US20160026661A1 - System and method for the automated generation of events within a server environment - Google Patents

System and method for the automated generation of events within a server environment Download PDF

Info

Publication number
US20160026661A1
US20160026661A1 US14/874,115 US201514874115A US2016026661A1 US 20160026661 A1 US20160026661 A1 US 20160026661A1 US 201514874115 A US201514874115 A US 201514874115A US 2016026661 A1 US2016026661 A1 US 2016026661A1
Authority
US
United States
Prior art keywords
event
sensor
record
computer system
sensor data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/874,115
Inventor
Anil V. Rao
Chandrasekhar Mugunda
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dell Products LP
Original Assignee
Dell Products LP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dell Products LP filed Critical Dell Products LP
Priority to US14/874,115 priority Critical patent/US20160026661A1/en
Assigned to DELL PRODUCTS L.P. reassignment DELL PRODUCTS L.P. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MUGUNDA, CHANDRASEKHAR, RAO, ANIL V.
Assigned to THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS FIRST LIEN COLLATERAL AGENT reassignment THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS FIRST LIEN COLLATERAL AGENT SUPPLEMENTAL PATENT SECURITY AGREEMENT - NOTES Assignors: BOOMI, INC., DELL PRODUCTS L.P., DELL SOFTWARE INC., WYSE TECHNOLOGY L.L.C.
Assigned to BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT reassignment BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT SUPPLEMENTAL PATENT SECURITY AGREEMENT - ABL Assignors: BOOMI, INC., DELL PRODUCTS L.P., DELL SOFTWARE INC., WYSE TECHNOLOGY L.L.C.
Assigned to BANK OF AMERICA, N.A., AS COLLATERAL AGENT reassignment BANK OF AMERICA, N.A., AS COLLATERAL AGENT SUPPLEMENTAL PATENT SECURITY AGREEMENT - TERM LOAN Assignors: BOOMI, INC., DELL PRODUCTS L.P., DELL SOFTWARE INC., WYSE TECHNOLOGY L.L.C.
Publication of US20160026661A1 publication Critical patent/US20160026661A1/en
Assigned to DELL PRODUCTS L.P., DELL SOFTWARE INC., WYSE TECHNOLOGY L.L.C. reassignment DELL PRODUCTS L.P. RELEASE OF REEL 037160 FRAME 0171 (ABL) Assignors: BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT
Assigned to DELL PRODUCTS L.P., WYSE TECHNOLOGY L.L.C., DELL SOFTWARE INC. reassignment DELL PRODUCTS L.P. RELEASE OF REEL 037160 FRAME 0239 (TL) Assignors: BANK OF AMERICA, N.A., AS COLLATERAL AGENT
Assigned to DELL SOFTWARE INC., WYSE TECHNOLOGY L.L.C., DELL PRODUCTS L.P. reassignment DELL SOFTWARE INC. RELEASE OF REEL 037160 FRAME 0142 (NOTE) Assignors: BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT
Assigned to CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENT reassignment CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENT SECURITY AGREEMENT Assignors: ASAP SOFTWARE EXPRESS, INC., AVENTAIL LLC, CREDANT TECHNOLOGIES, INC., DELL INTERNATIONAL L.L.C., DELL MARKETING L.P., DELL PRODUCTS L.P., DELL SOFTWARE INC., DELL SYSTEMS CORPORATION, DELL USA L.P., EMC CORPORATION, EMC IP Holding Company LLC, FORCE10 NETWORKS, INC., MAGINATICS LLC, MOZY, INC., SCALEIO LLC, SPANNING CLOUD APPS LLC, WYSE TECHNOLOGY L.L.C.
Assigned to THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT reassignment THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT SECURITY AGREEMENT Assignors: ASAP SOFTWARE EXPRESS, INC., AVENTAIL LLC, CREDANT TECHNOLOGIES, INC., DELL INTERNATIONAL L.L.C., DELL MARKETING L.P., DELL PRODUCTS L.P., DELL SOFTWARE INC., DELL SYSTEMS CORPORATION, DELL USA L.P., EMC CORPORATION, EMC IP Holding Company LLC, FORCE10 NETWORKS, INC., MAGINATICS LLC, MOZY, INC., SCALEIO LLC, SPANNING CLOUD APPS LLC, WYSE TECHNOLOGY L.L.C.
Assigned to SCALEIO LLC, FORCE10 NETWORKS, INC., EMC CORPORATION, ASAP SOFTWARE EXPRESS, INC., MAGINATICS LLC, DELL USA L.P., CREDANT TECHNOLOGIES, INC., WYSE TECHNOLOGY L.L.C., DELL INTERNATIONAL, L.L.C., DELL PRODUCTS L.P., DELL SYSTEMS CORPORATION, AVENTAIL LLC, DELL MARKETING L.P., EMC IP Holding Company LLC, DELL SOFTWARE INC., MOZY, INC. reassignment SCALEIO LLC RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH
Assigned to DELL INTERNATIONAL L.L.C., DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO ASAP SOFTWARE EXPRESS, INC.), DELL USA L.P., DELL MARKETING L.P. (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO CREDANT TECHNOLOGIES, INC.), EMC IP HOLDING COMPANY LLC (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MOZY, INC.), DELL PRODUCTS L.P., EMC CORPORATION (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MAGINATICS LLC), DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO FORCE10 NETWORKS, INC. AND WYSE TECHNOLOGY L.L.C.), SCALEIO LLC reassignment DELL INTERNATIONAL L.L.C. RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001) Assignors: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT
Assigned to DELL USA L.P., EMC CORPORATION (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MAGINATICS LLC), DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO ASAP SOFTWARE EXPRESS, INC.), DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO FORCE10 NETWORKS, INC. AND WYSE TECHNOLOGY L.L.C.), DELL INTERNATIONAL L.L.C., DELL PRODUCTS L.P., DELL MARKETING L.P. (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO CREDANT TECHNOLOGIES, INC.), EMC IP HOLDING COMPANY LLC (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MOZY, INC.), SCALEIO LLC reassignment DELL USA L.P. RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001) Assignors: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT
Abandoned legal-status Critical Current

Links

Images

Classifications

    • G06F17/30309
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • G06F16/219Managing data history or versioning
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/3031Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a motherboard or an expansion card
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3055Monitoring arrangements for monitoring the status of the computing system or of the computing system component, e.g. monitoring if the computing system is on, off, available, not available
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3058Monitoring arrangements for monitoring environmental properties or parameters of the computing system or of the computing system component, e.g. monitoring of power, currents, temperature, humidity, position, vibrations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0766Error or fault reporting or storing

