This invention relates generally to information handling systems and, more particularly, to system profile unique data management for information handling systems.
As the value and use of information continues to increase, individuals and businesses seek additional ways to process and store information. One option available to users is information handling systems. An information handling system generally processes, compiles, stores, and/or communicates information or data for business, personal, or other purposes thereby allowing users to take advantage of the value of the information. Because technology and information handling needs and requirements vary between different users or applications, information handling systems may also vary regarding what information is handled, how the information is handled, how much information is processed, stored, or communicated, and how quickly and efficiently the information may be processed, stored, or communicated. The variations in information handling systems allow for information handling systems to be general or configured for a specific user or specific use such as financial transaction processing, airline reservations, enterprise data storage, or global communications. In addition, information handling systems may include a variety of hardware and software components that may be configured to process, store, and communicate information and may include one or more computer systems, data storage systems, and networking systems.
Information handling systems are typically provided with machine-specific information that is unique to each given information handling system. Examples of such machine-specific information includes Linux KickStart files, ini files, configuration files, and autorun files, batch files, etc. Specific examples of information handling systems include remote servers that are employed in a cloud computing environment to deliver computing resources (e.g., applications, data storage, processing) over the Internet to local information handling systems. In such a cloud computing environment, moving workload images from one server system to another server system has become a routine task. During movement of such information, machine specific information can hinder a system from operating properly if blindly cloned to other systems. In a heterogeneous environment having both virtual and physical operating characteristics, the conventional handling of such machine-specific information is mainly through agents running on the operating systems or virtual machines of individual information handling systems. In any case, in-band operating system (OS) involvement is required to remove machine-specific information from a given system and to reinstall machine-specific information to the same system when a new workload image is installed to the given system. This conventional practice typically leads to “agent-sprout”, i.e., required steps of installing agent, running agent, updating agent, un-installing agent, etc.
Disclosed herein are systems and methods that may be implemented to manage (e.g., including transfer) machine-specific System Profile Unique Data (SPUD) information for one or more information handling systems. Using the disclosed systems and methods, SPUD information may be managed and transported through in-band and/or out-of-band processing and communications, and may be employed in one embodiment to make restoration of machine-specific data possible either through network data communications and/or local system data communications. In another embodiment, SPUD information may be comprehensive in content so as to allow all machine-specific information to be restored in one shot or operation.
In the practice of the disclosed systems and methods, machine-specific SPUD information includes information that is unique to a given information handling system and that is required by the given information handling system in order for the given system to properly operate to perform one or more assigned information handling tasks. In this regard, such machine-specific SPUD information for a given information handling system is different from SPUD information required by other information handling systems in order for these other systems to properly operate to perform one or more of their assigned tasks, including to perform the same or similar information handling tasks as performed by the given information handling system. Examples of machine-specific SPUD information includes, but is not limited to, unique system data such as system service tag information, static hostname, system MAC address/es, system storage map/s, system IP address/es, static IP address/es, storage configuration, hardware information including system-specific hardware configuration information, software license/s, user account and login information, information regarding BIOS type and BIOS setting/s, BIOS firmware, network interface card (NIC) firmware, etc.
In one embodiment, the disclosed systems and methods may be employed to deploy workload images to one or more information handling systems (e.g., servers) while at the same time preserving the unique SPUD for each individual information handing system. In one embodiment, such workload images may be further characterized as in-band workload images that include information or data configured for in-band processing by an information handling system. Using the disclosed systems and methods, workload images may be deployed in one embodiment in an out-of-band manner to a single information handling system or to a plurality of information handling systems (e.g., servers) while at the same time preserving the unique SPUD for each individual information handing system. In one embodiment, the SPUD information may be so managed without any in-band operating system (e.g., OS agent) involvement being required other than for operating system (OS) activation. In such an exemplary embodiment of the disclosed systems and methods, the entire spectrum (e.g., hardware layer and application images) may be deployed in an out-of-band manner. Moreover, in one exemplary embodiment out-of-band deployment of workload images may be performed in a heterogeneous environment having both virtual and physical operating system characteristics.
