assigned in step 2. e. In the Child Object field, type CISPEC. f. In the Remarks field, type Owner Name Relationship. For more information, see the Application Developer's Guide 4. You must determine which application needs to be changed. In this case it is the TPSERVERS application which is based on the TPSERVER business object. Go to the Application Designer (Go to > System Configuration > Platform Configuration > Application Designer) and search for the TPSERVERS application using the Find. 5. Select TPSERVERS, then click the Workspace tab, then the Computer tab. 6. Using the Control Palette, create a text entry field where you expect to see the owner details. For more information about the Control Palette, see the Application Developer's Guide. 7. Right-click the new text box and click Properties, then in the Attribute field, type CI.CISPECOWNERNM.ALNVALUE. to save your changes. 8. Click 9. Configure the database. For more information, see Database Configuration in the System Administrator's Guide. 10. If you configured the database using Admin Mode, you must restart Tivoli Provisioning Manager for the changes to take effect.
Results
You are now done adding the new attribute. The next time you use the application there will be a field where you can enter or modify the last update time information.
What to do next
This attribute is editable on all objects where the configuration item has the new attribute. For configuration items that do not yet have it, you navigate to the configuration item application and add the new attribute to be editable on the TPSERVERS application.
1223
v System Administrator Guide. Information about database configuration. Regardless of what variables you are obtaining, the same capabilities for modifying object properties are available in the Variables tab for your target computers. The following example provides information about how to access more visualization and editing capabilities than are available on the Variables tab. The general steps involved in accessing more capabilities are:
Procedure
1. First, you must use the database configuration application to add a relationship to the TPDCMOBJECTPROPERTY business object. The relationship must be named <KEY_NAME>_REL and must have a where clause as follows: DCM_OBJECT_ID = :ID and COMPONENT_ID = 7 and KEY_NAME = <KEY_NAME>. 2. Define a non-persistent attribute in the business object for this new field. The attribute must be defined as same as TPDCMOBJECTPROPERTY.VALUE and the attribute must be named <KEY_NAME>. You must add the class name com.ibm.tivoli.tpm.maximo.fieldvalidators.FldPropertyExtender to the attribute. 3. Because you changed the database configuration, you must to run the configdb command . This operation requires a shutdown and restart of Tivoli Provisioning Manager. For more information about configdb, refer to the System administrator guide. 4. Use the application designer to add the new field to your application. The attribute is <KEY_NAME>. The FldPropertyExtender class handles the creation of the DcmObjectProperty entry when a new value is entered and the Mbo is saved. This property also appears in the Variables tab for the object.
Results
You are now done adding the new attribute. The next time you use the application there will be a field where you can enter or modify the last update time information.
Example
You want to add a new property LAST_UPDATE_TIME to all server objects. To perform this action, (so that the last update time might be referenced in workflows), you want to be able to edit the DcmObjectProperty in the Web interface directly and not always use the Variables tab. This property can also be populated by a custom discovery workflow: 1. You first need to determine what object this property needs to be related to. In this case it is the TPSERVER object. So navigate to the Database Configuration application by clicking Go to > System Configuration > Platform Configuration > Database Configuration and search for the TPSERVER object. 2. Click the Relationships tab, then the New Row button. 3. In the Relationship field, type LAST_UPDATE_TIME_REL. 4. In the Child Object field, type TPDCMOBJECTPROPERTY. 5. In the Where Clause field, type DM_OBJECT_ID = :ID and COMPONENT_ID = 7 and KEY_NAME = 'LAST_UPDATE_TIME. Note: 7 is the ID for the user-defined component. There are several components IDs that could be used such as 0 which is used for the entire system. Also, if the key_name is unique across all components for the particular object ID, then KEY_NAME is not required in the WHERE clause. to save your changes. 6. In the Remarks field, type Last Update Time relationship and click 7. You are now going to create a non-persistent attribute. Click the Attributes tab, then click New Row 8. In the Attribute field, type LAST_UPDATE_TIME. 9. In the Title field, type Last Update Time. 10. In the Description field, type Last Update Time.
1224
11. In the Class field, type com.ibm.tivoli.tpm.maximo.fieldvalidators.FldPropertyExtender. 12. In the Same as Object field, type TPDCMOBJECTPROPERTY. 13. In the Same as Attribute field, type VALUE. 14. 15. 16. to save this change. Click The status of the TPSERVER object is now To Be Changed, which requires the configdb command to be run. See the System Administrator Guide for details Now you need to determine which application needs to be changed. In this case it is the TPSERVERS application which is based on the TPSERVER business object. Go to the Application Designer (Go to > System Configuration > Platform Configuration > Application Designer) and search for the TPSERVERS application using the Find field. Select TPSERVERS, then click the Workspace tab, then the Computer tab. Using the Control Palette, create a text entry field where you would like to see the last update time details. For more information about the Control Palette, see the Application Developer's Guide. Right-click the new text box and click Properties. In the Attribute field, type LAST_UPDATE_TIME. to save your changes.
21. Click
What to do next
This new DcmObjectProperty could then be used in any workflow using the DCM Query language.
<INSERT SAMPLE WF CODE HERE!> Get the Property Value (See the Get_DCM_Property WF) Property_Value = DCMQuery(/dcmobject[@id=$DCM_Object_ID]/property[@componentid=7 AND @key=$Property_Name]/@value) Set the Property Value (See the Set_DCM_Property WF) var propertyID = DCMQuery(/property[@key=$Property_Name AND @componentid=$Component_Id AND @dcmobjectid=$DCM_Object_ID]) if Jython(not propertyID) then DCMInsert parent = DCMQuery(/dcmobject[@id=$DCM_Object_ID]) <<EOI <property component="$componentName" name="$Property_Name" value="$Property_Value" description="$Property_Description" /> EOI #-else DCMUpdate parent = DCMQuery(/property[@id=$propertyID]) <<EOU <property component="$componentName" name="$Property_Name" value="$Property_Value" description="$Property_Description" /> EOU #-endif
1225
v Set up Tivoli Provisioning Manager to send workflow failure events to Tivoli Enterprise Console. Sending these events enables you to centralize management of provisioning workflow failure errors, as well as errors from other management systems in your enterprise environment. v Configure Tivoli Enterprise Console to run SOAP commands. In Tivoli Provisioning Manager, you can create rules to associate an event with a SOAP script. For example, you can set up a rule to change a server status to failed when Tivoli Enterprise Console receives a server failure event. When Tivoli Provisioning Manager sends an event to Tivoli Enterprise Console, it includes the following information in the event: v Name of the provisioning workflow v Deployment request ID v Error number v First 32 characters of the error message v IP address of the Tivoli Provisioning Manager server as the source of the error v logical management operation that failed v First four parameters passed to the provisioning workflow v Date and time of the error If a child provisioning workflow in a hierarchical provisioning workflow fails, an event is only sent for the parent provisioning workflow. If Tivoli Provisioning Manager cannot connect to the Tivoli Enterprise Console server, all exceptions are captured and a message is recorded in the message log to indicate the error.
Implement the interface for the Java class from the relevant provisioning workflow error. Only replace the class name. Note: All modifications must be made by IT support or service team members.
1226
Tivoli Enterprise Console cache If you enable the Tivoli Enterprise Console cache, the cache stores events when communication with the event server or IBM Tivoli Enterprise Console gateway fails. The name and location of this file is defined in the tivoli.send.conf configuration file that you use to configure the Tivoli Provisioning Manager server to send events. If BufferEvents=YES, the parameters to look for are BufferEvents and BufEvtPath for the location of buffered events. Tivoli Provisioning Manager log file The console.log file stores all event logs for the Web interface including messages, traces, and debugging information. It records information about failures in sending events to Tivoli Enterprise Console. The default location for this log file is: v
Windows
%TIO_LOGS%\j2ee v
UNIX
or
Linux
$TIO_LOGS/j2ee
Procedure
1. Switch to the %TIO_HOME%\config directory, where %TIO_HOME% is the Tivoli Provisioning Manager installation directory. 2. Open the tivoli.send.conf file in a text editor. 3. Edit the parameters as described in the file. For integration with Tivoli Provisioning Manager, ensure that you check the following settings: ServerPort (Windows only) If Tivoli Enterprise Console is running on a Windows server, the ServerPort setting is the port number on which the Tivoli Enterprise Console server is listening for events. Look for this line in the configuration file:
ServerPort=5529
The default value is port 5529. Verify that the port setting is correct and uncomment the line. BufEvtPath BufEvtPath must specify the path name of the file which will contain cached Tivoli Enterprise Console events if the Tivoli Enterprise Console server is shut off.
Chapter 15. Integrating with IBM products
1227
Server Location Server Location specifies the host name of the server on which the Server Location server resides. This is set to the Tivoli Provisioning Manager server by default, and must be changed if the Tivoli Enterprise Console server is on a different server. For more information about activating and filtering the cache, refer to the Tivoli Enterprise Console Event Integration Facility Reference. This guide is available in theTivoli Enterprise Console information center.
Results
You have now modified the configuration file to enable caching of workflow events, and set a path file name for the cache file.
What to do next
Next, you must configure Tivoli Enterprise Console to receive workflow events.
Procedure
1. Set up the Tivoli Enterprise Console server so that it can run SOAP commands remotely. For details about running SOAP commands from another server, see the Reference section of the information center. 2. Create an .sh or .cmd script to perform actions that you want to occur in response to an event. The script must contain each SOAP command that you want to run. 3. Create a rule in Tivoli Enterprise Console to start the script that you created. The rule defines the event and corresponding value that starts the script. For example, you can identify a specific device state or threshold value to automatically trigger the script. For details about creating a rule, refer to the Tivoli Enterprise Console documentation. You can obtain the documentation from the Tivoli software information center.
1228
Note: The Tivoli Enterprise Console server must be at the 3.9.1 (Fix Pack 1) product level to properly manage events. To load the event class:
Procedure
1. Copy the event class file from the Tivoli Provisioning Manager server to the Tivoli Enterprise Console server. The file is named tio_workflow_exception.baroc and is located in the %TIO_HOME%\config directory. 2. From the command line on the Tivoli Enterprise Console server, create a rule base, or identify an existing rule base that you want to use. v To create a rule base with the name tioRuleBase, type wrb -crtrb tioRuleBase. v To view a list of existing rule bases, type wrb -lsrb. 3. Import the event class into the rule base. Type wrb -imprbclass path/tio_workflow_exception.baroc rulebase where path is the full path to the event class file. rulebase is the name of the rule base. 4. Compile the rule base. Type wrb -comprules rulebase. 5. Load the rule base. Type wrb -loadrb rulebase. 6. Restart the Tivoli Enterprise Console server.
Results
You have copied the workflow event class definition to Tivoli Enterprise Console, imported it into the appropriate rule base, and then loaded the rule base.
Procedure
1. Click Go To > Administration > Provisioning > Provisioning Global Settings. 2. Click the Variables tab. 3. Add a variable to integrate Tivoli Enterprise Console. a. In the Key field, type Send TEC Events on workflow failures for the variable name. b. In the Component, click Deployment engine. c. In the Value field, type true to enable the transmission of events, or type false to disable the transmission of events.
Results
You have now enabled or disabled the transmission of workflow failure events.
1229
The runbook automation enables you to initiate provisioning tasks through process workflows from a Maximo instance. The Maximo instance can be either remote or on the same server as Tivoli Provisioning Manager. The remote instance is recommended, as it minimizes dependencies and decouples the provisioning engine from the process engine. The integration with Tivoli Provisioning Manager is ensured through the web services. The runbook automation integration provided with Tivoli Provisioning Manager is designed to address workflow development challenges such as: v Java programming or Jython scripting skills required to integrate with Tivoli Provisioning Manager from the process workflow. v Very difficult maintenance and debugging of Java code or Jython scripts. v Packaging of the custom Java code required to redeploy the maximo.ear file. v Support for a local Tivoli Provisioning Manager instance only. Support for a remote instance requires new action classes. v Manual and error-prone mapping of Tivoli Provisioning Manager parameters to the ISM process specification attributes. To address these challenges, the runbook automation provides: v Efficient, consistent, and fast management of manual and automated process through process workflows. v Out-of-the-box process workflows to demonstrate the top-down ISM integration from service catalog to the automation tasks in Tivoli Provisioning Manager. v A library of best-practice provisioning workflows and scripts to add to the overall ISM process. No Java or Jython code is required. v Automation of repetitive tasks associated with the IT operation process, by providing reusable action libraries that can be shared between processes. v An end-to-end solution that seamlessly integrates service ticket opening, management of service requests, work order setup, process workflow implementation and execution, and verification of successful provisioning. The following diagram illustrates the high-level architecture of the runbook integration provided with Tivoli Provisioning Manager 7.2.0.2 IF00001:
1230
Tivoli Process Automation Engine applications Tivoli Provisioning Manager runbook automation adapter - Process Manager Product package
Web services
Deployment Engine
- Exchange data - Map data center model objects Call provisioning workflows
Data center model database
Runbook automation
...
See the related links to learn more about the runbook automation process, the required user roles and requirements, and the available tasks. Related reference User roles and requirements on page 1238 Software requirements on page 1239
1231
Process
Process A typical automation process using process workflows is depicted in the following diagram:
1. Installing the runbook automation adapter package
3. Generating artifacts
Legend
Provisioning Administrator Workflow Designer Change Manager
To initiate the Default_Device_Copy_File provisioning workflow from a process workflow, and copy a file to a target computer, complete the following steps: 1. Generate the ISM process artifacts. 2. Build a process workflow that includes the provisioning task Device_Copy_file. 3. Run the process workflow from the work order. 4. Verify that the execution of the process workflow completes successfully.
