Edit the following files under the control_plane/input_params
directory to provide the required input parameters.
login_vars.yml
file to enter the following details:provision_password
- password used while provisioning OS on bare metal servers.cobbler_password
- password for Cobbler.idrac_username
and idrac_password
- iDRAC username and password.Edit the following variables in the idrac_vars.yml
file.
File name | Variables | [Required/ Optional]Default, choices | Description |
---|
R640,R740,C4140
to update firmware on these models of PowerEdge servers. For a complete list of supported PowerEdge servers, see the Hardware managed by Omnia section in the Readme file.idrac_tools_vars.yml
file. [WARNING]: For the other iDRAC playbooks to run, you must manually disable 2FA by setting the Easy 2FA State to "Disabled" in the iDRAC settings.
idrac_tools_vars.yml
file.
Omnia role used to create the custom ISO: control_plane_customiso
Based on the inputs provided in the login_vars.yml
and base_vars.yml
files, the Kickstart file is configured and added to the custom ISO file. The unattended_centos7.iso or unattended_rocky8.iso file is copied to an NFS share on the management station to provision the PowerEdge servers using iDRAC.
kubectl get svc -n awx
.kubectl get secret awx-admin-password -n awx -o jsonpath="{.data.password}" | base64 --decode
.http://<IP>:8052
, where IP is the awx-ui IP address and 8052 is the awx-ui port number. Log in to the AWX UI using the username as admin
and the retrieved password.Omnia role used to provision custom ISO on PowerEdge Servers using iDRAC: provision_idrac
For the idrac.yml
file to successfully provision the custom ISO on the PowerEdge Servers, ensure that the following prerequisites are met:
The provision_idrac file configures and validates the following:
After the configurations are validated, the provision_idrac file provisions the custom ISO on the PowerEdge Servers. After the OS is provisioned successfully, iDRAC IP addresses are updated in the provisioned_idrac_inventory in AWX.
NOTE: The
idrac.yml
file initiates the provisioning of custom ISO on the PowerEdge servers. Wait for some time for the node inventory to be updated on the AWX UI.
To provision newly added servers, wait till the iDRAC IP addresses are automatically added to the idrac_inventory. After the iDRAC IP addresses are added, launch the iDRAC template on the AWX UI to provision CentOS custom OS on the servers.
If you want to reprovision all the servers in the cluster or any of the faulty servers, you must remove the respective iDRAC IP addresses from provisioned_idrac_inventory on AWX UI and then launch the iDRAC template. If required, you can delete the provisioned_idrac_inventory from the AWX UI to remove the IP addresses of provisioned servers. After the servers are provisioned, provisioned_idrac_inventory is created and updated on the AWX UI.
Omnia role used: provision_cobbler
Ports used by Cobbler:
To create the Cobbler image, Omnia configures the following:
To access the Cobbler dashboard, enter https://<IP>/cobbler_web
where <IP>
is the Global IP address of the management station. For example, enter
https://100.98.24.225/cobbler_web
to access the Cobbler dashboard.
Note: After the Cobbler Server provisions the operating system on the servers, IP addresses and hostnames are assigned by the DHCP service.
- If a mapping file is not provided, the hostname to the server is provided based on the following format: computexxx-xxx where "xxx-xxx" is the last two octets of the Host IP address. For example, if the Host IP address is 172.17.0.11 then the assigned hostname by Omnia is compute0-11.
- If a mapping file is provided, the hostnames follow the format provided in the mapping file.
Note: If you want to add more nodes, append the new nodes in the existing mapping file. However, do not modify the previous nodes in the mapping file as it may impact the existing cluster.
Note: During a Cobbler based deployment, only one OS is supported at a time. If the user would like to deploy both, please deploy one first, unmount
/mnt/iso
and then re-run Cobbler for the second OS.
Omnia provides the following options to enhance security on the provisioned PowerEdge servers:
idrac_vars.yml
file.idrac_vars.yml
file.2-factor authentication (2FA): To enable the 2FA on iDRAC, set the two_factor_authentication variable to "enabled" in the idrac_vars.yml
file.
WARNING: If 2FA is enabled on iDRAC, you must manually disable 2FA on iDRAC by setting the Easy 2FA State to "Disabled" for the user specified in the login_vars.yml
file to run other iDRAC playbooks.
Before executing the idrac_2fa.yml, you must edit the idrac_tools_vars.yml
by running the following command: ansible-vault edit idrac_tools_vars.yml --vault-password-file .idrac_vault_key
.
Provide the following details in the idrac_2fa.yml file.
File name | Variables | [Required if two_factor_authentication is enabled/ Optional]Default, choices | Description |
---|
NOTE: 2FA will be enabled on the iDRAC only if SMTP server details are valid and a test email notification is working using SMTP.
LDAP Directory Services: To enable or disable the LDAP directory services, set the ldap_directory_services variable to "enabled" in the idrac_vars.yml
file.
Before executing the idrac_ldap.yml file, you must edit idrac_tools_vars.yml
by running the following command: ansible-vault edit idrac_tools_vars.yml --vault-password-file .idrac_vault_key
.
Provide the following values in the idrac_ldap.yml file.
File name | Variables | [Required if ldap_directory_services is enabled/ Optional]Default, choices | Description |
---|
To view the idrac_tools_vars.yml
file, run the following command: ansible-vault view idrac_tools_vars.yml --vault-password-file .idrac_vault_key
NOTE: It is suggested that you use the ansible-vault view or edit commands and that you do not use the ansible-vault decrypt or encrypt commands. If you have used the ansible-vault decrypt or encrypt commands, provide 644 permission to
idrac_tools_vars.yml
.
On the AWX Dashboard, select the respective security requirement playbook and launch the iDRAC template by performing the following steps.