Tivoli Provisioning Manager for OS Deployment Version 7.1.1.9

Total Page:16

File Type:pdf, Size:1020Kb

Tivoli Provisioning Manager for OS Deployment Version 7.1.1.9 Tivoli Provisioning Manager for OS Deployment Version 7.1.1.9 Getting Started Tivoli Provisioning Manager for OS Deployment Version 7.1.1.9 Getting Started ii Tivoli Provisioning Manager for OS Deployment: Getting Started Contents Chapter 1. Getting started .......1 The deployment process ..........10 Product overview.............1 Universal images ............11 Components ..............1 Shared repository and its cleanup .......11 Product topology .............4 Setting up a system profile by unattended setup . 4 Chapter 2. Glossary .........15 Setting up a system profile by cloning ......5 Choosing the correct way to boot your target . 5 Chapter 3. Notices ..........21 Types of PXE network boot ........6 Network boot process ..........9 © Copyright IBM Corp. 2012 iii iv Tivoli Provisioning Manager for OS Deployment: Getting Started Chapter 1. Getting started Product overview The product is a database-driven, network-based deployment solution. Using an easy-to-use interface, the product provides Windows cloning and unattended setup, Linux cloning, and unattended setup, Solaris cloning and unattended setup, AIX® unattended setup, and VMWare ESX unattended setup, from Windows, Linux, Solaris, and IBM® AIX servers. In addition to BIOS targets, the product can also manage Unified Extensible Firmware Interface (UEFI) enabled targets. Support for UEFI targets is currently provided for Windows deployment only. Using industry standards such as Wake on LAN and vPro, PXE and OpenBOOT, ODBC and JDBC, DMI and PCI, Microsoft system preparation tool (Sysprep), Kickstart, Autoyast, Jumpstart and NIM, the product provides ready to use installation of operating systems and selected software on tens, or even hundreds, of computers simultaneously. The deployment source can be on the network (with either unicast or multicast downloading), on a CD or DVD, or on a disk partition. Components The product is made of server-side components, installed using a typical setup program, of web interface components, and of target-side applications, automatically installed by the target through the network. The server-side components include: v The OS deployment server, running in the background as a service. This component provides the PXE remote-boot capability and multicast file access to the remote-boot targets. v A deployment database, accessed through the standard ODBC/JDBC interface, and through the product TCP-to-ODBC/JDBC Gateway service. This database stores the Bill of Material for every target, including information about what software modules must be installed. v The web interface, a Web-based application used to prepare and supervise deployments. Through the web interface, you can configure the OS deployment server, manage objects used during a deployment, and create recovery CDs and DVDs. You can also visualize targets into their different groups. The parameters and status of each target can be controlled (for example, when a target requests a remote-boot through PXE). The web interface side application, typically installed on the server, is the web interface extension, running in background as a service. Optionally, a web interface extension can be installed on targets, so that you can take control of them remotely. The web interface extension is useful, for example, to restart the computer when a deployment starts, or to perform an operating system inventory. Several features of the web interface are not available when the web interface extension is not © Copyright IBM Corp. 2012 1 installed on the server. The web interface extension is a piece of software designed to run as an operating system application (a Windows application or a UNIX application). There are two target-side tools: Deployment engine The deployment engine is a stand-alone mini-operating system used for all management tasks to be performed outside of the real operating system, such as operating system installation. This deployment engine never has to be installed manually on target systems, because it is downloaded automatically when target systems are instructed to boot on the OS deployment server in their DHCP configuration. After the deployment engine is started, it loads a ramdisk which can perform any kind of operations on the target, such as v partition and format disks v install a complete operating system such as Windows or UNIX v wipe the disks The deployment engine is a stand-alone management platform and does not require an operating system. web interface extension The web interface extension is a small program that can run on most operating systems (Windows, AIX, Linux , Solaris) either in the background as a service or as a command-line tool. It provides cross-operating system connectivity to the management platform for targets with an installed operating system. It can be used to collect information from targets, to remotely initiate tasks on a target from the OS deployment server, or to trigger commands on the OS deployment server from a target. The web interface extension can access all files on the hard