The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
This chapter contains the following sections:
Before you install Cisco UCS Director PowerShell Agent, make sure that the following software has been installed on the machine:
Supported Windows operating system
Supported .NET Framework (Full Package)
Supported Windows PowerShell
For more information about the system requirements and supported software, see the Compatibility Matrix for Cisco UCS Director.
Note | Cisco UCS Director executes scripts (commandlets) on the target server via remote execution. The target server's northbound PowerShell APIs must support remote invocation. |
You download the installer for PowerShell Agent from Cisco UCS Director.
Install Cisco UCS Director PowerShell Agent on the target computer.
Installing a newer version of the PowerShell Agent requires that you uninstall the older version first. To remove the older version of PowerShell Agent, stop the Cisco PSA Service first and then uninstall the agent.
Note | If you do not install the new version of PowerShell Agent for Cisco UCS Director, Release 5.5, the Execute Power Shell Task and the Execute Command options on the PowerShell Agents tab will not work correctly. |
You need system administrator privileges to complete this task.
Configure Cisco UCS Director PowerShell Agent.
The PowerShell Agent uses port 43891 (default) and it also uses a predefined authentication/access key to communicate with Cisco UCS Director. You can change these values, if needed, by modifying a properties file. The properties (XML) file is located in the following directory:
%AGENT_INSTALL_FOLDER%/props/properties.xml.
You should download and successfully install the Cisco UCS Director PowerShell Agent installation program.
Configure your firewalls.
The PowerShell Agent listens for incoming requests on port 43891 by default. Your machine's firewall needs to be configured so as to allow incoming TCP requests on port 43891 (or any port that you choose to use).
To accept remote PowerShell commands, you must enable Windows Remote Management (WinRM) for Windows Server 2008 R2, 2012 or 2012 R2. Once you enable the WinRM, the interoperability of hardware and operations systems is enabled to work with the Windows Remote Shell (WinRS) command-line tool on your target server and the target server hosts.
The PowerShell Agent only executes the cmdlets and scripts on the target server in a PowerShell remote session. It requires the WinRM configuration to accept the remote session. This is a Windows PowerShell remote session requirement
Step 1 | On your
host(s), open a command prompt, and enter
winrm
quickconfig.
The following messages appear: WinRM is not set up to allow remote access to this machine for management. The following changes must be made: Create a WinRM listener on HTTP://* to accept WS-Man requests to any IP on this machine. Enable the WinRM firewall exception. Make these changes [y/n]? | ||
Step 2 | Enter y.
WinRM is
updated for remote management, a listener is created to accept requests, and
the firewall exception is enabled:
Make these changes [y/n]? y WinRM has been updated for remote management. Created a WinRM listener on HTTP://* to accept WS-Man requests to any IP on this machine. WinRM firewall exception enabled. | ||
Step 3 | Verify that WinRS is enabled by entering the winrm g winrm/config command at a command prompt. | ||
Step 4 | Configure the
value
" * "
in the TrustedHosts table of WinRM by entering the
winrm
set winrm/config/client @{TrustedHosts="*"} command.
|
Make sure that the domain account used to connect the target server belongs to the local administrator group for the target server hosts.