Sherlock Diagnosing Problems in the Enterprise
|
|
- Duane York
- 5 years ago
- Views:
Transcription
1 Sherlock Diagnosing Problems in the Enterprise Srikanth Kandula Victor Bahl, Ranveer Chandra, Albert Greenberg, David Maltz, Ming Zhang Enterprise Management: Between a Rock and a Hard Place Manageability Stick with tried software, never change infrastructure Cheap Upgrades are hard, forget about innovation! Usability Keep pace with technology Expensive IT staff in 1000s 72% of MS IT budget is staff Reliability Issues Cost of down-time 1
2 Well-Managed Enterprises Still Unreliable Fraction Of Requests Response time of a Web server (ms) 85% Normal 10% Troubled % Down 10% responses take up to 10x longer than normal How do we manage evolving enterprise networks? Well-Managed Enterprises Still Unreliable Fraction Of Requests Response time of a Web server (ms) 85% Normal ~10% 10% Troubled 0.7% Down How 10% do responses we manage take evolving up to 10x enterprise longer than networks? normal 2
3 Current Tools Miss the Forest for the Trees Authentication Server DNS Web Server SQL Backend Monitor Individual Boxes or Protocols Flood admin with alerts Don t convey the end-to-end picture But, the primary goal of of enterprise management is is to to diagnose user-perceived problems! Client Sherlock Instead of looking at the nitty-gritty of individual components, use an end-to-end approach that focuses on user problems 3
4 Challenges for the End-to-End Approach Don t know what user s performance depends on Challenges for the End-to-End Approach E.g., Web Connection DNS Auth. Server Web Server SQL Backend Don t know what user s performance depends on Dependencies are distributed Dependencies are non-deterministic Don t know which dependency is causing the problem Server CPU 70%, link dropped 10 packets, but which affected user? Client 4
5 Sherlock s Contributions Passively infers dependencies from logs Builds a unified dependency graph incorporating network, server and application dependencies Diagnoses user problems in the enterprise Deployed in a part of the Microsoft Enterprise Sherlock s Architecture 5
6 Sherlock s Architecture Network Dependency Graph Servers + User Observations Clients Inference Engine Web2 30ms Web1 File1 1000ms Timeout = List Troubled Components Sherlock works for various client-server applications Sherlock s Architecture Network Dependency Graph Servers + User Observations Clients Inference Engine = List of Suspicious Components Sherlock works for various client-server applications 6
7 DNS Video Server Data Store How do you automatically learn such distributed dependencies? Strawman: Instrument all applications and libraries Not Practical Sherlock exploits timing info My Client talks to B Dt My Client talks to C Time If talks to B, whenever talks to C Dependent Connections 7
8 Strawman: Instrument all applications and libraries Not Practical Sherlock exploits timing info B B B B C BB B Dt False Dependence Time If talks to B, whenever talks to C Dependent Connections Strawman: Instrument all applications and libraries Not Practical Sherlock exploits timing info B C Dt Inter-access time Dependent iff Dt << Inter-access time If talks to B, whenever talks to C B Time Dependent Connections As long as this occurs with probability higher than chance 8
9 Sherlock s Algorithm to Infer Dependencies Infer dependent connections from timing Video Store DNS Dependency Graph Sherlock s Algorithm to Infer Dependencies Infer dependent connections from timing Infer topology from Traceroutes & configurations Video Store DNS Bill s Client Video Store DNS Dependency Graph Billfi DNS Bill Video Video fistore Bill Watches Video Works with legacy applications Adapts to changing conditions 9
10 But hard dependencies are not enough But hard dependencies are not enough DNS Bill s Client Video Store Video fistore Billfi DNS Bill Video p3 p1=10% p2=100% Bill watches Video If Bill caches server s IP DNS down but Bill gets video Need Probabilities Sherlock uses the frequency with which a dependence occurs in logs as its edge probability 10
11 How do we use the dependency graph to diagnose user problems? Diagnosing User Problems DNS Bill s Client Video Store Billfi DNS Bill Video Video fistore Bill Watches Video Which components caused the problem? Need to disambiguate!! 11
12 Diagnosing User Problems Sales DNS Bill s Client Video Store Video2 Billfi Sales Billfi DNS Video fistore Video2 fistore Bill Video Paul Video2 Bill Sees Sales Bill Watches Video Paul Watches Video2 Which Disambiguate components by caused correlating the problem? Use Across correlation logs to from disambiguate!! same client Across clients Prefer simpler explanations Will Correlation Scale? 12
13 Will Correlation Scale? Corporate Core Building Network Microsoft Internal Network O(100,000) client desktops O(10,000) servers O(10,000) apps/services O(10,000) network devices Campus Core Data Center Dependency Graph is Huge Will Correlation Scale? Can we evaluate all combinations of component failures? The number of fault combinations is exponential! Impossible to compute! 13