disk and other drives through the operating system. When running under Microsoft Windows, it can also access the system registry, and all system information published by drivers using the Windows Management Interface (WMI). In addition, for all Intel-based operating systems, the Web interface extension can install a hook on the boot process to force a PXE boot or to start the deployment engine in offline mode, to trigger pre-operating system management tasks such as migration or recovery. When you install the product you are installing the OS deployment server. The target side is embedded into the server, and sent to computers through a network connection such as a network boot or PXE boot, or through media such as a CD,a diskette,orahard disk partition. Note: It is also possible to boot targets over the network without using PXE. The installation process is exemplified in Figure 1 on page 3. 2 Tivoli Provisioning Manager for OS Deployment: Getting Started IBM Tivoli Provisioning Manager for OS Deployment 1 Setup wizard Installation files contain server-side and target-side components Install 2 Tivoli Provisioning Manager for OS Deployment server CD-ROM Runs Contains - the server-side component - the deployment engine - optionally, the Web interface extension - the Web interface extension Stores - the deployment engine - the Web interface extension Network 3 Target Target Target Boots on the network Boots on the network Boots on the CD-ROM and loads the and loads the and loads the deployment engine deployment engine deployment engine 4 Target Target Target Runs the deployment Runs the deployment Runs the deployment engine which loads a engine which loads a engine which loads a ramdisk ramdisk ramdisk (MCP for Linux) (WinPE2 for Windows) (WinPE2 for Windows) 5 Target Target Target The ramdisk performs The ramdisk performs The ramdisk performs tasks such as tasks such as tasks such as operating system operating system operating system installation installation installation 6 Target Target Target - Boots into the operating Boots into the operating - Boots into the operating system, for instance system, for instance system, for instance Linux. Windows Windows. - Runs the Web - Runs the Web interface extension. interface extension. Figure 1. Tivoli Provisioning Manager for OS Deployment components 1. The installer, containing server-side and target-side components, installs the server-side and potentially the Web interface extension on the server computer. Chapter 1. Getting started 3 2. A CD can then be created containing both the deployment engine and the web interface extension. 3. Computers then boot, loading the deployment engine either from the PXE server (OS deployment server), or from the CD. 4. The deployment engine loads a ramdisk, Linux deployment engine for Linux, WinPE for Windows. 5. The ramdisk can now perform all kinds of tasks, including operating system installation. 6. The targets boot into the operating system (Windows, Linux, Solaris,... ) , with the web interface extension optionally running. Product topology The product topology to automate remote deployment of operating systems and virtual images can be as simple as a single LAN implementation or a more complex implementation involving a large enterprise with multiple subnets with remote sites connecting through a low speed communication link. When planning your topology, you must make the following considerations: v What is the operating system of the computer where the OS deployment server will be installed? v Where will the database be located and what is the name of the database engine (DB2, Access,...)? v Will there be a single OS deployment server or a hierarchy of servers? v Where will the browser be located and what type of browser and version? The following diagram depicts a typical product topology with a single LAN, a single OS deployment server separate from the DHCP server, and a number of target computers. host DHCP host server host…. hosthost host LAN target hypervisor guest Web web interface browser extension database Tivoli Provisioning Manager for OS Deployment server Setting up a system profile by unattended setup Use unattended setup to set up a system profile without actively being involved when the process occurs. Setting up an automated system profile by unattended setup typically involves the following steps: 4 Tivoli Provisioning Manager for OS Deployment: Getting Started v Installing the OS deployment server on a computer v Creating a system profile by providing the installation CDs and choosing installation options v Creating software modules for most commonly used business applications and other software, using the web interface v Optionally, designing automatic binding rules and fixed configuration parameters for fully unattended deployment on unknown targets Setting up a system profile by cloning A cloning-mode system profile requires you to configure a target, prepare it for cloning, and run the cloning process directly on the computer. However, the native mode of operation of Tivoli® Provisioning Manager for OS Deployment is centered around cloning-mode system profiles, because this method of deployment is faster than unattended installation.
