Splunk for Akamai Cloud Monitor
|
|
- Benjamin Summers
- 6 years ago
- Views:
Transcription
1 Copyright 2015 Splunk Inc. Splunk for Akamai Cloud Monitor Pierre Pellissier Leela Kesireddy Performance Management PayPal, Inc.
2 Disclaimer During the course of this presentaeon, we may make forward looking statements regarding future events or the expected performance of the company. We caueon you that such statements reflect our current expectaeons and esemates based on factors currently known to us and that actual events or results could differ materially. For important factors that may cause actual results to differ from those contained in our forward- looking statements, please review our filings with the SEC. The forward- looking statements made in the this presentaeon are being made as of the Eme and date of its live presentaeon. If reviewed arer its live presentaeon, this presentaeon may not contain current or accurate informaeon. We do not assume any obligaeon to update any forward looking statements we may make. In addieon, any informaeon about our roadmap outlines our general product direceon and is subject to change at any Eme without noece. It is for informaeonal purposes only and shall not, be incorporated into any contract or other commitment. Splunk undertakes no obligaeon either to develop the features or funceonality described or to include any such feature or funceonality in a future release. 2
3 ! Why we need Log Analysis! What we had was too slow! Real Time logging OpEon! GeXng to Real Time! Benefits & Challenges! ConfiguraEon Details! Akamai Splunk ApplicaEon! Final Analysis and Q & A Agenda 3
4 Why we need log analysis Customer interaceons on Akamai exceed 1 BN/day It is business criecal that we : Know the state of the site Track the impact of changes Analyze the customer experience 4
5 What we had was too slow! Akamai for content delivery, web acceleraeon and security! Akamai log colleceon takes hours to get logs into NetStorage.! Downloading logs hourly and indexing them in Splunk makes them available for analysis.! But this is not a real Eme solueon. Akamai Network WAF Log Gathering DC #1 DC #2 NetStorage Hourly download 5
6 Real Eme logging opeon! Akamai Cloud Monitor delivers logs in < 60 sec! Faster delivery enables real Eme operaeonal monitoring and easier analyecs by internal users.! Lots of configuraeon decisions.! The results are worth the effort.! UlEmately easier than expected. Akamai Network WAF CM Log Streaming Aggregation Real Time Delivery DC #1 DC #2 6
7 GeXng to real Eme! OperaEonal goals required: Real Eme visibility into site Improved usability of logs! Lots of design decisions needed to be made How will we receive the logs? How do we configure CM on Akamai? How will this change the indexed volume? How do we ensure we get the logs? How will the logs be used?! The inieal benefits were achieved quickly MulEple bonus benefits were also realized Some challenges needed to be dealt with Which Sites? What aggregaeon? Redundancy? Dashboards views? Which data? CM Log Streaming DC #2 Aggregation Real Time Delivery How to receive? What volume? 7
8 IniEal benefits site control! Receiving the logs in <60 sec. makes them usable for real Eme analysis The NOC can immediately see the effects of site changes The CDN team can see the effects of Akamai configuraeon changes in real Eme Monitoring of site ramp acevity. 8
9 IniEal benefits log usability! NetStorage log parsing needed improving! Akamai CM logs use JSON formaxng! Splunk TA for CM logs put them into CIM format for ES consumpeon! Internal customers can work with the JSON formaned logs more intuievely 9
10 AddiEonal benefits opeonal CM data! OpEonal data fields enable rich analyecs for: OperaEonal Teams Performance Security Fraud! Adding more fields results in higher indexed volume 10
11 AddiEonal benefits custom fields! Data from the conneceon, HTTP header or payload can be inserted into CM! Enables powerful insight for muleple teams: Crypto use analysis Customer Experience Referer AnalyEcs TroubleshooEng 11
12 AddiEonal benefits more complete data! For real Eme analyecs we chose to receive 100% of the CM logs Some use cases may only need 10%! NetStorage log colleceon does not capture 100% of the logs Akamai Network WAF Sample percentage = 100%! The CM log count is ~5% greater than the NetStorage log count This increases our confidence that we are seeing the enere picture Real Time Delivery DC #1 DC #2 12
13 Challenges! Greater log volume with CM ~50% more data indexed Partly due to JSON formaxng Mostly due to addieonal CM data! IniEal configuraeon of log receiver did not provide redundancy CM Logs were lost when it was unavailable! Log forwarding logic took several iteraeons to get it right A POC got us close and then we adjusted arer we were in produceon Akamai Network WAF DC #1 DC #2 Delivery Failure 13
14 ConfiguraEon Details
15 CM & splunk checklist Ini$al configura$ons: q Add Cloud Monitor to the Akamai contract q Set up receiver VIP, DNS, SSL Cert and redundant servers q Choose the property and CM data sets to log q Build the inieal CM and Splunk configuraeons Trial Run: q Configure for a short duraeon of logging at 10% to verify receiver is working q Verify the CM data is being mapped to Splunk CIM q Verify that the receiver and Splunk can support the expected load q Verify the data is what you need and expect Plan on doing several rounds of configura$ons, tes$ng and tuning q It is easy to iterate and change the configuraeons as needed 15