User roles
User roles
1232
Table 215. User roles Role Provisioning Administrator (Tivoli Provisioning Manager) Description v Installs the Tivoli Provisioning Manager client PMP on a remote Maximo instance. v Configures the ISM instance to point to the Tivoli Provisioning Manager 7.2.0.2-IF00001 instance. v Runs the cron task to synchronize the data model objects from the Tivoli Provisioning Manager instance. Skills v Knowledge of Tivoli Provisioning Manager provisioning workflows and provisioning tasks v Knowledge of provisioning workflow parameters and configuration details
v Generates the ISM process artifacts from Tivoli Provisioning Manager custom provisioning workflows (if required) Workflow Designer (Maximo) v Builds process workflows (using the Tivoli Provisioning Manager-provided process and action libraries) v Knowledge of Tivoli Provisioning Manager provisioning workflows generated artifacts and usage v Familiarity with process workflows, workflow designer, and process flow customization
v Familiarity with service catalog, configuration, and process v Assigns the Tivoli Provisioning workflow execution Manager-generated classification to the work order. v Knowledge of operational side of provisioning tasks v Sets the specification attribute values in the work order v Executes the process workflow against the work order v Verifies the successful completion of the provisioning tasks
Requirements
Requirements v Software requirements on page 1239
1233
Key terms
Key terms activity plan Activities are actions performed on a set of targets at specified times. automation package An installation unit that consists of the scripts, provisioning workflows, documentation and Java files for a particular device or software package. provisioning workflow A provisioning workflow represents the real implementation of a specific IT process. Provisioning workflows interact with related components to provide automated provisioning. process workflow The structured sequence of provisioning tasks that are used to implement a specific change, release, or other process, including both automatic and manual routing and tracking of records for approval and other tasks. The process workflows represent the real implementation of the runbook integration of Tivoli Provisioning Manager and Maximo. SOAP SOAP is a specification for the exchange of structured information in a decentralized, distributed environment. Certain Tivoli Provisioning Manager internal properties and methods are available using SOAP commands.
software package A software package contains a description of the actions that need to be executed on the target system. Depending on the software package format, the software package can also contain the files and resources necessary to perform the actions. web services The Web Services Resource Framework (WSRF) defines a generic and open framework for modeling and accessing resources using stateful Web services. Tivoli Provisioning Manager provides WSRF services in an OSGi environment. work order A record that contains information about work that must be performed for an asset, location, configuration item, and so on.
Troubleshooting
Troubleshooting v Troubleshooting the runbook automation on page 1249 v Runbook automation problems and limitations on page 1250 v Troubleshooting provisioning workflows
Log files
Log files v Runbook automation log files on page 1249 v Viewing provisioning workflow logs v ../com.ibm.support.tpm.doc/logs/rtrblog_workflowlog.dita
1234
Resources
Resources To learn more about runbook automation, refer to one of the following resources: v Automating tasks using process workflows on page 1229 v Runbook automation process v ITNCMIntegration automation package
Related links Automating tasks using process workflows on page 1229 Runbook automation process Troubleshooting the runbook automation on page 1249
1235
Start
Request Approval
Stop Workflow
Stop Workflow
End
The runbook automation scenario for the virtual machine (VM) creation includes the following steps: v A request for a virtual machine is submitted. It must be approved before it is processed further. v After the request is approved, it is sent to the server build team to: Build the server. Install the additional software, including patches. Note: : These steps can be performed in one automated step, or they can be independent steps ). leveraging different tools ( Certify that the server is ready. v The record exits the New virtual machine (VM) order process. v If the request follows a standard template (with less than five existing servers), it can be approved by the Purchase Approver and routed to the server build team. The following user roles can participate in this scenario:
Table 216. Runbook user roles for the virtual machine creation scenario Role Server Administrator Patch Administrator Application Administrator Description Sets up the server using a standard installation. Scans for and applies the patches required by the company policy. Installs additional applications. Works with the License Administrator to get the required licenses.
License Administrator Works with the Application Administrator to get the appropriate licenses.
1236
Start
Infrastructure Manager
Agreement Signed?
Stop Workflow
Create VM Subprocess
The runbook automation scenario for getting a new customer started includes the following steps: v A new agreement for server hosting is signed by the customer. A request for a virtual machine is submitted. The agreement must be signed before the request is processed further. v A request for the assignment of a VLAN and an IP address range to this customers machines is sent to an Infrastructure Manager. v The VLAN and the IP address range are assigned to the customer by the Infrastructure Manager. ) v The assigned VLAN is sent to the network group to: ( Add the VLAN to the network switches and to the router. Create the default gateway and DNS records v A request is sent to the server group to add the VLAN to the hypervisor virtual switch. ( v The process described in the Scenario 1: Creating a virtual machine on page 1235 is called ( verify the basic network connectivity from the customer VLAN. The following user roles can participate in this scenario: ) ), to
1237
Table 217. Runbook user roles for the getting started scenario Role Infrastructure Manager Network Administrator Server Administrator Server Administrator Patch Administrator Application Administrator Description Manages the assignment of VLANs and IP address ranges. Configures switches, routers, and DNS servers. Configures virtual switches on the hypervisor. Sets up the server using a standard installation. Scans for and applies the patches required by the company policy. Installs additional applications. Works with the License Administrator to get the required licenses.
License Administrator Works with the Application Administrator to get the appropriate licenses.
Related tasks Installing the runbook automation adapter PMP package on page 1240 Configuring the Tivoli Provisioning Manager runbook automation adapter on page 1241 Generating process workflow artifacts on page 1245 Building process workflows on page 1247 Running process workflows on page 1248 Troubleshooting the runbook automation on page 1249 Related reference User roles and requirements Software requirements on page 1239
Requirements
Before you start working with the Runbook automation, ensure that you meet all requirements.
v Generates the ISM process artifacts from Tivoli Provisioning Manager custom provisioning workflows (if required)
1238
Table 218. User roles (continued) Role Workflow Designer (Maximo) Description v Builds process workflows (using the Tivoli Provisioning Manager-provided process and action libraries) Skills v Knowledge of Tivoli Provisioning Manager provisioning workflows generated artifacts and usage v Familiarity with process workflows, workflow designer, and process flow customization
v Familiarity with service catalog, configuration, and process v Assigns the Tivoli Provisioning workflow execution Manager-generated classification to the work order. v Knowledge of operational side of provisioning tasks v Sets the specification attribute values in the work order v Executes the process workflow against the work order v Verifies the successful completion of the provisioning tasks
Related concepts Automating tasks using process workflows on page 1229 Runbook automation process on page 1235
Software requirements
Ensure that you are using the supported software at the required levels for the runbook automation.
1239
Related concepts Automating tasks using process workflows on page 1229 Runbook automation process on page 1235
Procedure
1. Click Go To > System Configuration > Platform Configuration > Database Configuration. 2. On the List tab, search for the ACTION object, and click its name. 3. Click the Attributes tab of the ACTION object, then select the ACTION attribute. 4. Update the Length value to 200 (recommended). 5. Click Save to save the change and apply the setting.
Results
You have finished customizing the length of the ACTION attribute to accommodate longer action names.
What to do next
After you have customized the length of the ACTION attribute, ensure that you update the change in the database, by completing the following refresh steps on the Maximo administrative workstation: 1. Go to <WAS_HOME>\AppServer\profiles\ctgAppSrv01\bin. 2. Enter the command: stopServer MXServer -username <wasadminuser> -password <wasadminuser_password> 3. Go to c:\IBM\SMP\maximo\tools\maximo. 4. Enter the command: dropbackup 5. Enter the command: configdb 6. Go to <WAS_HOME>\AppServer\profiles\ctgAppSrv01\bin. 7. Enter the command: startServer MXServer Next: Installing the runbook automation adapter PMP package
1240
v Perform the attribute customization procedure described in the Customizing the length of the ACTION attribute on page 1240 topic. v Ensure that you have a system or database backup. The runbook automation adapter PMP can be installed either on the remote IBM Tivoli Service Request Manager instance or on the same location where both Tivoli Provisioning Manager and IBM Tivoli Service Request Manager are running on the same instance. The process to install the runbook automation adapter PMP package uses the tpm_rbadptr_pmp_7.2.0.zip PSI installable. To install the runbook automation adapter PMP:
Procedure
1. Download the runbook automation adapter PMP from https://www-304.ibm.com/support/ docview.wss?uid=swg24030496 to your IBM Tivoli Service Request Manager administrative workstation. 2. Run the following file: MAXIMO_HOME\bin\solutionInstallerGUI.bat (.sh for UNIX). 3. Select to install the tpm_rbadptr_pmp_7.2.0.zip PMP package. 4. Follow the wizard instructions for license agreement and middleware credentials. 5. Review the installation options, then click OK to install the package.
What to do next
After the PMP installation is complete, a one-time setup (initial configuration) is required, to ensure that the Service Request Manager client and the runbook instance can work with Tivoli Provisioning Manager 7.2.0.2-IF00001 through the web services. See Configuring the Tivoli Provisioning Manager runbook automation adapter. Related concepts Runbook automation process on page 1235
1241
Related concepts Runbook automation process on page 1235 Related information Changing end point location requires database objects removal on page 1252
Activating escalation
The escalation condition is used to retrieve the status of the provisioning workflows from the Tivoli Provisioning Manager server. By default, escalation is checked every 30 seconds, but can be customized. When you activate the escalation, you ensure that the status of the provisioning workflows can be retrieved from the provisioning server. To activate the escalation, as a provisioning administrator:
Procedure
1. Click Go To > System Configuration > Platform Configuration > Escalations. 2. On the Escalation tab, search for the TPA_ACTIONS escalation. 3. Click Select Action > Activate/Deactivate Escalation. 4. Click Save to save the change and apply the setting.
Results
Escalation is now activated, which enables you to retrieve the status of the provisioning workflows from the provisioning server.
Procedure
1. Click Go To > System Configuration > Platform Configuration > Logging. 2. In the Logger list, change the log level for the TPA logger from ERROR (default) to DEBUG. to save the change. 3. Click Save 4. Click Select Action > Apply Settings to apply the changes.
Results
The logging level is now set to DEBUG, which enables you to access log information to use for runbook automation adapter troubleshooting purposes.
1242
Procedure
1. Click Go To > System Configuration > Platform Configuration > System Properties. 2. Under Global Properties, search for rba. 3. In the list, select the rba.log.enableCustomScriptLogging property. The details for the selected property are displayed under Global Properties Details. 4. Set the Global Value of the rba.log.enableCustomScriptLogging property to 1. to save the change. 5. Click Save 6. Click the check box to select the property name. 7. Click Select Action > Live Refresh to apply the property update.
Results
The logging is now enabled for custom scripts.
Procedure
1. Click Go To > Integration > End Points. 2. On the End Points page, search for the name of the end point, TPMWSEP, and select it. 3. Under Properties for End Point, update the properties with the following information: v HOSTNAME: Enter the host name of the web service end point. For example, vm-tpm-s218.tpmserver.example.com. v USERNAME: Type the Maximo administrative user name, for example, maxadmin. v PASSWORD: Type the maxadmin password. Its encrypted value is displayed as you type. v PROTOCOL: Set to HTTPS. If set to another value or left unspecified, HTTP is used. Note: If the protocol is set to HTTPS, see Configuring HTTPS on page 1244 for more information about setting up the certificate. v UI_PORT: Set the port number for the Tivoli Provisioning Manager web interface, for example, 9443. v WS_PORT: Set the port number for the web services to the secure port, for example, 8777. 4. Click Save End Point .
Results
You have finished setting up the web services end point.
1243
Procedure
1. Click Go To > System Configuration > Platform Configuration > Cron Task Setup. 2. On the Cron Task tab, search for the cron task you want to activate, TPADBSYNCCRONTASK. 3. Select the Active check box for the cron task. 4. Click Save to save the change and apply the setting.
Results
Once activated, the cron task synchronizes the data model objects between Tivoli Provisioning Manager and Maximo. You have now finished configuring the Tivoli Provisioning Manager runbook automation adapter to communicate with Maximo through the web services.
What to do next
Generating process workflow artifacts on page 1245
Configuring HTTPS
The communication initiated from IBM Tivoli Service Request Manager to Tivoli Provisioning Manager can be configured to use SSL. The following configuration steps are provided for server authentication only. First, the Service Request Manager truststore must be identified for server authentication. Before the certificate can be imported into the truststore, you must identify the virtual host and the port that are used by the Service Request Manager. Identifying the virtual host: To identify the virtual host: Procedure 1. Log on to the WebSphere administrative console in Service Request Manager. 2. Click Applications > Enterprise Applications > MAXIMO. 3. Click Virtual hosts to display the virtual hosts used by the Maximo application. 4. Note down the name of the virtual host, maximo_host. Identifying the ports for the virtual host: The virtual host name that you have just identified is required for the following port identification procedure. To identify the ports for the virtual host: Procedure 1. Log on to the WebSphere administrative console in Service Request Manager. 2. 3. 4. 5. Click Environment > Virtual Hosts. Select the virtual host identified earlier, maximo_host. Click Host Aliases. A table displays the virtual hosts and the corresponding ports. Note down the port numbers.
IBM Tivoli Provisioning Manager Version 7.2.0.2 User Guide
1244
Results Identifying the truststore and importing the certificate: To identify the truststore and import the certificate into the truststore: Procedure 1. Log on to the WebSphere administrative console in Service Request Manager. 2. Click Servers > Application servers > MXServer > Ports. 3. Select the port to be used, for example, 9443. 4. Click View associated transports next to the 9443 port. The SSL Enabled status for the selected port must be Enabled. 5. Click WCInboundDefaultSecure. 6. SSL configuration (Centrally managed) is specified under SSL inbound channel (SSL 2). Click SSL inbound channel (SSL 2). 7. Click View centrally managed SSL tree. 8. Under Inbound, click the link for ctgCell01(CellDefaultSSLSetting,null). 9. Click Key stores and certificates. The truststore in use is identified as CellDefaultTrustStore. 10. Click CellDefaultTrustStore > Click Signer certificates. 11. Click Retrieve from port. 12. Fill in the following information to retrieve the certificate from the Tivoli Provisioning Manager server: v Host: The provisioning server host name. v Port: The SOAP SSL port for the provisioning server, for example, 8778. v Alias: Enter tpmuicert. Note: If port 8778 is not enabled on the SOAP server, you can try specifying 9443, which is the web interface port of the provisioning server. Both ports use the same certificate for the SSL communication, for example, tpmuicert. 13. Click Retrieve signer information. On the Configuration page, retrieved signer information such as Serial number, Issued to, Issued by, Fingerprint (SHA digest), and Validity period is displayed. 14. Click Apply, then click Save. The certificate is imported. 15. Synchronize the deployment managers repository with the nodes repository: a. Click System administration > Nodes. b. Select ctgNode01, then click Full Resynchronize. A confirmation for the successful synchronization of the two repositories is displayed. The certificate is now successfully imported into the truststore. 16. Restart the Service Request Manager. Results You have finished configuring HTTPS to ensure secure communication between Tivoli Provisioning Manager and IBM Tivoli Service Request Manager.
