Penguin
Diff: WlugBladeServer
EditPageHistoryDiffInfoLikePages

Differences between version 32 and predecessor to the previous major change of WlugBladeServer.

Other diffs: Previous Revision, Previous Author, or view the Annotated Edit History

Newer page: version 32 Last edited on Saturday, October 17, 2009 6:19:40 pm by BruceKingsbury Revert
Older page: version 31 Last edited on Saturday, October 17, 2009 6:16:23 pm by BruceKingsbury Revert
@@ -60,14 +60,15 @@
  * required to be a member of the sysadmins group in order to log into the db, mail, www1, www2 blades 
  * required to be a member of the wlugcomm group in order to run the hoihotools management scripts 
  
  
-== zcat's PXE debian install notes ==  
+  
+!! zcat's PXE debian install notes 
  
 Start here for setting up dhcp and tftp; 
 http://www.debian.org/releases/stable/i386/ch04s05.html.en 
  
-also http://stateless .geek .nz/2008/03/01 /setting-up-a-pxe-linux -recovery -deployment -server -using -debian-lennyetch/ is helpful (basically the same stuff, condensed) 
+also http://www .howtoforge .com /setting-up-a-pxe-install -server -for -multiple -linux-distributions-on -debian-lenny is helpful (basically the same stuff, condensed) 
  
 Only the bottom row (eth0) can be PXE booted. Hopefully the hoiho chassis has been configured with this as the 'private' network. 
  
 It's possibly also a good idea to lock down PXE boot to specific MAC addresses so no other blades can accidentally be PXE booted into the installer. 
@@ -77,5 +78,15 @@
  
 Edit /var/lib/tftpboot/debian-installer/i386/boot-screens/txt.cfg 
 and add "console=ttyS0,115200" to the kernel options. 
  
-PXE boot the desired blade, the boot menu and debian installer should all be accessable from the iLO serial console. 
+PXE boot the desired blade, the boot menu and debian installer should all be accessible from the iLO serial console.  
+  
+!! post-install  
+  
+Debian sets up serial console automatically, but probably a good idea to install ssh server during the install anyhow.  
+  
+whatever else we do on the blades.  
+* proper network config  
+* firewall rules  
+* more secure ssh settings  
+* ldap?