16 CM data delivery!!!! Select Data Sets to Include Configure Delivery Endpoint Configure the AggregaEon opeons: Time: 60 seconds max Line Count: Max 3000 records Message Size: Max 900 KB of data Configure DistribuEon & Failover OpEons: Primary receiver gets 100% Secondary receiver gets 100% if Primary receiver is unavailable NetStorage gets 100% if Primary & Secondary are unavailable ê With scheduled FTP download hourly 16
17 CM configuraeons! Default data sets: CP, Format, Message, Type, Version! OpEonal data sets: Akadebug, network, netperf, Geo, WAF, PPCustomData ê Can not opt out of data elements within an opeonal data set ê Results in duplicates of some data or unwanted data! Custom Data field: Selected HTTP Header data is included Other header info is excluded- like large cookies 17
18 CM receiver! Receiver build Akamai Posts CM data to receiver VIP SSL cert required for secure conneceon by Akamai MulEple Linux servers in pool running nginx & node.js Writes logs to a local data file Splunk Universal Forwarder monitors logs and forwards them to Indexers 18
19 CM receiver (future state)! Plan for receiver redundancy in the inieal design CM VIP1 CM VIP2 CM VIP1 Splunk VIP NetStorage CM VIP2 19
20 Splunk configuraeon! Index configured with 100 day reteneon! Built Add- on s with Field renames & EvaluaEons! Normalized data to be CIM Complaint! LDAP group configured for accessing CM data! Apps set up for internal teams to build and share searches! Common Akamai CM Dashboard for all teams Performance & Availability Dashboard for each property StarEng point for internal teams to view data but with click through access to granular data and search bar 20
21 New- Splunk 6.3 HTTP event collector! HTTP endpoint can securely receive high- volume JSON- based applicaeon and IOT data! Create and mange receiver configuraeons using the HTTP event collector configuraeon! Token based authenecaeon Model! Supports to both hnp & hnps! Replaces the nginx & node.js receiver solueon 21
22 Akamai ApplicaEon
23 Akamai App! Monitor the Real Time Traffic! Insights by Property! Monitor Health & Performance of Origin! Monitor Heath & Performance of Akamai Edge! Observe User s Pain Points! Inspect App / URL level Issues & Performance! InvesEgate Issues 23
24 ! Performance Issue Searches Were Slow Dashboards taking longer to load Greater than 25K events/sec! Summary Index Loses the Rich informaeon in data Hurdles! Report AcceleraEon AcceleraEon is suspended as the summary reaches 10% of its total size No Control on Summary Schedule 24
25 Akamai ApplicaEon Data Models & AcceleraEon Came to Rescue 25
26 Data Models Data Model s facilitated to format, evaluate fields and work with necessary event data for each data set and also accelerate the model! Data models are made up of object types like lookups, transaceons, fields extraceons & Calculated fields.! Data models encodes only necessary knowledge objects.! Data Model for each Property or group of ProperEes.! Objects by Success or Failure (HTTP Status)! Add addieonal fields using regular expressions, eval expressions and lookups. 26
27 Dashboards! Real Time Availability & Performance! Origin Insights! Edge Overview! Security! Release Monitoring 27
28 Availability Availability & Performance Volume of Hits. Success & Failure Volume by HTTP Status. Success & Failure by GEO Performance Track total Eme for transaceons. Origin Latency Last Mile Round Trip Time 28
29 Origin & Edge Origin Monitor traffic distribueon. Error Monitoring. Monitor Latency. Edge Edge Errors Edge Performance stats Last Mile RTT 29
30 Monitor the WAF denies and warnings. Monitor Top Deny Rules. Report on the WAF warning triggered. Top deny & warning URL s. Deny & warn tracking by Geo Top Denied Client IP s Security 30
31 Monitor Traffic by Origin / DC Monitor Issue s & Performance by Property Performance by Origin Last Mile Time by Edge Performance by GEO Release Monitoring DC 01 DC 02 DC 03 DC 04 DC 05 DC 01 DC 02 DC 03 DC 04 DC 05 31
32 Final Analysis and Q & A
33 Final analysis! The inieal business needs for Real Time logging have been met: Real Eme monitoring enables us to know the current state of the site Dashboards allow us to track the effect of site changes JSON data formaxng makes it easier to do analyecs on the customer experience! The addieonal benefits are extremely valuable: Custom fields to help troubleshoot site and code issues Header informaeon providing customer experience analyecs data Rich data set about customer crypto to help with SHA256 migraeon Performance data on a regional and network level! ConEnuing to find new ways to leverage the CM data in Splunk! Q & A 33
34 THANK YOU
Copyright 2014 Splunk Inc. Splunk for VMware. Architecture & Design. Michael Donnelly, Sr. Sales Engineer
Copyright 2014 Splunk Inc. Splunk for VMware Architecture & Design Michael Donnelly, Sr. Sales Engineer Disclaimer During the course of this presentaeon, we may make forward looking statements regarding
More informationSearch Head Clustering
Copyright 2015 Splunk Inc. Search Head Clustering Eric Woo Senior Engineer Manu Jose Senior Engineer Disclaimer During the course of this presentaeon, we may make forward looking statements regarding future
More informationSplunk and Spark. Liu- yuan Lai. So;ware Engineer, Splunk
Copyright 2015 Splunk Inc. Splunk and Spark Liu- yuan Lai So;ware Engineer, Splunk Disclaimer During the course of this presentaeon, we may make forward looking statements regarding future events or the
More informationCopyright 2014 Splunk Inc. Security Ninjutsu. Using Splunk for CorrelaEon, Anomaly DetecEon and Response AutomaEon. David Veuve.