Recommended publications
  • Chapter 3. Booting Operating Systems
    Chapter 3. Booting Operating Systems Abstract: Chapter 3 provides a complete coverage on operating systems booting. It explains the booting principle and the booting sequence of various kinds of bootable devices. These include booting from floppy disk, hard disk, CDROM and USB drives. Instead of writing a customized booter to boot up only MTX, it shows how to develop booter programs to boot up real operating systems, such as Linux, from a variety of bootable devices. In particular, it shows how to boot up generic Linux bzImage kernels with initial ramdisk support. It is shown that the hard disk and CDROM booters developed in this book are comparable to GRUB and isolinux in performance. In addition, it demonstrates the booter programs by sample systems. 3.1. Booting Booting, which is short for bootstrap, refers to the process of loading an operating system image into computer memory and starting up the operating system. As such, it is the first step to run an operating system. Despite its importance and widespread interests among computer users, the subject of booting is rarely discussed in operating system books. Information on booting are usually scattered and, in most cases, incomplete. A systematic treatment of the booting process has been lacking. The purpose of this chapter is to try to fill this void. In this chapter, we shall discuss the booting principle and show how to write booter programs to boot up real operating systems. As one might expect, the booting process is highly machine dependent. To be more specific, we shall only consider the booting process of Intel x86 based PCs.
    [Show full text]
  • Network Boot and Exotic Root HOWTO
    Network Boot and Exotic Root HOWTO Brieuc Jeunhomme frtest [email protected] Logilab S.A. Revision History Revision 0.3 2002−04−28 Revised by: bej Many feedback inclusions, added links to several projects Revision 0.2.2 2001−12−08 Revised by: dcm Licensed GFDL Revision 0.2.1 2001−05−21 Revised by: logilab Fixed bibliography and artheader Revision 0.2 2001−05−19 Revised by: bej Many improvements and included Ken Yap's feedback. Revision 0.1.1 2001−04−09 Revised by: logilab First public draft. Revision 0.1 2000−12−09 Revised by: bej Initial draft. This document explains how to quickly setup a linux server to provide what diskless linux clients require to get up and running, using an IP network. It includes data and partly rewritten text from the Diskless−HOWTO, the Diskless−root−NFS−HOWTO, the linux kernel documentation, the etherboot project's documentation, the linux terminal server project's homepage, and the author's personal experience, acquired when working for Logilab. Eventually this document may end up deprecating the Diskless−HOWTO and Diskless−root−NFS−HOWTO. Please note that you'll also find useful information in the From−PowerUp−to−bash−prompt−HOWTO and the Thin−Client−HOWTO, and the Claus−Justus Heine's page about NFS swapping. Network Boot and Exotic Root HOWTO Table of Contents 1. Introduction.....................................................................................................................................................1 1.1. What is this all about?.......................................................................................................................1 1.2. Thanks...............................................................................................................................................1 1.3. Diskless booting advocacy................................................................................................................1 1.3.1. Buying is cheaper than building.......................................................................................1 1.3.2.
    [Show full text]
  • Project Report - Adding PXE Boot Into Palacios
    Project Report - Adding PXE Boot into Palacios Chen Jin Bharath Pattabiraman Patrick Foley EECS Department EECS Department EECS Department Northwestern University Northwestern University Northwestern University chen.jin@eecs. bharath@u. patrickfoley2011@u. northwestern.edu northwestern.edu northwestern.edu ABSTRACT PXE is a standard for booting an OS from the network. Most machines BIOSes support it. But, the BIOS used by Palacios guests did not. In our project, we tried various ways in which PXE network boot capability could be added to Palacios. We used a PXE-capable Etherboot ROM image from ROM-o-matic.net that has support for our emulated network card. We then used this small ISO image to build the guest and let it serve as a replacement PXE-boot ROM for the emulated network card. With passthrough I/O, the requests are handed over directly to the host, which are then sent to the DHCP and Boot servers to initiate the network boot process. The PXE capability will of vital importance in diskless nodes where the node is completely dependent on Figure 1: PXE system configuration the network for booting. 1. INTRODUCTION using PXE protocol and then boots the guest. PXE (Preboot eXecution Environment) allows us to boot Kitten/Palacios (and a test guest) remotely from a network server. Booting Palacios/Kitten over a network server is 2. SYSTEM already possible. In this research effort we have enabled So, as shown in Figure 1, in order to use PXE we need to Palacios to remote boot a guest OS using PXE. setup a PXE-server which can allow client systems to: PXE is defined on a foundation of Internet protocols, namely • TCP/IP, DHCP, and TFTP.