14 Scalable Algorithm to Correlate Only a few faults happen concurrently But how many is few? Evaluate enough to cover 99.9% of faults For MS network, at most 2 concurrent faults 99.9% accurate Exponential Polynomial Scalable Algorithm to Correlate Only a few faults happen concurrently But how many is few? Only few nodes change state Evaluate enough to cover 99.9% of faults For MS network, at most 2 concurrent faults 99.9% accurate Exponential Polynomial 14
15 Scalable Algorithm to Correlate Only a few faults happen concurrently But how many is few? Only few nodes change state Evaluate enough to cover 99.9% of faults For MS network, at most 2 concurrent faults 99.9% accurate Re-evaluate only if an ancestor changes state Exponential Polynomial Reduces the cost of of evaluating a case by by 30x-70x Results 15
16 Experimental Setup Evaluated on the Microsoft enterprise network Monitored 23 clients, 40 production servers for 3 weeks Clients are at MSR Redmond Extra host on server s Ethernet logs packets Busy, operational network Main Intranet Web site and software distribution file server Load-balancing front-ends Many paths to the data-center What Do Web Dependencies in the MS Enterprise Look Like? 16
17 What Do Web Dependencies in the MS Enterprise Look Like? Auth. Server Client Accesses Portal What Do Web Dependencies in the MS Enterprise Look Like? Auth. Server Client Accesses Portal 17
18 What Do Web Dependencies in the MS Enterprise Look Like? Auth. Server Client Accesses Portal Client Accesses Sales Sherlock discovers complex dependencies of of real apps. What Do File-Server Dependencies Look Like? File Server 100% Auth. Server WINS DNS Proxy 10% 6% 5% 2% Backend Server 1 8% 5% 1%.3% Backend Server 2 Backend Server 3 Backend Server 4 Client Accesses Software Distribution Server Sherlock works for many client-server applications 18
19 Sherlock Identifies Causes of Poor Performance Dependency Graph: 2565 nodes; 358 components that can fail Component Index Time (days) 87% of of problems localized to to components Sherlock Identifies Causes of Poor Performance Inference Graph: 2565 nodes; 358 components that can fail Component Index Time (days) Corroborated the three significant faults 19
20 Sherlock Goes Beyond Traditional Tools SNMP-reported utilization on a link flagged by Sherlock Problems coincide with spikes Sherlock identifies the troubled link but SNMP cannot! Comparing with Alternatives Dataset of known (fault, observations) pairs Accuracy = 1 (Prob. False Positives + Prob. False Negatives) SCORE (non-probabilistic) 53% 20
21 Comparing with Alternatives Dataset of known (fault, observations) pairs Accuracy = 1 (Prob. False Positives + Prob. False Negatives) Shrink (probabilistic) SCORE (non-probabilistic) 53% 59% Comparing with Alternatives Dataset of known (fault, observations) pairs Accuracy = 1 (Prob. False Positives + Prob. False Negatives) Sherlock 91% Shrink Shrink (probabilistic) SCORE (non-probabilistic) 53% 59% Sherlock outperforms existing tools! 21
22 Time to Localize Faults Experiments From Inference Graph, create scaled versions Time to to Localize faults is is roughly linear! Sensitivity to Errors in the Inference Graph Perturb Inference Graph in Several ways Robust up to to 10% error in in dependencies Can run off auto-generated graphs 22
23 Conclusions Sherlock passively infers network-wide dependencies from logs and traceroutes It diagnoses faults by correlating user observations It works at scale! Experiments in Microsoft s Network show Finds faults missed by existing tools like SNMP Is more accurate than prior techniques Steps towards a Microsoft product Sherlock System A Authentication Servers A Web Servers A Exchange Inference Engine Cluster A A A Client Machines 23
24 Ongoing Work Helping MS product groups that maintain business apps like payroll Integrating automated dependency inference into MS product MOM Sherlock System MOM Scripts SMS A Active Directory A MSWeb A Exchange Inference Engine Cluster SMARTS SNMP NetFlow A A A Client Machines 24
25 Challenge 1: At what level of abstraction should dependencies be modeled so as to be feasibly automated client B DNS Server SQL Server client A web front 1 client A Root causes DNS Server A DNS web front 1 SQL Server WF1 SQL A WF1 User Experience A WF1 25
26 The Inference Graph DNS Web1 SQL Root Causes Computer (IP address) Service (IP address, port pair) Routers, Links Root causes Client A DNS Web1 SQL Meta-nodes A DNS A Web1 Web1 SQL Client A User Experience A Web1 Challenge 2: Non-deterministic dependencies Model allows significant re-use of nodes DNS Web1 SQL Client A Client B DNS Web1 SQL Web1 SQL Client A Client B A DNS B DNS A Web1 A Web1 B Web1 B Web1 26