Copyright 2014 Splunk Inc. Security Ninjutsu Using Splunk for CorrelaEon, Anomaly DetecEon and Response AutomaEon David Veuve SE, Splunk Who Am I?! David Veuve Sales Engineer for Major Accounts in Northern
More informationCopyright 2015 Splunk Inc. Security Jiujitsu. Building CorrelaEon Searches in Splunk. David Veuve. Senior SE, Security SME, Splunk
Copyright 2015 Splunk Inc. Security Jiujitsu Building CorrelaEon Searches in Splunk David Veuve Senior SE, Security SME, Splunk Disclaimer During the course of this presentaeon, we may make forward looking
More informationCampus Design Principals
Campus Design Principals John Hicks Internet2 jhicks@internet2.edu Overview Campus design challenges Edge Networks Layer2 design Core Networks Research and EducaEon Networks Network Management Campus Design
More informationMeasuring HEC Performance For Fun and Profit
Measuring HEC Performance For Fun and Profit Itay Neeman Director, Engineering, Splunk Clif Gordon Principal Software Engineer, Splunk September 2017 Washington, DC Forward-Looking Statements During the
More informationSaaS Providers. ThousandEyes for. Summary
USE CASE ThousandEyes for SaaS Providers Summary With Software-as-a-Service (SaaS) applications rapidly replacing onpremise solutions, the onus of ensuring a great user experience for these applications
More information<Insert Picture Here> Looking at Performance - What s new in MySQL Workbench 6.2
Looking at Performance - What s new in MySQL Workbench 6.2 Mario Beck MySQL Sales Consulting Manager EMEA The following is intended to outline our general product direction. It is
More informationImperva Incapsula Load Balancer
Imperva Incapsula Load Balancer DATASHEET Optimize Traffic Distribution and Application Delivery from the Cloud The Incapsula Load Balancer enables organizations to replace their costly appliances with
More informationAccount Activity Migration guide & set up
Account Activity Migration guide & set up Agenda 1 2 3 4 5 What is the Account Activity (AAAPI)? User Streams & Site Streams overview What s different & what s changing? How to migrate to AAAPI? Questions?
More informationReplication of summary data in indexer cluster
Copyright 2016 Splunk Inc. Replication of summary data in indexer cluster Dhruva Kumar Bhagi Sr. Software engineer Splunk Inc. Disclaimer During the course of this presentation, we may make forward looking
More informationThousandEyes for. Application Delivery White Paper
ThousandEyes for Application Delivery White Paper White Paper Summary The rise of mobile applications, the shift from on-premises to Software-as-a-Service (SaaS), and the reliance on third-party services
More informationAccount Activity Migration guide & set up
Account Activity Migration guide & set up Agenda 1 2 3 4 5 What is the Account Activity (AAAPI)? User Streams & Site Streams overview What s different & what s changing? How to migrate to AAAPI? Questions?
