Skip to main content
Version: Next

Task 05: Deploy OMIMSWAC Monitoring

Runbook Azure

DOCUMENT CATEGORY: Runbook SCOPE: Dell hardware monitoring via Windows Admin Center PURPOSE: Configure OMIMSWAC for hardware compliance, alerts, and Azure Policy integration MASTER REFERENCE: Dell OMIMSWAC Documentation

Status: Active


Dell OpenManage Integration for Windows Admin Center (OMIMSWAC) provides hardware-level monitoring, compliance checking, and Azure Policy integration for Dell AX-series Azure Local clusters. This extension enables hardware alert streaming to Azure Log Analytics and automated compliance remediation.

Prerequisites

RequirementDescriptionValidation
Windows Admin CenterVersion 2410 (GA) or laterGateway mode recommended
OMIMSWAC ExtensionInstalled and EULA acceptedWAC Settings → Extensions
OMIWAC Premium LicenseLicensed on every nodeMixed licensing not supported
Log Analytics WorkspaceCreated in Step 1Workspace ID available
iDRAC FirmwareVersion 7.xx.xx.xx+Redfish enabled
iDRAC Service Module (iSM)Installed and running on each nodeRequired for alert replication
Network ConnectivityPorts 443 (HTTPS), 445 (SMB)Outbound to Azure, Redfish to iDRAC

Prerequisites Checklist

CategoryRequirementNotes
WACVersion 2410+Gateway mode recommended
ExtensionOMIMSWAC installed, EULA acceptedWAC Settings → Extensions
LicensingOMIWAC Premium on every nodeMixed licensing not supported
AccountsDeployment user with local admin + WAC gateway adminUse "Manage as" on connect
ConnectivitySMB In (445) on nodes, SMB Out on gateway, HTTPS (443) outboundRedfish over 443 to iDRAC
iDRACFirmware 7.xx+, Redfish enabledMax 8 active sessions
iSMiDRAC Service Module installed and runningHardware alert replication
TPM/BIOSTPM 2.0 (fw ≥ 7.2.2.0), BIOS meets Secured-core minimumFor Secured-core enablement
AzureSubscription, Resource Group, Log Analytics, Arc rightsRole includes Microsoft.Authorization/*

Variables from variables.yml

VariableConfig PathExample
AZURE_SUBSCRIPTION_NAMEazure.subscription.nameAzure Local Production
AZURE_RESOURCE_GROUPazure.resource_group.namerg-azurelocal-prod-eus2
LOG_ANALYTICS_WORKSPACE_NAMEmonitoring.log_analytics.workspace_namelaw-azl-DAL-prod-01
CLUSTER_NODE_01_NAMEnodes[0].nameazl-dal-node-01
CLUSTER_NODE_02_NAMEnodes[1].nameazl-dal-node-02

Configuration Steps

Step 5.1: Connect Cluster in Windows Admin Center

  1. Open Windows Admin Center (WAC)
  2. Add cluster by FQDN (not individual nodes)
  3. Choose Manage as with deployment user credentials
  4. Check Use these credentials for all connections
  5. Launch Dell OpenManage Integration from Extensions

Step 5.2: Run Prerequisite Check

  1. Navigate to ViewPrerequisite Check
  2. Select all operations
  3. Review results and resolve any Critical items:
  • SMB port availability
  • Redfish connectivity
  • Execution Policy
  • IPMI driver
  • CredSSP (if required)

Step 5.3: Configure Cluster Settings

  1. Navigate to ViewComplianceHCP Compliance
  2. If prompted, configure:
SettingOptions
Network TopologyFully-Converged / Non-Converged-Physical / Non-Converged-Set
Deployment ModelScalable / Switchless / Stretch
RDMA Protocol (Intel E810 only)iWARP or RoCEv2
  1. Click Save — These settings drive which Dell policies are applied

Step 5.4: Run HCP Compliance Check

  1. Click Check Compliance (HCP)
  2. Address any Critical issues:
  • Dell Hardware Symmetry Policy (unsupported drive mix, missing BOSS, HBA mismatch)
  1. Use Fix Compliance only after symmetry passes:
  • Apply & Reboot Now — Cluster-aware sequencing
  • Apply at Next Reboot — Plan maintenance; disable Infrastructure Lock before reboot
  1. Re-run compliance to confirm Compliant/Recommended state
RDMA Warning

If RDMA network adapters show Warning under Dell OS Configuration Policy and you use Network ATC, you can safely ignore that specific check.