Definitions

  • the present disclosure relates generally to computer systems and information handling systems, and, more particularly, to a system and method for generating events within a server environment.
  • An information handling system generally processes, compiles, stores, and/or communicates information or data for business, personal, or other purposes thereby allowing users to take advantage of the value of the information. Because technology and information handling needs and requirements vary between different users or applications, information handling systems may vary with respect to the type of information handled; the methods for handling the information; the methods for processing, storing or communicating the information; the amount of information processed, stored, or communicated; and the speed and efficiency with which the information is processed, stored, or communicated.
  • information handling systems allow for information handling systems to be general or configured for a specific user or specific use such as financial transaction processing, airline reservations, enterprise data storage, or global communications.
  • information handling systems may include or comprise a variety of hardware and software components that may be configured to process, store, and communicate information and may include one or more computer systems, data storage systems, and networking systems.
  • a computer system such as a server computer, may include management software for monitoring the status of the computer.
  • server management software is Intelligent Platform Management Interface (IPMI) software.
  • IPMI Intelligent Platform Management Interface
  • the IPMI protocol defines a set of established interfaces for the monitoring and reporting the status of components of a server computer.
  • IPMI software is server management software that executes on the baseboard management controller of the server computer.
  • IPMI software employs the intelligence of the various hardware devices to present a common, standardized interface for monitoring and reporting on the status of the hardware devices within the server system.
  • An IPMI-compliant computer system will typically include a system event log. Deviations from normal operation within the computer system are recorded in the system event log.
  • Each event is associated with a sensor, and each sensor is associated with a sensor data record, which is a data record that describes the system event or deviation from normal operation.
  • the system event log may receive sensor data records that are unfamiliar to the system administrators who operate the system event log. In this circumstance, the system administrator may not be able to properly or efficient respond to the event that cause the sensor data record to be entered in the system event log.
  • a system and method for generating a list of each possible event record that could be recorded to the system event log of an IPMI-compliant computer system. For each sensor data record, the static portions of an event record are completed. The event record is then duplicated and a trigger event is noted as having occurred in one of the copies of the event record. For each copy, event-specific information is written to the event records.
  • the system and method disclosed herein is technically advantageous because, once all of the generated event records are known, the set of possible event records can be analyzed. Having a knowledge of each possible event record is valuable, as it provides a user or administrator with the opportunity to plan for and manage each possible event in the computer. In addition, because each possible event is known, a set of translations could be constructed in which an IPMI event is translated for use and handling by another operating system or computer system. Other technical advantages will be apparent to those of ordinary skill in the art in view of the following specification, claims, and drawings.
  • FIG. 1 is a block diagram of elements of a hardware architecture of an information handling system
  • FIG. 2 is a diagram of the format of an SEL event record
  • FIG. 3 is a flow diagram of a method for generating a set of possible event records that can be recorded in a system event log.
  • an information handling system may include any instrumentality or aggregate of instrumentalities operable to compute, classify, process, transmit, receive, retrieve, originate, switch, store, display, manifest, detect, record, reproduce, handle, or utilize any form of information, intelligence, or data for business, scientific, control, or other purposes.
  • an information handling system may be a personal computer, a network storage device, or any other suitable device and may vary in size, shape, performance, functionality, and price.
  • the information handling system may include random access memory (RAM), one or more processing resources such as a central processing unit (CPU) or hardware or software control logic, ROM, and/or other types of nonvolatile memory.
  • Additional components of the information handling system may include one or more disk drives, one or more network ports for communication with external devices as well as various input and output (I/O) devices, such as a keyboard, a mouse, and a video display.
  • the information handling system may also include one or more buses operable to transmit communications between the various hardware components.
  • the system and method disclosed herein concerns a technique for generating a set of possible system event records that can be logged to a system event log during the operation of a computer system that uses a management interface, such as the Intelligent Platform Management Interface (IPMI) management interface.
  • IPMI Intelligent Platform Management Interface
  • FIG. 1 Shown in FIG. 1 are elements of a hardware architecture of an information handling system, such as a server computer, which is indicated generally at 10
  • a motherboard 12 includes a baseboard management controller 20 and a network interface controller 16 .
  • the network interface controller 16 and the baseboard management controller 20 are each coupled to a system bus 24 .
  • Network interface controller 16 serves as an interface between the server computer 10 and an external network or client 14 .
  • Baseboard management controller 20 is also coupled to a remote access card 26 , which may not reside on motherboard 12 .
  • Nonvolatile storage 28 is also coupled to baseboard management controller 20 and resides on motherboard 12 . Also coupled to baseboard management controller 20 is temperature sensor 21 , which may reside on the motherboard or another board of the system, such as a control panel board. Temperature sensor 21 may comprise sensors for monitoring the temperature of the baseboard management controller or the interior of the server computer.
  • Nonvolatile storage 28 includes a system event log 30 and a sensor data record (SDR) repository 32 .
  • Nonvolatile storage 28 is coupled to baseboard management controller 20 .
  • buses such as I 2 C buses, are coupled between the baseboard management controller and some of the hardware elements of the server system.
  • An I 2 C bus labeled as I 2 C Bus 0
  • a second I 2 C bus labeled I 2 C bus 1
  • Another I 2 C bus labeled in FIG. 1 as I 2 C bus 2 is coupled between baseboard management controller 20 and temperature sensors 21 .
  • An I 2 C bus labeled as I 2 C bus 3 , is coupled between the power supply 36 and the baseboard management controller 20 .
  • Nonvolatile storage 28 includes a SDR repository 28 and a system event log 30 .
  • SDR repository 28 is a centralized, non-volatile storage location within the server computer.
  • the SDR repository is managed by and can be accessed by the baseboard management controller.
  • Stored in SDR repository are sensor data records, which comprise information and specifications for each sensor in the server computer.
  • the SDR repository provides the server management software of the computer system with a sensor data record that describes the number, type, and configuration of each sensor of the server system.
  • the SDR entry for the temperature sensor may include the parameters of the temperature sensor and any threshold operating values for the temperature sensor.
  • the SDR entry would specify the error conditions of the bus that are monitored by the baseboard management controller. These error conditions could include arbitration errors, no stop conditions, lines stuck low, and the recovery policy of the bus.
  • the format of a sensor data record includes an identification of the type of sensor data record.
  • a Type 1 sensor data record is a full sensor record that can be used by a sensor that includes analog or discrete states.
  • a Type 2 sensor data record is a compact sensor record format that is associated with threshold-based sensors that are operable to monitor a threshold comparison status.
  • System event log 30 is a nonvolatile storage area that is a log of events that have been recognized by the server management software of the server system. As events occur, the server management software records those events as part of an event record in the system event log 30 . An entry in the system event log will include, at a minimum, an identification of the sensor and the event experienced by the sensor.
  • IPMI software One example of server management software is IPMI software.
  • the IPMI protocol defines a set of established interfaces for the monitoring and reporting the status of components of a server computer.
  • IPMI software is server management software that executes on the baseboard management controller.
  • IPMI software employs the intelligence of the various hardware devices to present a common, standardized interface for monitoring and reporting on the status of the hardware devices within the server system.
  • the IPMI protocol was established, in part, by Dell Inc. of Round Rock, Tex.; Hewlett-Packard Company of Palo Alto, Calif.; Intel Corporation of Santa Clara, Calif.; and NEC Corporation of Tokyo, Japan. The specification for the IPMI protocol can be found on the Intel web site at http://www.intel.com/design/servers/ipmi.
  • event record in the system event log is a 16 byte record. Entries in the system event log can be monitored by a system administrator to manage the operation of the system. A system administrator may monitor entries in the system event log through a Simple Network Management Protocol (SNMP) Alert Standard Format (ASF) platform event trap.
  • SNMP Simple Network Management Protocol
  • ASF Alert Standard Format
  • Each record that is generated and saved to the system event log will be associated with an IPMI sensor of the computer system.
  • SNMP Simple Network Management Protocol
  • ASF Alert Standard Format
  • Each record that is generated and saved to the system event log will be associated with an IPMI sensor of the computer system.
  • a sensor is a temperature sensor, which might measure the temperature of the baseboard management controller of the interior temperature of the computer system.
  • a power supply sensor which monitors the status of the various power supplies of the computer system.
  • Each sensor will be associated with a 16-byte sensor data record. The content of the sensor data record will include information concerning the sensor and the event identified by the sensor.
  • Shown in FIG. 2 is an example of the format of the 16-byte system event log (SEL) event record 40 .
  • Record 40 is written to the system event log.
  • Record 40 includes a two-byte Record ID field 42 .
  • the content of the Record ID field may be a sequential number reflecting the order in which the records are written to the system event log.
  • Record type 44 is a one byte record that identifies whether record 40 has a standard format or another format defined by the user or manufacturer of the computer system.
  • Time stamp 46 is the time when the event was logged to the system event log. Time stamp 46 is automatically generated.
  • Generator ID field 48 is a two-byte field. The first byte identifies the owner ID of the sensor associated with the event, and the second byte identifies the channel over which the notification of the event was received.
  • Event record 40 is EvmRev 50 , which is also known as the event message format field.
  • This field identifies event message format version. The value of this field changes with each revision to the IPMI specification.
  • Field 52 is the sensor type field. This field includes the sensor type code for the sensor that generated the event. As an example, the sensor type code may identify the sensor as a voltage, current, or temperature sensor, of any of several other sensor types.
  • the next field in event record 40 is sensor number 54 . This field identifies the number of the sensor that generated the event.
  • the next field in event record 40 is the Event Dir/Event Type field. This field is a one byte field. The first bit of the field specifies whether the event is an asserted event or a deasserted event. The other seven bits of the field are an event type field that is populated with a code that identifies the type of trigger for the event and the class of the event.
  • the types of event triggers include the crossing of thresholds or the establishment of a state, for example.
  • the classes of events include discrete event, threshold events, and OEM, or manufacturer or user defined events.
  • the last field in event record 40 is the event data bytes field 58 .
  • the first nibble of the first byte of field 58 identifies whether OEM (manufacturer or user specific) data is included in the last two bytes of the field.
  • the second nibble of the first byte includes sensor-specific data that is specific to each type of sensor. In some instances, the last two bytes of the field will not include data.
  • FIG. 3 Shown in FIG. 3 is a flow diagram of a method for generating the set of possible event records that can be recorded in a system event log.
  • a sensor data record is selected from the SDR repository.
  • the record is reviewed to determine if the sensor data record is a Type 1 (discrete) or a Type 2 (threshold only) sensor data record. If the sensor data record is not a Type 1 or a Type 2 sensor data record, the method determines at step 74 is additional sensor data records exist in the SDR repository. If additional sensor data records do exist in the SDR repository, the next sensor data record is selected at step 70 . If additional sensor data records do not exist in the SDR repository, the process ends. Because each sensor data record is associated with a sensor, the process of identifying possible event records can end once all sensor data records have been processed.
  • the static portions of an event record for the sensor associated with the sensor data record are completed at step 76 .
  • the event record is then duplicated at step 78 and the ASSERT bit is turned on in one of the duplicate records.
  • the event data bytes are populated for each of the two event records.
  • Step 80 is performed for each possible state of the sensor, which is defined as the combination of sensor type and event trigger.
  • n is the number of states (combination of sensor types and event triggers) associated with the sensor and the multiplier two reflects that each event record is recorded with ASSERT bit on and the ASSERT bit off.
  • each generated event record is saved to the system event log or some other suitable storage location for later analysis of the generated set of event records.
  • the set of possible event records can be analyzed. Having a knowledge of each possible event record is valuable, as it provides a user or administrator with the opportunity to plan for and manage each possible event in the computer.
  • a set of translations could be constructed in which an IPMI event is translated for use and handling by another operating system or computer system.
  • system and method disclosed herein is not limited in its application to the IPMI specification. Rather, the system and method disclosed herein may be employed with any system management software to generate a comprehensive set of data records corresponding to each monitored event of the computer system.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • Databases & Information Systems (AREA)
  • Mathematical Physics (AREA)
  • Data Mining & Analysis (AREA)
  • Debugging And Monitoring (AREA)

