Access Control List - EasyDCIM v1.5.2
Know-How

ACL – User Permissions Under Sound Control

In our previous article we covered all major points related to IPMI protocol risks, and viable solutions to combat these threats, including the configuration of intermediary IPMI proxy servers. Today we intend to push the subject of data security a bit further, and provide you with a detailed preview of yet another backbone feature of the latest EasyDCIM v1.5.2 - ACL (Access Control List). No matter if working in a production environment or a web app - each user assigned to a specific task must be able to engage with the necessary tools to carry out their job in an optimal way. Does it mean it would be best if everyone had unlimited access to absolutely all resources as well as network and system functions? Of course not. It is not hard to imagine that doing so could seriously endanger the security of the entire company and compromise its stability. What needs to be done instead when using advanced web applications, is developing a proper mechanism for permissions management. Need for optimization Generally speaking, each user is being assigned to a specific role which defines the set of their available permissions. For example, users belonging to the "Full Administrator" group will have access to every part of the system while the "Sales" group will be permitted to access the pages regarding the management of company orders only. When using ACLs, you may also configure the so-called resources, that is individual rights set per a specific user group. These permissions will define the type of access to selected sections of the system or its functions. What needs to be stressed at this point is that those permissions may be assigned not only to single users, but the whole user groups. Wondering why? Just imagine a situation when you have to give access to the "Orders" section to, let’s say 50 employees. Of course you could click through every single person, changing their permissions. But why would you if you can do this so much faster by creating a new group called "Orders Access" for instance, quickly adding those 50 users and then granting access to the whole group? Principle of operation As was already mentioned before, the ACL model is based on distributing permissions to individual user groups. To access the section with group management, navigate to "Settings" → " Groups". By clicking on the desired group and opening the edition window, you can assign to this group appropriate permissions to specific sections of the application. Please note that by default none of the user groups has access to the application's back-end section. All available permissions are presented in the format of a drop-down tree and are divided into several main sections such as: 1. API Access - defines access to API for a given user through their API key 2. Backend Application Management - specifies if the user should be allowed to log in to the Backend section that covers: Clients Management Devices Management Infrastructure Management Modules Management Reports Management Settings Tools Management (system addons) After the user has correctly logged in to the application, a sidebar menu is being automatically generated, depending on the permissions admitted earlier on to the user group they belong to. Here, in our example, the user is assigned to the "Sales" group, which has the rights to: Log in to the Backend section Manage users, orders, and services Manage reports ACL benefits The first and most obvious advantage derived from the ACL model was already touched upon earlier and revolves around the convenience with which users can be divided into groups and assigned permissions. But another profit that may be even more valuable since it is closely related to privacy, is that the implementation of the ACL model makes the application considerably more safe and less susceptible to attacks. When securing any type of program, it is always the most optimal solution to give users access only to the sections they need. For example, a person who will just manage orders in the company will never need full root privileges, and certainly should not be allowed that much administrative freedom. The ACL security model allows you to do exactly that – authorize specific groups of users to navigate freely through only those sections that are really required for their tasks, without the worry that they might even inadvertently cause some major complications. And after all, is there anything more important than making sure your clients' confidential information is perfectly safe and sound with you, at all times? Be sure to skim our latest post on IPMI proxy integration, and notes on the EasyDCIM 1.5.2 release as well!
Piotr Dołęga - EasyDCIM CMO
Piotr Dołęga
IPMI Proxy Integration - EasyDCIM v1.5.2
Know-How