Thus, in one exemplary embodiment, the disclosed systems and methods may be implemented to provide a seamless solution to deploy images to a plurality of information handling systems with the capability of maintaining each system's particular SPUD. Such a capability may be employed to allow a workload image to be migrated from one information handling system to another target information handling system, while at the same time preserving the relationship between SPUD information components of the given target system, e.g., such as bonding between software licenses and individual service tag of a specific target system. In a further embodiment, this image deployment may be out-of-band and may cover the entire spectrum from hardware layer to the application.
In one respect, disclosed herein is an information handling system, including: at least one in-band processing device; at least one out-of-band processing device; and persistent storage coupled to the out-of-band processing device and to the in-band processing device. The out-of-band processing device may be configured to manage System Profile Unique Data (SPUD) stored on the persistent storage for the information handling system, the SPUD including machine-specific information that is unique to the information handling system.
In another respect, disclosed herein is a method of managing System Profile Unique Data (SPUD) for one or more in information handling systems. The method may include providing an information handling system that itself includes at least one in-band processing device, at least one out-of-band processing device, and persistent storage coupled to the out-of-band processing device and to the in-band processing device. The method may also include: using the out-of-band processing device to manage SPUD stored on the persistent storage for the information handling system, the SPUD including machine-specific information that is unique to the information handling system.
Still referring to
The disclosed systems and methods may be implemented in one exemplary embodiment using a plug-in architecture framework to allow extension of SPUD management functionalities (e.g., using Dell unified server configuration (“USC”) server management functionalities available from Dell Products L.P. of Round Rock, Tex.) in a unified extension firmware interface (“UEFI”) environment by leveraging available remote access controller core or optional flash memory space. Further information on implementation of USC functionalities in a UEFI environment may be found, for example, in U.S. patent application Ser. No. 12/587,001 filed Sep. 30, 2009, and incorporated herein by reference in its entirety for all purposes. Among other things, the disclosed systems and methods may be implemented to provide a hardware and software interface to allow use of a plug-in framework in the embedded system management that may be run under the BIOS firmware and the UEFI environment. The disclosed systems and methods may also be implemented to provide a USC server management architecture that may be modified and enhanced over time, and/or that may also be employed to extend availability of the USC server management framework to remote users 128.
Still referring to
In the exemplary embodiment of
As further shown, remote access controller 125 is coupled to remote access controller persistent storage 140 (e.g., non-volatile random access memory “NVRAM” such as embedded and partitioned flash memory, Electrically Erasable Programmable Read Only Memory—EEPROM, etc.), upon which one or more server management applications forming part of a USC framework may be stored in addition to one or more components or applications forming part of an embedded SPUD management configuration framework 142 and other functions, e.g., BIOS, unified extensible firmware interface (“UEFI”) modules, etc. In the embodiment of
In the embodiment of
Still referring to
Specifically referring to
In one exemplary embodiment, SPUD may be generated for a system 104b having pre-existing SPUD stored thereon together with workload image information that is to be replaced. For example, the existing SPUD may be fetched and stored using an automatic out-of-band module that collects the SPUD in step 302 and saves the collected SPUD to persistent storage 140 in step 304 during system boot-up. Alternatively, SPUD may be additionally or alternatively collected and saved in steps 302 and 304 in a similar manner using an operating system (OS) agent while system 104b is fully booted up and running, e.g., if particular OS-related SPUD such as OS license information is required to be collected. In one exemplary embodiment, pre-existing SPUD may be fetched and saved using an out-of-band utility such as out-of-band SPUD manager 108 executing on out-of-band processor 110 in conjunction with firmware and data storage of SPUD management configuration framework 142. In one embodiment, out-of-band SPUD manager 108 may identify and fetch SPUD for system 104b in step 302 from data locations such as network storage and local media. It will also be understood that SPUD may be generated from scratch in step 302 and entered by a user into persistent storage 140 in step 304 via out-of-band SPUD manager 108 in cases where system 104b is new or otherwise blank and has no pre-existing SPUD stored thereon.