Abstract

A system and method is disclosed in which the buses of a server computer are monitored through server management software. A data structure for a monitored bus or group of buses is created and stored in a repository of data structures for other monitored devices within the server computer. As events, such as failure events, occur on one or more of the monitored buses, the event is recorded in an event log. Using the server management software, monitoring commands can be issued by the baseboard management controller to each monitored bus to check the status of the bus.

Description

    CROSS-REFERENCE TO RELATED APPLICATION
  • This application is a continuation of application No. 11/332,558, filed Jan. 13, 2006, which is incorporated herein by reference.
  • TECHNICAL FIELD
  • The present disclosure relates generally to computer systems and information handling systems, and, more particularly, to a system and method for generating events within a server environment.
  • BACKGROUND
  • As the value and use of information continues to increase, individuals and businesses seek additional ways to process and store information. One option available to these users is an information handling system. An information handling system generally processes, compiles, stores, and/or communicates information or data for business, personal, or other purposes thereby allowing users to take advantage of the value of the information. Because technology and information handling needs and requirements vary between different users or applications, information handling systems may vary with respect to the type of information handled; the methods for handling the information; the methods for processing, storing or communicating the information; the amount of information processed, stored, or communicated; and the speed and efficiency with which the information is processed, stored, or communicated. The variations in information handling systems allow for information handling systems to be general or configured for a specific user or specific use such as financial transaction processing, airline reservations, enterprise data storage, or global communications. In addition, information handling systems may include or comprise a variety of hardware and software components that may be configured to process, store, and communicate information and may include one or more computer systems, data storage systems, and networking systems.
  • A computer system, such as a server computer, may include management software for monitoring the status of the computer. One example of server management software is Intelligent Platform Management Interface (IPMI) software. The IPMI protocol defines a set of established interfaces for the monitoring and reporting the status of components of a server computer. IPMI software is server management software that executes on the baseboard management controller of the server computer. IPMI software employs the intelligence of the various hardware devices to present a common, standardized interface for monitoring and reporting on the status of the hardware devices within the server system. An IPMI-compliant computer system will typically include a system event log. Deviations from normal operation within the computer system are recorded in the system event log. Each event is associated with a sensor, and each sensor is associated with a sensor data record, which is a data record that describes the system event or deviation from normal operation. During the operation of a system, the system event log may receive sensor data records that are unfamiliar to the system administrators who operate the system event log. In this circumstance, the system administrator may not be able to properly or efficient respond to the event that cause the sensor data record to be entered in the system event log.
  • SUMMARY
  • In accordance with the present disclosure, a system and method is disclosed for generating a list of each possible event record that could be recorded to the system event log of an IPMI-compliant computer system. For each sensor data record, the static portions of an event record are completed. The event record is then duplicated and a trigger event is noted as having occurred in one of the copies of the event record. For each copy, event-specific information is written to the event records.
  • The system and method disclosed herein is technically advantageous because, once all of the generated event records are known, the set of possible event records can be analyzed. Having a knowledge of each possible event record is valuable, as it provides a user or administrator with the opportunity to plan for and manage each possible event in the computer. In addition, because each possible event is known, a set of translations could be constructed in which an IPMI event is translated for use and handling by another operating system or computer system. Other technical advantages will be apparent to those of ordinary skill in the art in view of the following specification, claims, and drawings.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • A more complete understanding of the present embodiments and advantages thereof may be acquired by referring to the following description taken in conjunction with the accompanying drawings, in which like reference numbers indicate like features, and wherein:
  • FIG. 1 is a block diagram of elements of a hardware architecture of an information handling system;
  • FIG. 2 is a diagram of the format of an SEL event record; and
  • FIG. 3 is a flow diagram of a method for generating a set of possible event records that can be recorded in a system event log.
  • DETAILED DESCRIPTION
  • For purposes of this disclosure, an information handling system may include any instrumentality or aggregate of instrumentalities operable to compute, classify, process, transmit, receive, retrieve, originate, switch, store, display, manifest, detect, record, reproduce, handle, or utilize any form of information, intelligence, or data for business, scientific, control, or other purposes. For example, an information handling system may be a personal computer, a network storage device, or any other suitable device and may vary in size, shape, performance, functionality, and price. The information handling system may include random access memory (RAM), one or more processing resources such as a central processing unit (CPU) or hardware or software control logic, ROM, and/or other types of nonvolatile memory. Additional components of the information handling system may include one or more disk drives, one or more network ports for communication with external devices as well as various input and output (I/O) devices, such as a keyboard, a mouse, and a video display. The information handling system may also include one or more buses operable to transmit communications between the various hardware components.
  • The system and method disclosed herein concerns a technique for generating a set of possible system event records that can be logged to a system event log during the operation of a computer system that uses a management interface, such as the Intelligent Platform Management Interface (IPMI) management interface. Shown in FIG. 1 are elements of a hardware architecture of an information handling system, such as a server computer, which is indicated generally at 10 A motherboard 12 includes a baseboard management controller 20 and a network interface controller 16. The network interface controller 16 and the baseboard management controller 20 are each coupled to a system bus 24. Network interface controller 16 serves as an interface between the server computer 10 and an external network or client 14. Baseboard management controller 20 is also coupled to a remote access card 26, which may not reside on motherboard 12. Nonvolatile storage 28 is also coupled to baseboard management controller 20 and resides on motherboard 12. Also coupled to baseboard management controller 20 is temperature sensor 21, which may reside on the motherboard or another board of the system, such as a control panel board. Temperature sensor 21 may comprise sensors for monitoring the temperature of the baseboard management controller or the interior of the server computer. Nonvolatile storage 28 includes a system event log 30 and a sensor data record (SDR) repository 32. Nonvolatile storage 28 is coupled to baseboard management controller 20.
  • In server computer 10, buses, such as I2C buses, are coupled between the baseboard management controller and some of the hardware elements of the server system. An I2C bus, labeled as I2C Bus 0, is coupled between the backplane 34, remote access card 26, and baseboard management controller 20. A second I2C bus, labeled I2C bus 1, is coupled between the baseboard management controller 20 and network interface controller 16. Another I2C bus, labeled in FIG. 1 as I2C bus 2 is coupled between baseboard management controller 20 and temperature sensors 21. An I2C bus, labeled as I2C bus 3, is coupled between the power supply 36 and the baseboard management controller 20.
