Unattended setup Tivoli Provisioning Manager for OS Deployment 7.1.1 Unattended setup In this module, you learn how to create an unattended setup profile for any supported target operating system, including Windows®, Linux®, AIX®, and Solaris. Unattended setup profile Unattended setup profile You must have an OS image on a machine running the Web Interface Extension To create a Vista/2008 profile, you also need WAIK 1.1 32-bit and a Windows 32-bit operating system From OS deployment > System profiles, click the New profile button In the Profile Wizard, select Unattended setup (scripted install) In Tivoli® Provisioning Manager for OS Deployment, an unattended setup image is a profile that is created from an operating system image, for example, a Windows CD/DVD image. The first prerequisite to create this profile is to have the operating system image on a machine that is running the Web Interface Extension. For AIX and Solaris unattended profiles, additional actions are needed. If you are building a Windows Vista/2008 unattended profile, that machine must also have WAIK 1.1 32-bit installed and must run a Windows 32-bit operating system. Windows 2000 is not supported. After you have the source image available, you click the New profile button from the OS deployment > System profiles page in the product WEBUI and follow the wizard. Then, you specify the computer where the material to create your profile can be found and the directory where the images are located. Windows 2000/2003/XP unattended setup (1 of 2) Windows 2000/2003/XP unattended setup (1 of 2) To create a Windows 2000, 2003, or XP system profile you need the Windows source images available on a machine running the Web Interface Extension. From the OS deployment > System profiles page in the product WEBUI, you click the New profile button. Then, you select A Windows 2000/2003/XP system profile. You specify the computer where the material to create your profile can be found. It can be the Tivoli Provisioning Manager for OS Deployment server itself or another computer with the Web Interface Extension running. You also specify the directory where the images are located. You can specify the partition layout and the partition type for the first partition only. Later, you can edit the created profile and add new partitions or modify the existing one. Windows 2000/2003/XP unattended setup (2 of 2) Windows 2000/2003/XP unattended setup (2 of 2) The Profile wizard prompts you to specify the Windows product key. If you are setting the key at a profile level, that value is used for all the deployed machines. You also specify additional fixed properties, like the administrator password. You can set these fixed properties separately for each host. If you want to use a custom configuration file with advanced Windows installation settings, you can specify the full path to the unattend.txt file. Notice that the settings in the unattend.txt file will be merged by the product with the host-specific settings during the operating system deployment. Windows Vista/2008 unattended setup Windows Vista/2008 unattended setup Microsoft BitLocker Drive Encryption is a security tool that protects data by encrypting it and rendering the content of a hard disk unreadable, if stolen. BitLocker requires at least two partitions: a boot partition containing the BitLocker tool and at least 1.5 GB and an operating system partition that can be encrypted. A Windows Vista/2008 unattended profile creation is very similar to the Windows 2000/2003/XP. The difference that you see in the sequence of screen captures is that you can select multiple Vista/2008 configurations to be included in the profile. You can also choose to prepare the disk for the Microsoft® BitLocker drive encryption. This encryption is a security tool protecting data by encrypting it and making a hard disk unusable if stolen. This option requires at least two partitions, and the boot partition must have at least 1.5 GB. Linux unattended setup (1 of 2) Linux unattended setup (1 of 2) For a Linux unattended profile creation, you must have the Linux setup image on a machine running the Web Interface Extension. You must specify the image folder in the profile wizard. During the profile creation, you can modify the base partition layout by setting the partition sizes. Linux unattended setup (2 of 2) Linux unattended setup (2 of 2) In the wizard, you can select additional Linux software groups to be installed among the ones available in the setup image. You can then specify some additional system properties, such as the root password, that can be set later individually for each target. If you want to use a custom configuration file, ks.cfg, you specify its location so that the product merges those advanced settings with the host-specific settings during the deployment on the target system. Solaris unattended setup (1 of 2) Solaris unattended setup (1 of 2) To create a Solaris unattended profile, you need a Solaris install server that is also running the Web interface extension Set up a Solaris install server Configure a network file system share and load the installation content of Solaris operating systems Download and run the Web interface extension on the Solaris install server Create the profile using the WEBUI (Unattended is only supported in V7.1.1) Tivoli Provisioning Manager for OS Deployment does not require a full Solaris installation environment (with JumpStart) to provision Solaris. The only requirement is to have the corresponding operating system image files available using a Network File System (NFS) share to create the Solaris unattended setup. To create a Solaris profile, you need to have a Solaris install server, which can be configured on any standard Solaris computer. You must also be running the Web interface extension. Here are the required steps: 1. Set up a Solaris install server; 2. Configure a network share and load the Solaris installation images into that folder; 3. Download and run the Web interface extension on the Solaris install server; 4. Create the Solaris unattended profile from the product WEBUI. Solaris unattended setup (2 of 2) Solaris unattended setup (2 of 2) During the Solaris profile creation, you must specify the IP address of the Solaris machine that is hosting the image files in a network file system share and running the Web Interface Extension. AIX unattended setup (1 of 2) AIX unattended setup (1 of 2) To create an AIX unattended system profile, you must work on an AIX operating system of the same version as the profile you want to create, and be running the Web Interface Extension Copy the content of the installation DVD to disk Export the path of the folder in which you have copied the installation files by NFS Create the OS profile by using the WEBUI (an unattended profile is only supported in V7.1.1) To create an AIX unattended setup profile, you must have the AIX operating system image files. To obtain the files, use a Network File System (NFS) share on an AIX machine that is running the Web interface extension. First, copy the content of the installation DVD to disk. Next, export the path of the folder in which you have copied the installation files by NFS. Then, create the OS profile by using the WEBUI. Notice that in 7.1.1 you can only create unattended profiles for AIX. AIX unattended setup (2 of 2) AIX unattended setup (2 of 2) When creating the AIX profile, in the wizard, you specify the IP address of the machine that is hosting the AIX image files using the NFS share and is running the Web Interface Extension. Summary Summary In this module, you learned about: The unattended profile concept Creating unattended profiles for supported operating systems Additional details for AIX and Solaris unattended profile creation In this module, you learned about the unattended profile concept, how to create unattended profiles for supported operating systems, and additional details for AIX and Solaris unattended profile creation. Feedback Feedback Your feedback is valuable You can help improve the quality of IBM Education Assistant content to better meet your needs by providing feedback. Did you find this module useful? Did it help you solve a problem or answer a question? Do you have suggestions for improvements? Click to send e-mail feedback: mailto:iea@us.ibm.com?subject=Feedback_about_unattended_setup.ppt This module is also available in PDF format at: ../unattended_setup.pdf You can help improve the quality of IBM Education Assistant content by providing feedback. Trademarks