Tivoli Provisioning Manager for OS Deployment

Tivoli Provisioning Manager for OS Deployment

Tivoli Provisioning Manager for OS Deployment User's Guide Tivoli Provisioning Manager for OS Deployment User's Guide ii Tivoli Provisioning Manager for OS Deployment: User's Guide Contents Chapter 1. Defining targets ......1 Scheduling the application of software modules Adding targets..............2 for Windows operating systems ......64 Detecting targets automatically .......2 Working with hardware configurations .....65 Adding targets to the Target Monitor manually . 3 Setting up your environment .......66 Importing and exporting targets lists .....3 Hardware configuration objects and tasks . 67 Configuring new targets .........5 RAID and Fiber Channel hardware capture. 68 Changing the default administrative group . 5 Creating a hardware environment ......68 Requirements for VMware targets .......6 Creating a hardware configuration object . 75 Injecting drivers on WinPE 3.0 to deploy Windows Creating a hardware capture configuration . 75 XP guests ..............7 Capturing hardware information using templates 76 Booting non x86 and non x86-64 targets .....8 Capturing hardware information once ....77 Booting pSeries targets on the OS deployment Task templates for Windows operating systems . 77 server................8 Customizing a screen layout........78 Booting CellBlades targets on the OS deployment Creating and editing deployment schemes . 79 server................9 Creating media for deployment for Windows Booting SPARC targets on the OS deployment operating systems ............83 server................9 Creating an OS deployment USB drive with the Organizing targets ............11 wizard ...............84 Configuring targets ............12 Creating an OS deployment USB drive with Configuring multiple targets........12 command lines ............85 Configuring targets for fully unattended OS Creating OS deployment CD and DVD ....86 deployments .............12 Deploying Windows operating systems .....89 Setting partition sizes on the targets .....13 The deployment process .........89 Deployment requirements ........90 Chapter 2. Provisioning Windows Starting a one-time deployment ......91 operating systems on x86 and x86-64 Deploying a hardware configuration .....93 Redeploying .............93 targets ...............15 Monitoring deployments ........101 Overview of WinPE deployment engines ....15 Bindings created during deployment ....104 Windows Automated Installation Kit .....16 Creating a WinPE 3.0 deployment engine . 17 Chapter 3. Provisioning Linux Editing the information of a WinPE deployment operating systems on x86 and x86-64 engine ...............19 Adding matching target models to a WinPE targets ..............105 deployment engine ...........19 System profiles for Linux operating systems . 105 Binding drivers to a WinPE deployment engine 20 Creating system profiles .........105 System profiles for Windows operating systems . 24 Organizing and editing system profiles ....108 BitLocker compatibility .........24 Browsing partition files .........109 Creating system profiles .........25 Changing the partition layout in Linux ....109 Organizing and editing system profiles ....33 Updating device mapping ........111 Updating a system profile with a Language Pack OS configurations and fixed common or a HotFix .............34 parameters .............111 Browsing partition files .........34 Software modules for Linux operating systems . 113 Changing the partition layout in Windows . 35 Creating software modules ........114 Updating device mapping ........36 Editing software modules ........117 OS configurations and fixed common parameters 37 Keeping command lines confidential ....117 Binding drivers to a Windows system profile . 39 Keyword substitution..........118 Restoring a system profile manually .....42 Customizing the software page ......120 Software modules for Windows operating systems 43 OS configuration and software bindings . 120 WinPE and its uses ...........43 Scheduling the application of software modules Creating software modules ........45 for Linux operating systems .......123 Editing software modules ........58 Working with hardware configurations .....124 Keeping command lines confidential .....58 Setting up your environment .......125 Keyword substitution ..........59 Hardware configuration objects and tasks . 126 Customizing the software page .......61 RAID and Fiber Channel hardware capture . 127 OS configuration and software bindings ....61 Creating a hardware environment .....127 © Copyright IBM Corp. 2006, 2010 iii Creating a hardware configuration object . 134 Deploying Linux on PowerPC .......211 Creating a hardware capture configuration . 