  • Nonvolatile storage 28 includes a SDR repository 28 and a system event log 30. SDR repository 28 is a centralized, non-volatile storage location within the server computer. The SDR repository is managed by and can be accessed by the baseboard management controller. Stored in SDR repository are sensor data records, which comprise information and specifications for each sensor in the server computer. The SDR repository provides the server management software of the computer system with a sensor data record that describes the number, type, and configuration of each sensor of the server system. As an example, in the case of a temperature sensor, the SDR entry for the temperature sensor may include the parameters of the temperature sensor and any threshold operating values for the temperature sensor. Similarly, in the case of a bus sensor, the SDR entry would specify the error conditions of the bus that are monitored by the baseboard management controller. These error conditions could include arbitration errors, no stop conditions, lines stuck low, and the recovery policy of the bus. The format of a sensor data record includes an identification of the type of sensor data record. A Type 1 sensor data record is a full sensor record that can be used by a sensor that includes analog or discrete states. A Type 2 sensor data record is a compact sensor record format that is associated with threshold-based sensors that are operable to monitor a threshold comparison status.
  • System event log 30 is a nonvolatile storage area that is a log of events that have been recognized by the server management software of the server system. As events occur, the server management software records those events as part of an event record in the system event log 30. An entry in the system event log will include, at a minimum, an identification of the sensor and the event experienced by the sensor.
  • One example of server management software is IPMI software. The IPMI protocol defines a set of established interfaces for the monitoring and reporting the status of components of a server computer. IPMI software is server management software that executes on the baseboard management controller. IPMI software employs the intelligence of the various hardware devices to present a common, standardized interface for monitoring and reporting on the status of the hardware devices within the server system. The IPMI protocol was established, in part, by Dell Inc. of Round Rock, Tex.; Hewlett-Packard Company of Palo Alto, Calif.; Intel Corporation of Santa Clara, Calif.; and NEC Corporation of Tokyo, Japan. The specification for the IPMI protocol can be found on the Intel web site at http://www.intel.com/design/servers/ipmi.
  • The IPMI specification provides that event record in the system event log is a 16 byte record. Entries in the system event log can be monitored by a system administrator to manage the operation of the system. A system administrator may monitor entries in the system event log through a Simple Network Management Protocol (SNMP) Alert Standard Format (ASF) platform event trap. Each record that is generated and saved to the system event log will be associated with an IPMI sensor of the computer system. One example of a sensor is a temperature sensor, which might measure the temperature of the baseboard management controller of the interior temperature of the computer system. Another example of a sensor is a power supply sensor, which monitors the status of the various power supplies of the computer system. Each sensor will be associated with a 16-byte sensor data record. The content of the sensor data record will include information concerning the sensor and the event identified by the sensor.
  • Shown in FIG. 2 is an example of the format of the 16-byte system event log (SEL) event record 40. Record 40 is written to the system event log. Record 40 includes a two-byte Record ID field 42. The content of the Record ID field may be a sequential number reflecting the order in which the records are written to the system event log. Record type 44 is a one byte record that identifies whether record 40 has a standard format or another format defined by the user or manufacturer of the computer system. Time stamp 46 is the time when the event was logged to the system event log. Time stamp 46 is automatically generated. Generator ID field 48 is a two-byte field. The first byte identifies the owner ID of the sensor associated with the event, and the second byte identifies the channel over which the notification of the event was received. The next entry if event record 40 is EvmRev 50, which is also known as the event message format field. This field identifies event message format version. The value of this field changes with each revision to the IPMI specification. Field 52 is the sensor type field. This field includes the sensor type code for the sensor that generated the event. As an example, the sensor type code may identify the sensor as a voltage, current, or temperature sensor, of any of several other sensor types.
  • The next field in event record 40 is sensor number 54. This field identifies the number of the sensor that generated the event. The next field in event record 40 is the Event Dir/Event Type field. This field is a one byte field. The first bit of the field specifies whether the event is an asserted event or a deasserted event. The other seven bits of the field are an event type field that is populated with a code that identifies the type of trigger for the event and the class of the event. The types of event triggers include the crossing of thresholds or the establishment of a state, for example. The classes of events include discrete event, threshold events, and OEM, or manufacturer or user defined events. The last field in event record 40 is the event data bytes field 58. The first nibble of the first byte of field 58 identifies whether OEM (manufacturer or user specific) data is included in the last two bytes of the field. The second nibble of the first byte includes sensor-specific data that is specific to each type of sensor. In some instances, the last two bytes of the field will not include data.
  • Shown in FIG. 3 is a flow diagram of a method for generating the set of possible event records that can be recorded in a system event log. At step 70, a sensor data record is selected from the SDR repository. At step 72, the record is reviewed to determine if the sensor data record is a Type 1 (discrete) or a Type 2 (threshold only) sensor data record. If the sensor data record is not a Type 1 or a Type 2 sensor data record, the method determines at step 74 is additional sensor data records exist in the SDR repository. If additional sensor data records do exist in the SDR repository, the next sensor data record is selected at step 70. If additional sensor data records do not exist in the SDR repository, the process ends. Because each sensor data record is associated with a sensor, the process of identifying possible event records can end once all sensor data records have been processed.
  • If the sensor data record is a Type 1 or Type 2 sensor data record, the static portions of an event record for the sensor associated with the sensor data record are completed at step 76. The event record is then duplicated at step 78 and the ASSERT bit is turned on in one of the duplicate records. Following step 78, there are two event records, one with the ASSERT bit turned on and one with the ASSERT bit turned off. At step 80, depending on the sensor type (field 52 of FIG. 2) and the type of trigger for the event and the class of the event (the lower seven bits of the Event Dir/Event Type field 56 of FIG. 2), the event data bytes (field 58 of FIG. 2) are populated for each of the two event records. Thus, depending on the type of sensor, such as a voltage, current, or temperature sensor, for example, and depending on whether the event is triggered to a discrete event or a threshold event, the information that is specific to the sensor and the event is recorded in the event data bytes for the event record, for an event record is which the ASSERT bit is on and an event record in which the ASSERT bit is off. Step 80 is performed for each possible state of the sensor, which is defined as the combination of sensor type and event trigger. Thus, following step 80, there are 2*n generated event records, where n is the number of states (combination of sensor types and event triggers) associated with the sensor and the multiplier two reflects that each event record is recorded with ASSERT bit on and the ASSERT bit off.
  • At step 82, each generated event record is saved to the system event log or some other suitable storage location for later analysis of the generated set of event records. At step 84, it is determined if there are additional sensor data records that have not been analyzed. If there are additional sensor data records that have not been analyzed, the method continues at step 70. If there are no additional sensor data records to be analyzed, the method ends. The end result of this method is a generated collection of each possible event record for the IPMI-compliant computer system.
  • Once all of the generated event records are known, the set of possible event records can be analyzed. Having a knowledge of each possible event record is valuable, as it provides a user or administrator with the opportunity to plan for and manage each possible event in the computer. In addition, because each possible event is known, a set of translations could be constructed in which an IPMI event is translated for use and handling by another operating system or computer system.
  • It should be recognized that the system and method disclosed herein is not limited in its application to the IPMI specification. Rather, the system and method disclosed herein may be employed with any system management software to generate a comprehensive set of data records corresponding to each monitored event of the computer system. Although the present disclosure has been described in detail, it should be understood that various changes, substitutions, and alterations can be made hereto without departing from the spirit and the scope of the invention as defined by the appended claims.

