/build/static/layout/Breadcrumb_cap_w.png

KACE Product Support Question


Is there anyway to avoid installation of software that has already been installed on the computer using Dell Kace K1000?

06/18/2015 2268 views

1) Added new managed installation. Is there anyway to determine the sequence of installation?

2) How to avoid reinstallation using dell kace K1000?

Other than software deployment using dell kace.

3) Is there any published database schema of Dell Kace K1000? This is for SQL query for logs retrieval....

1 Comment   [ + ] Show comment

Comments

  • Is the managed installation associated with a software title? It is best practice to upload the software to a software title and create the MI based on that title. This allows KACE to detect if the title is already installed on the machine.

All Answers

0
1.  Managed installs are deployed as a batch job, but you can set priority in the MI itself, which will affect the order they are deployed in.  Look under Schedule and find Order.   I believe 1 is the highest and 10 is the lowest priority, but I don't remember for sure and can't find an article about it at the moment.

2.  Managed installs use either an uninstall string or a custom inventory rule in the software inventory item in order to avoid reinstallation. http://documents.software.dell.com/k1000-systems-management-appliance/6.3/administrator-guide/managing-inventory/writing-custom-inventory-rules/create-custom-inventory-rules

3. There is not a schema, but the tables are listed in the administrator guide.http://documents.software.dell.com/k1000-systems-management-appliance/6.3/administrator-guide/appendixes/database-table-names
Answered 06/18/2015 by: jknox
Red Belt

0
As Jason explained, the lower the number for order, the earlier in the list for deployment. Order 1 will install before order 2, and so on (default is 10). If you install via Managed Installation, the software will only be installed if it is not detected in inventory. The schema for the database is not published, but you can access the database with read-only permissions via something like MySQL Workbench to investigate the schema yourself.
Answered 06/19/2015 by: airwolf
Red Belt

Don't be a Stranger!

Sign up today to participate, stay informed, earn points and establish a reputation for yourself!

Sign up! or login

Share

 
This website uses cookies. By continuing to use this site and/or clicking the "Accept" button you are providing consent Quest Software and its affiliates do NOT sell the Personal Data you provide to us either when you register on our websites or when you do business with us. For more information about our Privacy Policy and our data protection efforts, please visit GDPR-HQ