Skip to content

Commit 550d14f

Browse files
authored
Merge pull request #92053 from johnwilkins/HCIDOCS-684
HCIDOCS-684: add iDRAC permission required for installing BareMetal hosts using BMC
2 parents 4f4a558 + 2d5cfb9 commit 550d14f

File tree

1 file changed

+13
-12
lines changed

1 file changed

+13
-12
lines changed

modules/ipi-install-bmc-addressing-for-dell-idrac.adoc

Lines changed: 13 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
[id='bmc-addressing-for-dell-idrac_{context}']
77
= BMC addressing for Dell iDRAC
88

9-
The `address` field for each `bmc` entry is a URL for connecting to the {product-title} cluster nodes, including the type of controller in the URL scheme and its location on the network.
9+
The `address` configuration setting for each `bmc` entry is a URL for connecting to the {product-title} cluster nodes, including the type of controller in the URL scheme and its location on the network. The `username` configuration for each `bmc` entry must specify a user with `Administrator` privileges.
1010

1111
[source,yaml]
1212
----
@@ -17,10 +17,11 @@ platform:
1717
role: <master | worker>
1818
bmc:
1919
address: <address> <1>
20-
username: <user>
20+
username: <user> <2>
2121
password: <password>
2222
----
2323
<1> The `address` configuration setting specifies the protocol.
24+
<2> The `username` configuration setting must specify a user with `Administrator` privileges.
2425

2526
For Dell hardware, Red Hat supports integrated Dell Remote Access Controller (iDRAC) virtual media, Redfish network boot, and IPMI.
2627

@@ -29,9 +30,9 @@ For Dell hardware, Red Hat supports integrated Dell Remote Access Controller (iD
2930
[width="100%", cols="1,3", options="header"]
3031
|====
3132
|Protocol|Address Format
32-
|iDRAC virtual media| `idrac-virtualmedia://<out-of-band-ip>/redfish/v1/Systems/System.Embedded.1`
33-
|Redfish network boot|`redfish://<out-of-band-ip>/redfish/v1/Systems/System.Embedded.1`
34-
|IPMI|`ipmi://<out-of-band-ip>`
33+
|iDRAC virtual media| `idrac-virtualmedia://<out_of_band_ip>/redfish/v1/Systems/System.Embedded.1`
34+
|Redfish network boot|`redfish://<out_of_band_ip>/redfish/v1/Systems/System.Embedded.1`
35+
|IPMI|`ipmi://<out_of_band_ip>`
3536
|====
3637

3738
[IMPORTANT]
@@ -61,7 +62,7 @@ platform:
6162
- name: openshift-master-0
6263
role: master
6364
bmc:
64-
address: idrac-virtualmedia://<out-of-band-ip>/redfish/v1/Systems/System.Embedded.1
65+
address: idrac-virtualmedia://<out_of_band_ip>/redfish/v1/Systems/System.Embedded.1
6566
username: <user>
6667
password: <password>
6768
----
@@ -73,7 +74,7 @@ While it is recommended to have a certificate of authority for the out-of-band m
7374
Ensure the {product-title} cluster nodes have *AutoAttach* enabled through the iDRAC console. The menu path is: *Configuration* -> *Virtual Media* -> *Attach Mode* -> *AutoAttach*.
7475
====
7576

76-
The following example demonstrates a Redfish configuration using the `disableCertificateVerification: True` configuration parameter within the `install-config.yaml` file.
77+
The following example demonstrates a Redfish configuration that uses the `disableCertificateVerification: True` configuration parameter within the `install-config.yaml` file.
7778

7879
[source,yaml]
7980
----
@@ -83,7 +84,7 @@ platform:
8384
- name: openshift-master-0
8485
role: master
8586
bmc:
86-
address: idrac-virtualmedia://<out-of-band-ip>/redfish/v1/Systems/System.Embedded.1
87+
address: idrac-virtualmedia://<out_of_band_ip>/redfish/v1/Systems/System.Embedded.1
8788
username: <user>
8889
password: <password>
8990
disableCertificateVerification: True
@@ -92,7 +93,7 @@ platform:
9293
[discrete]
9394
== Redfish network boot for iDRAC
9495

95-
To enable Redfish, use `redfish://` or `redfish+http://` to disable transport layer security (TLS). The installer requires both the hostname or the IP address and the path to the system ID. The following example demonstrates a Redfish configuration within the `install-config.yaml` file.
96+
To enable Redfish, use `redfish://` or `redfish+http://` to disable transport layer security (TLS). The installation program requires both the hostname or the IP address and the path to the system ID. The following example demonstrates a Redfish configuration within the `install-config.yaml` file.
9697

9798
[source,yaml]
9899
----
@@ -102,12 +103,12 @@ platform:
102103
- name: openshift-master-0
103104
role: master
104105
bmc:
105-
address: redfish://<out-of-band-ip>/redfish/v1/Systems/System.Embedded.1
106+
address: redfish://<out_of_band_ip>/redfish/v1/Systems/System.Embedded.1
106107
username: <user>
107108
password: <password>
108109
----
109110

110-
While it is recommended to have a certificate of authority for the out-of-band management addresses, you must include `disableCertificateVerification: True` in the `bmc` configuration if using self-signed certificates. The following example demonstrates a Redfish configuration using the `disableCertificateVerification: True` configuration parameter within the `install-config.yaml` file.
111+
While it is recommended to have a certificate of authority for the out-of-band management addresses, you must include `disableCertificateVerification: True` in the `bmc` configuration if you use self-signed certificates. The following example demonstrates a Redfish configuration that uses the `disableCertificateVerification: True` configuration parameter within the `install-config.yaml` file.
111112

112113
[source,yaml]
113114
----
@@ -117,7 +118,7 @@ platform:
117118
- name: openshift-master-0
118119
role: master
119120
bmc:
120-
address: redfish://<out-of-band-ip>/redfish/v1/Systems/System.Embedded.1
121+
address: redfish://<out_of_band_ip>/redfish/v1/Systems/System.Embedded.1
121122
username: <user>
122123
password: <password>
123124
disableCertificateVerification: True

0 commit comments

Comments
 (0)