IPMI Proxy Integration in EasyDCIM v1.5.2

Modern servers are equipped with management processors enabling the remote administration and monitoring of all crucial system parameters. Most of them are based on the Intelligent Platform Management Interface (IPMI). But what does this term actually mean? Let’s have a look. IPMI is a powerful protocol that is supported by multiple server devices from major manufacturers such as Dell, HP, Oracle and Lenovo. The IPMI specification itself has been developed by Intel, to allow administrators to manage their computer systems when you have no possibility to do that on the spot, through physical access. Working on the basis of the Baseboard Management Controller (BMC), the IPMI protocol is very practical. Not only does it provide access to the BIOS, disks and other hardware, but also supports multiple communication protocols, and operates independently of the operating system currently installed on the computer as well. Risks stemming from the use of IPMI protocol Judging by this short introduction alone you might think that IPMI is something of a technological revelation. But not entirely. Unfortunately, motherboards with IPMI functionality used with older versions of the IPMI firmware are affected by many security gaps, making them easy to identify and hack if only connected to the Internet. Here are some of the major drawbacks of the IPMI protocol: Passwords for IPMI authentication are saved in plain text By knowing just one IPMI password it is possible to access all computers belonging to the IPMI managed group Main access to the IPMI system provides full control over both hardware and software The Baseboard Management Controller often uses excessive and legacy network services that may be particularly vulnerable to attacks IPMI can also provide remote console access to the system, and therefore, the BIOS Some types of BMC connections are not encrypted Providing extra security The above outline of biggest risks resulting from the use of IPMI protocol leaves no doubts why it is so crucial to establish additional safety measures for your data center. Let’s move then to the practical approach to this problem. Here are some of the most commonly implemented solutions: Limiting IPMI IP addresses to internal networks. IPMI traffic (usually UDP port 623) should be restricted to trusted internal networks, preferably to VLAN management segment only. If using IPMI outside the trusted network, scan and monitor it closely for any invalid activity. Using strong passwords. Devices operating within the IPMI system should have strong, unique passwords defined for the IPMI service. Encrypting traffic. If possible, enable the encryption option on IPMI interfaces. Detailed information on how to configure an encryption can be usually found in the manufacturer's instruction manual. Authentication requirements. The "Cipher 0" function is an option enabled by default on many devices with active IPMI interface, allowing to ignore the authentication requirement. Disable this as well as the “Anonymous login” function to prevent hackers from bypassing authentication and sending any IPMI commands. IPMI Proxy Server After configuring and securing your servers with IPMI support, you will definitely want to provide end users with access to the KVM console or default management panel. The latter contains plenty of details particularly useful from the customer’s point of view - system logs, information about the installed software and the properties of individual hardware components. Access to the KVM console, in turn, enables the remote access to the BIOS or SSH session. IPMI Proxy Server requirements The 1.5.2 version of EasyDCIM introduces the possibility to configure IPMI proxy server, and by doing so greatly improve the security layer of your infrastructure. To use the proxy server you need an additional server with the Debian 9 "Stretch" or Ubuntu 18.04 LTS (Bionic Beaver) system. Also, the server should have access to the internal network in which the IPMI IP is located. We recommend installing the proxy software on a separate server (either virtual or dedicated). The proxy server can have both a public and private IP address, but it must be available from EasyDCIM. It is possible to configure proxy on the EasyDCIM server, but we advise against it since every time you are using a proxy server with third-party software installed, the risk of unauthorized access to the target server significantly rises. Finally, please keep in mind that proxy increases the load on the proxy server, consequently slowing down the application. Principle of operation The remote JAVA console is downloaded directly from the server manufacturer's panel, using the specific CURL commands. Additionally, to download the JAVA console, you need a public address of the IPMI interface which may lead to unauthorized access. If such a situation occurs, you can create a proxy server for IPMI connections in the application that will serve as a gateway between the application and the end user. The proxy server also channels all IPMI commands such as device power-on, restart or power-off. Owing to such a solution, none of the IPMI interfaces requires a public IP address and all important operations can be carried out in a secure private data center network. Using a proxy server in EasyDCIM EasyDCIM automatically creates a VNC session on the proxy server and launches the JAVA applet or the default management panel of the device. As a result, all devices are accessible only from the proxy server and all the traffic is transferred using a special image transfer system from the virtual graphic environment. Even though the VNC session runs in a secure manner, it is important to ensure that the proxy server is properly protected against any unauthorized access. Conclusions The vulnerabilities of IPMI-enabled systems are many and range from the ability to steal system password to the bypass of authentication mechanisms. Luckily, EasyDCIM v1.5.2 empowers data center administrators to mitigate the risk of authorized access attempts by configuring their own IPMI proxy servers that will redirect IPMI and KVM console commands. Hope you enjoyed the article and learned a few new things about the double-edged sword nature of the IPMI protocol. If you are eager to soar the safety standards of your company even higher, stay tuned for our next Blog dedicated to ACL (Access Control List). And if you have not explored the 1.5.2 release in full yet, our latest post will brief you in on all new features now available!
Piotr Dołęga - EasyDCIM CMO
Piotr Dołęga
EasyDCIM v1.5.2 Release
Release Notes

Double Your Security With New EasyDCIM v1.5.2!