27 The Inference Graph DNS Web1 SQL Root Causes Computer (IP address) Service (IP address, port pair) Routers, Links Root causes Client A DNS Web1 SQL Meta-nodes A DNS A Web1 Web1 SQL Client A User Experience A Web1 Challenge 4: How to find dependent connections without deep packet inspection? DNS Web1 SQL Client request depends on DNS Server response depends on SQL backend Host A Packet from/to B Δt Packet from/to C time Idea If host A talks to host B, whenever it talks to host C, then the two connections are dependent Client A Algorithm Given a pair A C, find all other servers that are accessed by A 27
28 Experimental Setup Sherlock Agents on Clients Local Servers Monitored 40 production servers for 3 weeks Intranet Portal and Software Dist. File-server Load-balancing and ECMP 28
10 BEST PRACTICES TO STREAMLINE NETWORK MONITORING. By: Vinod Mohan
10 BEST PRACTICES TO STREAMLINE NETWORK MONITORING By: Vinod Mohan 10 Best Practices to Streamline Network Monitoring Introduction As a network admin, you are tasked with keeping your organization s network
More informationLecture 16: Data Center Network Architectures
MIT 6.829: Computer Networks Fall 2017 Lecture 16: Data Center Network Architectures Scribe: Alex Lombardi, Danielle Olson, Nicholas Selby 1 Background on Data Centers Computing, storage, and networking
More informationImproving Your Network Defense. Joel M Snyder Senior Partner Opus One
Improving Your Network Defense Joel M Snyder Senior Partner Opus One jms@opus1.com Agenda: Improving Your Network Defense What s the Thesis? Intrusion Detection Collecting Information Enabling Features
More informationLEARN READ ON TO MORE ABOUT:
For a complete picture of what s going on in your network, look beyond the network itself to correlate events in applications, databases, and middleware. READ ON TO LEARN MORE ABOUT: The larger and more
More informationAT&T SD-WAN Network Based service quick start guide
AT&T SD-WAN Network Based service quick start guide After you order your AT&T SD-WAN Network Based service, you can: Create administrator accounts Log in to the SD-WAN orchestrator Configure business policy
More informationWeb Serving Architectures
Web Serving Architectures Paul Dantzig IBM Global Services 2000 without the express written consent of the IBM Corporation is prohibited Contents Defining the Problem e-business Solutions e-business Architectures
More informationGetting started with System Center Essentials 2007
At a glance: Installing and upgrading Configuring Essentials 2007 Troubleshooting steps Getting started with System Center Essentials 2007 David Mills System Center Essentials 2007 is a new IT management
More informationSaaS Providers. ThousandEyes for. Summary
USE CASE ThousandEyes for SaaS Providers Summary With Software-as-a-Service (SaaS) applications rapidly replacing onpremise solutions, the onus of ensuring a great user experience for these applications
More informationPresentation by Brett Meyer
Presentation by Brett Meyer Traditional AV Software Problem 1: Signature generation Signature based detection model Sheer volume of new threats limits number of signatures created by one vendor Not good
More informationCato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief
Cato Cloud Software-defined and cloud-based secure enterprise network Solution Brief Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise Cato Networks: Software-defined and Cloud-based
More informationNetwork Management Functions - Fault. Network Management
Network Management Functions - Fault Network Management 1 Lectures Schedule Week Week 1 Topic Computer Networks - Network Management Architectures & Applications Week 2 Network Management Standards Architectures
More informationDATASHEET. Advanced 6-Port Gigabit VPN Network Router. Model: ER-6. Sophisticated Routing Features. Advanced Security, Monitoring, and Management
Data Center & Cloud Computing DATASHEET Advanced 6-Port Gigabit VPN Network Router Model: ER-6 Sophisticated Routing Features Advanced Security, Monitoring, and Management High-Performance Gigabit Ports
More informationDiagnostics in Testing and Performance Engineering
Diagnostics in Testing and Performance Engineering This document talks about importance of diagnostics in application testing and performance engineering space. Here are some of the diagnostics best practices
More informationDetailed diagnosis in enterprise networks. Network diagnosis
Detailed diagnosis in enterprise networks Srikanth Kandula, Ratul Mahajan, Patrick Verkaik (UCSD), Sharad Agarwal, Jitu Padhye, Victor Bahl Network diagnosis Explaining faulty behavior 1 Current landscape
More informationIpswitch: The New way of Network Monitoring and how to provide managed services to its customers
BRKPAR-2333 Ipswitch: The New way of Network Monitoring and how to provide managed services to its customers Paolo Ferrari, Senior Director Sales Southern Europe, Ipswitch, Inc. WhatsUp Gold Jan 2018 Agenda
More informationManaging Voice Services VoiceCon March 7, Brian Gollaher Director, Product Management CA, Inc.