More informationAtlassian s Journey Into Splunk
Atlassian s Journey Into Splunk The Building Of Our Logging Pipeline On AWS Tim Clancy Engineering Manager, Observability James Mackie Infrastructure Engineer, Observability September 2017 Washington,
More informationFrom 1 To 30 How To Disassemble One Monster App Into An Ecosystem Of 30
From 1 To 30 How To Disassemble One Monster App Into An Ecosystem Of 30 Jonathan Palley, CTO/COO Guo Lei, Chief Architect 2010 Idapted, Ltd. An Experience A Tale of Two Buildings 2009 Shanghai Lotus Riverside
More informationBIG-IP APM: Access Policy Manager v11. David Perodin Field Systems Engineer
1 BIG-IP APM: Access Policy Manager v11 David Perodin Field Systems Engineer 3 Overview What is BIG-IP Access Policy Manager (APM)? How APM protects organization-facing applications by providing policy-based,
More informationVisualizing the Health of Your Mobile App
Visualizing the Health of Your Mobile App Jay Tamboli ios Engineer, Capital One September 26, 2017 Washington, DC Forward-Looking Statements During the course of this presentation, we may make forward-looking
More informationReal Time Monitoring Of A Cloud Based Micro Service Architecture Using Splunkcloud And The HTTP Eventcollector
Copyright 2016 Splunk Inc. Real Time Monitoring Of A Cloud Based Micro Service Architecture Using Splunkcloud And The HTTP Eventcollector Mike Sclimen; Experian Consumer Services, Splunk Inc. MaB Poland
More informationBig Data and IoT. Baris Aksanli 02/10/2016
Big Data and IoT Baris Aksanli 02/10/2016 Why is there big data? Number of devices increasing exponeneally They conenuously generate data For example, on average, 72 hours of videos are uploaded to YouTube
More informationDashboards & Visualizations: What s New
Dashboards & Visualizations: What s New Nicholas Filippi Product Management, Splunk Patrick Ogdin Product Management, Splunk September 2017 Washington, DC Welcome Patrick Ogdin Product Management, Splunk
More informationDisclaimer CONFIDENTIAL 2
Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally
More informationBIG-IP Analytics: Implementations. Version 12.1
BIG-IP Analytics: Implementations Version 12.1 Table of Contents Table of Contents Setting Up Application Statistics Collection...5 What is Analytics?...5 About HTTP Analytics profiles...5 Overview: Collecting
More informationDEPLOYMENT GUIDE Version 1.1. Deploying F5 with IBM WebSphere 7
DEPLOYMENT GUIDE Version 1.1 Deploying F5 with IBM WebSphere 7 Table of Contents Table of Contents Deploying the BIG-IP LTM system and IBM WebSphere Servers Prerequisites and configuration notes...1-1
More informationData Onboarding. Where Do I begin? Luke Netto Senior Professional Services Splunk. September 26, 2017 Washington, DC
Data Onboarding Where Do I begin? Luke Netto Senior Professional Services Consultant @ Splunk September 26, 2017 Washington, DC Forward-Looking Statements During the course of this presentation, we may
More informationFFIEC Cybersecurity Assessment Tool
FFIEC Cybersecurity Assessment Tool Cybersecurity Controls & Incidence Mappings for Splunk Enterprise, Enterprise Security, User Behavior Analytics Curtis Johnson Senior Sales Engineer & Security SME September
More informationBIG-IP Analytics: Implementations. Version 13.1
BIG-IP Analytics: Implementations Version 13.1 Table of Contents Table of Contents Setting Up Application Statistics Collection...5 What is Analytics?...5 About HTTP Analytics profiles... 5 Overview:
More informationWhat is New in Cisco ACE 4710 Application Control Engine Software Release 3.1
What is New in Cisco ACE 4710 Application Control Engine Software Release 3.1 PB478675 Product Overview The Cisco ACE Application Control Engine 4710 represents the next generation of application switches
More informationSplunk & AWS. Gain real-time insights from your data at scale. Ray Zhu Product Manager, AWS Elias Haddad Product Manager, Splunk
Splunk & AWS Gain real-time insights from your data at scale Ray Zhu Product Manager, AWS Elias Haddad Product Manager, Splunk Forward-Looking Statements During the course of this presentation, we may
More informationDB Connect Is Back. and it is better than ever. Tyler Muth Denis Vergnes. September 2017 Washington, DC
DB Connect Is Back and it is better than ever Tyler Muth Denis Vergnes September 2017 Washington, DC Forward-Looking Statements During the course of this presentation, we may make forward-looking statements
More informationIn This Webinar. ConEnuous Load TesEng & ConEnuous Delivery with Jenkins
In This Webinar TODAY S PRESENTERS Tom Chavez: SOASTA, Sr. Product MarkeEng Manager Andy Pemberton: CloudBees, Senior Director, SoluEons Architecture & ConsulEng TWO COMPANIES, A SINGLE SOLUTION SOASTA:
More informationLoad Balancing Nginx Web Servers with OWASP Top 10 WAF in Azure
Load Balancing Nginx Web Servers with OWASP Top 10 WAF in Azure Quick Reference Guide v1.0.2 ABOUT THIS GUIDE This document provides a quick reference guide on how to load balance Nginx Web Servers and
More informationFaster Splunk App Cer=fica=on with Splunk AppInspect
Copyright 2016 Splunk Inc. Faster Splunk App Cer=fica=on with Splunk AppInspect Andy Nortrup Product Manager, Splunk Grigori Melnik Director, Product Management, Splunk Disclaimer During the course of this
More informationData Centers: Technology, part 1