1245
Procedure
1. Click Go To > Integration > Provisioning > Process Artifact Generator. The Process Artifact Generator application is displayed. 2. Click Select Workflows. The Select Provisioning Workflows dialog is displayed. 3. On the Select Provisioning Workflows dialog, select one or more provisioning workflow names, then click OK. You can repeat this step to add more provisioning workflows to the list. To remove any workflow from the list, click Remove on the corresponding row. 4. If required, you can set up the configuration parameters for the selected provisioning workflows. For each parameter, the following options can be used: v Default Value: Enabled when DCMObjectLookup is not selected. Type in a value for your parameter, or use the default value. This value will be populated in the attribute value of the work order. v Description: (Optional) The parameter description. If provided, the description is displayed in the attribute value in the work order. v DCMObjectLookup: This option is to find a DCMObject ID by name, it is selected by default. Note: If a workflow parameter is a DCMObject ID that identifies a computer, a switch, a group, a software product, a software stack, a software module, a server group, a virtual server template, or a discovery, it is recommended that you select the DCMObjectLookup check box. This enables the artifact generator tool to generate the mapping, which allows you to select the existing data model objects when you specify the process attributes during the process workflow runtime. v Optional Parameter: It specifies whether the parameter is optional. The corresponding attribute description in the work order is marked accordingly. 5. In the Classification Name field, a unique classification name is already provided. You must replace it with a classification name that follows your companys naming conventions (for example, TPM\ACME.VMREQUEST). This classification name will be used later, associated with the work order, to map the process attributes in the provisioning workflow. 6. Click Generate. 7. Check all the messages that are returned, and ensure that the artifact generation completes without errors.
Results
This generates all the artifacts and actions for the selected provisioning workflows, one action per workflow. For example, if you selected one workflow, one action is generated. If you selected ten workflows, ten actions are generated.
1246
Next: Building process workflows Related concepts Runbook automation process on page 1235
Procedure
1. On the Process Management Requester screen, click Go To > System Configuration > Platform Configuration > Workflow Designer (Advanced). beside Select Action. 2. On the Workflow Designer (Advanced) page, click New Process 3. In the Process text box, type the name of the process workflow that you want to build. In the Object list, WORKORDER is the default object type. The bottom half of the Canvas tab displays the Launch on Demand Details for the process workflow to be built. The nodes that comprise your process workflow are represented graphically, with a Start node at the beginning of the process workflow, and a Validation node at the end. 4. Click the Connection icon on the Launch on Demand Details and link the nodes in the process workflow. 5. Double-click a connector to set up its action properties on the Action Properties dialog: > Select Value a. Next to Action, click Detail Menu b. On the Select Value dialog, select the action name. .
> Classification. c. Back on the Action Properties dialog, click Detail Menu d. On the Classification Search dialog, the action categories are listed, including the provisioning action categories for Software, Hardware, Virtualization, etc. Select the action category you want to work with, to add the corresponding provisioning action to the process workflow. e. Click OK. 6. Double-click any node to set up its properties on the corresponding Node Properties dialog. For example, you can: a. Edit the title of the start node on the Start Node Properties dialog, then click OK. b. Check the status and verify the progress of a task execution before it is complete on the Task Node Properties dialog. For doing that, under Role ID, click New Row, and then type in the Role ID. For Application, click Select Value c. Click OK. and select the application.
to save your process workflow. 7. Click Save Process 8. Click Action > Validate Process to validate the process workflow. 9. Click Action > Enable Process to enable the exection of the process workflow that you have just built and validated. 10. Click Action > Activate Process to activate the process workflow.
1247
Results
You have finished validating, enabling, and activating your process workflow. Next: Running process workflows Related concepts Runbook automation process on page 1235
Procedure
1. Create a work order, or select one that has been created before. To create a new work order: a. Click Go To > Work Orders > Work Order Tracking. beside Select Action. b. On the Work Order Tracking page, click New Work Order c. In the Work Order box, type a name for the new work order. Optionally, you can add a description for it. next to Classification, then click Classify. The Classify dialog is d. Click Detail Menu displayed. Select a TPM classification for the new work order, then click OK. 2. e. Click Save to save your work order. On the Work Order Tracking page, click the Specifications tab. It displays a list of generated specifications, which is automatically populated with all the workflow attributes that you have set up earlier. Click Action > Workflow > Route Workflow. On the Start Workflow dialog, under Process, select the process workflow you want to run, then click OK. Click Action > Workflow > View Workflow Map. The View Workflow dialog is displayed. The View Workflow dialog provides a graphical representation of the steps in the workflow execution and their status.
3. 4. 5.
Results
When the workflow execution completes successfully, it is marked as such on the Workflow Administration page. On the Logs tab, you can now see the TPM_TASK_ID and TPM_TASK_URL information. Copy the URL and paste it in a web browser to review the status of the provisioning workflow. When the workflow execution fails at one step, the failure is displayed on the View Workflow page. You have to move away from the View Workflow page and then reopen it to refresh the status of the workflow execution steps.
1248
Procedure
1. Verify that all requirements for the scenario were met as described in Requirements on page 1238. 2. If an error message with a message ID is displayed, search for the message ID in the information center or see the Tivoli Provisioning Manager Troubleshooting Guide for a description of the error message. 3. If a provisioning task fails during the tutorial, check any error messages generated by the provisioning workflows that are part of the task. For more information, see the Viewing workflow execution status from the Web interface topic. 4. Check the log files for error messages. The following log files contain information for the scenario:
Table 219. Log file locations Log files Runbook automation logs Provisioning workflow logs Description Location
Contain diagnostic information for Runbook automation log files the runbook automation. Contain the history of Viewing provisioning workflow logs provisioning workflows recorded in the provisioning workflow logs.
5. Check the Tivoli Provisioning Manager Support technotes and FAQs or the latest available fix pack readme file for information about known issues or updates to the documentation. Related concepts Runbook automation process on page 1235 Runbook automation problems and limitations on page 1250 Related reference Runbook automation log files
1249
2. Set the value of rba.log.enableCustomScriptLogging to 1, to enable logging within the Workflow Administration Advanced application. For each work order execution, the following information is available on the Log tab of the Workflow Administration Advanced application: v A link to the Task Tracking page on the provisioning server web interface. Open the URL in a web browser to review the workflow log. v The provisioning task ID. If a workflow implementation changes without a change in signature, action libraries must not be generated. If a workflow signature is changed, and actions still use the old signature, the deployment engine generates an error as the provisioning workflow fails. Related concepts Runbook automation problems and limitations Related tasks Troubleshooting the runbook automation on page 1249
Causes In the Maximo database, the length of the ACTION attribute is set to 200 characters. To accommodate action names that include longer provisioning workflow names, you must customize this length to a higher value. Resolving the problem Customize the length of the ACTION attribute as follows and then try the artifact generation again. 1. Click Go To > System Configuration > Platform Configuration > Database Configuration. 2. On the List tab, search for the ACTION object, and click its name. 3. Click the Attributes tab of the ACTION object, then select the ACTION attribute. 4. Update the Length value to 200 (recommended). to save the change and apply the setting. 5. Click Save 6. In the Maximo administrative workspace, go to <WAS_HOME>\AppServer\profiles\ctgAppSrv01\bin. 7. Enter the command: stopServer MXServer -username <wasadminuser> -password <wasadminuser_password>
1250
Go to c:\IBM\SMP\maximo\tools\maximo. Enter the command: dropbackup Enter the command: configdb Go to <WAS_HOME>\AppServer\profiles\ctgAppSrv01\bin. Enter the command: startServer MXServer
Parameters passed incorrectly from Service Request Manager to Tivoli Provisioning Manager: Symptoms If the working directory is a required parameter for a provisioning workflow, when a path using backslash signs is provided (for example, C:\dir1\dir2) the provisioning workflow fails on the provisioning server with the following error:
BMXAA4407E: A nested exception caused the workflow process to fail.
Causes Parameters are incorrectly passed from the Service Request Manager to Tivoli Provisioning Manager, meaning that backslash signs (\) are not accepted in Windows paths. Resolving the problem Instead of using the single backslash sign (\) as a directory separator in Windows paths, use either a double backslash sign (\\) or a forward slash sign (/). For example, instead of c:\dir1\dir2, use either c:\\dir1\\dir2 or c:/dir1/dir2. Insufficient memory for database synchronization: Symptoms During the database synchronization, the following error might be encountered in the SystemOut.log file:
BMXAA6359E - A runtime error for TPADBSYNCCRONTASK.TPADBSYNCCRONTASK1:null occurred.
Causes This is caused by an insufficient memory allocation in the WebSphere setting. Resolving the problem Increase the memory allocation as follows: 1. 2. 3. 4. Log on to the WebSphere administrative console in Service Request Manager. Click Servers > Application servers > MXServer. Expand Java and Process Management, then go to Process Definition, and Java Virtual Machine. Update the value of the Initial Heap Size to 1024, and the value of the Maximum Heap Size to 2048.
to save the changes. 5. Click OK, then click Save 6. Restart the IBM Tivoli Service Request Manager and WAS. Note: You must not only restart the Service Request Manager by restarting the MXServer, but rather restart the MXServer as well as the Node and Manager. For doing that, enter the following commands: v
Windows
1251
UNIX
Linux
Changing end point location requires database objects removal: Symptoms When the end point is changed to a new location, the existing objects in the database table are no longer valid. Resolving the problem Manually remove the content of the database table, to update the database objects for the new end point location. 1. Stop the TPADBSYNCCRONTASK cron task, as follows: a. Click Go To > System Configuration > Platform Configuration > Cron Task Setup. b. Search for TPADBSYNCCRONTASK, then select the cron task. to save the changes. c. Clear the Active check box to stop the cron task, then click Save d. Check the entries in the History tab frequently. When STOP is displayed and no error message occurs, the cron task is stopped successfully. Note: You might need to exit the page and then return to it to refresh the history entries. 2. Once the TPADBSYNCCRONTASK cron task is successfully stopped, open a database command prompt and run the following:
delete from tpadbsyncts delete from tpadcmobject
3. Start the TPADBSYNCCRONTASK cron task, as follows: a. Click Go To > System Configuration > Platform Configuration > Cron Task Setup. b. Search for TPADBSYNCCRONTASK, then select the cron task. to save the changes. c. Select Active to start the cron task, then click Save d. Check the entries in the History tab frequently. When START is displayed and no error message occurs, the cron task is started successfully. Note: You might need to exit the page and then return to it to refresh the history entries. Related tasks Configuring the Tivoli Provisioning Manager runbook automation adapter on page 1241 Installation of multiple PMP packages might fail: Symptoms A database error similar to the following might be encountered when you try installing more than one runbook automation adapter PMP:
com.ibm.db2.jcc.am.SqlSyntaxErrorException: "SHOWINTOPO" is not valid in the context where it is used.. SQLCODE=-206, SQLSTATE=42703, DRIVER=3.59.81
Causes
1252
In an ISM environment, multiple PMP packages might be installed, which could modify some database schema. This, in turn, could lead to an installation failure similar to this one. Resolving the problem Before proceeding with the PMP installation, ensure that you have a system or database backup. Contact IBM support for a workaround to this issue. For example, an update to the PMP content might be required to avoid the database error. DCMObjectLookup does not return new objects from Tivoli Provisioning Manager: Symptoms The data model objects are not found on the Service Request Manager. Causes The cron task that is used to synchronize the data model objects between Tivoli Provisioning Manager and Service Request Manager has not been activated, or the timer has not expired. Resolving the problem By default, the cron task runs once an hour, but the schedule can be customized as required. Ensure that the activation timer has not run out, or activate the cron task manually. To activate the cron task: 1. Click Go To > System Configuration > Platform Configuration > Cron Task Setup. 2. On the Cron Task tab, search for TPADBSYNCCRONTASK. 3. Select the Active check box for the cron task. 4. Click Save to save the change and apply the setting.
1253
v Data Model Object Lookup: Finds a data model object ID by name. The value found in the DCMObject table is mapped to a specific DCMObject ID. If this option is not selected, you can type in a value for your parameter, or use the default one. v Optional Parameter: Specifies whether the parameter is optional. The corresponding attribute description in the work order is marked accordingly. Generate Click this button to generate all the artifacts and actions for the selected provisioning workflows, one action per workflow.
Select Value
Enter the search criteria to retrieve the categories for the provisioning workflows. You can use % as a wildcard character for your search. Filter Searches for provisioning workflow category names that match a specified string of text. To see a filter field, click the Filter button, then enter your search string and click Enter. If you do not enter anything in the Filter field, and click Enter, all the categories are listed. To filter using different criteria, clear the filter fields. Provisioning Workflow Category Lists the available categories for the provisioning workflows.
1254
Notices
This information was developed for products and services offered in the U.S.A. IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM representative for information on the products and services currently available in your area. Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to evaluate and verify the operation of any non-IBM product, program, or service. IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of this document does not grant you any license to these patents. You can send license inquiries, in writing, to: IBM Director of Licensing IBM Corporation North Castle Drive Armonk, NY 10504-1785 U.S.A. For license inquiries regarding double-byte (DBCS) information, contact the IBM Intellectual Property Department in your country or send inquiries, in writing, to: Intellectual Property Licensing Legal and Intellectual Property Law IBM Japan Ltd. 1623-14, Shimotsuruma, Yamato-shi Kanagawa 242-8502 Japan The following paragraph does not apply to the United Kingdom or any other country where such provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you. This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice. Any references in this information to non-IBM Web sites are provided for convenience only and do not in any manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the materials for this IBM product and use of those Web sites is at your own risk. IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you.
1255
Licensees of this program who wish to have information about it for the purpose of enabling: (i) the exchange of information between independently created programs and other programs (including this one) and (ii) the mutual use of the information which has been exchanged, should contact: IBM Corporation 2Z4A/101 11400 Burnet Road Austin, TX 78758
U.S.A.
Such information may be available, subject to appropriate terms and conditions, including in some cases payment of a fee. The licensed program described in this document and all licensed material available for it are provided by IBM under terms of the IBM Customer Agreement, IBM International Program License Agreement or any equivalent agreement between us. Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. COPYRIGHT LICENSE: This information contains sample application programs in source language, which illustrate programming techniques on various operating platforms. You may copy, modify, and distribute these sample programs in any form without payment to IBM, for the purposes of developing, using, marketing or distributing application programs conforming to the application programming interface for the operating platform for which the sample programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore, cannot guarantee or imply reliability, serviceability, or function of these programs. The sample programs are provided "AS IS", without warranty of any kind. IBM shall not be liable for any damages arising out of your use of the sample programs.
Trademarks
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at Copyright and trademark information at www.ibm.com/legal/copytrade.shtml. Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries. IT Infrastructure Library is a registered trademark of the Central Computer and Telecommunications Agency which is now part of the Office of Government Commerce. Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both.
1256
ITIL is a registered trademark, and a registered community trademark of the Office of Government Commerce, and is registered in the U.S. Patent and Trademark Office. UNIX is a registered trademark of The Open Group in the United States and other countries. Java and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates. Other product and service names may be trademarks of IBM or other companies.