Managing Voice Services VoiceCon March 7, 2007 Brian Gollaher Director, Product Management CA, Inc. What is Voice Management? Service Availability Management Network Management - Network Fault & Performance
More informationWho am I? Identity Product Group, CXP Team. Premier Field Engineer. SANS STI Student GWAPT, GCIA, GCIH, GCWN, GMOB
@markmorow Who am I? Identity Product Group, CXP Team Premier Field Engineer SANS STI Student GWAPT, GCIA, GCIH, GCWN, GMOB Under the hood: Multiple backend services and hybrid components Hybrid Components
More informationCisco ISR G2 Management Overview
Cisco ISR G2 Management Overview Introduction The new Cisco Integrated Services Routers Generation 2 (ISR G2) Family of routers delivers the borderless network that can transform the branch office and
More informationROYAL INSTITUTE OF INFORMATION & MANAGEMENT
ROYAL INSTITUTE OF INFORMATION & MANAGEMENT MCSE SYLLABUS Course Contents : Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003: Managing Users, Computers and Groups. Configure access
More informationWho am I? Identity Product Group, CXP Team. Premier Field Engineer. SANS STI Student GWAPT, GCIA, GCIH, GCWN, GMOB
@markmorow Who am I? Identity Product Group, CXP Team Premier Field Engineer SANS STI Student GWAPT, GCIA, GCIH, GCWN, GMOB Active Directory Domain Services On-premises App Server Validate credentials
More informationCisco Prime for Enterprise Innovative Network Management
Cisco Prime for Enterprise Innovative Network Management Session ID 1 Agenda Network Management Challenges Cisco Prime for Enterprise Overview Service-Centric Foundation Common Operational Attributes Benefits
More informationMicrosoft Microsoft TS: MS Internet Security & Acceleration Server 2006, Configuring. Practice Test. Version:
Microsoft 70-351 Microsoft 70-351 TS: MS Internet Security & Acceleration Server 2006, Configuring Practice Test Version: 2.2 QUESTION NO: 1 Your network consists of a single Active Directory domain named
More informationBarry D. Lamkin Executive IT Specialist Capitalware's MQ Technical Conference v
What happened to my Transaction? Barry D. Lamkin Executive IT Specialist blamkin@us.ibm.com Transaction Tracking - APM Transaction Tracking is a major part of Application Performance Monitoring To ensure
More informationNetPilot: Automating Datacenter Network Failure Mitigation
NetPilot: Automating Datacenter Network Failure Mitigation Xin Wu, Daniel Turner, Chao-Chih Chen, David A. Maltz, Xiaowei Yang, Lihua Yuan, Ming Zhang Failures are Common and Harmful Network failures are
More informationDemocratically Finding The Cause of Packet Drops
Democratically Finding The Cause of Packet Drops Behnaz Arzani, Selim Ciraci, Luiz Chamon, Yibo Zhu, Hongqiang (Harry) Liu, Jitu Padhye, Geoff Outhred, Boon Thau Loo 1 Marple- SigComm 2017 Sherlock- SigComm
More information2610:f8:ffff:2010:04:13:0085:1
2610:f8:ffff:2010:04:13:0085:1 Qwest IPv6 Implementation Experience Shawn Carroll 2610:f8:ffff:2010:04:13:0085:55 Previous Qwest Implementation Work Obtained 6bone Pseudo Next Level Aggregator (pnla) from
More informationW H I T E P A P E R : O P E N. V P N C L O U D. Implementing A Secure OpenVPN Cloud
W H I T E P A P E R : O P E N. V P N C L O U D Implementing A Secure OpenVPN Cloud Platform White Paper: OpenVPN Cloud Platform Implementing OpenVPN Cloud Platform Content Introduction... 3 The Problems...
More informationSkype for Business Server 2019 Preview Deployment Guide
Skype for Business Server 2019 Preview Deployment Guide 11/08/2018 Plan Deploy Test Table of Contents Introduction... 3 Bit of background... 3 Skype for Business 2019 Preview requirements... 3 Hardware...