Claims (20)

What is claimed is:
1. A method for generating a set of possible event records associated with an event recognized by a sensor in a computer system comprising:
providing a sensor, wherein one or more events are associated with the sensor in a sensor data record corresponding to the sensor, and wherein an event trigger is associated with each of the one or more events;
providing a sensor data repository, wherein the sensor data repository comprises a sensor data record associated with the sensor;
providing an event record for each of the one or more events prior to an occurrence of the event trigger associated with each of the one or more events, wherein providing the event record comprises the steps of:
completing static portions of the event record, wherein the static portions of the event record include an identification of the sensor corresponding to the event;
duplicating the event record; and
completing an event data portion of the duplicate of the event record and the event record, wherein the event data portions are completed independent from accomplishment of the event trigger;
completing an assert portion of at least one of the event record and the duplicate of the event record.
2. The method for generating a set of data records associated with an event recognized by a sensor in the computer system of claim 1, wherein the sensor data record comprises at least one of a sensor type and a sensor configuration.
3. The method for generating a set of data records associated with an event recognized by a sensor in the computer system of claim 1, wherein the sensor is a temperature sensor, and wherein the sensor data record comprises at least one of one or more parameters and one or more threshold operating values.
4. The method for generating a set of data records associated with an event recognized by a sensor in the computer system of claim 1, wherein the sensor is a bus sensor, and wherein the sensor data record comprises one or more monitored error conditions of an associated bus.
5. The method for generating a set of data records associated with an event recognized by a sensor in the computer system of claim 1, wherein the sensor data record comprises an identification of a type of sensor data record.
6. The method for generating a set of data records associated with an event recognized by a sensor in the computer system of claim 5, wherein the type of sensor data record comprises at least one of a full sensor record and a compact sensor record.
7. The method for generating a set of data records associated with an event recognized by a sensor in the computer system of claim 1, wherein the sensor data repository is managed by a baseboard management controller.
8. A method for generating an event record of each possible event that can be recorded in the event log of a computer system, comprising:
providing a sensor data repository, wherein the sensor data repository is a centralized, non-volatile storage location with the computer system;
identifying in the sensor data repository a sensor data record corresponding to each of the one or more sensors of the computer system, wherein one or more events are associated with each of the one or more sensors; and
for each sensor of the computer system, prior to an occurrence of an event trigger corresponding to the one or more events, providing an event record for the sensor and completing the steps of:
populating at least some static portions of the event record, wherein the at least some static portions of the event record include an identification of the sensor corresponding to the event,
duplicating the event record, and
completing a version of the event record for each state of the sensor, wherein each state of the sensor is defined by a type of the sensor and a trigger event for the sensor, wherein the version of the event record for each state of the sensor is completed independent from accomplishment of the corresponding trigger event;
collecting completed versions of the event records for all of the sensors of the computer system.
9. The method for generating an event record of each possible event that can be recorded in the event log of a computer system of claim 8, wherein each sensor data record comprises at least one of a sensor type and a sensor configuration.
10. The method for generating an event record of each possible event that can be recorded in the event log of a computer system of claim 8, wherein at least one of the one or more sensors is a temperature sensor, and wherein a corresponding sensor data record comprises at least one of one or more parameters and one or more threshold operating values.
11. The method for generating an event record of each possible event that can be recorded in the event log of a computer system of claim 8, wherein at least one of the one or more sensors is a bus sensor, and wherein a corresponding sensor data record comprises one or more monitored error conditions of an associated bus.
12. The method for generating an event record of each possible event that can be recorded in the event log of a computer system of claim 8, wherein each corresponding sensor data record comprises an identification of a type of sensor data record.
13. The method for generating an event record of each possible event that can be recorded in the event log of a computer system of claim 12, wherein the type of sensor data record comprises at least one of a full sensor record and a compact sensor record.
14. The method for generating an event record of each possible event that can be recorded in the event log of a computer system of claim 8, wherein the sensor data repository is managed by a baseboard management controller.
15. A method for generating a set of possible system event records that can be logged to a system event log in a computer system, comprising:
providing a sensor data repository and the system event log, wherein the sensor data repository and the system event log are stored in a centralized, non-volatile storage location within the computer system.
identifying in the sensor data repository a sensor data record corresponding to each respective sensor of the computer system, wherein one or more events are associated with each sensor;
for each sensor of the computer system, prior to an occurrence of an event trigger corresponding to the one or more events, providing an event record for the sensor and completing the steps of:
populating at least some static portions of the event record, wherein the at least some static portions of the event record include an identification of the sensor corresponding to the event,
duplicating the event record, and
completing a version of the event record for each state of the sensor, wherein each state of the sensor is defined by a type of the sensor and a trigger event for the sensor, wherein the version of the event record for each state of the sensor is completed independent from accomplishment of the corresponding trigger event;
collecting completed versions of the event records for all of the sensors of the computer system; and
saving to the system event log each completed version of the event record.
16. The method of claim 15, wherein each sensor data record comprises at least one of a sensor type and a sensor configuration.
17. The method of claim 15, wherein at least one of the one or more sensors is a temperature sensor, and wherein a corresponding sensor data record comprises at least one of one or more parameters and one or more threshold operating values.
18. The method of claim 15, wherein at least one of the one or more sensors is a bus sensor, and wherein a corresponding sensor data record comprises one or more monitored error conditions of an associated bus.
19. The method of claim 15, wherein each corresponding sensor data record comprises an identification of a type of sensor data record.
20. The method of claim 19, wherein the type of sensor data record comprises at least one of a full sensor record and a compact sensor record.
US14/874,115 2006-01-13 2015-10-02 System and method for the automated generation of events within a server environment Abandoned US20160026661A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US14/874,115 US20160026661A1 (en) 2006-01-13 2015-10-02 System and method for the automated generation of events within a server environment

