Dell AIM automates today's data center

Corralling the myriad physical and virtual servers that exist in IT shops of any size is a daunting task, and management tools that ease the burden are in hot demand. Naturally, all of the big guys are out to win this "adaptive infrastructure management" sweepstakes. HP threw its hat into this ring with HP BladeSystem Matrix in the first half of 2009, and Cisco entered the fray with Cisco UCS later in the year. Now it's Dell's turn.

Like HP and Cisco, Dell has been working on a way to bring all the disparate systems that comprise a data center under a single management umbrella, but with a twist on the HP and Cisco playbooks. The difference is that Dell is trying to remain as vendor-neutral as possible. Largely, it's succeeding.

[ Get the no-nonsense explanations and advice you need to take real advantage of cloud computing in InfoWorld editors' 21-page Cloud Computing Deep Dive PDF special report. | Stay up on the cloud with InfoWorld's Cloud Computing Report newsletter. ]

Dell's AIM (Advanced Infrastructure Manager) software used to be known by another name: Scalent V/OE (Virtual Operating Environment). (Dell began selling Scalent V/OE under the Dell brand in 2009 and finally acquired the company in July.) I last looked at the Scalent offering four years ago, and much has changed since then. Most significantly, Dell has been busy leveraging the Scalent solution throughout its hardware line, including its PowerConnect switches and EqualLogic iSCSI storage arrays. But Dell has also kept the hardware agnosticism of V/OE alive, which is a key differentiator to its main competition.

Whereas HP and Cisco are limited to their own servers, blade chassis, and switches, Dell's AIM can handle a wide variety of vendors at every level of the solution, from servers to Ethernet switches to storage arrays. Deploying HP BladeSystem Matrix or Cisco UCS requires the purchase and installation of their gear, but you can introduce AIM into an existing infrastructure comprising Dell, HP, IBM, Cisco, and other hardware. Not all AIM features are available across all vendors, and some tasks may require a degree of human interaction, but in most cases the main needs are met.

In a nutshell, it's possible to have a completely automated infrastructure using all Dell gear, or a nearly completely automated infrastructure using an array of hardware from other vendors. Either way, it's an impressive value proposition.

Dell AIM: Tale of the test

Like its HP and Cisco counterparts, Dell AIM has been built to turn all the knobs and flip all the switches necessary to deploy, migrate, extend, expand, repurpose, and recover a server infrastructure -- physical or virtual -- without the assistance of an administrator. Throughout my testing, I was impressed with the way AIM handled all the curveballs I threw in its direction.

Test Center Scorecard

Management

Performance

Reliability

Scalability

Interoperability

Value

Overall score

20%

20%

20%

20%

10%

10%

Dell AIM 3.3

8

9

9

9

10

9

8.9

Very Good

For example, I took a RHEL5 "persona" (AIM's term for a managed server image) and booted it on a Dell blade, moved it to an HP ProLiant 1U server, next to a VMware vSphere virtual machine, back to a blade, and then to a Microsoft Hyper-V instance. Throughout all those gyrations, the only problem encountered was when Hyper-V had an issue with the ACPI (Advanced Configuration and Power Interface) shutdown and had to be manually powered off -- a problem wholly owned by Hyper-V.

In other cases, I was able to trick AIM into unknown states, but it invariably landed on its feet, such as when I created a new persona from a blade that had a RHEL5 system installed on the local disk, then booted that persona on another blade. The second, target blade was a known AIM server resource, and thus was configured to PXE boot to pick up any new persona it had been assigned. However, I selected to boot from the local disk and thus brought up an identical server to the one I'd just created. In essence, there were two identical servers running, potentially with identical IP information, running identical services. To its credit, AIM threw a stream of notifications into the logs about the mysterious new server that had appeared and didn't attempt any half-cocked remedies.

The testbed I worked with was quite varied in terms of different hardware. There were a half-dozen Dell blades in a Dell PowerEdge M1000e chassis, a few HP ProLiant DL385 G5 servers, Dell PowerEdge R710 and R610 servers, and Cisco and Dell Ethernet switches, backed by a Dell EMC CX4 240 FC array and a Dell EqualLogic PS6000XV iSCSI array. It was a quite reasonable representation of a heterogeneous computing infrastructure, and AIM handled all the pieces fluidly.

AIM could ostensibly be used to manage multiple data centers in different locations, but Dell doesn't recommend it. Dell would have you tie AIM to a single data center, though you could accomplish an end run by deploying an AIM controller in each data center and using SAN replication to sync server LUNs between the two.

VMware vSphere shops should note that AIM currently has no understanding of VMware's vApp concept. AIM can't see the various dependencies among the virtual machines in a vApp and act accordingly. This is a minor quibble, but could be an important factor in some data centers.

While AIM is the centerpiece of Dell's adaptive infrastructure play, it's supported by two other wrap-around components in the Dell Virtual Integrated System (VIS). The new Dell VIS Self-Service Creator adds self-service provisioning to the mix, while the forthcoming Dell VIS Director will handle service monitoring, dependency mapping, capacity planning, and cost allocation for AIM-managed infrastructures. (See the sidebar, "InfoWorld preview: Dell's VIS vision takes shape.")

All in all, AIM is a remarkably complete and very ambitious tool, limited only by the present pain of initial integration and the occasional problem related to someone coloring too far outside the lines. It's largely an all-or-nothing solution, but the benefits provided -- namely, the ability to efficiently and easily move servers across a wide array of hardware and virtualization platforms -- and the degree of automation it brings even to heterogeneous infrastructures are impressive.

