Feeds

Lights out management - still waiting for the bulb to glow

Go vertical or go home

  • alert
  • submit to reddit

Securing Web Applications Made Simple and Scalable

Blog I am on a quest to lower my computer power usage. If you have read my previous article, you know that this is not by choice - it’s a necessity driven largely by cooling requirements in the spaces where my systems live. The project at hand is Lights out Management (LOM), the ability to configure and control my systems even when they are powered off, thus allowing me to keep them powered off unless I need them.

To recap: I discovered with a little bit of hunting that I could do some really cool things. Wake On Lan (WOL) can wake sleeping, hibernating or suspended systems from their torpor, while Simple Network Management Protocol (SNMP) can give me granular control over my uninterruptible power supplies (UPSes), power distribution units (PDUs) and various flavours of printer. When it comes to actually getting some out-of-band remote management on these systems (in case they experience an error while coming back online) I have at my disposal an IPKVM and several systems running Intel’s vPro.

The goal is to actually find some software that allows me to use all of these tools from one interface, schedule power downs and wake ups and poke at my systems to see what is wrong with them if they aren’t responding. Preferably, I need to come up with something that I can throw together in the next few days, learn to use in no time flat and only poke at when there’s an actual problem needing my attention. While I normally love tinkering with projects endlessly, time is short and this LOM project needs to “just work”.

Whether open source, proprietary, free or paid, there are many enterprise desktop management tools out there capable of some aspect of LOM control. I have two requirements: the first is to assemble a set of basic tools for manipulating all elements of my LOM setup independently. The second requirement is to find a centralised management tool that will allow me to run my LOM setup across my whole network seamlessly and easily.

The search for candidates to include not only in this article, but to actively deploy on my networks left me nearly weeping with frustration. My Google-fu was inadequate, because if there exist applications that actually take LOM seriously I had virtually no luck finding them. Everything I could find that appeared to begin to take it seriously was part of some vertical stack of applications offered by OEMs like IBM or HP. Third-party, platform-independent lights out management is thin on the ground. To achieve the first requirement of my project, I need to acquire some backup management tools. These have to be simple tools, or preferably a single tool that does all the things I needed simply.

vPro and WOL proved to be the easiest of the lot. Applications that can reach out and wake a computer up using WOL number in the thousands - pick your poison. I will stick with what I know, and so for my “simple WOL tool” I have a combination of the WOL abilities built into my DD-WRT Wi-Fi routers and a tiny Windows app called “magic packet sender”.

Intel offers a Manageability Developer Toolkit which comes with a program called the Manageability Commander. While I am still not 100 per cent certain if the licensing terms allow me to actually use this in a corporate setting as a regular tool, if you have a vPro system and want to start making use of it right now, this is what you were looking for.

I could find two out of the three tools to satisfy my requirements, but APC stubbornly refused to play ball. I am starting to believe that it is quite possible there is no such thing as a simple anything when it comes to managing APC equipment. APC offers centralised management software of its own, but it is anything but simple and the costs are exorbitant, even for APC. For the cost of the software, I could replace every piece of APC hardware I have with equipment from an alternate vendor that would play nice with various bits of open source software I have grown to like.

The Essential Guide to IT Transformation

More from The Register

next story
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
Intel teaches Oracle how to become the latest and greatest Xeon Whisperer
E7-8895 v2 chips are best of the bunch, and with firmware-unlocked speed control
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.