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US11/332,558 US9183106B2 (en) 2006-01-13 2006-01-13 System and method for the automated generation of events within a server environment
US14/874,115 US20160026661A1 (en) 2006-01-13 2015-10-02 System and method for the automated generation of events within a server environment

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US11/332,558 Continuation US9183106B2 (en) 2006-01-13 2006-01-13 System and method for the automated generation of events within a server environment

Publications (1)

Publication Number Publication Date
US20160026661A1 true US20160026661A1 (en) 2016-01-28

Family

ID=38264277

Family Applications (2)

Application Number Title Priority Date Filing Date
US11/332,558 Active 2030-03-15 US9183106B2 (en) 2006-01-13 2006-01-13 System and method for the automated generation of events within a server environment
US14/874,115 Abandoned US20160026661A1 (en) 2006-01-13 2015-10-02 System and method for the automated generation of events within a server environment

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US11/332,558 Active 2030-03-15 US9183106B2 (en) 2006-01-13 2006-01-13 System and method for the automated generation of events within a server environment

Country Status (1)

Country Link
US (2) US9183106B2 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180132369A1 (en) * 2016-11-08 2018-05-10 Samsung Electronics Co., Ltd. Storage medium accommodation device and electronic device including the same
CN108268473A (en) * 2016-12-30 2018-07-10 北京国双科技有限公司 A kind of log processing method and device

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7155641B2 (en) * 2003-05-15 2006-12-26 Microsoft Corporation System and method for monitoring the performance of a server
US8510422B2 (en) 2009-09-30 2013-08-13 Dell Products L.P. Systems and methods for extension of server management functions
US8832369B2 (en) 2010-10-27 2014-09-09 Dell Products, Lp Systems and methods for remote raid configuration in an embedded environment
US8751635B2 (en) 2010-12-13 2014-06-10 International Business Machines Corporation Monitoring sensors for systems management
US9146812B2 (en) 2012-02-03 2015-09-29 Dell Products Lp Systems and methods for out-of-band backup and restore of hardware profile information
CN103294679A (en) * 2012-02-24 2013-09-11 鸿富锦精密工业(深圳)有限公司 Electronic device provided with synchronous data storage function and method
US8838848B2 (en) * 2012-09-14 2014-09-16 Dell Products Lp Systems and methods for intelligent system profile unique data management
US10291582B2 (en) * 2015-01-08 2019-05-14 American Megatrends, Inc. System and method of supporting more than 256 sensors by intelligent platform management interface (IPMI) based server management controller
US10474519B2 (en) * 2015-09-17 2019-11-12 Netapp, Inc. Server fault analysis system using event logs
CN106294064A (en) * 2016-07-28 2017-01-04 浪潮电子信息产业股份有限公司 A kind of device and method that baseboard management controller attribute is set
GB2552974B (en) * 2016-08-16 2020-11-04 Imagination Tech Ltd String logging in an embedded system
CN106844176B (en) * 2017-01-23 2020-10-02 扬州万方电子技术有限责任公司 Sensor data integration processing method of multi-unit server
US10360173B2 (en) * 2017-07-26 2019-07-23 Dell Products L.P. Server event log storage and retrieval system
US10616280B2 (en) 2017-10-25 2020-04-07 Bank Of America Corporation Network security system with cognitive engine for dynamic automation
US10437984B2 (en) 2017-10-26 2019-10-08 Bank Of America Corporation Authentication protocol elevation triggering system
US10705948B2 (en) 2017-10-30 2020-07-07 Bank Of America Corporation Robotic process automation simulation of environment access for application migration
US10686684B2 (en) 2017-11-02 2020-06-16 Bank Of America Corporation Individual application flow isotope tagging within a network infrastructure
US11593450B2 (en) 2020-05-29 2023-02-28 Bank Of America Corporation System for dynamic generation of a transmission interface bridge for computing platforms

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120023367A1 (en) * 2010-07-20 2012-01-26 Oracle International Corporation Accurate fault status tracking of variable access sensors
US20120151007A1 (en) * 2010-12-13 2012-06-14 International Business Machines Corporation Monitoring Sensors For Systems Management
US9304511B2 (en) * 2012-07-18 2016-04-05 International Business Machines Corporation Sensor virtualization through cloud storage and retrieval mechanisms

