Some time ago, and after discussing with a colleague, I had a look on Intel’s AMT, and this week I did a demo for another colleague as a cheap-replacement for having power fencing capabilities on commodity hardware.
AMT provides a server-like Out of band management like iLO, iDRAC, RSB etc and it’s included in i3 with vPro processors/chipsets of some equipment.
I did the test on a Lenovo X200/201 system I had as old laptop.
The steps used for configuring it, require to:
- first enable the support in the BIOS, usually named ‘Intel AMT’ or ‘Intel Active Management Technology’.
- After this step it was possible to use the command to enter the special AMT firmware
Intel(R) Management Enginewhich on this laptop is enabled with
- If this is the first time you enable it, you’ll require to change the default
adminpassword to something secure, usually mixed upper-lower case, symbol and numbers.
- For this example we’ll be using
- Explore the settings, enable it and validate network settings.
- I’ve enabled DHCP on both LAN and Wireless for IPv4 and IPv6, and enabled KVM redirection
- Once finished, save changes and exit from firmware screen and let the system boot.
From another host, you can perform the remaining configuration steps, from now on, the ‘target’ system will be intercepting packets sent to specific port via the network cards and redirect to AMT firmware instead of going to target host. This is something important to note, the packets are only intercepting when coming from OUTSIDE the host so we’ll use a second computer to access it.
You can use a browser pointing to target system’s IP at port
16992, for example: http://target:16992
From that web interface and once logging with
admin and the password set
Qwer123$ we can continue doing some configuration, like the power states to control (for example, this laptop could be remotely powered when it was with the charger connected even if laptop was powered off).
Now, for doing the ‘command-line’ part, we will need to install one package on our system and rum some scripts.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
After this step, we should be able to use
vinagre target to access the KVM redirection and remotely control our system.
For example, to control power of host you can use:
1 2 3 4 5 6 7 8
man amttool for other commands like
IMPORTANT: note that some power state changes can only be performed based on previous status, you can check with
info the available ones and current status of system.
As a bonus, there’s a RFE1 for requesting this tool to be incorporated as power fencing mechanism in fence-agents once ‘amtterm’ is included in RHEL, in the meantime it’s already available in Fedora, and when it comes to RHEL, hopefully could also be used as fence agent for Clusters and RHEV.
Request for Enhancement: a bugzilla request oriented not to fix a bug, but to incorporate new functionality/software into a product. ↩