Solved

SuperMicro Hardware Monitoring

Posted on 2010-11-23
3
1,144 Views
Last Modified: 2012-05-10
Hi,

Is there anything on SuperMicro servers similar to the Dell OMSA functions on Dell servers?  We have a SuperMicro server but I'm not sure how to tell if the hard drives are going bad or not.

Bryan
0
Comment
Question by:bryanatm
3 Comments
 
LVL 11

Accepted Solution

by:
louisreeves earned 250 total points
ID: 34201686
By the looks of this, http://www.neteye-blog.it/?p=289

It looks like you should buy their gold contract. Support is the best reasons to get a server. I am sure you can do some monitoring. Ok. I can tell you there is a BMC, so you do have the ability to monitoring. However, I am wondering if they have stateside support! It doesnt look like it.

http://www.supermicro.com/manuals/other/Embedded_BMC_IPMI.pdf

Here is the proof the functionality is there. I would contact them directly.

0
 
LVL 47

Assisted Solution

by:dlethe
dlethe earned 250 total points
ID: 34204215
The supermicro BMC won't drill into the RAID controllers that are embedded on many of their motherboards.  It actually, wont do anything to monitor disk health even if it wasn't a RAID controller.

You'll need to go with some third-party software, but even that depends on the make/model of controller(s), as well as operating system, of course.

If you want something relatively inexpensive, check out smartmon-ux at santools.com
0
 
LVL 1

Author Closing Comment

by:bryanatm
ID: 34250631
Thanks for all the information, sorry I didn't close this sooner.
0

Featured Post

Optimizing Cloud Backup for Low Bandwidth

With cloud storage prices going down a growing number of SMBs start to use it for backup storage. Unfortunately, business data volume rarely fits the average Internet speed. This article provides an overview of main Internet speed challenges and reveals backup best practices.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
A clone is a duplicate copy. Sheep have been cloned and maybe someday even people will be cloned, but disk cloning (performed by the hard drive cloning software) is a vital tool used to manage and protect data. Let’s look at what hard drive cloning …
Windows 10 is mostly good. However the one thing that annoys me is how many clicks you have to do to dial a VPN connection. You have to go to settings from the start menu, (2 clicks), Network and Internet (1 click), Click VPN (another click) then fi…
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now