Family Cites Families (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS5690219A (en) * 1979-12-24 1981-07-22 Yamato Scale Co Ltd Combination scale
US5764657A (en) * 1996-06-10 1998-06-09 Cypress Semiconductor Corp. Method and apparatus for generating an optimal test pattern for sequence detection
US6686838B1 (en) * 2000-09-06 2004-02-03 Xanboo Inc. Systems and methods for the automatic registration of devices
US6496790B1 (en) * 2000-09-29 2002-12-17 Intel Corporation Management of sensors in computer systems
US7113085B2 (en) * 2000-11-07 2006-09-26 Fisher-Rosemount Systems, Inc. Enhanced device alarms in a process control system
GB0100331D0 (en) * 2001-01-06 2001-02-14 Secr Defence Method of querying a structure of compressed data
US7051363B2 (en) * 2001-09-20 2006-05-23 Intel Corporation System and method for interfacing to different implementations of the intelligent platform management interface
US7069349B2 (en) * 2002-01-10 2006-06-27 Intel Corporation IPMI dual-domain controller
US6954466B1 (en) * 2002-03-05 2005-10-11 Modelware, Inc. Link-layer receiver
US6948008B2 (en) * 2002-03-12 2005-09-20 Intel Corporation System with redundant central management controllers
US6772099B2 (en) 2003-01-08 2004-08-03 Dell Products L.P. System and method for interpreting sensor data utilizing virtual sensors
US7188171B2 (en) * 2003-01-23 2007-03-06 Hewlett-Packard Development Company, L.P. Method and apparatus for software and hardware event monitoring and repair
US7966389B2 (en) 2003-04-22 2011-06-21 Hewlett-Packard Development Company, L.P. System and method for application programming interface for extended intelligent platform management
US7246156B2 (en) * 2003-06-09 2007-07-17 Industrial Defender, Inc. Method and computer program product for monitoring an industrial network
US7844866B2 (en) * 2007-10-02 2010-11-30 International Business Machines Corporation Mechanism to report operating system events on an intelligent platform management interface compliant server
JP4314463B2 (en) * 2003-09-05 2009-08-19 横河電機株式会社 Alarm management system
US7237086B1 (en) * 2003-11-26 2007-06-26 American Megatrends, Inc. Configuring a management module through a graphical user interface for use in a computer system
US20050137833A1 (en) * 2003-12-18 2005-06-23 Rajasekhar Sistla Automatic sensor integration
US7707282B1 (en) * 2004-06-29 2010-04-27 American Megatrends, Inc. Integrated network and management controller
US20060085690A1 (en) 2004-10-15 2006-04-20 Dell Products L.P. Method to chain events in a system event log
JP4389215B2 (en) * 2004-10-29 2009-12-24 日本電気株式会社 Component device monitoring system and component device monitoring method
KR100631761B1 (en) * 2005-01-04 2006-10-11 삼성전자주식회사 Management system and method using virtual SDR
US7340379B2 (en) * 2005-02-18 2008-03-04 Ans, Inc. Automated acquisition and notification system
US20070088816A1 (en) * 2005-10-14 2007-04-19 Dell Products L.P. System and method for monitoring the status of a bus in a server environment
US7555666B2 (en) * 2006-05-04 2009-06-30 Dell Products L.P. Power profiling application for managing power allocation in an information handling system
US8473429B2 (en) * 2008-07-10 2013-06-25 Samsung Electronics Co., Ltd. Managing personal digital assets over multiple devices
US7764682B2 (en) * 2008-07-15 2010-07-27 Unisys Corporation Mainframe computing system having virtual IPMI protocol
US7788363B2 (en) * 2008-07-15 2010-08-31 Unisys Corporation Secure communication over virtual IPMB of a mainframe computing system
TW201118596A (en) * 2009-11-18 2011-06-01 Inventec Corp Server management system
KR101302134B1 (en) * 2009-12-18 2013-08-30 한국전자통신연구원 Apparatus and method for providing hybrid sensor information

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120023367A1 (en) * 2010-07-20 2012-01-26 Oracle International Corporation Accurate fault status tracking of variable access sensors
US20120151007A1 (en) * 2010-12-13 2012-06-14 International Business Machines Corporation Monitoring Sensors For Systems Management
US9304511B2 (en) * 2012-07-18 2016-04-05 International Business Machines Corporation Sensor virtualization through cloud storage and retrieval mechanisms

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
http://www.intel.com/design/servers/ipmi/pdf/IPMIv2_0_rev1_0_E3_markup.pdf *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180132369A1 (en) * 2016-11-08 2018-05-10 Samsung Electronics Co., Ltd. Storage medium accommodation device and electronic device including the same
CN108268473A (en) * 2016-12-30 2018-07-10 北京国双科技有限公司 A kind of log processing method and device

Also Published As

Publication number Publication date
US20070168049A1 (en) 2007-07-19
US9183106B2 (en) 2015-11-10

Similar Documents

Publication Publication Date Title
US9183106B2 (en) System and method for the automated generation of events within a server environment
US20070088816A1 (en) System and method for monitoring the status of a bus in a server environment
CN100417081C (en) Method, system for checking and repairing a network configuration
US7487343B1 (en) Method and apparatus for boot image selection and recovery via a remote management module
US7269534B2 (en) Method to reduce IPMB traffic and improve performance for accessing sensor data
US7069349B2 (en) IPMI dual-domain controller
US9658914B2 (en) Troubleshooting system using device snapshots
US6460151B1 (en) System and method for predicting storage device failures
US7421490B2 (en) Uniquely identifying a crashed application and its environment
US10747732B2 (en) Virtual database administrator
US20080028264A1 (en) Detection and mitigation of disk failures
US8291063B2 (en) Method and apparatus for communicating between an agent and a remote management module in a processing system
US10541892B2 (en) System and method for monitoring, sensing and analytics of collaboration devices
US11416327B2 (en) System and method for intelligent firmware updates, firmware restore, device enable or disable based on telemetry data analytics, and diagnostic failure threshold for each firmware
US11847082B2 (en) System and method for secure management of non-registered components of an information handling system using a baseboard management controller
US20060085690A1 (en) Method to chain events in a system event log
CN102271054A (en) Bookmarks and performance history for network software deployment evaluation
US20110055397A1 (en) Systems and methods for abstracting storage views in a network of computing systems
CN102480396A (en) Server system and connection method thereof
US20230023869A1 (en) System and method for providing intelligent assistance using a warranty bot
WO2019241199A1 (en) System and method for predictive maintenance of networked devices
US10938821B2 (en) Remote access controller support registration system
US11841838B1 (en) Data schema compacting operation when performing a data schema mapping operation
Lundin et al. Significant advances in Cray system architecture for diagnostics, availability, resiliency and health
US11755443B2 (en) System for performing an autonomous widget operation

Legal Events

Date Code Title Description
AS Assignment

Owner name: DELL PRODUCTS L.P., TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:RAO, ANIL V.;MUGUNDA, CHANDRASEKHAR;REEL/FRAME:036719/0930

Effective date: 20051221

AS Assignment

Owner name: BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT, NO

Free format text: SUPPLEMENTAL PATENT SECURITY AGREEMENT - ABL;ASSIGNORS:DELL PRODUCTS L.P.;DELL SOFTWARE INC.;BOOMI, INC.;AND OTHERS;REEL/FRAME:037160/0171

Effective date: 20151124

Owner name: BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT, NORTH CAROLINA

Free format text: SUPPLEMENTAL PATENT SECURITY AGREEMENT - ABL;ASSIGNORS:DELL PRODUCTS L.P.;DELL SOFTWARE INC.;BOOMI, INC.;AND OTHERS;REEL/FRAME:037160/0171

Effective date: 20151124

Owner name: BANK OF AMERICA, N.A., AS COLLATERAL AGENT, NORTH CAROLINA

Free format text: SUPPLEMENTAL PATENT SECURITY AGREEMENT - TERM LOAN;ASSIGNORS:DELL PRODUCTS L.P.;DELL SOFTWARE INC.;BOOMI, INC.;AND OTHERS;REEL/FRAME:037160/0239

Effective date: 20151124

Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS FIRST LIEN COLLATERAL AGENT, TEXAS