Mestrado em Engenharia InformáEca e de Computadores Master Degree (MSc) in InformaEon Systems and Computer Engineering Administração e Gestão de Infra-estruturas de IT IT Infrastructure Management and
More informationSearch Head Clustering Basics To Best Practices
Search Head Clustering Basics To Best Practices Bharath Aleti Product Manager, Splunk Manu Jose Sr. Software Engineer, Splunk September 2017 Washington, DC Forward-Looking Statements During the course
More informationComputer Systems and Networks. ECPE 170 Jeff Shafer University of the Pacific. Input / Output
ECPE 170 Jeff Shafer University of the Pacific Input / Output 2 Schedule Quiz 6 Tuesday, Nov 22 nd Input / Output OperaEng Systems Compilers & Assemblers 3 Input / Output 4 I/O and Performance Star=ng
More informationF5 Analytics and Visibility Solutions
Agility 2017 Hands-on Lab Guide F5 Analytics and Visibility Solutions F5 Networks, Inc. 2 Contents: 1 Class 1: Introduction to F5 Analytics 5 1.1 Lab Environment Setup.......................................
More informationMaking the Most of the Splunk Scheduler
Making the Most of the Splunk Scheduler Paul J. Lucas Principal Software Engineer, Splunk September 25 28, 2017 Washington, DC Forward-Looking Statements During the course of this presentation, we may
More informationImperva Incapsula Product Overview
Product Overview DA T A SH E E T Application Delivery from the Cloud Whether you re running a small e-commerce business or in charge of IT operations for an enterprise, will improve your website security
More informationLoad Balancing Nginx Web Servers with OWASP Top 10 WAF in AWS
Load Balancing Nginx Web Servers with OWASP Top 10 WAF in AWS Quick Reference Guide V1.0.2 ABOUT THIS GUIDE This document provides a quick reference guide on how to load balance Nginx Web Servers and configure
More informationDeploying the BIG-IP System for LDAP Traffic Management
Deploying the BIG-IP System for LDAP Traffic Management Welcome to the F5 deployment guide for LDAP traffic management. This document provides guidance for configuring the BIG-IP system version 11.4 and
More informationConfiguring Virtual Servers
3 CHAPTER This section provides an overview of server load balancing and procedures for configuring virtual servers for load balancing on an ACE appliance. Note When you use the ACE CLI to configure named
More informationStealthwatch and Cognitive Analytics Configuration Guide (for Stealthwatch System v6.10.x)
Stealthwatch and Cognitive Analytics Configuration Guide (for Stealthwatch System v6.10.x) Copyrights and Trademarks 2018 Cisco Systems, Inc. All rights reserved. NOTICE THE SPECIFICATIONS AND INFORMATION
More informationSEVONE END USER EXPERIENCE
Insight for the Connected World End User Experience [ DataSheet ] SEVONE END USER EXPERIENCE INSIGHTS FROM THE USER PERSPECTIVE. Software, applications and services running on the network infrastructure
More informationMonitoring Docker Containers with Splunk
Monitoring Docker Containers with Splunk Marc Chéné Product Manager Sept 27, 2017 Washington, DC Forward-Looking Statements During the course of this presentation, we may make forward-looking statements
More informationSierra- Cedar s Best PracDces for Building a Security OperaDons Center
Copyright 2015 Splunk Inc. Sierra- Cedar s Best PracDces for Building a Security OperaDons Center Robert Miller Manager Corporate Security, Sierra- Cedar, Inc. Disclaimer During the course of this presentadon,
More informationCreate Dashboards that People Love
Create Dashboards that People Love Introducing Splunk Dashboard Design Guidelines Iryna Vogler User Experience Design September 26, 2017 Washington, DC Forward-Looking Statements During the course of this
More informationEMC VPLEX Geo with Quantum StorNext
White Paper Application Enabled Collaboration Abstract The EMC VPLEX Geo storage federation solution, together with Quantum StorNext file system, enables a global clustered File System solution where remote
More informationIN: US:
About Intellipaat Intellipaat is a fast-growing professional training provider that is offering training in over 150 most sought-after tools and technologies. We have a learner base of 600,000 in over
More informationIaaS. IaaS. Virtual Server
FUJITSU Cloud Service K5 for Public & Virtual Private Cloud US Region Price List (March 2018) Pricing Overview: FUJITSU Cloud Service K5 for Type 1 and Type 2 Cloud Services is priced on a consumption
More informationTesting & Assuring Mobile End User Experience Before Production Neotys
Testing & Assuring Mobile End User Experience Before Production Neotys Henrik Rexed Agenda Introduction The challenges Best practices NeoLoad mobile capabilities Mobile devices are used more and more At
More informationLevel 3 SM Enhanced Management - FAQs. Frequently Asked Questions for Level 3 Enhanced Management
Level 3 SM Enhanced Management - FAQs Frequently Asked Questions for Level 3 Enhanced Management 2015 Level 3 Communications, LLC. All rights reserved. 1 LAYER 3: CONVERGED SERVICES 5 Where can I find
More informationNetFlow Optimizer. Overview. Version (Build ) May 2017
NetFlow Optimizer Overview Version 2.4.9 (Build 2.4.9.0.3) May 2017 Copyright 2013-2017 NetFlow Logic Corporation. All rights reserved. Patents both issued and pending. Contents About NetFlow Optimizer...