Notices
1257
1258
Index Numerics
20006 error for software package block 796 administrative console troubleshooting 799 administrative domains adding clusters 737 subdomains 737 cells and nodes 734 defining 736 overview 733 removing clusters 737 requirements 736 WebSphere Application Server clusters 734 administrative workstation changing the database table 192 administrator toolkit 689 agent manager administering and configuring 684 Authorization.xml file sample 684 AuthXMLAddUser command 685 cleaning up the database 689 components 682 configuring in WebSphere Application Server 108 default ports 675 duplicate agent registration 681 in SDI diagram 18 log files WebSphere Application Server run time 799 managing registration 675 recovery of agents 681 recovery service 683 registry configuration 680 size 680 removing expired agents 674 replacing certificates 687 resource manager registration properties 684 resource manager registration user 685 sample Authorization.xml file 684 server overview 682 TCP/IP ports 631 toolkit 681 troubleshooting cannot communicate with Tivoli Common Agent 786 installation fails with embedded WebSphere Application Server 802 agent recovery service HTTP connection 683 unsecured connection to agents 683 agent registration password 678 agentTrust.jks file 679 AIX approving compliance recommendations 925 creating system profiles 306 AIX (continued) LPARs 1016 NIM discovery 505 patch management approved patches 923 aquiring 922 considerations 884 customizing the scanning model 923 day-to-day tasks 922 discovering satellite server 920 discovering targets 920 distributing patches 926 grouping target computers 921 installing 926 missing patches 924 prerequisites for servers 918 process 914 requirements 918 setting up compliance 923 supported platforms 914 testing 922 tutorial 917 uninstalling 627 verifying compliance results 926 prerequisites for target computers 919 troubleshooting cannot scan for patches 1000 download of large number of patches fails 1000 installing technology level also installs service pack patches 998 patch download and distribution failure 999 replacing corrupted or deleted patches 999 Technology Level (TL) patches unavailable for AIX discovery setup 1000 VMControl 1040 WPARs 1027 ancestors master image versions 509 Anyplace Kiosk 381, 492 applications getting started 1 mapping to data model objects 1221 opening 30 architecture for provisioning components 14 attributes adding after integration with other products 1222 audit records 111 Authorization.xml file resource manager registration properties 684 sample 684
A
access rights overview 132 security groups 138 access rules adding and removing 1145 ACLs adding, editing, and removing rules 1146 activity plans as a provisioning task 1161 ad hoc reports 1198 adapters 10/100 EtherLink PCI Management Adapter by 3Com 382, 493 10/100 EtherLink Server Adapter by 3Com 382, 493 Ethernet Daughter Card 382, 493 IBM 10/100 EtherJet miniPCI adapter with 56K modem by 3Com 382, 493 IBM 10/100 EtherJet PCI Adapter with Alert on LAN 2 382, 493 IBM 10/100 EtherJet PCI Adapter with Wake on LAN1 382, 493 IBM 10/100 EtherJet PCI Management Adapter 382, 493 IBM 10/100 EtherJet Secure Management Adapter 382, 493 IBM 10/100 EtherJetminiPCI adapter with 56K modem (Intel current card) 382, 492 IBM 10/100 Ethernet Server Adapter 382, 492 IBM NetXtreme 1000 T Dual Port Ethernet Adapter 382, 493 IBM NetXtreme 1000 T Ethernet Adapter 382, 493 IEEE 1394/LAN Combo Card 383, 493 Intel Gigabit Copper (82543) PRO 1000 XT 383, 493 Intel Gigabit Copper (82544) PRO 1000 XT 383, 493 Intel PRO/100 SP Mobile Combo adapter 382, 492 Intel PRO/100S Desktop Adapter 382, 493 Intel PRO/100S Low Profile Desktop Adapter 382, 493 On board Ethernet Adapter for ThinkPad R30 383, 493 adding a virtual Fibre Channel adapter to an LPAR 1082
1259
boot servers (continued) AuthXMLAddUser command OS Deployment configuration 354, changing passwords 464 encryption key 686 VMControl 1040 resource manager registration 684 branch office automated hardware discovery 443 distributing software 584 automation software package creation 751 compliance 24 Brocade 20 Port FC switch module 384, deployment engine 20 494 deployment infrastructure 17 building device discovery 21 runbook process workflows 1247 life cycles 20 bundles managing operating systems 23 deployment and management 631 automation packages AIX_WPAR_Virtual_infratructure 1027 for regions, zones, depot servers 822 HyperV_Virtual_Infrastructure 1049 p-Series-Server 1016 cache size Solaris Sun Update Connection client and depot 608 Enterprise 984 calendar files 615 SolarisZones_Virtual_Infrastructure 1085 capabilities for software 699 VMControl_Virtual_Infrastructure 1040 capture virtual images 431 VMware_Virtual_Infrastructure 1060 CD/DVD automation packages email creating notification 38 using a wizard 275, 402 using command line 278, 405 CDS data source 107 CellBlades 295 backend storage for NPIV 1083 cells backups WebSphere Application Server 734 creating saved images 519 certificates images 392 agent manager base services creating 687 troubleshooting regenerating security broken link 64 certificates 687 broken link for shortcut 64 common agent 688 binding rules expired or revoked 683 automatic 347, 460 importing to the web interface 100 tutorial 347 change windows 1220 BIOS settings and updates 317 changePassword blade servers maximo user and database configuring remotely 1142 password 96 defined 45 checklist LPARs 1016 scalable distribution BladeCenter infrastructure 756 2-Port Fibre Channel Switch support 756 Module 384, 494 child server 6-pt Fibre Channel Switch creating 284, 415 Module 384, 494 promoting 285, 416 Advanced Management Module Cisco (AMM) 384, 494 Fiber Switch Module 384, 494 compatibility list 380, 490 Gigabit Ethernet Switch module 384, Copper Pass-Thru Module 384, 494 494 Gigabit Ethernet Expansion CIT Card 384, 494 changing installation path 633 HS20 Fibre Channel Expansion creating custom inventory Card 384, 494 extension 193 HS20 Fibre Channel Expansion Card including custom inventory extension Short Form Factor 384, 494 data 194 Optical Pass-Thru Module 384, 494 manual uninstallation 673 PCI Expansion unit (PEU) 384, 495 storing additional inventory data 191 related products 379, 490 testing custom inventory BMXAA0024E 122 extension 193 BMXAA3813E 125 wscanfs command 190 boot module TPMconfig.xml file 191 parameters 355, 466 clean-up-deployment-requests command boot servers COPDEX029E error 1185 KVM 1030 client cache size 608
clones 269 cluster domains adding new clusters 726 building using a template 724 creating new 723 resource relationships 731 device drivers associating 726 associating with resources 730 high availability 722 logical management operations 733 managing resources in groups 731 nodes adding 728 configuring 728 configuring automatically 726 deprovisioning 728 editing properties 728 node details 731 starting and stopping 728 overview 722 resources associating device drivers 730 creating and removing relationships 731 starting 730 software configuration templates 724 starting and stopping 731 status 728 types 722 WebSphere Application Server 734 clusters administrative domains associating to 737 removing from 737 CMS Java native library 131 key database 131 commands AuthXMLAddUser changing passwords 684 changing the password encyption key 686 creating users 685 EncryptAMProps 686 Tivoli Common Agent collecting diagnostic info 764 installation failure when using copy or put 772 list 766 troubleshooting error using clean-up-deploymentrequests 1185 error when running versionInfo 69 wscanfs 190 TPMconfig.xml file 191 common agent custom RHEL 6 installation 931 common agents changing default installation path 654 changing default port number 652 cleaning up the data model after the manual uninstallation 673
1260
common agents (continued) configuration template parameters 633 customizing 654 default ports 675 discovering after installation 645 discovery and health status report 575 error state records 680 inactive agents 681 installing cleaning up 673 DBCS 774 from the web interface 640 install-path variable 654 InstallStatus 645 on all target computers 570 overview 541, 635 requirements 547, 550, 552, 554 return codes 645 up-level over existing level 780 using DVD 641 using sudo 774 IP address 1146 prerequisites 547, 550, 552, 554 recovering unregistered agents 681 registering duplicates 681 with agent manager 675 removing old agents from the registry 681 software package blocks 581 replacing certificates 688 requirements for software deployments 546 running as a local administrator user 656 as LOCAL_SYSTEM 656 software stack 633 starting and stopping 652 status checkpoints 631 toolkit InstallStatus 650 runtime logs 650 UnInstallStatus 650 troubleshooting list of problems 763 return codes 645 uninstalling from individual computers 669 from provisioning groups 669 manual 670 manually 673 software 581 UnInstallStatus 645 when regular uninstallation fails 673 unregistered agents 681 upgrading InstallStatus 645 stand-alone procedure 668 supported versions 667 using a provisioning workflow 667 with the deployment engine infrastructure 667
common agents (continued) with the scalable distribution infrastructure 667 Common Inventory Technology installation removing 170 setting the path 164 compliance approviing recommendations Solaris 983 approving recommendations AIX 925 Red Hat Enterprise Linux 945 SUSE Linux Enterprise Server 967 defining multiple-rule security compliance check 854 in managing system life cycle 20 overview 24, 827 prerequisite checklist 838 process 833 reference 869 reports 1191 requirements 835 restricting software example 855 security roles 835 supported endpoints and platforms 838 the basics 828 troubleshooting check settings cannot be modified 866 checks are duplicated when computer is part of a group 865 checks are duplicated when computer is part of multiple groups 864 inventory scan will not run 865 list of known issues 858 no recommendation after system logging check 866 recovering from cocmpliance problems 867 remediation task cannot be run 864 Windows check does not recognize firewall 866 tutorial 844 user-defined compliance check example 856 verifying results Red Hat Enterprise Linux 948 SUSE Linux Enterprise Server 970 Windows 909 Compliance Analyst reports 1188 compliance checks creating for Windows 845 exporting for all computers and groups 841 for selected computers or groups 840 tools 839 for software 847 for software configuration templates 848 importing for all computers and groups 842
compliance checks (continued) importing (continued) for selected computers or groups 841 to different target computers 843 tools 839 overview 845 running 850 scheduling 851 security overview 869 using a model 846 composite images creating 511 prerequisites 511 computers adding a network interface card 1134 and removing 48 resources and parameters 1133 to application tiers and resource pools 54 checking health 47 configuring network interface 1135 discovering attributes 1223 finding inactive computers 228 object IDs 37 installing targets 23 Lenovo ThinkCentre ASI 381, 492 Lenovo ThinkCentre SSO 381, 492 Lenovo ThinkPad R52 381, 492 managing group members 42 remotely 49 targets 23 networking and IP addresses 1133 patching targets 25 rebooting 50 registering with Sun Update Connection 985 turning off and on 50 types of servers 45 viewing groups 42 viewing in Tivoli Storage Productivity Center 1214 conditional user interface cross-site scripting 144 preventing cross-site scripting 95 SQL injection attacks 144 Configuration Librarian creating saved images 519 image library 501 configuration template editing 654 configuring HTTPS 1244 runbook automation adapter 1241, 1253 console.log virtualization problems 1096 consumable size 66 COPCOM123E cannot execute commands in Cygwin 66 simple software product installation 625
Index
1261
COPCOM123Etroubleshooting adding MPIO hard disk fails 1107 COPCOM132E special characters in user names 123 COPCOM618E 255 COPDEX029E 1185 COPDEX123E 1002 cannot create virtual server 525 COPDEX172E 1102 COPINF002E 1001 COPINF050E software distribution fails on HP-UX 791 COPSWD087E synchronizing entries 505 CPU on virtual server templates 1072 credentials adding to virtual images 430 cross-site scripting 144 CTGDEC030E 1001 custom inventory extension creating 193 including data 194 testing 193 custom scan configuring the SMT or YUM repository 965 patches AIX 923 Red Hat Enterprise Linux 941 SUSE Linux Enterprise Server 964 YUM scan discovery 943 custom user registry LDAP 113 customizing length of Action attribute 1240 Cygwin cannot execute commands 66
D
data model objects mapping to applications 1221 database tables changing 192 DB2 103 configuring MXServer for SSL DB2 communication 106 configuring SSL 104, 111 database lock time-out 793 DB2 Control Center 192 dcm.xml for SSL DB2 connection 109 how to get a database report 181 managing compliance 874 remediation on 874 DB2COMM configuring SSL for DB2 104 registry variable 110 dcm.xml file 109 deleting virtual servers 1077 deleting virtual Fibre Channel adapters 1084 deploying software troubleshooting 756
deployment engine definition 20 OS Deployment 265, 392 overview of deployment 17 deployment engines managing multiple WinPE deployment engines 289, 420 Deployment Specialist distributing software 583 image library 501 reports 1188 virtualization 1060, 1087 deployments setting up by cloning images 269 virtual images 432 depot servers adding 819 automation package for managing large numbers of 822 creating Red Hat Enterprise Linux patch 939 Windows patch 901 data directory 820 default polling interval 542, 655 installing 540, 599 migrating published files 820 predeploying files 543, 1004 predeploying software patches 544, 1005 predeploying software products 544, 1004 publishing files 543, 1004 publishing software package blocks 578 publishing software patches 544, 1005 publishing software products 544, 1004 removing 821 troubleshooting software distribution issue 796 software product publish operation 808 undeploying files 545, 546, 1006, 1007 undeploying patches 545, 1006 undeploying software products 545, 1006 unpublishing files 545, 546, 1006, 1007 unpublishing software patches 545, 1006 unpublishing software products 545, 1006 uploading files 543, 1004 uploading software patches 544, 1005 uploading software products 544, 1004 viewing 819 depots cache size 608 failing distributions deleting 792 recreating 792
depots (continued) publishing SUSE patches 968 removing stacks 821 troubleshooting 792 device manager federated agents configuring the subagents manually 596, 598 with the federator automatically 597 with the federator manually 592 uninstalling 599 device manager service authentication 823 changing polling intervals and runtime values 662 deployment options 823 federated agents 823 federator 822 in scalable distribution infrastructure diagram 18 installing verification 666 job processing and results 824 timing explanation 663 log files console 666 installation, migration, and removal 666 logging and tracing 663 monitored by administrator 666 overriding the default job expiry interval 825 periodic connectivity 824 security 823 subagents 822 troubleshooting scalable distribution infrastructure 751, 989 timeout error for file distribution 789 using the console 665 DeviceName adding MPIO hard disk fails 1107 DHCP configuring for OS Deployment server 297, 424 for OS Deployment option 43 299, 426 option 60 298, 425 requirements 296, 423 directories default values 56 discovering NPIV resources 1081 discovery agent manager discovery 195 AIX workload partitions 200 AIX WPAR Discovery 1027 basic information 146 business applications defining 235 mapping 239 overriding rules 236 collecting information 233 common agent process 645 configuration file 174
1262