Free format text: SUPPLEMENTAL PATENT SECURITY AGREEMENT - NOTES;ASSIGNORS:DELL PRODUCTS L.P.;DELL SOFTWARE INC.;BOOMI, INC.;AND OTHERS;REEL/FRAME:037160/0142

Effective date: 20151124

Owner name: BANK OF AMERICA, N.A., AS COLLATERAL AGENT, NORTH

Free format text: SUPPLEMENTAL PATENT SECURITY AGREEMENT - TERM LOAN;ASSIGNORS:DELL PRODUCTS L.P.;DELL SOFTWARE INC.;BOOMI, INC.;AND OTHERS;REEL/FRAME:037160/0239

Effective date: 20151124

Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., A

Free format text: SUPPLEMENTAL PATENT SECURITY AGREEMENT - NOTES;ASSIGNORS:DELL PRODUCTS L.P.;DELL SOFTWARE INC.;BOOMI, INC.;AND OTHERS;REEL/FRAME:037160/0142

Effective date: 20151124

AS Assignment

Owner name: DELL SOFTWARE INC., CALIFORNIA

Free format text: RELEASE OF REEL 037160 FRAME 0171 (ABL);ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:040017/0253

Effective date: 20160907

Owner name: DELL PRODUCTS L.P., TEXAS

Free format text: RELEASE OF REEL 037160 FRAME 0171 (ABL);ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:040017/0253

Effective date: 20160907

Owner name: WYSE TECHNOLOGY L.L.C., CALIFORNIA

Free format text: RELEASE OF REEL 037160 FRAME 0171 (ABL);ASSIGNOR:BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:040017/0253

Effective date: 20160907

AS Assignment

Owner name: WYSE TECHNOLOGY L.L.C., CALIFORNIA

Free format text: RELEASE OF REEL 037160 FRAME 0239 (TL);ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:040028/0115

Effective date: 20160907

Owner name: DELL PRODUCTS L.P., TEXAS

Free format text: RELEASE OF REEL 037160 FRAME 0142 (NOTE);ASSIGNOR:BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT;REEL/FRAME:040027/0812

Effective date: 20160907

Owner name: WYSE TECHNOLOGY L.L.C., CALIFORNIA

Free format text: RELEASE OF REEL 037160 FRAME 0142 (NOTE);ASSIGNOR:BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT;REEL/FRAME:040027/0812

Effective date: 20160907

Owner name: DELL PRODUCTS L.P., TEXAS

Free format text: RELEASE OF REEL 037160 FRAME 0239 (TL);ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:040028/0115

Effective date: 20160907

Owner name: DELL SOFTWARE INC., CALIFORNIA

Free format text: RELEASE OF REEL 037160 FRAME 0239 (TL);ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:040028/0115

Effective date: 20160907

Owner name: DELL SOFTWARE INC., CALIFORNIA

Free format text: RELEASE OF REEL 037160 FRAME 0142 (NOTE);ASSIGNOR:BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS COLLATERAL AGENT;REEL/FRAME:040027/0812

Effective date: 20160907

AS Assignment

Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT, TEXAS

Free format text: SECURITY AGREEMENT;ASSIGNORS:ASAP SOFTWARE EXPRESS, INC.;AVENTAIL LLC;CREDANT TECHNOLOGIES, INC.;AND OTHERS;REEL/FRAME:040136/0001

Effective date: 20160907

Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENT, NORTH CAROLINA

Free format text: SECURITY AGREEMENT;ASSIGNORS:ASAP SOFTWARE EXPRESS, INC.;AVENTAIL LLC;CREDANT TECHNOLOGIES, INC.;AND OTHERS;REEL/FRAME:040134/0001

Effective date: 20160907

Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLAT

Free format text: SECURITY AGREEMENT;ASSIGNORS:ASAP SOFTWARE EXPRESS, INC.;AVENTAIL LLC;CREDANT TECHNOLOGIES, INC.;AND OTHERS;REEL/FRAME:040134/0001

Effective date: 20160907

Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., A

Free format text: SECURITY AGREEMENT;ASSIGNORS:ASAP SOFTWARE EXPRESS, INC.;AVENTAIL LLC;CREDANT TECHNOLOGIES, INC.;AND OTHERS;REEL/FRAME:040136/0001

Effective date: 20160907

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: WYSE TECHNOLOGY L.L.C., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

Owner name: SCALEIO LLC, MASSACHUSETTS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

Owner name: MOZY, INC., WASHINGTON

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

Owner name: MAGINATICS LLC, CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

Owner name: FORCE10 NETWORKS, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

Owner name: EMC IP HOLDING COMPANY LLC, TEXAS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

Owner name: EMC CORPORATION, MASSACHUSETTS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

Owner name: DELL SYSTEMS CORPORATION, TEXAS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

Owner name: DELL SOFTWARE INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

Owner name: DELL PRODUCTS L.P., TEXAS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

Owner name: DELL MARKETING L.P., TEXAS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

Owner name: DELL INTERNATIONAL, L.L.C., TEXAS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

Owner name: DELL USA L.P., TEXAS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

Owner name: CREDANT TECHNOLOGIES, INC., TEXAS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

Owner name: AVENTAIL LLC, CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

Owner name: ASAP SOFTWARE EXPRESS, INC., ILLINOIS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001

Effective date: 20211101

AS Assignment

Owner name: SCALEIO LLC, MASSACHUSETTS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001

Effective date: 20220329

Owner name: EMC IP HOLDING COMPANY LLC (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MOZY, INC.), TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001

Effective date: 20220329

Owner name: EMC CORPORATION (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MAGINATICS LLC), MASSACHUSETTS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001

Effective date: 20220329

Owner name: DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO FORCE10 NETWORKS, INC. AND WYSE TECHNOLOGY L.L.C.), TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001

Effective date: 20220329

Owner name: DELL PRODUCTS L.P., TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001

Effective date: 20220329

Owner name: DELL INTERNATIONAL L.L.C., TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001

Effective date: 20220329

Owner name: DELL USA L.P., TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001

Effective date: 20220329

Owner name: DELL MARKETING L.P. (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO CREDANT TECHNOLOGIES, INC.), TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001

Effective date: 20220329

Owner name: DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO ASAP SOFTWARE EXPRESS, INC.), TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001

Effective date: 20220329

AS Assignment

Owner name: SCALEIO LLC, MASSACHUSETTS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001

Effective date: 20220329

Owner name: EMC IP HOLDING COMPANY LLC (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MOZY, INC.), TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001

Effective date: 20220329

Owner name: EMC CORPORATION (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MAGINATICS LLC), MASSACHUSETTS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001

Effective date: 20220329

Owner name: DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO FORCE10 NETWORKS, INC. AND WYSE TECHNOLOGY L.L.C.), TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001

Effective date: 20220329

Owner name: DELL PRODUCTS L.P., TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001

Effective date: 20220329

Owner name: DELL INTERNATIONAL L.L.C., TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001

Effective date: 20220329

Owner name: DELL USA L.P., TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001

Effective date: 20220329

Owner name: DELL MARKETING L.P. (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO CREDANT TECHNOLOGIES, INC.), TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001

Effective date: 20220329

Owner name: DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO ASAP SOFTWARE EXPRESS, INC.), TEXAS

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001

Effective date: 20220329