More informationBIG-IP APM: Access Policy Manager v11. David Perodin Field Systems Engineer
1 BIG-IP APM: Access Policy Manager v11 David Perodin Field Systems Engineer 3 Overview What is BIG-IP Access Policy Manager (APM)? How APM protects organization-facing applications by providing policy-based,
More informationPush-to-Revenue: Maximizing Potential Beyond Basic Push-to-Talk. David Wetherelt, Director International Carrier Sales
Push-to-Revenue: Maximizing Potential Beyond Basic Push-to-Talk David Wetherelt, Director International Carrier Sales Push-to-Talk: The Application Driving Today s Market The First Killer Application For
More informationThe Keys to Monitoring Internal Web Applications
WHITEPAPER The Keys to Monitoring Internal Web Applications Much of the focus on applications today revolves around SaaS apps delivered from the cloud. However, many large enterprises are also required
More informationThousandEyes for. Application Delivery White Paper
ThousandEyes for Application Delivery White Paper White Paper Summary The rise of mobile applications, the shift from on-premises to Software-as-a-Service (SaaS), and the reliance on third-party services
More informationCisco 4000 Series Integrated Services Routers: Architecture for Branch-Office Agility
White Paper Cisco 4000 Series Integrated Services Routers: Architecture for Branch-Office Agility The Cisco 4000 Series Integrated Services Routers (ISRs) are designed for distributed organizations with
More informationThe network s impact on student and staff experience. Client-centric Analytics and Assurance Darren Smith Aruba Networks
The network s impact on student and staff experience Client-centric Analytics and Assurance Darren Smith Aruba Networks Growing IT Challenges More User Devices, Apps and Services Legacy Tools Limited Resources
More informationOffice 365 and Azure Active Directory Identities In-depth
Office 365 and Azure Active Directory Identities In-depth Jethro Seghers Program Director SkySync #ITDEVCONNECTIONS ITDEVCONNECTIONS.COM Agenda Introduction Identities Different forms of authentication
More informationSIEM FOR BEGINNERS Everything You Wanted to Know About
SIEM FOR BEGINNERS Everything You Wanted to Know About Log Management But were Afraid to Ask www.alienvault.com A Rose By Any Other Name SLM/LMS, SIM, SEM, SEC, SIEM Although the industry has settled on
More informationMonitoring Infoblox eg Enterprise v6
Monitoring Infoblox eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced
More informationEdge Device Manager R15 Release Notes
2017-03 Software releases are created to add new features, make enhancements or correct defects. These releases are tested on all current, actively shipping platforms and operating systems as applicable.
More informationZero to Millions: Building an XLSP for Gears of War 2
Zero to Millions: Building an XLSP for Gears of War 2 Dan Schoenblum Senior Engine Programmer Epic Games dan.schoenblum@epicgames.com About Me Working in online gaming for over 10 years At GameSpy from
More informationAlways Keep IT Purely Simple
Always Keep IT Purely Simple Network Monitoring Software Page 1 CEO Message AKiPS is a scalable, fully featured monitoring tool that collects, reports and alerts on the performance of your network infrastructure.
More informationOMi Management Pack for Microsoft SQL Server. Software Version: For the Operations Manager i for Linux and Windows operating systems.
OMi Management Pack for Microsoft Software Version: 1.01 For the Operations Manager i for Linux and Windows operating systems User Guide Document Release Date: April 2017 Software Release Date: December
More informationMicrosoft System Center Configuration Manager 2007, Configuring
Microsoft System Center Configuration Manager 2007, Configuring Number: 70-401 Passing Score: 800 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ Exam A QUESTION 1 You have a System Center
More informationThe Modern Mainframe At the Heart of Your Business
The Modern Mainframe At the Heart of Your Business IT Service Management Service Oriented Finance Needs to Satisfy Service Levels For Their Critical Applications I must make sure to meet my service levels.
More informationOrion Network Performance Monitor
Orion Network Performance Monitor availability & performance management for your data center network I have continued to watch this product evolve since version 7.0 and have always found the interface
More informationDiploma in Network (LAN/WAN) Administration
Diploma in Network (LAN/WAN) Administration The Diploma in Network (LAN/WAN) Administration program prepares students to setup Local & Wide Area Networks using Cisco routers and Catalyst switches in a
More informationSolarWinds Engineer s Toolset Fast Fixes to Network Issues
DATASHEET SolarWinds Engineer s Toolset Fast Fixes to Network Issues SolarWinds Engineer s Toolset (ETS) helps you monitor and troubleshoot your network with the most trusted tools in network management.
More informationDebugging the Data Plane with Anteater
Debugging the Data Plane with Anteater Haohui Mai, Ahmed Khurshid Rachit Agarwal, Matthew Caesar P. Brighten Godfrey, Samuel T. King University of Illinois at Urbana-Champaign Network debugging is challenging
More informationChange Is Hard: Adapting Dependency Graph Models For Unified Diagnosis in Wired/Wireless Networks
Change Is Hard: Adapting Dependency Graph Models For Unified Diagnosis in Wired/Wireless Networks Lenin Ravindranath, Paramvir Bahl, Ranveer Chandra, David A. Maltz, Jitendra Padhye, Parveen Patel MIT,
More informationSolarWinds Engineer s Toolset Fast Fixes to Network Issues
DATASHEET SolarWinds Engineer s Toolset Fast Fixes to Network Issues SolarWinds Engineer s Toolset (ETS) helps you monitor and troubleshoot your network with the most trusted tools in network management.
