A Linux Foundation Project
IBM POWER8 CPU Die
Project 02 · Open Management Console

Open Management Console
Project Charter

An open source replacement for the IBM Hardware Management Console — providing full LPAR lifecycle management, live partition migration, hardware monitoring, and a REST API across a POWER estate, with complete source auditability.

StatusForming — seeking Founding Members
PhasePre-charter / Architecture
LicenseApache 2.0
GovernanceOPF Technical Steering Committee
IBM POWER8 CPU Die

Executive Summary

Enterprise POWER deployments depend on a hardware management console to manage logical partitions, hardware resources, and system firmware across one or more servers. Today that function is served by a closed appliance — one that does not permit user software installation, command-line access, or source-level audit — creating a single point of vendor dependency in otherwise well-understood POWER infrastructure.

Regulated industries increasingly require source-level auditability of all management plane software. No open source management console for POWER-class systems currently exists.

The Open Management Console (OpenHMC) project fills that gap: a full-featured LPAR management platform built on libvirt, OpenBMC, and standard Linux infrastructure — capable of managing a POWER estate on OPAL-based systems, with a documented API surface designed for multi-vendor extensibility.

Management Console Capabilities

OpenHMC is scoped to provide feature parity with today's enterprise management console requirements:

  • Partition lifecycle management: Create, modify, start, stop, and delete logical partitions (LPARs). Configure CPU, memory, and I/O resources per partition.
  • Live Partition Mobility (LPM): Migrate running LPARs between physical servers with no workload interruption. This is a primary PowerVM enterprise differentiator.
  • Resource monitoring: Real-time CPU utilization, memory usage, I/O throughput, and thermal/power metrics per LPAR and per physical system.
  • Firmware management: Coordinate firmware updates across managed systems, including rolling updates with no downtime.
  • Hardware service events: Receive and display hardware errors from service processors; initiate vendor service requests; track hardware replacement history.
  • Capacity planning: Shared processor pool management, workload resource controls, and utilization reporting.
  • REST API and CLI: REST API (HMC Web Services API) and SSH CLI for automation integration. Ansible, Terraform, and IBM Cloud management tools consume these APIs.

Architecture

OpenHMC is designed as a layered system, with each layer independently replaceable and auditable:

Web UI Cockpit framework · React · LPAR dashboard, live topology view
REST API Layer FastAPI / OpenAPI spec · HMC Web Services API-compatible endpoints
Partition Management Engine libvirt on KVM/OPAL · LPAR lifecycle, live migration, resource pools
Hardware Abstraction Layer OpenBMC Redfish API · FSP protocol adapter · OPAL event bus
Managed Hardware OpenPOWER OPAL-based systems · (IBM FSP systems via adapter, Phase 2)

Feature Parity Target

FeatureIBM HMCOpenHMC v1.0OpenHMC v2.0
LPAR create / modify / delete
CPU and memory allocation
Live Partition MobilityPhase 2
Shared processor pools
Hardware monitoring
Firmware update management
Hardware service events
REST API (HMC-compatible)
Ansible/Terraform integration
AIX / IBM i guest managementOut of scopeOut of scope
Multi-system federationPhase 2
Auditable source code
Multi-foundry deployable

AIX and IBM i guest management requires proprietary PowerVM firmware. OpenHMC targets Linux guests on OPAL-based systems (including the OpenCore processor). Adapter work for IBM FSP-based commercial systems is Phase 2.

Deliverables

Architecture Specification

Published API design, hardware abstraction layer spec, and libvirt extension requirements. Month 4.

OpenHMC Alpha

LPAR lifecycle management, CPU/memory allocation, power control, and REST API on OPAL systems. Month 12.

Web UI

Cockpit-based dashboard: LPAR topology view, resource utilization charts, hardware event log. Month 16.

Live Migration Prototype

KVM live migration across OPAL-based hosts, coordinated through OpenHMC. Month 20.

OpenHMC 1.0 GA

Full v1.0 feature set, third-party security audit, Ansible collection, Terraform provider. Month 28.

OpenHMC 2.0 — Multi-Site

Federation across multiple managed systems, Live Partition Mobility GA, capacity planning reports. Month 36.

Regulatory Compliance Value

Regulated industries face a fundamental conflict: they are required by frameworks including DORA (Digital Operational Resilience Act), NIS2, FFIEC IT Examination Handbooks, and emerging national AI governance standards to demonstrate control over their critical infrastructure software stack. The IBM HMC — a closed appliance managing their most critical compute systems — cannot satisfy source-level auditability requirements that auditors are increasingly raising.

OpenHMC is designed with regulatory compliance as a primary requirement, not an afterthought:

  • Full source code availability for independent audit at any time
  • Signed software bill of materials (SBOM) for every release
  • Cryptographically verifiable build process (reproducible builds target)
  • Structured audit log: every management action attributed, timestamped, and tamper-evident
  • Role-based access control with separation of duties between partition operators, hardware administrators, and security officers

Governance

OpenHMC operates under OPF project governance with a Technical Steering Committee seated from Founding Members and at-large contributors. The project will establish an Operations Advisory Board of regulated industry representatives to guide compliance feature prioritization — ensuring the project stays aligned with what auditors, risk officers, and regulators are actually asking for.

Milestones

  • Month 1TSC formed. Architecture working group kickoff. HMC API compatibility analysis begun.
  • Month 4Architecture specification v1.0 published. Hardware abstraction layer design ratified. Redfish integration design complete.
  • Month 8Core partition management engine operational. REST API endpoints for LPAR lifecycle passing integration tests.
  • Month 12Alpha release: LPAR create/start/stop/modify, CPU and memory control, hardware monitoring via OpenFSP integration.
  • Month 16Web UI beta. Cockpit dashboard with real-time LPAR topology, utilization, and event log.
  • Month 20Live migration prototype demonstrated. Ansible collection for OpenHMC published.
  • Month 24Third-party security audit. SBOM pipeline automated. Terraform provider published.
  • Month 28OpenHMC 1.0 GA. Founding member production deployments begin.
  • Month 36OpenHMC 2.0: Live Partition Mobility GA, multi-system federation, capacity planning module.