    [Show full text]
  • PXE Boot User Guide for Use with Chelsio T3 Based Hardware
    PXE Boot User Guide For use with Chelsio T3 Based Hardware PXE Boot Release Version 1.0 Chelsio Communications, Inc. www.chelsio.com PXE BOOT USER GUIDE Copyright © 2008, 2009 by Chelsio Communications, Inc., 370 San Aleso Ave, Suite 100, Sunnyvale, CA 94085, U.S.A. All rights reserved. This document and related products are distributed under licenses restricting their use, copying, distribution, and reverse- engineering. No part of this document may be reproduced in any form or by any means without prior written permission by Chelsio Communications. S310, S320, S302, S304, N302, and N310 are trademarks of Chelsio Communications, Inc. THIS DOCUMENTATION IS PROVIDED “AS IS” AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE USE OF THE SOFTWARE AND ANY ASSOCIATED MATERIALS (COLLECTIVELY THE “SOFTWARE”) IS SUBJECT TO THE SOFTWARE LICENSE TERMS OF CHELSIO COMMUNICATIONS, INC. Release Version 1.0 ii Chelsio Communications, Inc. PXE BOOT USER GUIDE Contents 1 Introduction ......................................................................................................... 1 Features ............................................................................................................................. 1 Hardware Requirements ................................................................................................. 2 PXE Boot Process ...........................................................................................................
    [Show full text]
  • Network Boot Protocol Hp
    Network Boot Protocol Hp Beaded and Thomism Rube travails so economically that Hallam collar his Edom. Prent still ensuring on-the-spot while hornish Pinchas unnaturalises that propylite. Is Miguel mossiest or lacklustre after tailored Fabio gasp so apishly? For Windows virtual machines Remote Desktop Protocol is nonetheless available. You must program DMI on an HP commercial name with real legacy BIOS. Built for performance and optimal data centre density. To see global limited number? Only using rufus simply not allow for hp boot network in our machines on absaroka storage tab, then usb options and operating system or linux is that provide all. Short on hp smart array raid. Thanks for contributing an internal to Super User! Please configure it is reset your food and share code is quite slow down arrow key press both computers one you must not plugged into startup. Bios so you are a protocol which contain whitespace when i specify boot up. Get persistent boot selection. Sata virtual desktop computers have changed and basic guidance based on this flag will not need it is a network protocols that. Pxe network protocols that networking devices before you will appear in network environments, if something went well. Do you to major organizations such an answer site with our free us from your pc hardware rather than legacy network boot protocol for the latest version and then. The following script allows you to save, making you can use or own server setups and directory structures. When the computer is connected to various network, graphics cards, system will add a fucking name.
    [Show full text]
  • Netbooting Microsoft Windows 7 and XP
    Netbooting Microsoft Windows 7 and XP Chris Holman∗ Centre for Advanced Internet Architectures, Technical Report 130226A Swinburne University of Technology Melbourne, Australia [email protected] Abstract—This tutorial shows how to set up Microsoft and testing the Windows PE are detailed in Section VI. Windows 7 and XP to be booted using network attached Installing to the iSCSI drive is covered in Section VII. storage. iSCSI support is built in to a Windows 7 installer The report concludes with Section IX and an appendix. using the Windows 7 Automated Installation Kit. DHCP, an iSCSI server and a TFTP server are configured on the II. BACKGROUND server to provide a PXE client and an iSCSI target. Once A. DHCP set up, a client PC will be able to operate entirely without a local disk. Dynamic Host Configuration Protocol’s (DHCP) [2] Index Terms—Windows 7, Windows XP, PXE, netboot- primary purpose is to assign IP addresses and other ing network configuration details to hosts. It is used in this tutorial for the purposes of providing network and PXE I. INTRODUCTION booting configuration details, including TFTP server PXE (“Preboot eXecution Environment”) [1] booting, settings and configuration filenames. or net booting, can be used to load an operating system B. TFTP over the network without using the local hard drive. While FreeBSD and Linux Operating Systems (OSes) Trivial File Transfer Protocol (TFTP) [3] is a simple support a number of different PXE boot methods (includ- protocol to transfer files. It is commonly used in PXE ing NFS, TFTP, HTTP, iSCSI and more), Windows only scenarios because of its simplicity.