Since the last major release of EasyDCIM, we have been working on a new version with all our dedication, carefully weighing what its cornerstone should be. What essential functionality EasyDCIM users would most want to get access to next. And now that we have finally figured it out, we are proud to announce that EasyDCIM v1.5.2 is officially out in the open, armed and ready to facilitate your server management process! Without dragging things out any more than necessary, let us see what novel features this vital new update presents at your disposal. IPMI protocol with Proxy server integration It is a well-known fact now that remote supervision of modern servers would be greatly obstructed, if not impossible, without such management processors as IPMI. But what is less obvious to the public is that this seemingly brilliant solution has quite a few drawbacks too, posing a serious security risk to all systems using this very protocol and connected to the Internet. To address and deal with this looming threat, the 1.5.2 version of our control panel provides administrators with the possibility to configure servers that will serve as proxy servers for all IPMI commands and KVM consoles. If you would like to read all about this specific function and how it works in practical terms, our dedicated article which is already scheduled for release will put you in the picture very shortly. ACL model for managing permissions among user groups No matter if you are currently working on the production environment or web app. You need rules defining to which parts of the system each particular user should be granted access so that your team could carry out their individual tasks effectively, but without compromising the safety of the entire infrastructure – either willingly or by accident. ACL model is one way to approach this problem. It not only shields your system against potential security breaches through advanced access control but also enables you to manage permissions on groups of users (not only each user separately) which turns out to be a huge time-saver when you need to define access to particular departments to multiple employees. EasyDCIM v1.5.2 is all about safety – our spotlight features, each briefly outlined above, are the best example of that. But a sharp eye will momentarily notice that our changelog accommodates a handful of other improvements and adjustments as well, all worthy of your close investigation. Here is a sample of some of them: Open two simultaneous login sessions separate for the administrator and the user Advanced device search tool based on the previously set filters Possibility to switch off such options as "Activate", "Suspend", "Unsuspend" per device A new bootloader in OS installation which supports booting of the older device types with network boot support Learn more about the new EasyDCIM v1.5.2 and stay tuned for the upcoming articles elaborating some more on our two keystone features! View The Changelog!   UPDATE: Two promised articles are now ready. Learn more about IPMI proxy integration and ACL in EasyDCIM v1.5.2!
Piotr Dołęga - EasyDCIM CMO
Piotr Dołęga
Windows OS Auto Installation - EasyDCIM v1.5.1
Know-How