More informationGoliath Technology Overview with MEDITECH Module
Customers # 324 Fortune 500 Goliath Technology Overview with MEDITECH Module In approximately one week, support tickets dropped by 25% z Our Customers were complaining about persistent slowness with Citrix.
More informationAugust 11 th 2014, APAN38 Network Performance Tutorial John Hicks Internet2. Performance Primer
August 11 th 2014, APAN38 Network Performance Tutorial John Hicks Internet2 Performance Primer Agenda ExpectaEons and RealiEes TCP Basics What We Can Determine The Tools 2 ExpectaEons and RealEes SeWng
More information2nd SIG-NOC meeting and DDoS Mitigation Workshop Scrubbing Away DDOS Attacks. 9 th November 2015
2nd SIG-NOC meeting and DDoS Mitigation Workshop Scrubbing Away DDOS Attacks 9 th November 2015 AKAMAI SOLUTIONS WEB PERFORMANCE SOLUTIONS MEDIA DELIVERY SOLUTIONS CLOUD SECURITY SOLUTIONS CLOUD NETWORKING
More informationCS 152 Computer Architecture and Engineering CS252 Graduate Computer Architecture. Lecture 19 Memory Consistency Models
CS 152 Computer Architecture and Engineering CS252 Graduate Computer Architecture Lecture 19 Memory Consistency Models Krste Asanovic Electrical Engineering and Computer Sciences University of California
More informationDistributed Systems. Peer- to- Peer. Rik Sarkar James Cheney. University of Edinburgh Spring 2014
Distributed Systems Peer- to- Peer Rik Sarkar James Cheney University of Edinburgh Spring 2014 Recap: p2p We studied properees of p2p systems Examples of p2p system Arpanet Internet SETI@home Napster Gnutella
More informationKV Store: Hammer Time
Copyright 2016 Splunk Inc. KV Store: Hammer Time Nadine Miller Technical Support Engineer, Splunk aka 'vraptor' on IRC and Slack Disclaimer During the course of this presentation, we may make forward looking
More informationNeed for Speed: Unleashing the Power of SecOps with Adaptive Response. Malhar Shah CEO, Crest Data Systems Meera Shankar Alliance Manager, Splunk
Need for Speed: Unleashing the Power of SecOps with Adaptive Response Malhar Shah CEO, Crest Data Systems Meera Shankar Alliance Manager, Splunk September 27, 2017 Washington, DC Forward-Looking Statements
More informationAdding Depth to Dashboards
Copyright 2015 Splunk Inc. Adding Depth to Dashboards Pierre Brunel Splunk Disclaimer During the course of this presentacon, we may make forward looking statements regarding future events or the expected
More informationA Distributed World - the New IT Requirements of Edge Computing
A Distributed World - the New IT Requirements of Edge Computing JEDEC Mobile & IOT Forum Jonathan Hinkle, Sr. Research Staff Member - Systems and Memory Architecture Lenovo Research 2018 Data growth continuing
More informationjetnexus Load Balancer
Mitigate the Risk of Downtime and Optimise Application Delivery jetnexus load balancers improve the performance, scalability and reliability of applications for a superb end user experience. Our business
More informationCisco ACI App Center. One Platform, Many Applications. Overview
White Paper Cisco ACI App Center One Platform, Many Applications Overview Cisco Application Centric Infrastructure (Cisco ACI ) is a comprehensive software-defined networking (SDN) solution designed from
More informationBringing Sweetness to Sour Patch Tuesday
Bringing Sweetness to Sour Patch Tuesday Pacific Northwest National Laboratory Justin Brown & Arzu Gosney September 27, 2017 Washington, DC Forward-Looking Statements During the course of this presentation,
More informationCitrix 1Y0-230 Exam. Volume: 64 Questions
Volume: 64 Questions Question: 1 Scenario: A Citrix Administrator configured the "-denysslreneg" Parameter using the below command on NetScaler to enhance security. set ssl parameter -denysslreneg
More informationIaaS. IaaS. Virtual Server
FUJITSU Cloud Service K5 for Public & Virtual Private Cloud US Region Price List (February 2018) Pricing Overview: FUJITSU Cloud Service K5 for Type 1 and Type 2 Cloud Services is priced on a consumption
More informationHow Teridion Works. A Teridion Technical Paper. A Technical Overview of the Teridion Virtual Network. Teridion Engineering May 2017
