dellemc.openmanage.dellemc_system_lockdown_mode module – Configures system lockdown mode for iDRAC

Note

This module is part of the dellemc.openmanage collection (version 5.4.0).

You might already have this collection installed if you are using the ansible package. It is not included in ansible-core. To check whether it is installed, run ansible-galaxy collection list.

To install it, use: ansible-galaxy collection install dellemc.openmanage.

To use it in a playbook, specify: dellemc.openmanage.dellemc_system_lockdown_mode.

New in version 1.0.0: of dellemc.openmanage

Synopsis

  • This module is allows to Enable or Disable System lockdown Mode.

Requirements

The below requirements are needed on the host that executes this module.

  • omsdk >= 1.2.488

  • python >= 3.8.6

Parameters

Parameter

Comments

ca_path

path

added in 5.0.0 of dellemc.openmanage

The Privacy Enhanced Mail (PEM) file that contains a CA certificate to be used for the validation.

idrac_ip

string / required

iDRAC IP Address.

idrac_password

aliases: idrac_pwd

string / required

iDRAC user password.

idrac_port

integer

iDRAC port.

Default: 443

idrac_user

string / required

iDRAC username.

lockdown_mode

string / required

Whether to Enable or Disable system lockdown mode.

Choices:

  • Enabled

  • Disabled

share_mnt

string

Local mount path of the network share with read-write permission for ansible user. This option is mandatory for Network Share.

share_name

string / required

Network share or a local path.

share_password

aliases: share_pwd

string

Network share user password. This option is mandatory for CIFS Network Share.

share_user

string

Network share user in the format ‘user@domain’ or ‘domainuser’ if user is part of a domain else ‘user’. This option is mandatory for CIFS Network Share.

timeout

integer

added in 5.0.0 of dellemc.openmanage

The socket level timeout in seconds.

Default: 30

validate_certs

boolean

added in 5.0.0 of dellemc.openmanage

If False, the SSL certificates will not be validated.

Configure False only on personally controlled sites where self-signed certificates are used.

Prior to collection version 5.0.0, the validate_certs is False by default.

Choices:

  • no

  • yes ← (default)

Notes

Note

  • This module requires ‘Administrator’ privilege for idrac_user.

  • Run this module from a system that has direct access to Dell EMC iDRAC.

  • This module does not support check_mode.

Examples

---
- name: Check System  Lockdown Mode
  dellemc.openmanage.dellemc_system_lockdown_mode:
       idrac_ip:   "192.168.0.1"
       idrac_user: "user_name"
       idrac_password:  "user_password"
       ca_path: "/path/to/ca_cert.pem"
       share_name: "192.168.0.1:/share"
       share_mnt: "/mnt/share"
       lockdown_mode: "Disabled"

Return Values

Common return values are documented here, the following are the fields unique to this module:

Key

Description

error_info

dictionary

Details of the HTTP Error.

Returned: on HTTP error

Sample: {“error”: {“@Message.ExtendedInfo”: [{“Message”: “Unable to process the request because an error occurred.”, “MessageArgs”: [], “MessageId”: “GEN1234”, “RelatedProperties”: [], “Resolution”: “Retry the operation. If the issue persists, contact your system administrator.”, “Severity”: “Critical”}], “code”: “Base.1.0.GeneralError”, “message”: “A general error has occurred. See ExtendedInfo for more information.”}}

msg

string

Lockdown mode of the system is configured.

Returned: always

Sample: “Successfully completed the lockdown mode operations.”

system_lockdown_status

dictionary

Storage configuration job and progress details from the iDRAC.

Returned: success

Sample: {“Data”: {“StatusCode”: 200, “body”: {“@Message.ExtendedInfo”: [{“Message”: “Successfully Completed Request”, “MessageArgs”: [], “MessageArgs@odata.count”: 0, “MessageId”: “Base.1.0.Success”, “RelatedProperties”: [], “RelatedProperties@odata.count”: 0, “Resolution”: “None”, “Severity”: “OK”}]}}, “Message”: “none”, “Status”: “Success”, “StatusCode”: 200, “retval”: true}

Authors

  • Felix Stephen (@felixs88)