Windows Server OS Straight In Your EasyDCIM

As from the 1.5.0 version, EasyDCIM allows admins to install any of the supported operating systems on existing EasyDCIM servers in a totally automated manner – from the moment of selecting an installation template to running post-installation scripts. Yeah, saying that will never fail to give us a thrill. But that is not enough reason for us to slow down the tempo and just slob around while there is still so much to be done! Talking about progress – we are putting final touches to the 1.5.1 version which will extend the range of supported OS systems to include the long asked-for Windows Servers. Care for a little teaser? A brief outlook on automatic OS installation But let's go back to basics for a moment and focus on what 'unattended installation' actually means. Simply put, it is an automated technology used to install or upgrade an operating system with minimal user intervention. Unattended installation is usually employed while introducing a new system on a large scale, when the manual installation of an operating system on individual servers by administrators would be too money- and time-consuming. Just like with all other automatic installation technologies, unattended installation goes with a series of multiple advantages that standard interactive configuration does not provide. Here are some of those which we would like to highlight the most: Fewer installation errors. Since unattended installation makes use of a response file to install and configure operating systems, the interaction between administrators and technicians during the configuration process is reduced to minimum. Therefore, the likelihood that any erroneous data is entered during the configuration stage is proportionally smaller. Greater consistency during deployment. By using the same response file to install and configure every operating system, you gain the assurance that all servers in your data center are configured in the same exact way. Shorter installation time. During interactive configuration, the installation program demands from administrators or technicians to enter valid information at almost every step of the process. The unattended installation, in comparison, simply reads the configuration settings from the response file, saving you the whole hassle. And, of course, time. Lower maintenance costs. By minimizing errors during the configuration process, increasing server consistency and reducing the time required to configure the server, you can significantly diminish the overall cost related to technical support in the data center. Windows OS installation in practice The built-in operating system installer in EasyDCIM relies on installation templates. Each system has its own template which serves to automatically install the operating system on a dedicated server. All necessary installation files for the systems from the Windows family are usually compressed in ISO files on the basis of which EasyDCIM will automatically set up a system template for the selected Windows edition. Getting the Windows system template ready will be virtually unattended since the administrator's role will come down to merely placing the ISO file in the appropriate directory and then adding a new system task that will automatically perform the required operations including: Unpacking the installation files from the ISO image Injection of special parameters to the boot files Preparation of a response file responsible for the unattended installation of Windows Injection of the system key (if required) Placing the installation files on the SAMBA server All of the above steps will be taken by EasyDCIM automatically, thanks to which the administrator will be able to install Windows on multiple dedicated servers at the same time. During tests we used the following versions of Windows systems: Windows 10 April 2018 Windows Server 2016 Windows Server 2012 R2 Windows Server 2008 R2 For each of the Windows versions listed above, the installer performs the following actions: Creating an account named Administrator Setting a password for the Administrator account Setting the language Disk partitioning Setting a main IP address Setting additional IP addresses Setting a computer name Interested to see how this process looks like in practice? Here we go: [embed]https://www.youtube.com/watch?v=n3azlCUIPrI[/embed] Unattended OS installation of systems from the Windows family is exactly the kind of convenience that most frequently comes up on a wish list of every data center admin. And soon it will be also an integral part of the EasyDCIM system! Stay tuned for this momentous 1.5.1 release and be sure to swing by the changelog as soon as it arrives! And in the meantime, feel doubly welcome to get the best out of our Anniversary Promotion crowning 3 wonderful years of our nonstop advance. A 30% discount on every pricing plan for 3 months or a personalized deal suited to your wants are still within your grasp! See also: Automatic OS installation in EasyDCIM v1.5.0
Piotr Dołęga - EasyDCIM CMO
Piotr Dołęga
Celebrating EasyDCIM 3rd Anniversary
Release Notes

Celebrate 3rd Anniversary with EasyDCIM!

The road so far... It was exactly on 25th June 2015 that a team of software geeks looked at their work with satisfaction and concluded: our all-embracing control panel is officially ready to launch and change the life of data center owners forever. And this is how the legend of EasyDCIM was born! It is to hard to believe that 3 years have passed since that very moment! We came a long way. Not always smooth and not always paved with spectacular victories, but definitely fruitful in the end. Was it worth it? Looking back at what we have achieved, I think we can all unanimously agree that EasyDCIM was the best thing that happened to us. And, hopefully, to all data centers using our software which is setting ever new trends in the market. EasyDCIM has been continuously evolving throughout these 3 years and will surely keep doing that for many, many more days to come. We are strongly driven to action when seeing how many businesses are already using our tool, and how massive feedback we receive from you. It means a whole world to us because with your help we do not have to wander in the dark. We listen, deliberate on each and every one of your suggestions, assess their feasibility, and when possible – we implement them. One of the most game-changing functionalities which settled in EasyDCIM for good as per your request was the Automatic OS Installer built in our recently released 1.5.0 version. To you, it is a great opportunity to set up a series of operating systems in one fell swoop and without the need to use any third-party software. To us – a wonderful tribute to our hard three-year work. Another noteworthy features added in response to your growing needs include Network Auto Discovering which lets you save considerable amounts of time by automatically detecting all devices within a given network through the SNMP protocol, and Revision History section storing all kinds of device-related information conveniently in one place. Some other prodigious additions comprise: Remote KVM console for HP iLO3 devices Remote KVM console for American Megatrends devices Power Control Settings - definining scope of remote control over the device status, choosing primary and secondary method of device restart (IPMI or PDU) PDU Drivers - support for Enlogic & Cyberpower ATS devices Added capability to export parts assigned to a device Possibility to upload files for each element from the inventory Means to export all items at once As you can see, we have done so much already with your support. And there is still a lot up our sleeve, so stay tuned – this second part of the year will be really exciting! Let's make a toast for future to come! An anniversary party without presents is no party at all so let′s see what we have got here! Are you our long-established customer seeking to upgrade your pricing plan? When in touch with us, use the "<3 EasyDCIM" slogan, and we will arrange some exclusive deal specially for you! Still not one of the EasyDCIM happy users? Contact us and use "<3 EasyDCIM" in your message's subject to pay 30% less for any pricing plan for the first three months! Our success is your success so join the celebration and make it one for the books! Let′s get this party started! Needless to say, we simply rejoice great parties. That is why our buoyant promotion is going to last not for a couple of days, but until 31st August inclusively! See also new EasyDCIM v1.5.1 with the  Automatic Windows Server OS Installer!
Piotr Dołęga - EasyDCIM CMO
Piotr Dołęga
EasyDCIM v1.5.0 Release
Release Notes

