JetKVM is much like nanoKVM but a slightly polised version.
What is JetKVM?
JetKVM is a high-performance, open-source KVM over IP (Keyboard, Video, Mouse) solution designed for efficient remote management of computers, servers, and workstations. Whether you’re dealing with boot failures, installing a new operating system, adjusting BIOS settings, or simply taking control of a machine from afar, JetKVM provides the tools to get it done effectively.
As far as I know, these Jets are not available for retail yet, but can be bought via their kickstarter.
Link to the source code: https://github.com/jetkvm/kvm
Link to their website: https://jetkvm.com/
Link to their kickstarter: https://www.kickstarter.com/projects/jetkvm/
Picture of a JetKVM mounted in a homelab, credits to Jeff Gerling.
Sorry if this question is easily answerable by reading and I’m just missing it. But I genuinely don’t really understand what this product does or what its use case is. Is it a usb stick that gives you kvm access to a computer from a remote location? Like call up someone in another building ‘hey plug the jet into tower X so I can remote in?’ In which case how is this better/worse/just different from a software solution like Barrier? Sorry if I’m being borderline deliberately obtuse but the website gives no info on the home page at all.
Edit: I think I understand better, digging into it more. But if anyone has an ELI5 I would greatly appreciate it.
KVM also allows access if the machine isn’t booted up, so like mounting remote recovery images, re-installing an OS, and changing BIOS settings and that kind of thing.
I love this. I have a box I’ve been wanting to move to a family members place because they have fiber and I don’t. They’re heavy users of the plex server I have on there, so they’re happy to host it, but if I ever had issues around anything boot related I’d be down until I could physically get there.
This would also be awesome for troubleshooting some RasPi stuff where I kind of want the DE every now and then but mostly let it run headless.
Yeah it’s great for that kind of thing!
Enterprise servers often have it built in, but for everything else this is priced really well.
@Lemjukes @Sunny It’s a KVM that you access over IP. It’s physically plugged into a machine’s HDMI and USB ports so, unlike software solutions, it can be used to access the BIOS/UEFI and system functions prior to hitting the desktop (like login managers and recovery consoles), and allows you to boot other operating systems and the like. It can also act as a PXE host for loading disk images, issue Wake On LAN to its connected machine, and likely a bunch of other convenience functions.
Ooooooh! Ok that’s really cool. Thank you so much for taking the time to explain that!
ELI5:
It lets you remotely control a computer.
It’s different (arguably better) than remote connection software because it is a separate device that basically just forwards your keyboard & mouse inputs. This means that you can control the remote device even if it’s powered off or not able to boot properly, and you can configure the BIOS remotely too.
You could call someone on-site to connect the KVM to a server, but KVMs, while expensive by regular person standards, are pretty cheap as enterprise hardware goes. So some organizations just keep separate KVMs plugged into all critical hardware all the time.
Worth noting here that KVMs are potentially a quite high security risk.
Their website is probably light on details because “KVM” is fairly common industry parlance. If you normally work with this stuff then just hearing those 3 letters tells you most of what you need to know.
Edit: high, not Hugh
You can put them behind a VPN and they should be relatively secure. I definitely wouldn’t expose it on the web directly, however.
Sure, as long as the VPN itself is secure. Strong passwords/keys, etc. A VPN itself can be a potential security risk, as if it’s compromised an attacker can tunnel traffic directly into a network straight past a firewall.
The risks can definitely be mitigated, but if someone’s asking for an ELI5 on KVMs, then it may be best to stay away until they have a better understanding of IT infrastructure altogether.
As for food functionality it is very comparable to software remote control of a computer. There are 3 key features that stand out:
Edit: Because this is essentially full access to the machine as if you where physically at it, it should be considered a security risk. Not saying that you need to be scared of it, but you should be aware of the risk and protect it from unauthorized access.
If I understand correctly, it’s kinda like an add-on IPMI, in the sense that it doesn’t rely on the target computer’s OS to be running to work.
I have a similar project called PiKVM. I can remotely turn on my computer from a full shutdown, navigate the BIOS to select an OS, and log in, after which I typically switch to a software-based Remote Desktop which is more performant. But you can’t power on a computer and navigate a BIOS with a software solution.
ELI5
Remote KVM lets you access the machine as if you’re in front of it, including pre-boot / BIOS / BSoD’s / Etc (when software isn’t / can’t run) because the device (usually) connects to the computer’s USB/VGA port.
The whole idea is you don’t need anyone local. You leave it plugged in 24/7 so that’s it’s accessible remotely, as needed.
For me, they’re also useful because a lot of my jobs don’t allow remote software to be installed on laptops, so I use something like this to be able to remote in still.