discovery (continued) consolidation rules different discovery configurations 229 different software installations 230 creating using wizard 231 creating report 569 custom composite applications mapping 210 database configuration details 214 discovering targets 568 finding computer attributes 1223 generate book 225 Hyper-V SCVMM Server Discovery 1049 hypervisors 439 identifying resources 227 in managing system life cycle 20 inventory KVM operating systems 507, 512 inventory discovery using the inventory extension 188 inventory extensions defining custom 184 importing the reports 188 running the reports 189 setting up the environment 175 inventory scans creating the custom tables in the data model 187 creating the inventory extensions 188 creating the pre script files 186 creating the properties files 188 customizing the CIT configuration file 186 library adapter process diagram 223 recent versions 224 Libvirts Virtual Hosts Discovery 1030 MAC address adding 226 mapping software 210 Microsoft Active Directory discovery running 196 Microsoft updates running 198 Network Address Translation support enabling 227 network discovery customizing 231 discovering environment 231 overview 154 performing 155 specifying a group 158 using RSA credentials 157 operating systems 195, 208 OS Deployment servers 296 overview 21, 145 PCI devices 202 process 150 provisioning groups 195 reports 1194 requirements 152
discovery (continued) rerunning the task 233 running the Tivoli Provisioning Manager Inventory Discovery scan 580 RXA discovery running 155 security roles 153 SNMP using 159 software requirements 153 Solaris target computers 979 Solaris zones 199 TADDM discovery business applications 234 computer extended attributes 207 creating the discovery 237 defining SAPs for computers 208, 836 hardware and software 205 overview 203 running 207 verifying results 238 viewing business applications 238 tracking progress 233 troubleshooting cannot associate software resources with software definitions 794 deadlock problems 250 deployment engine exception 254 discovery of Linux on zSeries 247 dual computer information after installation 251 errors for host platform servers 1106 failure on AIX WPAR target computers 255 HostPlatform Resource and Virtual Machine discovery error 1102 incorrect locale on Linux 250 incorrect value for cpu.type in data model 246 Initial Discovery provides limited information 245 inventory scan fails 247 IPv6 addresses on Windows XP 253 Libvert discovery misses virtual servers 1105 Libvirt host platform fails 1104 no hardware report information 246 only displays short names 246 recovering from problems 244 TADDM discovery failure 256 Windows Vista 251 wrong recommendation generated by password security check 868 tutorial 230 types 153 unknown resources 233 verifying computers and groups 228 resources 227 virtual centers 200 virtual servers 201
discovery (continued) VMControl 1040 VMware HostPlatform Resource and Virtual Machine Discovery 1066 VMware Virtual Center Discovery 1066 web logic configuration details 221 WebSphere Application Server discovery configuriation 219 software instances 203 without common agent 162 DiscoveryUploadUrl maintenance windows 613 disk space requirements for common agent registry 680 distributing software prerequisites 635 scalable distribution infrastructure setup 538, 589 using 584 target computers 547 distribution infrastructure adding a software package block to the software catalog 577 automated setup of the device manager federated agents 597 configuring subagents to communicate with the federated agent 596, 598 configuring the federated agent with the federator 592, 593 creating a software signature 577 deploying software 576 depot servers 817 distributing software package blocks 578 federated agents restarting after a reboot 598 installing manual installation of JRE 1.5 591 setting up the scalable distribution infrastructure 538, 589 software package blocks on targets 579 the device manager federated agent 538, 589 inventory and deployment reports 581 manual setup of the device manager distribution elements 593 publishing software package blocks 578 removing software 581 stopping the federated agent 598 uninstalling the device manager federated agents 599 uninstalling the federated agent 598 unpublishing the software 581 upgrading software package blocks on targets 579 validating the software installation 580 DMS_SYSTEM_JOB_PRIORITY maintenance windows 613 DMXAA0026E 129
Index
1263
documentation tip for reordering the information center 34 types of help 32 updates 1, 9 What's new 1 driver 337 DRS enablement on VMware cluster 1063 Dual Channel LSI Ultra320 SCSI controller 383, 494 dynamic content delivery accessing the administration console 820 authentication 816 automation package 822 cache size client 608 default 655 depot 608 deplot servers verifying published files 658 depot servers adding 819 installing 540, 599 managing 817 removing 821 disabling peering 815 distributing software 543, 545, 1004, 1006 downloading files bulk data 810 peering 815 sharing 815 dual stack of IPv4 and IPv6 816 log files configuration of properties 658 maintenance windows 613 management center 813 peering enabling and disabling 815 enabling on dual stack of IPv4 and IPv6 816 peer-to-peer file sharing 815 publishing files to depot servers 543, 544, 1004, 1005 regions 818 managing 818 removing 818 security 816 software distribution 810 trimming data 814 troubleshooting cannot reinstall depots after removal 805 depot information 804 depot stack not removed on uninstall 807 Dynamic Depot Selection (DDS) algorithm 657 incorrect used space value on depot 807 management center 809 overview 804 silent installation of management center fails 806
dynamic content delivery (continued) unpublishing files from depot servers 545, 546, 1006, 1007 uploading files to depot servers 543, 544, 1004, 1005 zones 818 adding 818 dynamic groups creating 39 definition 78 types for security groups 143
everyday tasks getting started 37 expired agents removing 674 export virtual images 434
F
FAQs 55 FAStT EXP500 Storage Expansion Unit 382, 492 FDCC COPCOM618E error 255 Fibre Channel adapter resource requirement 1081 fibre channel switches 1156 file access module parameters 356, 467 file distribution troubleshooting device manager timeout is low 789 dual stack 789 fails when deleting and recreating 792 file repositories adding files 604 adding network interface cards 603 creating YUM or SMT on SUSE 959 for patch download 604 overview 602 file system requirements for target systems 283, 414 file transfer operations maintenance windows 613 filter searching tables and using wildcards 30 FIPS PKCS12 92 upgrading JDBC 103 firewall component overview 739 connecting through unidirectional firewall 747 through unidirectional firewall with additional network 748 enabling support for common agent 742 example 1 747 example 2 748 generating the keystore 742 setting up the gateway manager 742 starting the components 742 firewalls networking overview 1131 fix 9 Flash archives 311 form base authentication configuring 99 enabling the Applications tab 93 frequently asked questions 55
E
electronic signatures auditing 111 email disable password notification 125 report notifications 1188 email notification 38 email notification for NPIV 1078, 1084 EMAILTYPE translation errors non-English install 72 Emulex 4Gb SFF Fibre Channel Expansion Card 384, 494 EncryptAMProps command 686 endpoint distributing software package blocks 578 patch scan Windows 788 properties file 682 enhancements 1 enterprise discovering resources 21 life cycle management 20 patching 25 software distribution 23 error messages clean-up-deployment-requests command 1185 database lock timeout 70 default insert site configuration 72 deploying SPB 797 GUID installation fails 769 locale incorrectly displayed in English 71 old download plans 797 provisioning workflows shell command error 796 Tivoli Common Agent fails if already installed 775 installation failure on Red Hat 5 771 upload server time out 792 eServer 325 380, 490 eServer 326 380, 490 ESX server creating an unattended setup image 1061 creating on a target 1062 error creating a virtual server 1101 managed by VirtualCenter 1062 registering 1063 Ethernet adapters OS Deployment 382, 492
1264
G
gateway manager 742 generate request page reports 1188 generating process artifacts 1246 getting started everyday tasks 37 the basics 10 global agent configuration 570 global variable AM.Discovery.Thread.Count 250 DiscoveryConcurrencyLevel 250 golden master capturing images 315 groups creating 39 GSKit configuring SSL for DB2 104 key manager troubleshooting 131
H
hard disk adding to virtual server templates 1072 hard disks adding 1075 to existing virtual servers 1075 to LPARs 1016 adding multiple 1016 moving virtual servers 1077 hardware adding resources Solaris Zones virtual server templates 1090 VMware virtual server templates 1072 administering remotely 1142 OS Deployment compatability list 379, 490 creating configuration images 317 creating configurations 322 creating environments 318 requirements for target systems 281, 412 working with configurations 317 Hardware abstraction layer (HAL) 339, 452 hardware and software requirements for NPIV 1080 hardware discovery 164 hypervisor and virtual servers 443 Hardware Management Console for VMControl 1040 troubleshooting errors appear scrambled 1180 health 47 heartbeat function 682 high availability disaster recovery alternative technologies 1129 architecture overview 1110 cluster domains 722 configuring 1120 installing 1120
high availability disaster recovery (continued) introduction 1109 primary installation 1120 secondary installation 1121 solution architecture 1116 solution architecture diagram 1117 solution constraints 1113 steps for disaster recovery 1127 the basics 1109 Tivoli Provisioning Manager for OS Deployment 1127 Tivoli System Automation for Multiplatforms installation 1122 integration 1119 HMAC-SHA1 keyed-hashing 686 HMC see Hardware Management Console 1016 host platform servers definition 1013 discovering 441 Solaris 1089 VMware 1066 initial discovery for Solaris 1088 KVM 1030 moving LPARs 1016 virtual servers 1077 troubleshooting application opens too slowly 1106 discovery errors 1106 Libvert discovery fails 1104 HostPlatform Resource and Virtual Machine discovery error 1102 HotFix creating 334, 448 HP-UX patch management considerations 884 reference 985 Tivoli Common Agent cannot register 776 troubleshooting software distribution fails 791 HTTP SAP 1065 HTTP server port for agent recovery 683 Hyper-V 1049 hypervisors discovering 441 KVM 1030 requirements VMWare 4.0 408
I
IBM AIX NIM Discovery synchronizing images 505 IBM HTTP Server managing compliance 877 IBM System p booting in OS Deployment 294 VMControl 1040 IBM Systems Director VMControl 1040
IBM TotalStorage DS4100 382, 492 DS4300 382, 492 DS4400 382, 492 DS4500 382, 492 FAStT100 382, 492 FAStT600 382, 492 FAStT700 382, 492 FAStT900 382, 492 iKeyman utility 679 image library basics 498 composite images prerequisites 511 importing OVF master images 513 overview 497 OVF master images 525 prerequisites 501 provisioning administrator 501 publishing images 520 saved images overview 517 synchronizing entries 497 terminology 498 troubleshooting 522 KVM virtual server cannot be deleted 526 user roles 501 image monitor 392 image properties associating with images 327 customizing 327 image repositories synchronizing entries 304, 430 image repository creating 502 KVM 1030 synchronizing 505 synchronizing entries 505 image respository troubleshooting refused connection error 525 images bindings 324 drivers 324 exporting to OVF 446 installing 461 OS Deployment capturing golden master 315 creating unattended setup 304 deployment process 269, 398 editing properties 323 installing 349 Linux on Intel 307 Linux on PowerPC 308 managing 259 managing operating systems 268 preparing the source computer 312 software modules for 332 Solaris 308 synchronization 304, 430 Windows 305 point-in-time snapshot 316 replication 434 requirements for operating system 270 Index
1265
images (continued) saving LPARs 1016 software modules for 447 types for operating systems 272 importing inventory extension reports after installation 182 setting up parameters for importing inventory extension reports 182 installation agent manager fails with embedded WebSphere Application Server 802 common agents 541, 635, 640, 645 and subagents 641 registration request rejected by agent manager 787 creating image 641 device manager verification 666 directories 56 dynamic content delivery silent installation of management center fails 806 GUID fails on Windows 769 images 461 incorrect information with Tivoli Common Agent 784 resource manager SSLHandshakeException error 773 Tivoli Common Agent fails if already installed 775 fails on Solaris 770 fails on Solaris SPARC target computers 770 fails when using copy or put commands 772 fails with invalid password 775 failure on AIX WPAR 1103 failure on Red Hat 5 771 files deleted on restart 776 installation fails 768, 772, 774 on Security-Enhanced Linux 768 SSLHandshakeException error 773 troubleshooting 767 agent manager 767 error after installing 7.2 on Windows 65 virtual images 461 Web interface extension on a hypervisor 442 rbagent 428 installing RHEL 6 with optional packages 931 runbook automation adapter PMP 1240 Tivoli Common Agent installation fails 769 instance images creating a repository 502 definition 498 viewing 508, 514 instance level security restriction 131 Integrated Virtualization Manager 1016
integration Tivoli Storage Productivity Center 1214 with other products 1211 with Tivoli Monitoring 1211 Intel Copper Switch Module 384, 495 IntelliStation M Pro 381, 491 interim fix 9 Internet Explorer hangs when viewing multiple report results 1208 non-English information center displayed in English 66 intial discovery Solaris host platform servers 1088 inventory configuring networking devices 1131 inventory discovery software 169 Inventory discovery SDI environment setting global variables 163 inventory extensions creating custom data output files 178 custom table 176 inventory extention 181 pre and post scripts 177 properties file 179 the environment 175 custom report 184 customized 175 environment set up 183 running 183 IP addresses adding blocked IPs for a subnet 1138 enabling for SDI 1146 IPv6 for the provisioning server 1153 examples 1133 not displayed on web interface 257 IPv4 comparing to IPv6 1148 file distribution error 789 troubleshooting updgrading common agent or depot 763 IPV4 dynamtic content delivery 816 IPv6 benefits 1148 cannot discover addresses on Windows XP 253 dual stack network 1148 enabling for SDI 1146 in the operating system 1151 enabling on the provisioning server 1153 limitations 1149 management IP 1153 supported scenarios 1149 IPV6 dynamtic content delivery 816 IVM 1016
J
JDBC upgrading 103
K
key management utility 679 key performance indicators 1204 keyed-hashing algorithm, HMAC-SHA1 686 keys encryption 686 keystore 742 error importing 130 KVM adding a mount point 502 creating a repository 502 for OS Deployment 410 importing OVF master images 513 resizing disks 1030 resource allocations 1030 synchronizing images 505 troubleshooting cannot be deleted from the agent 526 refused connection error 525 virtual server states 1067
L
language pack creating 333, 448 languages Latin supported for user names 128 last known status 45 LDAP accessing 119 attribute 119 failed login limit 94 group management 113 overview 113 sample information 115 Tivoli Directory server sample 115 user management 113 library adapter 223 Libvirt discovery misses virtual servers 1105 host platform discovery fails 1104 Virtual Hosts Discovery 1030 Linux images creating unattended 307 creating unattended on PowerPC 308 KVM 1030 troubleshooting cannot import software signature 794 common agent cannot read GUID on startup 784 common agent installation fails 768 common agent installation fails on Red Hat 5 771 discovery of zSeries 247
1266