In The Realm Of Automation – EasyDCIM v1.5.0

One of the reasons why you love EasyDCIM is probably the extent to which it automates all sorts of processes going on under the roof of your data center. But as you will see for yourself in a few moments, the milestone 1.5.0 version of you favorite control panel brings the subject of automation to a whole new level! When a hobby becomes a nuisance As a technological geek you certainly get a kick out of the whole ritual surrounding the installation of a new server. But will the thrill be equally as intense when installing not one or a few, but a hundred of operating systems? Highly doubtful. In such a situation you will be grateful for the tools which help to automate the system implementation process along with a complete configuration. Why else is automation so important for data centers? Let us stop on this subject for a moment. The more computer devices in the company's infrastructure, the higher the cost of their implementation, future maintenance and ultimate shutdown. But money is not the only problem. Apart from the fact that your employees are doomed to lose a lot of valuable time on routine tasks, there is also the issue of increased failure rates and worse transparency of complex systems. During installation of operating system, one must also cope with hundreds of drivers, technical specifics, and other additional tasks like installing occasional patches. That is quite a lot to digest, isn't it? Luckily for you, automation solves most of these concerns - guarantees the most economic resource usage, provides you with unlimited control over various processes, and reduces the need for manual routine tasks to the minimum. Automation of operating systems - benefits The profits of implementing a solution based on automatic operating system installer are both many and tangible. For starters, automation enables to add whole operating systems along with services, applications and all additional configuration by simply duplicating the administrator-defined installation templates. The results are immediate. Since automatic deployment is simply much faster than manual installation, you can spend the saved time on, for example, making another server ready for use. What is more, EasyDCIM allows you to run multiple network installations simultaneously. Being based on configuration files and scripts, these operations do not allow for any errors – something which cannot be said about an activity performed manually by human. EasyDCIM is also a great way to standardize your configuration. By installing many identical servers, it is much easier later on to navigate through their settings, diagnose failures, anticipate possible problems, and introduce comprehensive changes. Another crucial advantage of the implementation lies in the ease of use. Although the very preparation of a complete environment and configuration of its numerous tools can be both time-consuming and quite complicated, the installation of new servers after that is a smooth sailing and should cause no trouble to even the less experienced users. The technical perspective Servers operate basing on such services as DHCP, TFTP, HTTP and kickstart answer files. Each new dedicated server is launched from the network. While downloading settings from the DHCP server, our dedicated server also detects the EasyDCIM installation server and receives from it the list of available templates - possible to implement scenarios. In the very basic one, the profile includes a specific operating system distribution and a kickstart file containing the answers for the installer. By choosing a selected profile, you can then install the desired operating system without the need to supervise it personally. When it comes to a slightly more complex scenario, profiles are enriched with additional scripts that can not only install services and user accounts but also upload appropriate configuration files and perform a suite of other tasks in the newly added systems. EasyDCIM also allows to maximally optimize the implementation of operating systems understood as the automatic installation of a complete system containing all the required configuration. The more delegated tasks, the less manual work will be required with each new server. During the installation of an operating system installation, EasyDCIM performs a series of specific actions in a fully automatic manner: 1. Based on the MAC Address field of the device, EasyDCIM regenerates the configuration file of the DHCP server. 2. The device is restarted using IPMI, PDU or a manual method and entered into the PXE boot mode. 3. The device is launched in the PXE boot mode. 4. The device requests DHCP server to assign the IP address set in the IP Address field in EasyDCIM. 5. The DHCP server assigns the appropriate IP address. 6. The appropriate bootloader file is downloaded from the TFTP server and then uploaded to the device's memory. 7. Based on the correct bootloader file, the kickstart file containing the configuration of the selected operating system is requested from EasyDCIM. 8. The kickstart file is downloaded from the specified IP address of the EasyDCIM server. 9. Automatic installation of the operating system is commenced via the kickstart file: Downloading the required system files Running the pre-installation scripts Setting the time zone Setting the language Disk partitioning Creating a user account and setting the root password Setting the parent IP address Setting additional IP addresses and network interfaces Installing additional system packages Running post-installation scripts Finishing the installation 10. Once the installation has been completed successfully, a suitable notification is sent to EasyDCIM. This principle of operation is used for most installation templates. While some templates may vary in certain respects, the operating principle remains the same. Now, let us see how this theory works in practice! [embed]https://youtu.be/0SnCG7UF1cU[/embed] Manual installation of operating systems raises more problems than being just extremely laborious. More often than not it requires unwavering attention and excellent technical know-how, too. And there is always the risk that despite your best efforts, you may inadvertently mess up a few crucial steps in the process. With the new EasyDCIM v1.5.0 already on the loose, you may take the bother of manual OS installation off your mind entirely, and do something more interesting in the meantime. Like, for example, checking out some other principal functionalities of this ground-breaking novel version: IP Address Management v1.5.3 OS Installation For EasyDCIM v1.3.0 Greater functionality connected with PDU drivers More advanced power control settings Learn more about this most anticipated edition of EasyDCIM ever and bring a boon of automation to your data center! View The Changelog!
Piotr Dołęga - EasyDCIM CMO
Piotr Dołęga
Device Monitoring Reports in EasyDCIM v1.4.4
Know-How

