This is an idrac management utility
Right now, it only scans address ranges and spits out JSON for the dracs it finds.
Example:
$ ./idracula -u root -p 'password' -scan '192.168.128.1-192.168.128.254'
yields (without logging output):
{
"nodes": [
{
"pm_type": "pxe_drac",
"pm_user": "root",
"pm_password": "password",
"pm_addr": "192.168.128.24",
"mac": [
"d4:ae:52:89:61:ed",
"d4:ae:52:89:61:ee",
"d4:ae:52:89:61:ef",
"d4:ae:52:89:61:f0"
],
"cpu": "12",
"memory": "98304",
"disk": "500",
"arch": "x86_64"
},
{
"pm_type": "pxe_drac",
"pm_user": "root",
"pm_password": "password",
"pm_addr": "192.168.128.21",
"mac": [
"a0:36:9f:52:a2:d8",
"a0:36:9f:52:a2:da",
"ec:f4:bb:cd:3b:60",
"ec:f4:bb:cd:3b:62",
"ec:f4:bb:cd:3b:64",
"ec:f4:bb:cd:3b:65"
],
"cpu": "16",
"memory": "131072",
"disk": "500",
"arch": "x86_64"
},
{
"pm_type": "pxe_drac",
"pm_user": "root",
"pm_password": "password",
"pm_addr": "192.168.128.31",
"mac": [
"a0:36:9f:53:13:78",
"a0:36:9f:53:13:7a",
"ec:f4:bb:cf:ed:98",
"ec:f4:bb:cf:ed:9a",
"ec:f4:bb:cf:ed:9c",
"ec:f4:bb:cf:ed:9d"
],
"cpu": "20",
"memory": "98304",
"disk": "1200",
"arch": "x86_64"
}
]
}