A Teridion Technical Paper How Teridion Works A Technical Overview of the Teridion Virtual Network Teridion Engineering May 2017 Learn more at teridion.com Introduction Sub-second application response
More informationControl for CloudFlare - Installation and Preparations
Control for CloudFlare - Installation and Preparations Installation Backup your web directory and Magento 2 store database; Download Control for CloudFlare installation package; Copy files to /app/firebear/cloudflare/
More informationMaking Sense of Web Fraud With Splunk Stream
Making Sense of Web Fraud With Splunk Stream An in-depth look at Stream use cases and customer success stories with a focus on stream:http Jim Apger Minister of Mayhem Senior Security Architect Matthew
More informationData Obfuscation and Field Protection in Splunk
Data Obfuscation and Field Protection in Splunk Angelo Brancato Security Specialist Dirk Nitschke Senior Sales Engineer 28 September 2017 Washington, DC 2017 SPLUNK INC. Agenda Protect Your Machine Data
More informationScaling Indexer Clustering
Scaling Indexer Clustering 5 Million Unique Buckets and Beyond Cher-Hung Chang Principal Software Engineer Tameem Anwar Software Engineer 09/26/2017 Washington, DC Forward-Looking Statements During the
More informationDistil Networks & F5 Networks Integration Guide
INTEGRATIONGUIDE Distil Networks & F5 Networks Integration Guide (w) www.distilnetworks.com (e) sales@distilnetworks.com (US) 415.423.0831 (UK) +44.203.3184751 Table of Contents INTRODUCTION 3 F5 LTM 4
More informationComprehensive Citrix HDX visibility powered by NetScaler Management and Analytics System
Solution Brief HDX Insight powered by Citrix Comprehensive Citrix HDX visibility powered by NetScaler Management and Analytics System HDX Insight is the only tool in the market that provides endto-end
More informationIaaS. IaaS. Virtual Server
FUJITSU Cloud Service K5 for Public & Virtual Private Cloud UK Region Price List (November 2017) Pricing Overview: FUJITSU Cloud Service K5 for Type 1 and Type 2 Cloud Services is priced on a consumption
More informationSam Pickles, F5 Networks A DAY IN THE LIFE OF A WAF
Sam Pickles, F5 Networks A DAY IN THE LIFE OF A WAF Who am I? Sam Pickles Senior Engineer for F5 Networks WAF Specialist and general security type Why am I here? We get to see the pointy end of a lot of
More informationAccount Customer Portal Manual
Account Customer Portal Manual Table of Contents Introduction Dashboard Section Reporting Section My Settings Section My Account Section Billing Section Help Section 2 4 7 15 20 25 27 1 Introduction SMTP
More informationIaaS. IaaS. Virtual Server
FUJITSU Cloud Service K5 for Public & Virtual Private Cloud Germany Region Price List (December 2017) Pricing Overview: FUJITSU Cloud Service K5 for Type 1 and Type 2 Cloud Services is priced on a consumption
More informationIntroducing Splunk Validated Architectures (SVA)
Introducing Splunk Validated Architectures (SVA) Optimizing Your Path To Success With Splunk Sean Delaney Principal Architect Stefan Sievert Staff Architect September 2017 Washington, DC Forward-Looking
More informationProtecting Your SaaS Investment: Monitoring Office 365 Performance
Protecting Your SaaS Investment: Monitoring Office 365 Performance Utilizing the ExtraHop platform to ensure high performance from your Office 365 applications Achieving Higher Productivity and Business
More informationCO405H. Department of Compu:ng Imperial College London. Computing in Space with OpenSPL Topic 4: DataFlow Engines (DFEs)
Oskar Mencer CO405H Computing in Space with OpenSPL Topic 4: DataFlow Engines (DFEs) Georgi Gaydadjiev Department of Compu:ng Imperial College London h#p://www.doc.ic.ac.uk/~oskar/ h#p://www.doc.ic.ac.uk/~georgig/
More informationWhat You Think Is Real Is Not Real, Learn How Splunk Uncovered The Truth!
What You Think Is Real Is Not Real, Learn How Splunk Uncovered The Truth! Jeff Kent President m- mobo Alex Gitelzon System Administrator, APM Dennis Morton Splunk Expert m- mobo Copyright 2015 Splunk Inc.