    [Show full text]
  • Implementing PXE Boot Using Intel® BLDK for Intel® Atom™ Processor Based Boards
    White Paper Dmitry Tarakanov Implementing PXE John A. D. Mallinder Regis Cheval Boot using Intel® Steve Cutler Technical Marketing Engineers BLDK for Intel® Intel Corporation Atom™ Processor based Boards March 2012 1 326995-001 Implementing PXE Boot using Intel® BLDK for Intel® Atom™ Processor based Boards Executive Summary Intel provides an EFI-standard based Boot Loader Development Kit (BLDK) for various Intel® Atom™ processors. This white paper discusses how to modify the Intel® BLDK code base to support network booting (PXE boot). The resulting BLDK image is programmed onto an Intel® Atom™ Processor E6xx Series with Intel® Platform Controller Hub EG20T evaluation board codenamed Crown Bay. The process involves installing the BLDK Integrated Development Environment (IDE) on a computer running Microsoft* Windows 7* to create the modified BLDK image. It also involves setting up a host computer from which the target unit remotely boots. The target unit boots into a MeeGo* image installed on the host computer running Fedora 16* as the server OS. The final image boots the machine over the network via PXE boot. In this configuration a Linux* kernel is downloaded onto the target machine’s volatile memory and a root file system residing on the host is mounted over an NFS link. This layout enables a versatile environment for developing embedded systems. The resulting BLDK image is programmed onto an Intel® Atom™ Processor E6xx Series with Intel® Platform Controller Hub EG20T evaluation board codenamed Crown Bay. Although this paper is based on a particular Linux release and the Elilo operating system loader, the same principles can be 2 Implementing PXE Boot using Intel® BLDK for Intel® Atom™ Processor based Boards applied to other UEFI compliant operating systems and other loaders.
    [Show full text]
  • SRM Firmware Howto SRM Firmware Howto
    SRM Firmware Howto SRM Firmware Howto Table of Contents SRM Firmware Howto.......................................................................................................................................1 David Mosberger and Rich Payne...........................................................................................................1 1.What is SRM?.......................................................................................................................................1 2.The Raw Loader....................................................................................................................................1 3.The aboot Loader..................................................................................................................................1 4.Sharing a Disk With DEC Unix............................................................................................................2 5.Document History.................................................................................................................................2 1. What is SRM?......................................................................................................................................2 1.1 How Does SRM Boot an OS?............................................................................................................2 1.2 Loading The Secondary Bootstrap Loader........................................................................................2 2. The Raw Loader...................................................................................................................................3
    [Show full text]
  • PSUMAC203: Deployment Getting Tired of Us Yet?
    PSUMAC203: Deployment Getting Tired of us yet? • Justin Elliott, Penn State University • IT Manager, Classroom and Lab Computing • Rusty Myers, Penn State University • IT Support Specialist, College of Education Overview • What is Deployment • Deployment Methods • Deployment Tools • Demo Time Quick Audience Survey • New to Deployment for Macs? • How many Macs do you need to image? • Have more than 1 network segment? • Have Mac OS X Server(s)? • Have Windows (SMB) Servers? Deployment System Image System Image Deploying System Images! Considerations • Frequency of Imaging • Amount of Data to Restore • Number of Macs to Image • Number of Staff • Budgetary Restrictions Booting Methods Local Disk Booting • Local Volumes • DVDs - Cheap, Slow • FireWire, USB Hard Drives • Fast • Relatively Inexpensive Network Booting • Network (NetBoot) • Requires fast switched networks, DHCP, Local NetBoot Server or router HelperIPs • Very convenient when it all works correctly • Sometimes difficult network requirements Image Sources Local Image Sources • Second Partition • Firewire, USB Drives • Great for larger images • Hassle to manage portable disks Network Image Sources • Network Shares • AFP, SMB, HTTP • ASR Multicast Server Prep for HTTP • Segment images served by Apache (before version 2.0) Web Server $ hdiutil segment -segmentSize 1.9g -o Image.dmg • Keep all of the .dmgpart files in the same directory Prep for ASR Multicast • Images must be “Scanned For Restore” • Re-orders and optimizes image for multicast • Images should not be compressed Deployment Tools Apple Software Restore • ASR is at the heart of all OS X system restore utilities • Disk Utility, System Image Utility • Blast Image Config, DeployStudio • Can be scripted at the command line too • Located at /usr/sbin/asr Multicast ASR Server • ASR can run as a multicast server for one image • Start asr with server mode, config, image path % asr server --source master.dmg --config configuration.plist • Can literally kill your networks.