134 Provisioning Solaris on SPARC targets .....216 Capturing hardware information using System profiles for Solaris operating systems 216 templates..............135 Software modules for Solaris operating systems 221 Capturing hardware information once ....135 Task templates for Solaris operating systems 231 Task templates for Linux operating systems . 136 Deploying Solaris ...........237 Customizing a screen layout .......137 Provisioning AIX on PowerPC targets .....243 Creating and editing deployment schemes. 137 System profiles for AIX operating systems. 243 Creating media for deployment for Linux Task templates for AIX operating systems . 246 operating systems ............142 Deploying AIX ............253 Creating an OS deployment USB drive with command lines ............143 Chapter 6. Multiple server architecture 259 Creating an OS deployment USB drive with Server roles ..............259 command lines ............144 OS deployment server replication ......261 Creating OS deployment CD and DVD ....145 Replicating OS deployment servers with a Deploying Linux ............148 schedule ..............264 The deployment process.........148 Replicating an OS deployment server once Deployment requirements ........149 manually ..............264 Starting a one-time deployment ......150 Replicating offline with the web interface Deploying a hardware configuration ....151 extension ..............265 Redeploying.............152 Replicating one time in command line ....267 Monitoring deployments ........159 Server replication status and logs......268 Bindings created during deployment ....163 Switching from an ODBC to a JDBC gateway 269 Removing an OS deployment server from the Chapter 4. Provisioning VMWare ESX hierarchy ...............269 Server on x86 and x86-64 targets . 165 System profiles for VMWare operating systems . 165 Chapter 7. Security .........271 Creating an unattended setup system profile for Security roles and access to the Web interface . 271 VMWare..............166 Creating an HTTP authentication domain . 272 Organizing and editing system profiles ....166 Creating security roles .........272 Browsing partition files .........167 Backups of server files ..........273 Changing the partition layout in VMWare . 167 Importing and exporting RAD files .....273 Updating device mapping ........168 Importing and exporting targets lists ....275 OS configurations and fixed common Exporting and loading configurations ....276 parameters .............169 Fault tolerance .............277 Task templates for VMWare operating systems . 170 Fault tolerance at the DHCP level .....277 Customizing a screen layout .......171 Fault tolerance at the Tivoli Provisioning Creating and editing deployment schemes. 172 Manager for OS Deployment level .....278 Creating media for deployment for VMWare . 176 Network security constraints ........279 Creating an OS deployment USB drive with the Avoiding new security breaches .......280 wizard ..............177 Rogue PXE servers ..........280 Creating an OS deployment USB drive with Unwanted target computers .......281 command lines ............178 Security issues and the web interface .....281 Creating OS deployment CD and DVD ....179 Deploying VMWare ...........182 Chapter 8. Booting targets without The deployment process.........182 using PXE .............283 Deployment requirements ........183 Creating network boot USB drive with the wizard 283 Starting a one-time deployment ......184 Creating a network boot CD or DVD with the Monitoring deployments ........185 wizard ...............284 Bindings created during deployment ....188 Creating an original WinPE 3.0 network boot CD or DVD with the wizard..........285 Chapter 5. Provisioning non x86 and Using a network boot CD ........286 non x86-64 targets .........189 Creating a network boot USB drive with command Provisioning Linux on PowerPC and Cell targets 189 lines ................287 System profiles for Linux operating systems on Creating a network boot CD or DVD with PowerPC ..............189 command lines .............289 Software modules for Linux operating systems Booting on the network when the target is missing on PowerPC.............195 network drivers ............290 Task templates for Linux operating systems on PowerPC ..............205 Chapter 9. Tools ..........293 iv Tivoli Provisioning Manager for OS Deployment: User's Guide Erasing hard disk content .........293 Restoring user settings ..........295 Software snapshots ...........293 Limitation of the technology .......293 Chapter 11. Glossary ........297 Restoring software snapshots .......294 Chapter 12. Notices.........303 Chapter 10. Migrating users .....295 Capturing user settings ..........295 Contents v vi Tivoli Provisioning Manager for OS Deployment: User's Guide Chapter 1. Defining targets Targets are computers known to the OS deployment server. This includes the OS deployment servers themselves, the

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    316 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us