Still referring to
If the final destination for the SPUD is a new target system 104b that is different from the system from which the SPUD was originally generated in step 302 (e.g., the system 104b has no existing machine-specific SPUD and/or other image loaded thereon), then a SPUD template may be edited in step 314 with the exported SPUD of step 310 by the appropriate user interfaces for the new target system. Such a SPUD template may be a configuration file and database schema in appropriate SPUD format with or without specific system data. Thereafter, the edited SPUD may be imported to persistent storage 140 of the target system 104b in step 316. If the final destination for the SPUD is not a new target system 104b (i.e., the target system 104b is the same system from which the SPUD was generated), then methodology 300 may proceed as shown from step 312 to step 315 where the data (including SPUD) is erased or removed from the target system 104b, and then to step 316 where the SPUD is imported back to persistent storage 140 of the target system 104b. In step 315, storage of target system 104b may be reformatted or all data otherwise removed from system storage 118 of the target system 104b, and optionally further removed from persistent storage 140 in case of full restore of system 104b. After step 316, the target system 104b is ready to receive the workload image 202. Although exported SPUD may be edited while stored on an external location as described above, it will be understood that in another exemplary embodiment SPUD stored on local persistent storage of the target system 104b may also be edited if desired or needed.
Next, the given SPUD corresponding to each target system 104b is retrieved by out-of-band SPUD manager 108 from persistent storage 140 of the respective target system 104b and applied (i.e., extracted and installed) by out-of-band storage manager 108 in step 406 to appropriate storage locations, e.g., on system storage 118. Then, in step 408 any appropriate licenses may be generated (i.e., bound to the specific system 104b) from the installed and extracted SPUD now present on each given target system 104b. Thereafter, the workload image is deployed in step 410 from the source system 104a to the target system/s 104b.
In the embodiment of
It will be understood that methodology 300 of
In one exemplary embodiment, each of LM/CFG utilities 506 may operate in an in-band manner to create SPUD information (e.g., licenses, service tag, MAC addresses, storage maps, IP addresses, user account and login information, etc.) for system 104b, e.g., such as in step 302 of
It will be understood that the configuration of the particular embodiments illustrated in
For purposes of this disclosure, an information handling system may include any instrumentality or aggregate of instrumentalities operable to compute, classify, process, transmit, receive, retrieve, originate, switch, store, display, manifest, detect, record, reproduce, handle, or utilize any form of information, intelligence, or data for business, scientific, control, entertainment, or other purposes. For example, an information handling system may be a personal computer, a PDA, a consumer electronic device, a network storage device, or any other suitable device and may vary in size, shape, performance, functionality, and price. The information handling system may include memory, one or more processing resources such as a central processing unit (CPU) or hardware or software control logic. Additional components of the information handling system may include one or more storage devices, one or more communications ports for communicating with external devices as well as various input and output (I/O) devices, such as a keyboard, a mouse, and a video display. The information handling system may also include one or more buses operable to transmit communications between the various hardware components.
It will be understood that one or more of the tasks, functions, or methodologies described herein may be implemented, for example, as firmware or other computer program of instructions embodied in a non-transitory tangible computer readable medium that is executed by a CPU, controller, microcontroller, processor, microprocessor, FPGA, ASIC, or other suitable processing device.
While the invention may be adaptable to various modifications and alternative forms, specific embodiments have been shown by way of example and described herein. However, it should be understood that the invention is not intended to be limited to the particular forms disclosed. Rather, the invention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the invention as defined by the appended claims. Moreover, the different aspects of the disclosed systems and methods may be utilized in various combinations and/or independently. Thus the invention is not limited to only those combinations shown herein, but rather may include other combinations.