Linux (continued) troubleshooting (continued) no compliance recommendation after system logigng check 866 problems on System z 247 provisioning server does not start 68 wrong locale discovered 250 load balancers adding and editing 1136 configuring routing 1137 switch functionality 1137 description 1131 networking 1132 locales cannot log on to Turkish computer 60 error messages incorrectly displayed in English 71 Linux incorrect discovery 250 system variables and attributes 36 Web interface displays English on non-English information center 66 log files agent manager WebSphere Application Server run time 799 device manager 664 console 666 installation, migration, and removal 666 lightweight 667 monitored by administrator 666 trace logs 663 dynamic content delivery configuration of properties 658 for Tivoli Enterprise Console 1227 image library 522 Remote Execution and Access (RXA) enabling 803 setting up default cleanup 658 Tivoli Common Agent collecting from target computer 765 list 765 troubleshooting inventory discovery 244 UNIX file system capacity exceeded 70 virtual servers 1095 WebSphere Application Server 664 when generating request pages 1208 logging off changing the automatic setting 32 the provisioning server 28 logging on cannot access Web Interface 60 cannot change password 61 cannot see Start Center 63 problems with Turkish locale 60 reports on users 1196 the provisioning server 28 troubleshooting 60
logical management operations cluster domains 733 login lockout for resource manager 685 LPAR troubleshooting adding MPIO hard disk fails 1107 LPARs Integrated Virtualization Manager 1016 troubleshooting cannot synchronize with WPAR 1104 recovering from problems 1096 VIO servers 1016 virtual server states 1067 VMControl 1040 LPARS creating multi-disk LPARs 1016 moving to host platforms 1016 resizing disks 1016 resource allocations 1016 LSI 1068 controller 383, 494 LSI MegaRAID IDEal RAID controller 383, 494 LSI MegaRAID SAS 8408E controller 383, 494 LSI-SAS RAID controllers 383, 494
M
machine types 4347 380, 491 4362 380, 491 4363 380, 491 4364 380, 491 4365 380, 491 4800-722 381, 492 4800-723 382, 492 4800-743 381, 492 4800-782 381, 492 4810-33H 381, 492 4836-132 381, 492 4838-137 381, 492 4838-520 382, 492 4838-720 382, 492 4840-544 381, 492 4846-565 381, 492 4851-5x4 381, 492 6625 381, 491 7971 380, 490 7972 380, 490 7973 381, 491 7977 381, 491 7978 381, 491 7979 381, 491 7981 380, 490 7984 381, 491 7985 381, 491 7996 380, 490 8480 380, 490 8482 380, 490 8485 380, 490 8486 380, 490 8647 380, 491 8648 380, 491 8649 380, 491
machine types (continued) 8670 380, 491 8671 380, 491 8673 380, 491 8676 380, 491 8685 380, 491 8832 380, 490 8835 380, 490 8836 380, 491 8837 380, 491 8839 380, 490 8840 380, 491 8841 380, 491 8843 380, 490 8848 380, 490 8849 380, 491 8850 380, 490 8853 380, 490 8863 380, 491 8864 381, 491 8865 380, 491 8866 381, 491 8870 380, 491 8872 380, 491 8877 381, 491 8878 381, 491 8886 380, 490 9229 381, 491 maintenance operations creating reports 617 pause/resume functionality 613 maintenance windows configuration 613 defining 613 parameters 613 planning 687 reporting 617 scalable distribution infrastructure 613 syntax 615 VCALENDAR Properties 615 VEVENT Properties 615 management center database performance 814 trimming data 814 Management Information Format see MIF 190 manually created MAC addresses 1107 master images capturing 507 composite images 512 creating a repository 502 creating versions 509 definition 498 deploying create a new computer 508 on an existing computer 510 importing OVF packages 513 KVM 1030 overview 504 publishing composite images 520 single images 520 synchronizing 505 troubleshooting create virtual server 525 Index
1267
master images (continued) troubleshooting (continued) OVF images 525 VMControl 1040 VMware troubleshooting 524 MAXADMIN creating a duplicate user 90 security 79 Maximo changing the user password 96 creating users 85 Maximo administrator user 131 maximo.properties 96 error after update 131 Microsoft Software Installer (MSI) 335, 449 Microsoft Active Directory new security group not displayed 123 PKCS12 92 running discovery 196 troubleshooting installation of Tivoli Common Agent fails 249 inventory scan fails 247 no hardware report information 246 only displays short names 246 verifying discovered resources 228 Microsoft Internet Explorer importing the certificate 95 Microsoft Updates Discovery troubleshooting fails on UNIX and AIX 249 Windows parsing error 998 MIF output 190 mount points adding to image repository 502 Mozilla Firefox importing certificates 95 MPIO 1016 adding hard disk fails 1107 multiple images 392 multiple server architecture replication manual 358, 469 scheduling 358, 468 MXServer configuring for SSL DB2 communication 106 myoutput.mif 190 Myrinet Cluster Expansion Card for BladeCenter 384, 494
network boot (continued) overview 273, 400 parameters 356, 467 USB drive command lines 276, 403 wizard 274, 401 without PXE 274, 401 network share module reference 357, 468 networking adding MAC address on discovered computers 226 configuring subnetworks 1138 IP addresses and examples 1133 linking a computer 1136 new in fixpack 1 NIC on virtual server templates 1072 NICs adding to file repositoriesfile repositories 603 hostname override 631 managing multiples 631 nodes cluster domains 728 WebSphere Application Server 734 Nortel Copper L2/L3 Switch Module 384, 494 Fibre L2/L3 Switch Module 384, 494 Network Layer 2-7 GbE Switch Module for BladeCenter 384, 495 not found DCM object 1253 provisioning workflow 1253 notification 35 NPIV requirements 1079 NPIV-enabled LPAR 1081 NPIV-enabled LPARs 1078
O
object ID finding 30, 37 object structures 1196 OEM installation 645 Open Services Gateway Initiative 630 operating system management basics 261 target system requirements 281 tutorial 301 operating systems deploying reference 351 discovering 208 in managing system life cycle 20 managing 23, 259 overview 259 prerequisites for managing 279 requirements for software deployment 546 requirements for target systems 282, 412 support for compliance 838 Oracle Database compliance managing 874 parameters for TADDM 836
Oracle Database (continued) compliance (continued) running recommendations 874 error messages upload server time out 792 OS bootable media devices CD/DVD command lines 278, 405 wizard 275, 402 USB drive command lines 276, 403 wizard 274, 401 OS configuration parameters modifying 360, 470 OS configurations binding 347, 459 OS Deployment deployment process 269, 398 managing multiple WinPE deployment engines 289, 420 operating system management process 268 server files backup 350 unattended setup image for ESX server 1061 OS deployment server command lines keeping confidential 345, 458 components 265, 392 replicating 358, 468 OS Deployment server CellBlades 295 configuring DHCP 297, 424 upgrading 352 OS Deployment servers system requirements 280, 411 OS Deployments virtual images replicating 445 OS management 407 OSGi branch office overview 584 bundles 630 OVF exporting an image 446 images 434 virtual images 434 importing composite master images 513 virtual images 436 master images 525
P
page Provisioning Task Tracking 55 refresh 55 return to previous 55 parameters base parameters 354, 464 file access module 356, 467 paravirtualization 1030 partitions browing files 331 changing layout 331
N
NAT server IP address change 784 netmask Solaris Zones 1091 network boot CD/DVD command lines 278, 405 wizard 275, 402 configuring for Solaris 293
1268
passwords adding to virtual images 430 agent registration 678 disable email notification 125 encryption key, changing 686 troubleshooting @ symbol is not supported 1003 cannot change the user password 124 patch management acquiring Windows patches offline 893 AIX approving recommendations 925 aquiring patches 922 commit feature 884 configuration 915 customizing the scanning model 923 day-to-day tasks 922 discovering targets 920 grouping target computers 921 installing 926 supported versions 914 testing 922 verifying compliance results 926 creating zones, regions, and depot servers 901 cross platform support 884 customizing the scanning model 965 deploying patches 1004 deploying patches and upgrades 25 discovering target computers 898 HP-UX 985 in managing system life cycle 20 installing patches individually UNIX and Linux 609, 1009 Windows 609, 1010 manually defining patches 707, 1007 offline patch acquisition through SDI 893 overview 877 process AIX 914 Red Hat Enterprise Linux 929 Solaris 975 SUSE Linux Enterprise Server 953 Windows 887 proxy server platform considerations 884 Red Hat Enterprise Linux approving compliance recommendations 945 approving in the data model 942 configuration 931 creating YUM repository 936 creating zones, regions, depot servers 939 day-to-day tasks 941 distributing patches 946 grouping target computers 935 installing patches 947 proxy server 938 publishing to depots 945 required software 940 supported platforms 928, 949 testing 942
patch management (continued) Red Hat Enterprise Linux (continued) verifying compliance results 948 reports 1193 Solaris add Sun Update Connection to data model 980 configuration 976 day-to-day tasks 981 installing patches 983 registering computers with Sun Update Connection 985 Sun Update Connection automation package 984 supported environments 974 verifying compliance results 983 SUSE creating YUM or SMT repositories 1089 SUSE Linux Enterprise Server approving compliance recommendations 967 approving patches 965 configuration 955 creating regions, zones, depot servers 961 day-to-day tasks 963 discovering and grouping targets 958 distributing patches 969 installing patches 970 installing software on targets 963 managing patches 971 proxy server 960 publishing patches to depots 968 supported platforms 952 testing patches 965 tutorial 955 verifying compliance results 970 the basics 877 troubleshooting checklist 993 duplicate patch recommendations 997 exclusive patches not installed 1001 patches not aquired if Red Hat Enterprise Linux has no SSL 1002 RHEL using SSH 1001 WUA install fails on Windows 7 1003 tutorial AIX 917 Red Hat Enterprise Linux 5 932 Red Hat Enterprise Linux 6 932 Solaris 977 Windows 895 uninstalling support by platform 884 using the MS_Patch_Offline_For_SDI automation package 893 Windows approving patches 906 aquiring patches 904 compliance recommendations 908 configuration 889
patch management (continued) Windows (continued) creating patch server 899 distributing patches 908 installing patches 909 process 887 required software on targets 903 requirements 896 testing 906 turn off automatic updates 905 verifying compliance 909 Windows Server Update Services 911 patch scan SDI 788 patches configuring file repositoriesfile repositories 604 deploying with SDI 702 path variables 56 pause/resume functionality configuration 613 implementation 613 maintenance operations 613 maintenance windows 613 parameters 613 reporting 617 syntax rules 615 peer domain cluster domains 722 peer-to-peer file sharing dual stack of IPv4 and IPv6 816 permissions adding to security groups 83 provisioning workflow 83 PKCS12 92 point-in-time snapshot capturing 316 polling intervals default 542, 655 device manager service 662 portlets cannot create graph with data model objects 67 ports 80 and 9513 682 8442 1040 9443 100 9510 652 agent manager 631 common agents 631 TCP/IP 631 POWER resource allocations 1016 VMControl 1040 power units and outlets 1142 PowerVM creating a repository 502 synchronizing images 505 prerequisites common agents 547, 550, 552, 554 installation media 566 Oracle 836 software deployments for AIX targets 546 for HP-UX targets 546 Index
1269
prerequisites (continued) software deployments (continued) for RedHat Linux targets 546 for Solaris targets 546 for SUSE targets 546 target computers AIX 562 HP-UX 565 RedHat Linux 560 SLES 561 Solaris 563 Windows 546, 556 WebSphere Application Server 836 private key 809 process workflows generating artifacts 1246 properties agent manager 679 impact from password changes 679 registration 684 provisining groups troubleshooting all objects listed 129 Provisioning Administrator discovery 146 image library 501 reports 1188 virtualization 1060, 1087 provisioning applications access control 84, 88 in managing system life cycle 20 provisioning computers displaying quickly the general page 55 quick server provisioning 52 running quick discovery 51 Provisioning Configuration Librarian discovery 146 reports 1188 provisioning groups adding and removing members 41 adding resources 40 AIX target computers for patch 921 combining queries 43 creating 569 creating data restrictions 45 definition 38 deleting 40 grouping together 44 members 42 nesting 41 reports 1193 running compliance checks 850 running quick discovery 42 scheduling and running compliance recommendations 852 scheduling compliance checks 851 security issues 44 security purposes 44 setting security constraints 44 troubleshooting can be changed without permission 121 types 143 uninstalling common agents 669 viewing 42
provisioning server does not start on Linux 68 does not start on Windows 68 logging on and off 28 troubleshooting cannot register target computers in firewall 777 Java Virtual Machine error 1183 SSH error 1183 provisioning settings reports 1195 provisioning task troubleshooting refused connection error 525 Provisioning Task Tracking 55 provisioning tasks adding to processes 1176 attaching an assisted workflow 1177 benefits 1157 bookmarking 1173 canceling 1172 claiming and initiating for a process 1178 creating 1161 creating a group from results 1174 creating a report 1173 deleting 1172 displaying a graphical view 1169 editing 1170 enabling automatic refresh 1169 integration with IBM Service Management 1174 key concepts 1157 managing definitions 1161 managing submitted tasks 1170 overview 1157 provisioning workflows and activity plans 1161 refreshing the target list 1166 reports 1194 requirements 1160 requirements for 1160 rerunning 1167 rescheduling 1171 restricting access 1169 running 1165 security roles 1160 setting a concurrency level for all 1162 setting a time limit 1168 sharing with users 1163 submitting and tracking 1164 tracking progress 1165 troubleshooting cannot be scheduled and submitted 1182 cannot delete 1182 HMC errors appear scrambled 1180 unsharing 1164 viewing by target computer 1167 viewing history 1164 provisioning workflows and provisioning tasks and activity plans 1161 and the deployment engine 20 as a provisioning task 1161
provisioning workflows (continued) deploying 20 enabling event transmissions 1229 permissions for security groups 87 receiving events 1228 report 1195 sending events 1225 sending provisoning server events 1227 starting from Tivoli Enterprise Console 1228 TCA_DeleteServerFromAMAndDCM 689 troubleshooting incorrect info during Tivoli Common Agent installation 784 proxy server patch management considerations 884 for Windows 900 Red Hat Enterprise Linux 938 pSeries creating multi-disk LPARs 1016 increasing virtual disk size 1030 virtual server template 505 publishing images individual 520 PXE booting without 274, 401 rogue servers 350 security breach 350
Q
Qlogic 4Gb SFF 383, 494 4Gb Std 383, 494 iSCSI Expansion Card for BladeCenter 384, 494 QLogic 4Gb Fibre Channel Switch Module 384, 494 quick server provisioning physical server 52 virtual server 52
R
RAID configuration 317 ramdisk creating from a bootable diskette 344, 457 WinPE2 288, 419 rbagent installing 442 reboot notification setting up on targets 610 Red Hat Enterprise Linux compliance results 948 patch management approved patches scan 944 approving compliance recommendations 945 approving patches 942 considerations 884 creating YUM repository 936
1270