More informationIaaS. IaaS. Virtual Server
FUJITSU Cloud Service K5 for Public & Virtual Private Cloud Germany Region Price List (March 2018) Pricing Overview: FUJITSU Cloud Service K5 for Type 1 and Type 2 Cloud Services is priced on a consumption
More informationMetrics Analysis with the Splunk Platform
Metrics Analysis with the Splunk Platform How to work with metrics for Monitoring, Alerting, and ad-hoc analysis at scale Michael Porath Product Management, Splunk Allan Yan Principal Software Engineer,
More informationForeScout Extended Module for Splunk
Version 2.8 Table of Contents About Splunk Integration... 5 Support for Splunk Enterprise and Splunk Enterprise Security... 6 What's New... 6 Support for Splunk Cloud... 6 Support for Batch Messaging...
More informationData Models for Developers
Copyright 2013 Splunk Inc. Data Models for Developers Alice Neels So
More informationThe Power of Data Normalization. A look at the Common Information Model
The Power of Data Normalization A look at the Common Information Model Mark Bonsack, CISSP Vladimir Skoryk, CISSP, CCFE, CHFI, CISA, CISM, RGTT Staff Sales Engineer, Splunk PS Supreme Architect, Splunk
More informationEnd User Monitoring. AppDynamics Pro Documentation. Version Page 1
End User Monitoring AppDynamics Pro Documentation Version 4.1.1 Page 1 End User Monitoring....................................................... 4 Browser Real User Monitoring.............................................
More informationMonitoring the Device
The system includes dashboards and an Event Viewer that you can use to monitor the device and traffic that is passing through the device. Enable Logging to Obtain Traffic Statistics, page 1 Monitoring
More informationTroubleshooting SMTP Routing. Chris Miller Director of Messaging/Collab Connectria
Troubleshooting SMTP Routing Chris Miller Director of Messaging/Collab Connectria What We ll Cover Following the breadcrumbs in the forest Planning to be an archeologist Running relay races, jumping hurdles
More informationWhat s New in Fireware v12.3 WatchGuard Training
What s New in Fireware v12.3 2 What s New in Fireware v12.3 Updates to Networking functionality: SD-WAN actions SD-WAN reporting enhancements NetFlow support Link monitor enhancements Centralized FireCluster
More informationLoad Balancing Web Servers with OWASP Top 10 WAF in Azure
Load Balancing Web Servers with OWASP Top 10 WAF in Azure Quick Reference Guide v1.0.3 ABOUT THIS GUIDE This document provides a quick reference guide on how to load balance Web Servers and configure a
More informationjetnexus Virtual Load Balancer
jetnexus Virtual Load Balancer Mitigate the Risk of Downtime and Optimise Application Delivery We were looking for a robust yet easy to use solution that would fit in with our virtualisation policy and
More informationHow your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter
How your network can take on the cloud and win Think beyond traditional networking toward a secure digital perimeter Contents Introduction... 3 Reduce risk points with secure, contextualized access...
More informationForeScout Extended Module for Splunk
ForeScout Extended Module for Splunk Version 2.7.0 Table of Contents About Splunk Integration... 5 Support for Splunk Enterprise and Splunk Enterprise Security... 7 What's New... 7 Support for Splunk Cloud...
More informationhaltdos - Web Application Firewall
haltdos - DATASHEET Delivering best-in-class protection for modern enterprise Protect your website against OWASP top-10 & Zero-day vulnerabilities, DDoS attacks, and more... Complete Attack Protection
More informationIaaS. IaaS. Virtual Server
FUJITSU Cloud Service K5 for Public & Virtual Private Cloud UK Region Price List (March 2018) Pricing Overview: FUJITSU Cloud Service K5 for Type 1 and Type 2 Cloud Services is priced on a consumption
More informationThreatScape App for QRadar: Overview, Installation and Configuration
ThreatScape App for QRadar: Overview, Installation and Configuration December 16, 2015 App Description... 3 System Requirements... 3 ThreatScape App for QRadar Installation and Configuration... 3 Configuration...
More informationDeploying the F5 Analytics iapp Template
Deploying the iapp Template Welcome to the F5 deployment guide for deploying F5 BIG-IP for easy export of statistical data. This document contains guidance on configuring the BIG-IP system with the Analytics
More informationQoS on Low Bandwidth High Delay Links. Prakash Shende Planning & Engg. Team Data Network Reliance Infocomm
QoS on Low Bandwidth High Delay Links Prakash Shende Planning & Engg. Team Data Network Reliance Infocomm Agenda QoS Some Basics What are the characteristics of High Delay Low Bandwidth link What factors
More information