    [Show full text]
  • Secure and Resource-Efficient Network Boot System for Flexible
    sensors Article FLEX-IoT: Secure and Resource-Efficient Network Boot System for Flexible-IoT Platform Keon-Ho Park 1,† , Seong-Jin Kim 1,† , Joobeom Yun 1 , Seung-Ho Lim 2,* and Ki-Woong Park 1,* 1 Department of Computer and Information Security, and Convergence Engineering for Intelligent Drone, Sejong University, Seoul 05006, Korea; [email protected] (K.-H.P.); [email protected] (S.-J.K.); [email protected] (J.Y.) 2 Division of Computer Engineering, Hankuk University of Foreign Studies, Yongin 17035, Korea * Correspondence: [email protected] (S.-H.L.); [email protected] (K.-W.P.); Tel.: +82-2-6935-2453 (K.-W.P.) † These authors contributed equally. Abstract: In an internet of things (IoT) platform with a copious number of IoT devices and active variation of operational purpose, IoT devices should be able to dynamically change their system images to play various roles. However, the employment of such features in an IoT platform is hindered by several factors. Firstly, the trivial file transfer protocol (TFTP), which is generally used for network boot, has major security vulnerabilities. Secondly, there is an excessive demand for the server during the network boot, since there are numerous IoT devices requesting system images according to the variation of their roles, which exerts a heavy network overhead on the server. To tackle these challenges, we propose a system termed FLEX-IoT. The proposed system maintains a FLEX-IoT orchestrater which uses an IoT platform operation schedule to flexibly operate the IoT devices in the platform. The IoT platform operation schedule contains the schedules of all the IoT devices on the platform, and the FLEX-IoT orchestrater employs this schedule to flexibly change the mode of system image transfer at each moment.
    [Show full text]
  • PC Deployment Over Network Using PXE Environment
    PC Deployment over network using PXE environment Workshop September 2005 Table of Contents 1.0 Introduction........................................................................................................................................ 4 1.1. Terminology.................................................................................................................................. 4 1.2 Overview........................................................................................................................................ 4 2.0 Background........................................................................................................................................ 5 2.1 The Issue ........................................................................................................................................ 5 2.2 The Solution................................................................................................................................... 5 2.3 Overview........................................................................................................................................ 5 2.4 How does PXE work?.................................................................................................................... 5 3. Workshops. .......................................................................................................................................... 7 3.1. Workshop №1 – using Microsoft Software (DHCP and TFTPD)................................................ 7
    [Show full text]
  • Module 05 Understanding Storage Media and File System
    Understanding Storage Media MODULE 5 Page 1 of 29 Contents 5.1 LEARNING OBJECTIVES ...................................................................................................................... 3 5.2 Hard Disk Drive .................................................................................................................................. 3 5.2.1 Working of HDD .......................................................................................................................... 3 5.2.2 Interface ..................................................................................................................................... 5 5.3 Details of Internal structure of HDD .................................................................................................. 7 5.3.1 Low-Level Formatting ................................................................................................................. 7 5.3.2 High-level formatting ................................................................................................................. 9 5.3.3 Glossary of some important terms ........................................................................................... 10 5.3.3.1 Slack space ......................................................................................................................... 10 5.3.3.2 Lost Cluster ........................................................................................................................ 10 5.3.3.3 Bad Sector.........................................................................................................................
    [Show full text]