SeeSpotLearn
asked on
Xenserver 5.0-5.5 & Dell OpenManage
Does anyone know a workaround to be able to successfully install Dell's OpenManage Server Administrator on Citrix XenServer? Dell itself doesn't support XenServer unless its their own build of it. I have tried OMSA 5.4, 6.1, 6.2. It will not install because the operating system is unknown. I have install each RPM one at a time and they have installed but they still do not function
Just so you can see the iptables and snmp...
# Firewall configuration written by system-config-securityleve l
# Manual customization of this file is not recommended.
*filter
:INPUT ACCEPT [0:0]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:RH-Firewall-1-INPUT - [0:0]
-A INPUT -j RH-Firewall-1-INPUT
-A FORWARD -j RH-Firewall-1-INPUT
-A RH-Firewall-1-INPUT -i lo -j ACCEPT
-A RH-Firewall-1-INPUT -p icmp --icmp-type any -j ACCEPT
-A RH-Firewall-1-INPUT -p 50 -j ACCEPT
-A RH-Firewall-1-INPUT -p 51 -j ACCEPT
-A RH-Firewall-1-INPUT -p udp --dport 5353 -d 224.0.0.251 -j ACCEPT
-A RH-Firewall-1-INPUT -p udp -m udp --dport 161 -j ACCEPT
-A RH-Firewall-1-INPUT -p udp -m udp --dport 162 -j ACCEPT
-A RH-Firewall-1-INPUT -p udp -m udp --dport 631 -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m tcp --dport 631 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 1311 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m udp -p udp --dport 694 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 80 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 443 -j ACCEPT
-A RH-Firewall-1-INPUT -j REJECT --reject-with icmp-host-prohibited
COMMIT
# Map users to community strings
# sec.name source community
com2sec TMC_U_ReadOnly default TMCDEV_READ
com2sec TMC_U_ReadWrite default TMCDEV_WRITE
# Map users to groups
# groupName securityModel securityName
group TMC_G_ReadOnly any TMC_U_ReadOnly
group TMC_G_ReadWrite any TMC_U_ReadWrite
# create view
# name incl/excl subtree mask(optional)
view all included .1
# grant rights to the above views
# group context sec.model sec.level prefix read write notif
access TMC_G_ReadOnly "" any noauth exact all none none
access TMC_G_ReadWrite "" any noauth exact all all none
# Set trap destination
trapsink (FQDN.SERVER.NAME) TMC_MANAGEMENT
# Allow localhost access
rocommunity TMCDEV_READ 127.0.0.1
rwcommunity TMCDEV_WRITE 127.0.0.1
# Allow remote hosts access
rocommunity TMCDEV_READ (FQDN.SERVER.NAME)
rwcommunity TMCDEV_WRITE (FQDN.SERVER.NAME)
Just so you can see the iptables and snmp...
# Firewall configuration written by system-config-securityleve
# Manual customization of this file is not recommended.
*filter
:INPUT ACCEPT [0:0]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:RH-Firewall-1-INPUT - [0:0]
-A INPUT -j RH-Firewall-1-INPUT
-A FORWARD -j RH-Firewall-1-INPUT
-A RH-Firewall-1-INPUT -i lo -j ACCEPT
-A RH-Firewall-1-INPUT -p icmp --icmp-type any -j ACCEPT
-A RH-Firewall-1-INPUT -p 50 -j ACCEPT
-A RH-Firewall-1-INPUT -p 51 -j ACCEPT
-A RH-Firewall-1-INPUT -p udp --dport 5353 -d 224.0.0.251 -j ACCEPT
-A RH-Firewall-1-INPUT -p udp -m udp --dport 161 -j ACCEPT
-A RH-Firewall-1-INPUT -p udp -m udp --dport 162 -j ACCEPT
-A RH-Firewall-1-INPUT -p udp -m udp --dport 631 -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m tcp --dport 631 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 1311 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m udp -p udp --dport 694 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 80 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 443 -j ACCEPT
-A RH-Firewall-1-INPUT -j REJECT --reject-with icmp-host-prohibited
COMMIT
# Map users to community strings
# sec.name source community
com2sec TMC_U_ReadOnly default TMCDEV_READ
com2sec TMC_U_ReadWrite default TMCDEV_WRITE
# Map users to groups
# groupName securityModel securityName
group TMC_G_ReadOnly any TMC_U_ReadOnly
group TMC_G_ReadWrite any TMC_U_ReadWrite
# create view
# name incl/excl subtree mask(optional)
view all included .1
# grant rights to the above views
# group context sec.model sec.level prefix read write notif
access TMC_G_ReadOnly "" any noauth exact all none none
access TMC_G_ReadWrite "" any noauth exact all all none
# Set trap destination
trapsink (FQDN.SERVER.NAME) TMC_MANAGEMENT
# Allow localhost access
rocommunity TMCDEV_READ 127.0.0.1
rwcommunity TMCDEV_WRITE 127.0.0.1
# Allow remote hosts access
rocommunity TMCDEV_READ (FQDN.SERVER.NAME)
rwcommunity TMCDEV_WRITE (FQDN.SERVER.NAME)
ASKER
Not the guest. The host XenServer Linux OS.
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
> Not the guest. The host XenServer Linux OS.
Thanks god:) I was afraid that I'd be explaining what is the difference between the real hardware and emulated hardware : )
Cheers,
K.
Thanks god:) I was afraid that I'd be explaining what is the difference between the real hardware and emulated hardware : )
Cheers,
K.
I have installed omsa inside 5.5 dom0.
iirc the dell install package looks at /etc/redhat-release for a valid string. Changing it to a redhat string or hack the xenserver string into setup.sh near line 200 allowed the process to complete without issue.
Essentially, its the same process as installing omsa in centos
iirc the dell install package looks at /etc/redhat-release for a valid string. Changing it to a redhat string or hack the xenserver string into setup.sh near line 200 allowed the process to complete without issue.
Essentially, its the same process as installing omsa in centos
ASKER
When I did:
The Dell Version has all IPMI drivers are built in. Here's an article on how do you install it on XenServer 5.5 (though you say you're running 5.0.5)
http://support.citrix.com/article/CTX116325
I got this error when I tried the install:
Unsupported system (sysid=028C)
The Dell Version has all IPMI drivers are built in. Here's an article on how do you install it on XenServer 5.5 (though you say you're running 5.0.5)
http://support.citrix.com/article/CTX116325
I got this error when I tried the install:
Unsupported system (sysid=028C)
SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
It is not possible to run OMSA over a Virtualized guest!!!. OMSA is designed to access the server hardware through the IPMI interface which is hidden from a virtualized guest. So it is not possible to run OMSA over any virtualization solution..
Cheers,
K.