Number | Name | Date | Kind |
---|---|---|---|
5603005 | Bauman et al. | Feb 1997 | A |
5717942 | Haupt et al. | Feb 1998 | A |
6108697 | Raymond et al. | Aug 2000 | A |
6144992 | Turpin et al. | Nov 2000 | A |
6298443 | Colligan et al. | Oct 2001 | B1 |
6408334 | Bassman et al. | Jun 2002 | B1 |
6470446 | Beelitz et al. | Oct 2002 | B1 |
6519679 | Devireddy et al. | Feb 2003 | B2 |
6763458 | Watanabe et al. | Jul 2004 | B1 |
6854122 | Sheriff et al. | Feb 2005 | B1 |
6973587 | Maity et al. | Dec 2005 | B1 |
7028138 | Ali et al. | Apr 2006 | B2 |
7216200 | Zhang et al. | May 2007 | B2 |
7272815 | Eldridge et al. | Sep 2007 | B1 |
7360211 | Hyden et al. | Apr 2008 | B2 |
7426052 | Cox et al. | Sep 2008 | B2 |
7430592 | Schmidt et al. | Sep 2008 | B2 |
7526541 | Roese et al. | Apr 2009 | B2 |
7610575 | Sproule | Oct 2009 | B2 |
7706369 | Roese et al. | Apr 2010 | B2 |
7739372 | Roese et al. | Jun 2010 | B2 |
7739402 | Roese et al. | Jun 2010 | B2 |
7765371 | Abels et al. | Jul 2010 | B2 |
7805533 | Burns et al. | Sep 2010 | B2 |
7877614 | Frenkiel et al. | Jan 2011 | B2 |
7895428 | Boland et al. | Feb 2011 | B2 |
7898977 | Roese et al. | Mar 2011 | B2 |
7945945 | Graham et al. | May 2011 | B2 |
8086834 | Brisky et al. | Dec 2011 | B2 |
8086838 | Harmer | Dec 2011 | B2 |
8099624 | Saxena et al. | Jan 2012 | B1 |
8191107 | Frattura et al. | May 2012 | B1 |
8260841 | Maity | Sep 2012 | B1 |
8510422 | Phung et al. | Aug 2013 | B2 |
20030216143 | Roese et al. | Nov 2003 | A1 |
20040162857 | Butts | Aug 2004 | A1 |
20050027837 | Roese et al. | Feb 2005 | A1 |
20050055688 | Barajas et al. | Mar 2005 | A1 |
20050066015 | Dandekar et al. | Mar 2005 | A1 |
20050076245 | Graham et al. | Apr 2005 | A1 |
20050172280 | Ziegler et al. | Aug 2005 | A1 |
20050216664 | Taninaka et al. | Sep 2005 | A1 |
20050237996 | Sakuraba et al. | Oct 2005 | A1 |
20060018505 | Cherian et al. | Jan 2006 | A1 |
20060031936 | Nelson et al. | Feb 2006 | A1 |
20060036730 | Graham et al. | Feb 2006 | A1 |
20060048142 | Roese et al. | Mar 2006 | A1 |
20060075093 | Frattura et al. | Apr 2006 | A1 |
20060190532 | Chadalavada | Aug 2006 | A1 |
20060212143 | Nguyen et al. | Sep 2006 | A1 |
20070124407 | Weber et al. | May 2007 | A1 |
20070162695 | Ali et al. | Jul 2007 | A1 |
20070168049 | Rao et al. | Jul 2007 | A1 |
20070168481 | Lambert et al. | Jul 2007 | A1 |
20070204105 | Lauffer et al. | Aug 2007 | A1 |
20080002694 | Brahmaroutu et al. | Jan 2008 | A1 |
20080033972 | Yin et al. | Feb 2008 | A1 |
20080126551 | Conner et al. | May 2008 | A1 |
20080155094 | Roese et al. | Jun 2008 | A1 |
20080201501 | Partani et al. | Aug 2008 | A1 |
20090037655 | Cherian et al. | Feb 2009 | A1 |
20100057987 | Liu | Mar 2010 | A1 |
20100268925 | Brisky et al. | Oct 2010 | A1 |
20100306773 | Lee et al. | Dec 2010 | A1 |