Device Monitoring – Your Portal To Easy Savings!

Comprehensive diagnostics and analysis of device parameters allows you to optimize the functioning of the entire data center. Because of this precious insight, you are able to avoid the dire consequences of potential failures, rationalize planning of device maintenance intervals, and significantly prolong the service life of devices. But not only that - proactive monitoring also helps to raise energy efficiency of the individual pieces of equipment, and consequently - the whole data center altogether. Whether you succeed in turning your data center into a role model of economic maintenance depends to a large extent on the technical condition of your devices. Surprised? Wondering how exactly these two aspects are connected? Let us explain this sequence of dependencies to you in the most explicit manner which will not give you a headache along the way! Keeping equipment shipshape is number one condition if you want your devices to be safe in exploitation, available for use at all times, durable and foolproof on top of that. Not to mention energy efficient which will translate into increased savings. And that is something you are striving for more than anything else, isn't it? As you can see for yourself, detailed diagnostics and round-the-clock monitoring are indispensable for preventing any sort of faults (and thus monstrous costs related to repairs). This, in practice, means observing the parameters and device properties during not only normal, everyday functioning but diagnostic processes as well. EasyDCIM v1.4.4 provides you with all the necessary tools to review the state of each individual device in your possession. But even that is not the most utilitarian and exciting part of this ultramodern control panel. A couple of entirely new reports which allow you to readily inspect every single parameter of your devices is! Have a closer look at these two powerful reports unlocked in your 'Reports' section! Devices Load From The Last 5 Minutes Pretty easy to figure out what this report type is responsible for, isn't it? That is right - it displays the total load of your devices from the last 5 minutes, automatically sorting the values from the highest to the lowest. In other words, it shows how many processes on average are running per CPU during a particular time. If, for example, your load equals 1.50, then it means that roughly one process is in the 'Active' state and 0.5 processes are in the 'Standby' state. A higher value always denotes the more overloaded state. The collection of values is carried out through the polling process which polls the devices once every 5 minutes. The device polling is based on the SNMP protocol from which every 5 minutes the UCD-SNMP-MIB::laLoad value is downloaded. The 'Report Configuration' section contains two fields: Types - choose the device types which are to be taken into account when generating a report. Number Of Devices - specify the number of devices which will be displayed in a report. Power Consumption This report type is just as straightforward and helpful as the previous one. What it does is show the power consumption of your devices from one of four selected time intervals: last hour, last day, last week, last month. Can you see the potential lying in such precious data? Here is a hint! Identify the devices that generate the most electricity consumption → work out the ways to reduce this high usage most effectively → grab an extra cup of coffee with your saved dollars! The special process responsible for the collection of values is run once an hour and retrieves data on power consumption for PDUs and colocation from the following time intervals: last hour, last day, last week, last month. The device polling is based on the SNMP protocol from which the power consumption value is downloaded. Although the SNMP protocol is a primary source of data, specific device brands allow you to collect the values in other ways as well. In APC brand devices, for instance, data is retrieved using branches in the MIB tree with the value: 1.3.6.1.4.1.318.1.1.12.2.3.1.1.2.1 (PowerNet-MIB). The 'Report Configuration' section contains five fields: Types - pick the device types which should be included when generating a report. Units - select counting units other than the default Amps. In addition, you can convert values into predefined kW for direct current at 230V or 120V. Custom Conversion - convert the values to the ones of your own choosing. The base value is Amps which can be freely recalculated using appropriate arithmetic operations. Traffic Interval - choose the time interval from which data will be collected. There are for at your disposal: last hour, last day, last week, last month. Number Of Devices - specify the number of devices which will be displayed in a report. Key Benefits Of Device Monitoring With Dynamic Reports By way of introduction, we outlined why device monitoring is such an important issue when looked at from the fundamental level as well as wider perspective. Devices which keep generating a large load over a long period of time can outlive their usefulness really quickly and simply fail. If that were not enough, increased device load generates greater demand for power thus leading to higher electricity bills. But having the two newly added reports at your disposal, you can react instantly to any arising threats stemming from either device overload or power consumption and prevent serious failures from ever taking place. There is no better time than now to see how tremendous impact data center analysis has on the condition of your entire data center and... your wallet as well! Learn More About EasyDCIM v1.4.4!
Piotr Dołęga - EasyDCIM CMO
Piotr Dołęga
EasyDCIM v1.4.4
Release Notes

