I just face palmed reading that first paragraph:
LVM RAID support
One of the biggest features of blivet-gui 2.0 is support of LVM RAID. When adding a new LV, you can now choose RAID level for it. LVM supports the same RAID types mdraid does but you can choose different level for every logical volume so it's more flexible than using LVM on top of an mdraid.
LVM still uses md raid, just like you would normally.
That said, people like their gui for all the things, why not have yet another tool to manage everything.
The IPMI from SuperMicro has a web interface where you can do user maintenance for ipmi, remote control of hosts, record video(for recording other people's access to this system i guess), from there you can set Serial over Lan options. Here is the base screenshot
It does use java for some things still. There are also functions here i have no clue what they are. No idea what RAKP Protocol Setting is, but it is there.
Here is a nice feature, it shows how much power your host is using. It changes every few seconds.
It was amazing that Scott found it so fast. I was on the Windows side of things. Inside Windows they were using the iSCSI initiator to connect to the FreeNAS. All the sudden Windows would just log a ton of iSCSI events and go down.
I looked up the events and most people resolved them by putting the iSCSI traffic on a separate NIC. This happened two days in a row at about the same time each day. I was looking at snapshot, backup, etc times when Scott found it in the FreeNAS logs.
Why are you using FreeNAS? Every conversation ever with someone asking should I use FreeNAS or something else for my storage device, @scottalanmiller has always had the same answer. Use CentOS, or purchase a Synology.
So where did this come up that you are on a FreeNAS box?
Because we support customers. That's how customers work.
SuperMicro is beginning to make the lines between Tier 1 and Tier 2 blurry as they increase their level of engineering on their products and begin to offer more and more enterprise class support for their products.
As an update, CERT even put out an advisory to have folks not expose their management interface: http://www.us-cert.gov/ncas/alerts/TA13-207A. I'd like to suggest taking it a step further. Other management interfaces, such as hypervisors, web control panels, SSH logins, etc. should not be exposed to the Internet.
Looks like your connection to MangoLassi was lost, please wait while we try to reconnect.