Abstract:
A method and system for automatically managing a fault event occurring in a datacenter system provided. The method includes collecting hardware fault event analysis corresponding with the hardware fault event. The hardware fault event analysis is organized into a report for a server device suffering from the hardware fault event. The method also includes processing statistical data received from the report for the server device. The method also includes performing hardware recovery based on the evaluated statistical data.
Abstract:
Various examples of the present technology provide systems and methods for testing whether there is any memory error in a server system, determining physical memory addresses corresponding to a detected memory error on one or more memory devices of the server system, and preventing the physical memory addresses corresponding to the detected memory error from accessing by an operating system, application programs, and/or other components of the server system.
Abstract:
A method for power management by a rack management controller (RMC) of a server rack includes collecting power consumption data from a first baseboard management controller (BMC) of a first server in the server rack and sending the power consumption data to a management server. The RMC receives power requirements from the management server and determines a power setting based on the power consumption data and the power requirements. The RMC requests the first BMC to limit power consumption of the first server according to the power setting.
Abstract:
A baseboard management controller (BMC) of a system can retrieve logged system events from a non-volatile storage of the BMC and receive a command from an administrator device for the BMC to collect system debug information. The BMC can obtain debug information from a component of the system, in response to receiving the command. The BMC can save the debug information to a debug file and send the debug file to the administrator device.
Abstract:
Various embodiments of the present technology provide methods for activating a security module of a rack system prior to the loading of an operating system. The security module can be configured to examine server platform security, communicate with an administrator through a baseboard management controller (BMC), certify signatures of firmware pieces on a motherboard of the rack system, exclude malware by isolating unsigned UEFI images, examine a signature list and security key installed on the motherboard, and/or report status of security management to a controller of the rack system (e.g., BMC). When the security module determines that an uncertified firmware or a bootable storage with malware is loaded onto the rack system, the security module can stop process(es) associated with the uncertified firmware and/or the bootable storage, and subsequently send a report the administrator.
Abstract:
A plurality of BIOS default configurations may be is stored in a BIOS of the computer system. A particular BIOS default configuration may be selected from the plurality of BIOS default configurations based at least in part on a server identification (ID) of the computer system or a user command. The computer system is initialized with the particular BIOS default configuration.
Abstract:
A system and method for providing security key exchange and management prior to the operating system of the server and also provides for executing various security functions to prevent a virus or malicious software from propagating through the server and the network. The system and method utilize the BIOS firmware and baseboard management controller (BMC), which are more secure since they do not rely on open source code for software plug-ins from the user layer. As a result, a secure code can be created for key management with a globally unique identifier (GUID). The system and method provides for a network manager to easily and flexibly manage multiple security keys for a rack server system.
Abstract:
Each of a plurality of Basic Input/Output System (BIOS) performance profiles can be determined upon a corresponding performance goal. A particular performance profile can be selected from the plurality of BIOS performance profiles. A BIOS configuration can be determined for a computer system automatically based at least in part on the particular performance profile or a hardware configuration of the computer system. The computer system can be initialized with the BIOS configuration.
Abstract:
What is disclosed is a system and method to secure a network device such as a server. The network device has a memory storing a static credential file. A basic input output system operates a security module that gathers an IP address of the router and an IP address of the network device, via a query to a network manager when power is enabled to the network device. The gathered IP addresses are compared with stored IP addresses in the static credential file. The operating system of the network device is prevented from booting if the IP addresses do not match. In addition, a baseboard management controller is operable to receive an encrypted credential file. The encrypted credential file is decrypted and compared with the static content file. The baseboard management controller shuts down power to the network device if the credential file does not match the static content file.
Abstract:
A method for autonomously provisioning firmware and custom settings for a server device is provided. The method include determining an installation location and identification information of a server device installed into a rack device, wherein the server device is operating in a first mode of operation, the first mode of operation including at least one of a factory mode and a repair mode. The method also includes identifying a firmware package for the server device based on the installation location and identification information of the server device. The firmware is installed based on the determined installation location and identification information of the server device.