EasyDCIM v1.4.4 – The Era Of Reports Has Begun!

The sheer amount of sundry data stored and disseminated in server rooms every day, hour and minute is just staggering. And given the highly competitive nature of data center industry, it should not come as shock to anyone that effective data analysis is starting to play an increasingly important role for more and more business owners. Are you one of them? Did you ever realize how much potential lies dormant in these countless figures and numbers collected right under the roof of your data center? If not – be prepared to have your mind blown away by this game-changing revelation known to the circle of insiders as 'data mining'. Reports in EasyDCIM v1.4.4 New EasyDCIM v1.4.4 was designed and developed with one primary intent in mind – to help you discover your business anew with the aid of a wide assortment of whip-smart reports. The 15 novel report types are grouped into thematic categories to let you swiftly reach the relevant content you are currently interested in. Would you like to analyze which nationality constitutes the biggest percentage of your client base, and thus better personalize your offer? It will take you only a few minutes to study the statistics generated by the client-focused reports and draw valid conclusions. Measuring the resource usage and traffic generated by network devices does not have to serve billing purposes exclusively. Thanks to the multiple reports dedicated to devices you can easily sort the values from the highest to the lowest and preview, for example, if the transfer usage has increased or decreased compared to the previous month or any other time period. Monitoring the load of devices from the last 5 minutes, in turn, will allow you to quickly detect if there is a DDoS attack attempt being made on any of the ports. Are you adopting new strategies to branch out your business? Or maybe you want to simply keep your finger on the pulse and evaluate the profitability of your data center? Whatever your goals are, the next class of reports aimed at orders and services will grant you instant access to all sorts of details related to orders from any time interval of your own choosing. Deciding on a further course of action? Making quick adjustments to improve the quality of provided services? Not a problem any more! Keeping track of your inventory items can be quite a challenge when you own dozens of them (which you most certainly do). The last category of newly implemented reports designated for inventory organization will bring much alleviation to your daily tasks by allowing you to easily sort the possessed items by their type, status, model, and display the number of racks according to their location. We are positive that through careful interpretation of the data collected within these five areas you will be able to drive effective decision-making, predict customer trends, and boost the general productivity of your data center. Although we got totally engrossed in the business of new reports, this release has many more salient points to enjoy. Let us have a look at some of them: Password Management Module v1.1.0 Usage Collector Module v1.3.1 List with application jobs New configuration fields in the general settings Streamlined polling process Learn more about EasyDCIM v1.4.4 and be on the lookout for more stirring Blog posts devoted in their entirety to freshly applied reports! View The Changelog!
Piotr Dołęga - EasyDCIM CMO
Piotr Dołęga

READY FOR MORE?

Let EasyDCIM revolutionize your business

Test our system with a 30-day money back guarantee!