Dell AIM: Essentials and prerequisites

AIM provides a Linux-based controller that is tied into just about every aspect of a data center. It has hooks into the physical servers' out-of-band management processors (DRAC, ILOM, or ILO), and can manage blade chassis from a variety of vendors. It has hooks into the relevant portions of the switching infrastructure, be they Cisco, Dell, or Juniper switches, as well as storage switches from Brocade and Cisco. AIM can also reach out to Dell's own EqualLogic iSCSI SAN arrays to automatically provision storage.

Beyond the hardware, the solution also leverages agents running on each server instance, as well as agents installed on VMware ESX servers and other hypervisors. Further, the controller is tied into VMware's vCenter, Microsoft's Hyper-V, and Red Hat Xen virtualization frameworks.

As with any solution so ambitious, there are some up-front requirements. First and foremost is the need for the underlying network topology and configuration to be clean, well defined, and well designed. A normal implementation includes a central L2 network built specifically to allow the AIM controller to discover the various physical and virtual servers in its domain and manage them via DHCP and PXE. However, the controller will function in an L3 network as long as the requisite broadcast packet forwarding configurations are in place on the management VLAN.

As your production networks and VLANs are defined, they are displayed in an interactive network diagram, much like a live-action Visio layout, in the AIM GUI. This GUI drives everything that AIM does. To deploy a server persona -- a complete server profile including OS, applications, and hardware and networking requirements -- to a specific server node or virtual server farm, you simply drag it to a block on the diagram. The end result is that server personas can be run on either physical or virtual servers and remain connected to the networks they require, no matter where in the infrastructure they happen to reside. Personas can even be given minimum and maximum hardware rules, in which case AIM will try to run the persona on a high end system, but if none are available will boot it on a low end box.

AIM accomplishes all of this with the aforementioned switch interaction. When a server persona is booted on a physical server, AIM knows which switch and which switch ports that physical server is connected to, and it makes the requisite configuration changes on that switch to allow the correct networks to be presented to the persona. The switch can also be called upon to create VLAN trunks if required or to link aggregation configurations. On the storage front, if the persona is running on a Fibre Channel SAN, the server's HBAs will be configured to present the appropriate LUNs. If all that sounds like a very complex task, rest assured, it definitely is. But after initial configuration is done, the complexity is hidden beneath AIM's slick, Flash-based GUI.

The other side of that coin is virtualization. AIM is cognizant of the hypervisor configurations via hooks into the management frameworks of the three supported virtualization solutions and can make adjustments to the virtual switches as necessary. AIM can even present the correct VLANs to those hypervisors and ensure they're available to the personas that may be running as guests on those hypervisors.

There are also gradients of automation. For instance, you can instruct AIM to address any particular switch in read-only fashion, where it can gather information from the switch but is not allowed to make any modifications. In this case, when switching changes need to be made, AIM will simply alert admins about what alteration is required. It's also possible to prevent AIM from ever modifying certain switch ports, such as uplinks and so forth. In this way it's possible to implement AIM in baby steps rather than immediately handing over all the keys to the controller.

Dell AIM: Physical and Virtual views

Using the AIM GUI is simple once you get used to the different views and wrap your head around the constant need to save and confirm any actions you may direct. The two main views are Physical and Virtual. The former shows all the physical servers present and known to the controller, and breaks out virtual servers running on any hypervisors by displaying them within the container for the physical host they reside upon. All known Ethernet switches are displayed as well, as are the various physical links between servers and switches.

Server personas are pictured on each physical or virtual server instance they happen to be running on at the time. Clicking on them reveals relevant information for that persona in a sidebar, while contextual menus allow for common administration tasks to be run from this view.

The Virtual view shows each persona as a block with an icon denoting the OS installed and the name of the persona. Links between the servers across the various AIM-controlled networks are then drawn just as you'd expect, with a VLAN represented as a hub and the spokes heading out to the personas connected to that particular network. As with the Physical view, clicking and right-clicking on the personas permits further information displays and actions that can be performed on the servers.

The key here is that in Virtual view, there's no concept of whether the persona is running on a virtual machine or a physical server, or what particular hypervisor or type of physical server that may be. This is by design, as AIM tries to divorce the concept of a server from any specific piece of hardware or software. It's simply a server instance.

Of course there are other views as well, which are largely informational, such as the event log, and a dashboard view, which can show each rack, the personas currently running on it, as well as statistical overviews of the whole infrastructure.

One element that doesn't exist in AIM itself is provisioning new servers. AIM is strictly focused on managing known resources, not creating new resources. Dell's plan for handling service provisioning is through the use of the new VIS Self-Service Creator. Without Creator, adding servers to an AIM-based infrastructure is left up to the admin. All a server needs to be included in the AIM umbrella is to be discovered by the AIM controller, and this can be accomplished with or without running an agent.

An easy way to make a server discoverable would be to leverage templates or cloning on a virtualization hypervisor. For instance, a VMware server template could be created that contains all the requisite AIM agents, and creating a new VM from that template and booting it up would automatically cause that server persona to be manageable by AIM. Of course, building a physical server and running the AIM agents is also an option.

Dell AIM: Personas in motion

1 2 Page
FREE Computerworld Insider Guide: IT Certification Study Tips
Join the discussion
Be the first to comment on this article. Our Commenting Policies