Administrator Guide

Table of contents
3 Using Server Configuration Profiles to Deploy Operating Systems to Dell EMC PowerEdge Servers | 375
Table of contents
Revisions............................................................................................................................................................................. 2
Acknowledgements ............................................................................................................................................................. 2
Table of contents ................................................................................................................................................................ 3
Executive Summary ............................................................................................................................................................ 4
1 Server configuration profile template operating system deployment additions ............................................................ 5
2 Server configuration profile operations ........................................................................................................................ 8
2.1 Export server configuration profile template ....................................................................................................... 8
2.1.1 SCP export using the iDRAC UI: ........................................................................................................................ 8
2.1.2 SCP export using RACADM: .............................................................................................................................. 8
2.1.3 SCP export using Redfish: ................................................................................................................................. 8
2.2 Import preview server configuration profile template .......................................................................................... 8
2.2.1 SCP import preview using iDRAC UI:................................................................................................................. 9
2.2.2 SCP import preview using RACADM:................................................................................................................. 9
2.2.3 SCP import preview using Redfish: .................................................................................................................... 9
2.3 Import server configuration profile template ....................................................................................................... 9
2.3.1 SCP import using the iDRAC UI: ........................................................................................................................ 9
2.3.2 SCP import using RACADM: ............................................................................................................................ 10
2.3.3 SCP import using Redfish: ............................................................................................................................... 10
3 Server configuration profile end-to-end workflows ..................................................................................................... 11
3.1 Workflow using the iDRAC UI ........................................................................................................................... 11
3.2 Workflow using the remote RACADM CLI ........................................................................................................ 14
3.3 Workflow using Redfish .................................................................................................................................... 20
4 Troubleshooting .......................................................................................................................................................... 23
4.1 Operating system driver pack issues................................................................................................................ 23
4.2 Network issues ................................................................................................................................................. 23
4.3 Corrupt operating system installation file ......................................................................................................... 24
5 Useful Links ................................................................................................................................................................ 26
6 Additional notes .......................................................................................................................................................... 27