Red Hat Enterprise Linux (continued) patch management (continued) creating zones, regions, depot servers 939 customizing the scanning model 943 day-to-day tasks 941 distributing 946 grouping target computers 935 installing 947 overview 929 prerequisites for server 934 prerequisites for target computers 935 process 929 proxy server 938 publishing to depots 945 required skills 933 required software 940 requirements 933 scalable distribution infrastructure 935 setting up compliance 943 supported platforms 928 supported platforms for RHEL 4 949 testing patches 942 tutorial 932 verifying compliance results 948 YUM Scan discovery configuration 943, 965 troubleshooting patches not aquired 1002 SSH 1001 Red Hat Linux custom installation for common agent support 931 RedHat KVM 1030 reference computer 312 reference image 310 refresh page 55 regions adding 818 automation package for managing large numbers of 822 creating for RHEL patching 939 creating for Windows patching 901 removing and changing 818 registration duplicate 681 password 678 reregistering 681 resource manager users 685 registry overview 682 retention period 680 size estimate 680 remediation actioning 852 on DB2 874 on IBM HTTP Server 877 on Oracle database 874 on WebSphere Application Server 875 scheduling and running 852 task overview 851
Remote Execution and Access (RXA) cannot connect with UNIX target computers 804 enabling logging 803 enabling on Windows target computers 803 troubleshooting 803 replication image 434 manual 358, 469 overview 284, 414 schedule 358, 468 server status 359, 469 reports ad hoc running 1200 attributes 1202 collecting discovered information 233 creating ad hoc report 1198 for compliance 1191 for discovery 1194 for patch management 1193 for provisioning global settings 1195 for provisioning groups 1193 for provisioning task tracking 1194 for provisioning workflow 1195 for virtualization management 1195 generate request page 1188 generating deployment reports 581 generating inventory reports 581 getting started 1188 listing custom reports 184 missing information when saved in CSV format 1207 object structures 1198 overview 1187 predefined 1187, 1190 for users logging on 1196 running 1200 prerequisites 1188 report view descriptions 1198 troubleshooting 1205 ad hoc report PDF file does not open 1209 corrupted text 1205 garbled text when saved to CSV format 1207 Microsoft Internet Explorer hangs 1208 user roles 1188 virtual servers 1095 requirements compliance 835 software dependencies 695 target systems 281 requirements for virtual Fibre Channel adapters 1079 reset interval 686 resource allocations KVM 1030 LPARs 1016 VMware 1076 resource manager attacks 685 changing registration password 684
resource manager (continued) changing the registration password 684 creating users 685 definition 630 installation SSLHandshakeException error 773 registration fails because of agentTrust.jks file 779 registration properties changes 684 resource members associating to administrative domains 737 resource pools adding computers 54 resources adding to computers 1133 adding to virtual server templates 1072 creating a group 39 creating dynamic groups 39 creating static groups 39 management overview 13 return codes for common agent installation 645 roles mapping 115 OS management 279 user roles 279 runbook automation 1238 virtual image management 406 user roles 406 rollback feature disabling 718 enabling 718 overview 717 removing backup software package blocks 719 setting a global variable 718 root password for Solaris Zones 1091 routers networking overview 1131 RSA credentials 809 runbook activating cron task 1241, 1253 activating escalation 1241 automating tasks using process workflows 1230 automation process 1235 building process workflows 1247 configuring HTTPS for secure communication 1244 configuring the runbook automation adapter 1241, 1253 customizing length of Action attribute 1240 installation of automation adapter PMP 1240 log files 1249 problems and limitations 1250 reference information 1231 running process workflows 1248 setting up logging level 1241
Index
1271
runbook (continued) setting up web service end point 1241, 1253 software requirements 1239 troubleshooting 1250, 1251, 1252 user roles 1238 Runbook hardware requirements 1238 requirements 1238 software requirements 1238 running runbook process workflows 1248 RXA for SCVMM server 1049 RXA discovery 155
S
SAN LPARs 1016 SAN and SAN fabrics 1156 SAN disks adding disk resources fails 1107 Sarbanes-Oxley reporting 853 SAS 2-port CFFv daughter card 383, 494 SAS Expander Switch Module 383, 494 saved images creating 519 creating a repository 502 creating a virtual server 520 definition 498 LPARs 1016 multi-disk virtual servers 1075 overview 517 publishing 520 troubleshooting KVM virtual server cannot be deleted 526 TCA_pingAgent fails 526 scalability cluster domains 722 deployment infrastructure overview 17 scalable distribution infrastructure 18 components 535 maintenance on target compouters 613 tutorial 567 scalable distribution infrastructure access rights 547 creating the infrastructure 572 deploying software 529 diagram 18 enabling IP addresses 1146 overview components 535 process 533 overview of deployment 17 requirements 546 Scalable Distribution Infrastructure tutorial managing Windows patches 895 scan.period maintenance windows 613 screensaver compliance checks 869 SCVMM server 1049
SDI patch scan Windows 788 see scalable distribution infrastructure 529 trace log 788 searching and filtering 30 tables 55 Secure Sockets Layer (SSL) protocol 682 security 350 avoiding vulnerability issues 350 certificates 128 certificates for common agent 675 configuration tasks 89 creating custom groups 85 creating duplicate MAXADMIN 90 creating security groups 84 data model object finder maximo 88 duplicate agent registration 681 dynamic content delivery 808 everyday tasks 89 groups duplicate records 122 Favorite applications 126, 127 LDAP 113 logs 119 MAXADMIN logon 126 network 351 overview 75 provisioning server cannot register target computers in firewall 777 PXE breach 350 Tivoli Common Agent error during registration 778 troubleshooting all objects are listed in group 129 cannot change passwords in web interface 124 CMS Java native library 131 error importing to keystore 130 error updating maximo.properties 131 only Latin supported for user names 128 provisioning groups can be changed 121 removing users 129 special characters in user names 123 user adding task to plan 122 user not logged off after session expires 62 user not logged off on timeout 123 users and groups are not synchronized 127 tutorial using LDAP 80 using Maximo 85 WebSphere Application Server changing data source password 657
security groups accessing applications Maximo 88 provisioning server 84 adding permissions Maximo security groups 87 provisioning security groups 83 adding users Maximo security groups 86 provisioning security groups 81 assigning permissions Maximo security groups 86 provisioning security groups 82 assigning provisioning workflow permissions 87 creating for the provisioning server 81 in Maximo 86 IBM Service Management compatibility 79 managing 102 overview 132 predefined 135 publishing images 520 types 143 security manager definition 78 security roles compliance 835 for discovery 153 task management 1160 server replication overview 358, 468 ServeRAID controllers 383, 493 ServerGuide 338, 451 service access points adding credentials to the VirtualCenter 1065 adding to virtual images 430 common agent 638 for VMware VirtualCenter 1065 KVM 1030 removing the default service access point 673 service access points Remote Access and Execution (RXA) 638 VMControl 1040 services agent manager service 682 agent recovery service 683 signing off provisioning server 28 signing on integrating single sign-on with Tivoli Monitoring 1211 silent installation creating installation image 641 Single Channel LSI Ultra320 SCSI controller 383, 494 single sign-on definition 144 integrating with Tivoli Monitoring 1211 SLES troubleshooting create virtual server 525
1272
SMT repsitory creating on SUSE Linux Enterprise Server 959 SMTP reports 1188 SOAP deployment engine 20 starting from Tivoli Enterprise Console 1228 software adding configuration options 716 capabilities 699 concepts 691 configuration 701 deploying products 607 discovery requirements 153 distributing 576, 582, 605 distributing files 602 distributing patches 601 distributing products 583, 635, 637 distributing software stacks 601 in managing system life cycle 20 installing 576, 582 installing patches 610 UNIX and Linux 609, 1009 Windows 609, 1010 installing products 607 installing stacks 611 model 692 overriding default interval for distribution 605 prerequisite check global 637 local 637 publishing 576 requirements for runbook automation 1239 troubleshooting publishing fails 791 uninstalling software products 626 software stacks 628 software catalog adding items manually 704 software definitions ways to add software 702 software configuration adjusting parameters 849 software configuration templates adding 716 changing 716 compliance checks 848 configuring cluster domains 724 copy from a software definition 717 copying 716 creating 714 definition 699 removing 716 types 699 using to build cluster domains 724 software deployment basic information 529 operating system requirements 546 software distribution access rights 547 canceling 606 configuring target computers 837
software distribution (continued) failure when filtered by group 790 infrastructures 18, 535 jobs not cancelled 793, 795 overview 582 process overview 23 reference information log files 809 through scalable distribution infrastructure 529 troubleshooting 795, 806 fails on HP-UX 791 installation fails for extracted file 1184 user roles 547 software installation adding 719 software model storing 692 terminology 692 software module custom actions 341, 454 software modules binding to targets 347, 459 creating for images 344, 457 custom actions 340, 453 deleting 673 driver 337 for images 332, 447 for unattended deployment 343, 456 pkgadd 336 RPM 336, 450 scheduling 346, 458 Solaris 336 software modulessoftware module creating a ramdisk 344, 457 software package blocks associating with software module 577 distributing to depot server 578 importing from the web interface 703 installing large blocks 608 large size client cache size 608 depot cache size 608 publishing to depot server 578 removing from depot server 581 saving to the local file repository 577 temporary directory 607 time out value 580 unpublishing 581 upgrading on targets 579 validating installation 581 Software Package Editor configuring 576 overview 751 software packages after installation process 607 overwritten by installation 790 REMOVE_SPB_AFTER_PROCESS parameter 607 removed from temporary directory 607 software patches distributing before installation 601
software products defining 622 deploying with the scalable distribution infrastructure 702 distribution overview 618 distribution requirements 620 importing 702 installing 624 manually defining 705 troubleshooting installation 625 software resources adding child 720 types of 689 updating the data model 721 upgrading 722 software resourcessoftware installations adding to software installations 719 software signatures adding custom defined 170 using command line 172 creating 173, 577 refresh custom 171 troubleshooting out of memory when querying 795 software stacks adding 712 definition 709 dependencies 715 display-cloned-stacks variable 714 duplicating 714, 719 Solaris configuring for OS deployment 293 creating unattended setup image 311 Flash archives 293 images creating unattended 308 installation server 292 OS deployments 292 patch management add Sun Update Connection to data model 980 approved patches scan 981 approviing recommendations 983 components 976 considerations 884 day-to-day tasks 981 discovering target computers 979 discovery 979 installing patches 983 missing patches scan 982 prerequisites for servers 979 prerequisites for target computers 979 process 975 required skills 978 requirements 978 supported platforms 974 tutorial 977 uninstalling 627 verifying compliance results 983 Sun Update Connection adding to the data model 980 managing patches 984 registering computers with 985 Index
1273
Solaris Zones adding credentials 1093 hardware resources 1089 automation package 1085 creating 1092 defining root password and netmask 1091 deleting 1095 initial discovery 1088 installing Tivoli Common Agent 1094 patch management supported environments 974 tutorial 977 process overview 1086 running an inventory scan 1094 troubleshooting 1096 tutorial 1085 virtual server states 1067 SOX reporting 853 SQL injection attacks 144 SSH importing OVF master images 513 troubleshooting Red Hat Enterprise Linux 1001 SSL configuring device manager service 108 for DB2 104 for FIPS compliance 103 MXServer for SSL DB2 communication 106 SSL-only 110 configuring DB2 client 111 dcm.xml for DB2 connection 109 profile for web interface port 100 troubleshooting RHEL patch issue 1002 upgrading JDBC for FIPS 103 VMControl 1040 Start Center multiple 29 not visible for new user 63 opening applications 30 overview 29 portlets create 55 Start Center, Updating 1204 static groups adding and removing members 41 creating 39 definition 78 types for security groups 143 status heartbeat function 682 of computers 45 updated reports 682 storage architecture 1154 devices and templates 1155 provisioning 1154 storage template problems with German symbols 66 storing images 392
subnetworks configuring 1138 Subscription Management Tool see SMT 959 subtask 35 Sun Update Connection adding to the data model 980 Enterprise application 984 registering computers 985 Solaris environments 975 Solaris tutorial 977 support tables BladeCenter-related products 383, 494 Ethernet adapters 382, 492 Lenovo mobile and desktop computers 381, 492 LSI RAID controllers 383, 494 SurePOS 382, 492 SUSE Linux Enterprise Server patch management approving compliance recommendations 967 approving patches 965 checklist 956 components 955 considerations 884 creating regions, zones, depot servers 961 creating SMT or YUM repository 959 day-to-day tasks 963 distributing patches 969 installing patches 970 installing software on targets 963 overview 971 prerequisites for servers 957 process 953 proxy server 960 publishing patches to depots 968 requirements environments 956 requirements for servers 957 requirements for target computers 957 skills required 956 supported platforms 952 target computer requirements 957 testing patches 965 troubleshooting scans 1002 tutorial 955 verifying compliance results 970 version 11 environments 953 SUSE Linux Enterprise ServerSUSE Linux Enterprise Server environments patch management approved patches scan 966 missing patches scan 967 switches adding and removing 1132 to a SAN 1156 to VLANs 1139 configuring 1131 creating trunk connections 1144 synchronizing image library 505
synchronizing (continued) images OS Deployment 304, 430 troubleshooting refused connection error 525 system life cycle 20 system profiles creating for VMWare 309 creating unattended AIX 306 system settings configuring 32 System x3105 380, 491 System x3200 380, 491 System x3250 380, 491 System x3400 381, 491 System x3455 381, 491 System x3500 381, 491 System x3550 381, 491 System x3650 381, 491 System x3655 381, 491 System x3755 381, 491 System x3800 381, 491 System x3850 381, 491 System x3950 381, 491
T
tables searching 55 TADDM business application considerations 234 defining business applications 234 SAPs 208, 836 running discovery 238 supported versions 205 troubleshooting discovery displays wrong version 253 tutorial 234 verifying discovered results 238 viewing business applications 238 target computers assigning the WOL device driver 738 changing the default polling interval 542, 655 common agent prerequisites AIX 562 HP-UX 565 Red Hat Linux 560 SLES 561 Solaris 563 Windows 556 configuring for software distribution 547, 837 configuring the default peering cache 655 distributing software package blocks 578 overriding 739 overriding the default WOL port 739 patch management AIX prerequisites 919 discovering targets 898 RedHat Linux prerequisites 935
1274