More informationPerformance Monitoring and SiteScope
Performance Monitoring and SiteScope Presented By Rupesh Garg & Naidu, Wipro Technologies. December 11, 2012 1 Abstract Monitoring the web environment refers to test or Check the systems and services in
More informationMicrosoft Architecting Microsoft Azure Solutions.
Microsoft 70-535 Architecting Microsoft Azure Solutions https://killexams.com/pass4sure/exam-detail/70-535 QUESTION: 106 Your organization has developed and deployed several Azure App Service Web and API
More informationINFRASTRUCTURE BEST PRACTICES FOR PERFORMANCE
INFRASTRUCTURE BEST PRACTICES FOR PERFORMANCE Michael Poulson and Devin Jansen EMS Software Software Support Engineer October 16-18, 2017 Performance Improvements and Best Practices Medium-Volume Traffic
More informationPortnox CORE. On-Premise. Technology Introduction AT A GLANCE. Solution Overview
Portnox CORE On-Premise Technology Introduction Portnox CORE provides a complete solution for Network Access Control (NAC) across wired, wireless, and virtual networks for enterprise managed, mobile and
More informationIBM Internet Security Systems Proventia Management SiteProtector
Supporting compliance and mitigating risk through centralized management of enterprise security devices IBM Internet Security Systems Proventia Management SiteProtector Highlights Reduces the costs and
More informationPreinstallation Requirements Guide
Preinstallation Requirements Guide Synergy Manage v4.12 September 2018 Synergy SKY 2018 TOC 1: Introduction 3 Synergy Manage install procedure - your responsibilities 3 Further information about Synergy
More informationForeScout Extended Module for IBM BigFix
ForeScout Extended Module for IBM BigFix Version 1.0.0 Table of Contents About this Integration... 4 Use Cases... 4 Additional BigFix Documentation... 4 About this Module... 4 Concepts, Components, Considerations...
More informationDiscover threats quickly, remediate immediately, and mitigate the impact of malware and breaches
Discover threats quickly, remediate immediately, and mitigate the impact of malware and breaches Introduction No matter how hard you work to educate your employees about the constant and evolving threats
More informationRelease Notes. NetBrain Integrated Edition 7.0
NetBrain Integrated Edition 7.0 Release Notes Version 7.0b1 Last Updated 2017-11-22 Copyright 2004-2017 NetBrain Technologies, Inc. All rights reserved. Contents 1. Highlights... 3 2. Feature Summary...
More informationHA solution with PXC-5.7 with ProxySQL. Ramesh Sivaraman Krunal Bauskar
HA solution with PXC-5.7 with ProxySQL Ramesh Sivaraman Krunal Bauskar Agenda What is Good HA eco-system? Understanding PXC-5.7 Understanding ProxySQL PXC + ProxySQL = Complete HA solution Monitoring using
More informationTCP Spatial-Temporal Measurement and Analysis
TCP Spatial-Temporal Measurement and Analysis Infocom 05 E. Brosh Distributed Network Analysis (DNA) Group Columbia University G. Lubetzky-Sharon, Y. Shavitt Tel-Aviv University 1 Overview Inferring network
More informationN-Partner solution. VPN should be able to do AI and Abnormal Analysis, detect problems and solve them
N-Partner solution VPN should be able to do AI and Abnormal Analysis, detect problems and solve them Headquarter Branch Office There will be huge loss if the intranet is disconnected for only an hour For
More informationSQL Azure. Abhay Parekh Microsoft Corporation
SQL Azure By Abhay Parekh Microsoft Corporation Leverage this Presented by : - Abhay S. Parekh MSP & MSP Voice Program Representative, Microsoft Corporation. Before i begin Demo Let s understand SQL Azure
More informationMicrosoft Core Solutions of Microsoft SharePoint Server 2013
1800 ULEARN (853 276) www.ddls.com.au Microsoft 20331 - Core Solutions of Microsoft SharePoint Server 2013 Length 5 days Price $4290.00 (inc GST) Version B Overview This course will provide you with the
More informationMicrosoft SharePoint Server 2013 Plan, Configure & Manage
Microsoft SharePoint Server 2013 Plan, Configure & Manage Course 20331-20332B 5 Days Instructor-led, Hands on Course Information This five day instructor-led course omits the overlap and redundancy that
More information1Y0-A22. Citrix XenApp 6.5 Advanced Administration. Exam Summary Syllabus Questions
1Y0-A22 Citrix XenApp 6.5 Advanced Administration Exam Summary Syllabus Questions Table of Contents Introduction to 1Y0-A22 Exam on Citrix XenApp 6.5 Advanced Administration 2 Citrix 1Y0-A22Certification