Step 5.5: Configure Azure Policy Integration

  1. Navigate to ViewAzure Integration (or Azure tab in OMIMSWAC)
  2. Sign into Azure (ensure network egress on 443)
  3. Run Onboarding Checklist — Must pass Microsoft.Authorization permission check
  4. Onboard Dell policies (HCP/SCP sets) to Azure Arc scope
  5. Trigger compliance scan from Azure Portal (Policy blade) if immediate visibility needed

Step 5.6: Configure Hardware Alerts to Azure

  1. Verify on each node in iDRAC:
  • Lifecycle Log replication enabled
  • Alerts enabled
  1. In OMIMSWAC Alerts/Diagnostics section:
  • Configure Data Collection Rule (DCR)
  • Select Log Analytics Workspace
  • Map all cluster nodes
  1. Complete the DCR wizard:
SettingValue
Subscription{{AZURE_SUBSCRIPTION_NAME}}
Resource Group{{AZURE_RESOURCE_GROUP}}
Log Analytics Workspace{{LOG_ANALYTICS_WORKSPACE_NAME}}
Data Collection EndpointCreate new or select existing in same region
  1. Confirm ingestion in Azure Portal → Log Analytics → Logs

Step 5.7: Create Hardware Alert Rules

  1. Navigate to Azure PortalMonitorAlertsAlert rules
  2. Create log-based alerts:
// Dell hardware alert query (adjust table name based on OMIMSWAC)
// Table name shown in OMIMSWAC Tables blade
CustomTable_CL
| where TimeGenerated > ago(1h)
| where Severity_s in ("Critical", "Warning")
| project TimeGenerated, Computer, Message_s, Severity_s, Category_s
  1. Configure alert rule:
  • Evaluation frequency: 5 minutes
  • Attach Action Group from Step 4

Optional: Secured-Core Enablement

For enhanced security hardening:

  1. Navigate to ViewSecuritySecured Core
  2. Disable Infrastructure Lock if enabled
  3. Review BIOS + OS feature statuses:
  • Virtualization Technology
  • Kernel DMA Protection
  • Secure Boot
  • TPM
  • DRTM/TXT
  1. Click Enable BIOS Configurations and choose reboot method
CredSSP

CredSSP is temporarily enabled for cluster-aware operations. Disable it post-operation for security.

  1. Re-enable Infrastructure Lock once stable

Validation

Verify Compliance Status

LayerHow to VerifyPass Criteria
HCP ComplianceRe-run Check ComplianceNo Critical; Warnings understood
Secured-coreSecurity page & msinfo32All BIOS features Enabled
Azure PoliciesAzure Portal → Policy → ComplianceDell definitions present
AlertsLog Analytics query returns rowsRecent hardware events visible
Lock StateOverview page shows lock iconLocked post-change

Sample Validation Query

// Verify hardware events are flowing
Heartbeat
| where TimeGenerated > ago(1h)
| where Computer in ("{{CLUSTER_NODE_01_NAME}}", "{{CLUSTER_NODE_02_NAME}}")
| summarize LastHeartbeat = max(TimeGenerated) by Computer

iDRAC/iSM Verification

On each cluster node:

# Verify iDRAC Service Module is running
Get-Service -Name "iDRAC Service Module" |
Select-Object Name, Status, StartType

# Check for recent hardware events
Get-WinEvent -LogName "Dell" -MaxEvents 10 -ErrorAction SilentlyContinue |
Select-Object TimeCreated, Message

Troubleshooting

SymptomLikely CauseResolution
Policy onboarding failsMissing Microsoft.Authorization/*Assign Owner or custom role; retry
Symmetry CriticalMixed drive sizes/model mismatchAlign hardware; re-run HCP
Alerts absent in AzureiSM missing or DCR deletedInstall iSM; recreate DCR
Inventory hangingSMB 445 blocked or USB NIC conflictOpen port; add proxy bypass
Secured-core partialTPM firmware below 7.2.2.0Update TPM/server firmware

Ongoing Maintenance

FrequencyTask
DailyReview Azure alerts dashboard
WeeklyRe-run HCP Compliance after changes
MonthlyConfirm lock state; verify Secured-core
QuarterlyFirmware/BIOS drift check (Azure portal if LCM-enabled)

Limitations

  • Hardware Updates (CAU): Not supported for freshly deployed Azure Local 23H2/24H2 clusters with LCM component. Use Azure portal lifecycle management instead.
  • Infrastructure Lock: Must be disabled for BIOS/iDRAC/NIC remediation and Secured-core enablement.
  • Proxy: Add USB NIC (169.254.*) IPs to proxy bypass or Redfish/iDRAC inventory may fail.

Variables Reference

VariableDescriptionExample
{{CLUSTER_NODE_01_NAME}}First node hostnameazl-dal-n01
{{LOG_ANALYTICS_WORKSPACE_NAME}}Workspace namelaw-azl-dal-prod-01

Next Steps

After deploying OMIMSWAC monitoring:

  1. ➡️ Task 6: Configure Network Device Logging — Syslog from switches/firewalls
  2. Set up regular compliance check schedule
  3. Document firmware update procedures for maintenance windows
  4. Create operational runbooks for common hardware alerts