target computers (continued) patch management (continued) Solaris prerequisites 979 SUSE prerequisites 957 Windows prerequisites 897 PowerPC specifics on AIX 294 specifics on Linux 294 scalable distribution infrastructure 535 setting up restart notification 610 setting up the Wake on LAN (WOL) 738 turning on 738 upgrading software package blocks 579 using the Wake on LAN (WOL) 738 targets refreshing for task tracking 1166 task status 35 tasks automating using process workflows 1230 see provisioning tasks 1157 TCA common agent template parameters 633 TCA_pingAgent fails 526 TCP/IP ports for common agent and agent manager 631 temporary directory override 607 terminal servers configuring remotely 1143 definition 45 timeout software package blocks 580 VMControl 1040 TivGUID manual uninstallation 672 Tivoli Common Agent benefits 628 collecting diagnostic information 764 HP-UX cannot register 776 in scalable distribution infrastructure diagram 18 installing fails because of duplicated GUID 769 no tpm_default.xml file 773, 774 on Solaris Zones 1094 on VMware 1066 SSLHandshakeException error 773 IP address change on NAT server 784 subagents overview 631 standalone procedure 668 troubleshooting cannot be installed using Microsoft Active Directory 249 cannot communicate with agent manager 786
Tivoli Common Agent (continued) troubleshooting (continued) cannot read GUID on startup 784 collecting logs from target computer 765 computer name not updated after upgrade 780 data model not updated after uninstalling 783 fails when uninstalled manually 782 failure on AIX WPAR 1103 files deleted on restart after install 776 install fails on Solaris because of locale 770 install fails on Solaris SPARC target computers 770 install fails when using copy or put commands 772 install fails with invalid password 775 install failure on Red Hat 5 771 installing on Security-Enhanced Linux 768 no tpm_default.xml file 768, 772 registration fails because of agentTrust.jks file 779 registration request rejected by agent manager 787 renewing certificates 779 reregistering 779 security error during registration 778 TCA_PingAgent workflow hangs 785 truncated endpoint.properties file 778 uninstalling manually 781 troubleshoting fails if already installed 775 Tivoli Enterprise Console configuring to receive workflow events 1228 to send workflow events 1227 log files 1227 provisioning workflow events transmissions 1229 sending workflow failure events to 1225 starting workflows from 1228 Tivoli Monitoring integration with Tivoli Provisioning Manager 1211 Tivoli Provisioning Manager cannot import XML 71 error when primary server is disabled 67 launching from other products 1218 published task files saving on different depot server 806 security user not logged off after session expires 62 Tivoli Provisioning Manager for Images image types 399 obtaining build packages 439
Tivoli Provisioning Manager for Images (continued) overview 391 upgrading 439 upgrading from OS Deployment server 265 upgrading to a later version 462 virtual image management tasks 430 Tivoli Provisioning Manager for OS Deployment downloading 396 obtaining 396 upgrading 397 Tivoli Provisioning Manager Inventory Discovery 580 Tivoli Provisioning Manager Inventory Scan 574 Tivoli Storage Productivity Center viewing computers in 1214 Tivoli System Automation for Multiplatforms high availability disaster recovery installation 1122 integrating with the provisioning server 1119 toolkits administrators 689 agent registration tools 681 runtime logs 650 tools hypervisor 392 TPADMIN defined 135 publishing images 520 TPCOMPLIANCEANALYST 135 TPCONFIGURATIONLIBRARIAN 135 TPDEPLOYMENTSPECIALIST 135 TPDEVELOPER 135 TPMconfig.xml file wscanfs command 191 TPMEmailHelper 38 TPwebSERVICEUSER 135 trace log SDI 788 Transaction.properties 108 Transport Layer Security protocol 92 troubleshooting administrative console 799 agent manager installation 767 aids 59 auditing 69 basics 10 changing end point location 1252 common agent authentication errors 783 collecting diagnostic information 764 DBCS 774 installation 767 service access point 786 up-level over existing level 780 updgrading 763 upgrade failure 779 using sudo 774 verifying the running state 764 common problems 65 Index
1275
troubleshooting (continued) compliance 858 configdb 69 COPCOM123E cannot execute commands in Cygwin 66 depot updgrading 763 device manager jobs 751 diagnosing errors 59 discovery Windows 2003 and Windows XP 64-bit 252 dynamic content delivery 804 for logging off 59 image library 522 installing agent manager 767 insufficient memory for database synchronization 1251 IP addresses and host names 257 log files image library 522 server logs 863 Tivoli Common Agent 765 verifying 761, 863 log off 59 log on 59 logging on 60 passing TSRM parameters to the provisioning server 1251 patch scan fails with key import error 1002 patch scans on SLES 1002 patch scans on SLES 10 SP 1002 PMP installation 1252 process workflows length 1250 provisioning tasks 1180 reports 1205 garbled text when exporting to CSV format 1207 importing non-English CSV reports to Excel 1205 importreports.cmd error 1208 Microsoft Internet Explorer hangs 1208 runbook automation 1249, 1250, 1251, 1252 runbook automation logs 1249 runbook automation problems and limitations 1250 runbook automation tasks 1249 RXA connecting to the target 767 searching object selection not displayed after searching for other objects 67 server logs 761, 996 simple software product installation 625 software provisioning 760, 761 task management 1180 troubleshooting information for logging on 59 verifying log files 996
troubleshooting (continued) virtual servers discovery errors for host platform servers 1106 error creating a VMware virtual server 1101 failure on AIX WPAR 1103 overview 1095 synchronize WPARs with AIX LPAR 1104 VMware problems 1096 WPAR dedicated creation fails 1105 Windows Server Update Services 798 WSUS patch management 798 truststore file re-encrypting 679 tutorials discovery 230 getting started 27 listed 26 managing compliance 844 managing user access 80 patch management AIX 917 Red Hat Enterprise Linux 5 932 Solaris 977 Windows using SDI 895 replicating business applications from TADDM 234 security using LDAP 80 using Maximo 85 TADDM 234
U
unattended deployments setting up 271 unattended image troubleshooting 296 uninstalling CIT 670 common agent 670 common agents 669, 673 patches 1011 TivGUID 672 Tivoli Common Agent data model not updated 783 fails when done manually 782 manual 781 truncated endpoint.properties file 778 web interface extension 428 UNIX log files file system capacity exceeded 70 troubleshooting failure with Microsoft Update discovery 249 RXA does not connect to target 804 unknown resources ignoring 161 managing 160 overview 160
unknown resources (continued) reactivating 161 rediscovering 161 unpublishing images 520 updates documentation 1, 9 updating new features 1 Updating the Start Center 1204 upgrading common agents registration request rejected by agent manager 787 using scalable distribution infrastructure 667 software resources 722 to Tivoli Provisioning Manager for Images 439 troubleshooting agent or depot 763 upgradingcommon agent common agent deployment engine 667 USB drive network boot command lines 276, 403 wizard 274, 401 user access 75 tutorials 80 user datagram protocol (UDP) 742 user interface accessing 144 user roles for compliance 828 for software deployment 547 for software distribution 547 image library 501 patch management AIX 918 Red Hat Enterprise Linux 933 Solaris 978 SUSE Linux Enterprise Server 956 Windows 896 reports 1188 users adding to security groups 81 Maximo 86 cannot be removed using the web interface 129 create 55 creating in Maximo 86 using LDAP 81 creating duplicate MAXADMIN 90 managing overview 102 with LDAP 113 resource manager registration 685 troubleshooting not logged off on timeout 123 unlocking 686
V
variables configuring for tool integration 36
1276
variables (continued) system 34 versionInfo command error running on Windows 64-bit 69 versions creating master images 509 determining for common agent 764 VIO server LPARs 1016 virsh for KVM 1030 virt-manager for KVM 1030 virtual center discovery running 200 virtual Fibre Channel adapters 1078 virtual Fibre Channel adapters email notification 1084 virtual Fibre Channel adapters for LPARs 1080 virtual image management basics 387 hypervisor requirements 407 target system requirements 412 tutorial 437 virtual images adding credentials 430 capturing 443 deploying 432 discovering 443 editing properties 443 exporting 434 importing 436 installing 461 managing 387 overview 387 prerequisites 406 reference 462 replicating 443 streamlining management of 391 synchronization 304, 430 tasks 430 types 399 virtual machines see virtual servers 1073 virtual server templates adding multiple hard disks 1016 cloning 1071 configuring a netmask 1091 creating 1071 Solaris Zones 1089 Hyper-V 1049 VMControl 1040 VMware 1071 virtual server with virtual Fibre Channel 1083 virtual servers adding hard disks 1075 AIX LPARs 1016, 1056 creating using composite images 514 using saved images 519 deleting multiple 1077 discovering 441 Hyper-V 1049 KVM 1030 LPARs 1016 allocating resources 1016 overview 1013
virtual servers (continued) pSeries 1016 reports 1095 restoring or replacing 519 Solaris Zones activities 1066 adding credentials 1093 creating 1092 deleting 1095 discovering host platform servers 1089 installing Tivoli Common Agent 1094 intial discovery 1088 performing activities 1093 states 1067 Tivoli Common Agent installing on VMware 1066 troubleshooting adding MPIO hard disk fails 1107 cannot create from ESX server 1101 discovery errors 247 errors for host platform servers 1106 Libvirt discovery misses virtual servers 1105 Libvirt host platform discovery fails 1104 List tab opens too slowly 1106 removing if created without a software stack 53, 1074 VMControl 1040 VMware adding credentials to virtual servers 1069 adding credentials to VirtualCenter 1065 adding hard disks 1075 creating 1073 creating an image for ESX server 1061 creating the ESX server 1062 deleting 1077 discovering host platform servers 1077 discovering virtual servers 1066 enabling DRS on a cluster 1063 enabling HTTPS connection 1064 importing SSL certificate 1064 installing Tivoli Common Agent 1066 inventory scan 1070 powering on and off 1075 registering the ESX server 1063 WPARs 1027 VirtualCenter configuring 1062 enabling DRS on a VMware cluster 1063 virtualization error messages 1095 hardware and software requirements Solaris Zones 1087 VMware 1060 Hyper-V 1049 KVM 1030
virtualization (continued) logs 1096 LPARs 1016, 1056 overview 1013 prerequisites Solaris Zones 1087 VMware 1060 reports 1095, 1195 Tivoli Provisioning Manager for Images 265 troubleshooting 1095 List tab opens too slowly 1106 tutorial Solaris Zones 1085 VMware 1058 user roles 1060, 1087 VMControl 1040 WPARs 1027 VLANs adding switches 1132 to a network 1139 networking overview 1131 trunking 1140 vm see virtual servers 1073 VMC see VMControl 1040 VMControl 1040 synchronizing images 505 VMDK and VDDK 446 VMFS synchronizing images 505 VMMSync users and groups are not synchronized 127 VMMSYNC cron task does not run 120 does not synchronize information 120 synchronizing groups and users 82 LDAP 114 VMware activities 1066 add hard disk resources 1075 adding credentials to the VirtualCenter 1065 adding credentials to virtual servers 1069 adding disks 1075 changing resources 1076 configuring the VirtualCenter 1062 creating a repository 502 creating virtual server templates 1071 creating virtual servers 1073 deleting virtual servers 1077 download center 1061 enabling DRS on a cluster 1063 enabling HTTPS connection 1064 ESX servers deploying 1061 installing the server image 1062 managing with VirtualCenter 1062 registering 1063 Index
1277
VMware (continued) ESX servers (continued) unattended setup image 1061 importing OVF master images 513 importing the SSL certificate 1064 installing Tivoli Common Agent 1070 master images troubleshooting 524 moving virtual servers 1077 OS Deployments prerequisites 295, 423 problems 1096 process overview 1059 resizing disks 1076 troubleshooting cannot create using ESX server 1102 create from SLES 10 525 discovery errors for host platform servers 1106 tutorial 1058 virtual server states 1067 VMDK 446 VMWare 3.5 408 VMWare 4.0 configuration 408 requirements 408 VMware VirtualCenter Discovery error running vmware vi3 1103 synchronizing images 505 vst see virtual server templates 1071
W
WAIK 286, 417 Wake on LAN (WOL) assigning the WOL device driver to targets 738 overriding the default port 739 using 738 wasadmin user 98 Web Administration Tool changing user passwords 124 web browser importing the certificate for Internet Explorer 7 95 web interface configuring the List view 34 error 64 getting started 27 identifying the virtual host 100 locale non-English information center displayed in English 66 parameters 354, 465 port 9443 100 setting up your environment 26 troubleshooting cannot run remediation task 864 does not refresh 1181 SSL security warnings 124 Web interface 407 web interface extension deployment database 265, 392 installation 428
web interface extension (continued) installing 384, 429 installing on a hypervisor 442 web server discovery 215 hostname 576 port number 576 WebSphere Application Server adding resource members 737 administrative console troubleshooting 799 administrative domains 734 changing the data source password 657 compliance managing 875 parameters 837 running recommendations 875 TADDM parameter 837 configuring agent manager for 108 discovering software 203 discovery configuration 219 importing a certificate 100 installing with settings from another installation 612 trace logs 664 troubleshooting agent manager installation fails 802 cannot run backup tool 802 configuration generates incorrect information 869 What's new 1 wildcards using for table filtering 30 WIM 310 Windows See also WinPE2 images creating unattended 305 patch management acquiring patches 904 approval group 906 approved patches scan 906 approving patches 906 compliance recommendations 908 configuring patch server 899 considerations 884 distributing patches 908 installing patches 909 managing 911 required skills 896 requirements 896 requirements for servers 897 requirements for target computers 897 scanning for missing patches 907 supported configurations 889 supported platforms 886 testing patches 906 verifying compliance 909 Preinstallation Environment 2WinPE2 287, 418 Sysprep 2000 315 2003 314 2008 312
Windows (continued) Sysprep (continued) Vista 313 XP 314 troubleshooting discovery on 2003 and Windows XP 64-bit 252 error after installing version 7.2 65 FDCC 255 interactive patches not installed in silent mode 798, 999 Microsoft Updates Discovery parsing error 998 patches are not installed 997 provisioning server does not start 68 Windows Update Agent install fails 1003 tutorial patch management 895 Windows Server Update Services 798 Windows Update Agent install fails on Windows 7 1003 WinPE managing multiple deployment engines 289, 420 WinPE2 deployment engine 286, 287, 417, 418 hardware environments 286, 417 ramdisk 286, 417 creation 288, 419 wizards discovering resources 21 WPARs overview 1027 troubleshooting cannot synchronize with AIX LPAR 1104 dedicated creation fails 1105 network discovery fails 255 recovering from problems 1096 virtual server states 1067 wscanfs command configuring TPMconfig.xml file 191 previewing MIF output 190 WUA install fails on Windows 7 1003
X
xSeries 100 380, 490 205 380, 490 206 380, 490 206m 380, 490 225 380, 491 226 380, 491 235 380, 491 236 380, 491 255 380, 491 260 380, 491 305 380, 491 306 380, 491 306m 380, 491 335 380, 491 336 380, 491
1278
(continued) 380, 491 380, 491 380, 491 380, 491 380, 491
Y
Yellow dog Updater Modified see YUM 959 YUM repository @ symbol is not supported for users or passwords 1003 Red Hat Enterprise Linux for patch 936 selection 943, 965 YUM repsitory creating on SUSE Linux Enterprise Server 959
Z
zones adding 818 adding to a SAN 1156 automation package for managing large numbers of 822 creating for RHEL patching 939 creating for Windows patching 901 modifying 818
Index
1279
1280
Printed in USA