More informationBuilding a Fast, Virtualized Data Plane with Programmable Hardware. Bilal Anwer Nick Feamster
Building a Fast, Virtualized Data Plane with Programmable Hardware Bilal Anwer Nick Feamster 1 Network Virtualization Network virtualization enables many virtual networks to share the same physical network
More informationPALLADION Feature Set
PALLADION Feature Set FEATURE SET Introduction: PALLADION makes the job of running SIP based network infrastructure much more straightforward, resulting in much more reliable and predictable SIP based
More informationDCWS-6028 Enterprise-Class Smart Wireless Access Controller. The Simple and Powerful Enterprise Smart Wireless LAN Controller
DCWS-6028 Enterprise-Class Smart Wireless Access Controller The Simple and Powerful Enterprise Smart Wireless LAN Controller Overview The Digital China Networks(DCN) Wireless Access Controller/WLAN Switch
More informationTensorFlow: A System for Learning-Scale Machine Learning. Google Brain
TensorFlow: A System for Learning-Scale Machine Learning Google Brain The Problem Machine learning is everywhere This is in large part due to: 1. Invention of more sophisticated machine learning models
More informationSoftware Defined Networking
Software Defined Networking Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101 http://www.cs.princeton.edu/courses/archive/spr12/cos461/ The Internet: A Remarkable
More information20331B: Core Solutions of Microsoft SharePoint Server 2013
20331B: Core Solutions of Microsoft SharePoint Server 2013 Course Details Course Code: Duration: Notes: 20331B 5 days This course syllabus should be used to determine whether the course is appropriate
More informationScale and secure workloads, cost-effectively build a private cloud, and securely connect to cloud services. Beyond virtualization
Beyond virtualization Scale and secure workloads, cost-effectively build a private cloud, and securely connect to cloud services The power of many servers, the simplicity of one Efficiently manage infrastructure
More informationSession 7: Configuration Manager
Session 7: Configuration Manager Mark Aslett Consultant Adam Shepherd Consultant MCS Talks Infrastructure Architecture Agenda Introduction Gathering requirements Core Concepts Hierarchy Design Scaling
More informationForeScout Extended Module for IBM BigFix
Version 1.1 Table of Contents About BigFix Integration... 4 Use Cases... 4 Additional BigFix Documentation... 4 About this Module... 4 About Support for Dual Stack Environments... 5 Concepts, Components,
More informationRuckus ZoneDirector 3450 WLAN Controller (up to 500 ZoneFlex Access Points)
Product Name: Manufacturer: - Model Number: 901-3450-UK00 Ruckus ZoneDirector 3450 supporting up to 500 ZoneFlex APs (901-3450-UK00) The Ruckus ZoneDirector 3450, The First Simple and Powerful Enterprise
More informationVMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway
VMware AirWatch Content Gateway for Linux VMware Workspace ONE UEM 1811 Unified Access Gateway You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationBECOME A LOAD TESTING ROCK STAR
3 EASY STEPS TO BECOME A LOAD TESTING ROCK STAR Replicate real life conditions to improve application quality Telerik An Introduction Software load testing is generally understood to consist of exercising
More informationREMOTE AUTHENTICATION DIAL IN USER SERVICE
AAA / REMOTE AUTHENTICATION DIAL IN USER SERVICE INTRODUCTION TO, A PROTOCOL FOR AUTHENTICATION, AUTHORIZATION AND ACCOUNTING SERVICES Peter R. Egli INDIGOO.COM 1/12 Contents 1. AAA - Access Control 2.
More informationMBD Techniques for Internet Delay Diagnosis
MBD Techniques for Internet Delay Diagnosis Roni Stern, Meir Kalech 1 1 Department of Information Systems Engineering, Ben Gurion University, Beer-Sheva, Israel roni.stern@gmail.com, kalech@bgu.ac.il ABSTRACT
More informationConnection Logging. Introduction to Connection Logging
The following topics describe how to configure the Firepower System to log connections made by hosts on your monitored network: Introduction to, page 1 Strategies, page 2 Logging Decryptable Connections
More informationBlackBerry Enterprise Server for Microsoft Exchange Version: 5.0. Feature and Technical Overview
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Feature and Technical Overview SWDT305802-524791-0331031644-001 Contents 1 Overview: BlackBerry Enterprise Server... 5 New in this release...
