Reference Guide

15 Lifecycle Controller Web Services Interface Guide for Linux
3 Overview
The remote interface guidelines provided in this document are illustrated by command line examples of
the WS-Man protocol Web services APIs that expose the remote management capabilities of the Dell
Lifecycle Controller. The command line examples are from the Microsoft Windows and Linux
environments using WinRM
4
and WSMANCLI
5
respectively. The Lifecycle Controller remote management
capabilities are organized by management domain and documented in Dell CIM Profile specifications
2
.
The remote enablement feature for Lifecycle Controller 2.0 provides the following capabilities:
Remotely retrieve information about inventory of the BIOS, component firmware, and embedded
software including version information of both the installed as well as available cached versions
Remote update of BIOS, component firmware, Diagnostic content, DRAC content, driver pack,
power supplies from remotely located Dell Update Packages or cached images located in the
Lifecycle Controller
Remotely schedule and track the status of update tasks (jobs)
Remotely manage the Part Replacement feature by allowing retrieving and setting auto update
and auto System inventory sync
Enable re-initiation of Lifecycle Controller Auto-Discovery feature
Enhancement of Operation System Deployment capabilities by supporting the downloading of an
ISO image to a Dell VFlash SD Card and booting to the ISO image on the VFlash SD Card
NIC configuration enables the ability to get and set NIC attributes that are configurable using NIC
Option ROM or NIC UEFI HII.
Remote RAID configuration allows you to remotely query and configure the Hardware Raid of the
System
Multiple HW Inventory views allows you to remote query the inventory of Hardware
Backup & Restore of Server Profiles and automatic scheduling of backups
Automatic scheduled firmware updates
XML based server configuration
WS-Eventing for event notifications
3.1 Format for WS-Man CLI Examples in Document
The examples of WinRM and WSMANCLI command line invocations in this document are formatted for
readability and often span multiple lines in the document. In actual use, scripted or hand-typed invocations
are incorporated in one line. The examples also use substitute values for the target iDRAC IP address,
username (with ExecuteServerCommand privilege), password and other site specific information. Actual
use of these examples would require using valid values for IP address, username, password, and so on.
These values are represented in the examples as follows:
Target iDRAC IP address = [IPADDRESS]
iDRAC Username = [USER]
iDRAC Password = [PASSWORD]
Additional substitute values are used in some of the examples and are described in the specific example.
The following example represents the format used in this document:
EXAMPLE:
wsman enumerate http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/root/dcim/DC
IM_OSDeploymentService
-h $IPADDRESS -V -v -c dummy.cert -P 443
-u $USERNAME -p $PASSWORD
-j utf-8 -y basic