20110072280 | Chiasson et al. | Mar 2011 | A1 |
20110078293 | Phung et al. | Mar 2011 | A1 |
20110173427 | Merkin et al. | Jul 2011 | A1 |
20110264951 | Pratt et al. | Oct 2011 | A1 |
20110289350 | Andrews et al. | Nov 2011 | A1 |
20110296404 | Zhang et al. | Dec 2011 | A1 |
20120110262 | Zhang et al. | May 2012 | A1 |
20120198245 | Mundt et al. | Aug 2012 | A1 |
20120317633 | O'Donnell et al. | Dec 2012 | A1 |
Entry |
---|
Phung et al., “Systems and Methods for Extension of Server Management Functions”, U.S. Appl. No. 13/898,991, filed May 21, 2013, 25 pgs. |
IBM, “Navigator for I”, Printed From Internet May 26, 2009, 3 pgs. |
IBM, “IBM iSeries Navigator System Management Plug-In for SAP”, Printed From Internet May 26, 2009, 1 pg. |
Business Wire; Business Services Industry, “F5 and Oracle Collaborate to Release Big-Ip Load Balancer System Management Plug-In for Oracle Enterprise Manager 10g Grid Control”, Oct. 31, 2005, 10 pgs. |
Highbeam Research, “Nimsoft Team Up With Oracle”, Printed From Internet May 26, 2009, 4 pgs. |
All Business, “Oracle Releases F5 Management Plug-In Via iControl”, Printed From Internet May 26, 2009, 4 pgs. |
Warren Togami, “Remote Conversion to Linux Software RAID-1 for Crazy Sysadmins HOWTO”, 2004, 11 pgs. |
“Remote Raid/Mirror”, HTMICenter, Printed From Internet Jul. 22, 2010, 2 pgs. |
Power6 Information, “Installing an HA-two system RAID Configuration”, Printed From Internet Jul. 22, 2010, 4 pgs. |
Phung et al. “Systems and Methods for Extension of Server Management Functions”, U.S. Appl. No. 12/587,001; Office Action, Jun. 15, 2012, 13 pgs. |
Wikipedia, “License Manager” Printed from Internet Jun. 20, 2012, 2 pgs. |
McNeill, “Virtual Machine Asynchronous Patch Management”, U.S. Appl. No. 13/210,552, filed Aug. 16, 2011, 17 pgs. |
Karandikar et al., “System and Method for Providing an Image to an Information Handling System”, U.S. Appl. No. 13/174,221, filed Jun. 30, 2011, 35 pgs. |
Phung et al. “Systems and Methods for Extension of Server Management Functions”, U.S. Appl. No. 12/587,001; Amendment, Oct. 15, 2012, 16 pgs. |
Zhang et al., “Systems and Methods for Remote Raid Configuration in an Embedded Environment”, U.S. Appl. No. 12/925,673, filed Oct. 27, 2010, 31 pgs. |
Andrews et al., “System and Method for Removable Network Attached Storage Enabling System Recovery From Backup”, U.S. Appl. No. 13/187,219, filed Jul. 20, 2011, 30 pgs. |
Zhang et al., “Systems and Methods for Out-Of-Band Backup and Restore of Hardware Profile Information”, U.S. Appl. No. 13/365,901, filed Feb. 3, 2012, 37 pgs. |
Phung et al., “Systems and Methods for Extension of Server Management Functions”, U.S. Appl. No. 13/898,991, filed May 21, 2013, Preliminary Amendment, Jun. 27, 2013, 18 pgs. |
Number | Date | Country | |
---|---|---|---|
20140082236 A1 | Mar 2014 | US |