More information<Insert Picture Here> Managing Oracle Exadata Database Machine with Oracle Enterprise Manager 11g
Managing Oracle Exadata Database Machine with Oracle Enterprise Manager 11g Exadata Overview Oracle Exadata Database Machine Extreme ROI Platform Fast Predictable Performance Monitor
More informationBest Practices for Monitoring VMware with System Center Operations Manager
Best Practices for Monitoring VMware with System Center Operations Manager Pete Zerger Cameron Fuller Alec King Managing Principal Infront Consulting Principal consultant for Catapult Systems Director,
More informationOracle Enterprise Manager. 1 Before You Install. System Monitoring Plug-in for Oracle Unified Directory User's Guide Release 1.0
Oracle Enterprise Manager System Monitoring Plug-in for Oracle Unified Directory User's Guide Release 1.0 E24476-01 October 2011 The System Monitoring Plug-In for Oracle Unified Directory extends Oracle
More informationMOC 6232A: Implementing a Microsoft SQL Server 2008 Database
MOC 6232A: Implementing a Microsoft SQL Server 2008 Database Course Number: 6232A Course Length: 5 Days Course Overview This course provides students with the knowledge and skills to implement a Microsoft
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
More informationLearning Secomea Remote Access (Using SiteManager Embedded for Windows)
Secomea GateManager BASIC Guide Learning Secomea Remote Access (Using SiteManager Embedded for Windows) This guide is intended for first time users of the Secomea remote access solution, who need a practical
More informationMassive Scalability With InterSystems IRIS Data Platform
Massive Scalability With InterSystems IRIS Data Platform Introduction Faced with the enormous and ever-growing amounts of data being generated in the world today, software architects need to pay special
More informationWhatsConfigured v3.1 User Guide
WhatsConfigured v3.1 User Guide Contents Table of Contents Welcome to WhatsConfigured v3.1 Finding more information and updates... 1 Sending feedback... 2 Deploying WhatsConfigured STEP 1: Prepare the
More information70-414: Implementing an Advanced Server Infrastructure Course 01 - Creating the Virtualization Infrastructure
70-414: Implementing an Advanced Server Infrastructure Course 01 - Creating the Virtualization Infrastructure Slide 1 Creating the Virtualization Infrastructure Slide 2 Introducing Microsoft System Center
More informationWSN Routing Protocols
WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before
More informationPutting together the platform: Riak, Redis, Solr and Spark. Bryan Hunt
Putting together the platform: Riak, Redis, Solr and Spark Bryan Hunt 1 $ whoami Bryan Hunt Client Services Engineer @binarytemple 2 Minimum viable product - the ideologically correct doctrine 1. Start
More informationEnterprise Overview. Benefits and features of Cloudflare s Enterprise plan FLARE
Enterprise Overview Benefits and features of s Enterprise plan 1 888 99 FLARE enterprise@cloudflare.com www.cloudflare.com This paper summarizes the benefits and features of s Enterprise plan. State of
More informationSix Questions to Answer When Buying a Phone System
NEW PHONE SYSTEM BUYER S GUIDE Six Questions to Answer When Buying a Phone System In addition to the most comprehensive portfolio of voice communications, data and wireless networking products in the industry,
More informationPROVIDING SECURE ACCESS TO VMWARE HORIZON 7 AND VMWARE IDENTITY MANAGER WITH THE VMWARE UNIFIED ACCESS GATEWAY REVISED 2 MAY 2018
PROVIDING SECURE ACCESS TO VMWARE HORIZON 7 AND VMWARE IDENTITY MANAGER WITH THE VMWARE UNIFIED ACCESS GATEWAY REVISED 2 MAY 2018 Table of Contents Introduction Deployment Options Preparation Configuration
More informationUn SOC avanzato per una efficace risposta al cybercrime
Un SOC avanzato per una efficace risposta al cybercrime Identificazione e conferma di un incidente @RSAEMEA #RSAEMEASummit @masiste75 Mauro Costantini - Presales Consultant Agenda A look into the threat
More informationWe re Gonna Need a Bigger Boat
SESSION ID: CSV-F01 We re Gonna Need a Bigger Boat Alan Ross Senior Principal Engineer Intel Corporation Grant Babb Research Scientist Intel Corporation IT Analytics: All about the changing Enterprise
More informationArcGIS Deployment Scenarios. Philip Heede, Jay Theodore
ArcGIS Deployment Scenarios Philip Heede, Jay Theodore Agenda Two main sections: - The GIS server - Moving to Web GIS for enterprises - Why? - Patterns - Some technical details The GIS Services Server
More informationCato Cloud. Solution Brief. Software-defined and Cloud-based Secure Enterprise Network NETWORK + SECURITY IS SIMPLE AGAIN
Cato Cloud Software-defined and Cloud-based Secure Enterprise Network Solution Brief NETWORK + SECURITY IS SIMPLE AGAIN Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise The
More informationSelf-Managing Wireless Networks
Self-Managing Wireless Networks Are self managing networks in our Future? Victor Bahl, Mircrosoft Corporation SIGCOMM MobiArch 2007, August 2007 Jinyoung, Han jyhan@mmlab.snu.ac.kr 2007. 11. 05 Contents
More information