More DEV Less OPS. An introduction to Opsview s Event Handlers. Summary Strategy What Kind of Automation Do I Want?...

Size: px
Start display at page:

Download "More DEV Less OPS. An introduction to Opsview s Event Handlers. Summary Strategy What Kind of Automation Do I Want?..."

Transcription

1 More DEV Less OPS An introduction to Opsview s Event Handlers Summary... 1 Strategy... 2 What Kind of Automation Do I Want?... 2 When Should This Occur?... 2 Soft States... 3 Dependency Mapping... 3 Detecting Bugs without Loss of Service... 5 Implementation... 7 How Do Event Handlers Work in Opsview?... 7 Process Flow... 7 Writing Event Handlers... 8 Remedy Scripts... 9 Let s Do It... 11

2 Page 1 Summary Monitoring software does not serve the purpose of replacing technical talent. Instead, it is there to make the lives of technical resources easier by removing tedious tasks from their day. By freeing up time, these resources can be better utilized by the business to do more development and spend less time maintaining the existing systems. The end goal in any monitoring project should be maintaining uptime by quickly resolving problems as they come up. Often the question Have you The trick is to adopt automatic resolution into your agile methodology. Each sprint yields new things that can break so it makes sense to create rules and scripts that can automatically fix things when they break. However, automatically restarting services serves to cover up the problem rather than truly fix it. This means that to effectively police this we will need to report on how often these corrective steps are taken. The more frequent the automatic resolution, the worse the bug. The best thing about this is that bugs are detected without causing an interruption of service. tried turning it off and on again? may offer the solution to any outages that arise, so a new question must be asked. If a simple, repetitive task is most often the answer; why is human capital being wasted on something that a computer can do? This approach means that unavoidable bugs should no longer cause systemic outages. These bumps in the road can even occur in production and they can be fixed automatically so that they don t lead to more serious problems. This can amount to less firefighting, less code regression and more time spent on the next thing.

3 Page 2 Strategy Automation cannot be effectively implemented without a little bit of planning. By rolling out automation hastily, you might exclude tasks that would have been helpful or introduce noise to the system by automating too many things. This section will help you to determine when automation is most appropriate. It will also help you to determine where in the process these methods should be introduced so that it can be most effective without causing more problems than it alleviates. This whitepaper will go over the following questions: Which tasks are better automated? Under what conditions should this automation occur? How would this be achieved in a tool like Opsview? What Kind of Automation Do I Want? This is going to vary by environment. The best way to determine which tasks should be automated is by consulting your ticketing system. What are some of your most common problems? What actions are most often taken by the team to fix these common problems? Do any patterns emerge? When patterns emerge we have found tasks that can potentially be automated. This will make the entire team more effective by taking the tedium out of their lives so that they are better focused on jobs that will require the creativity and intuition that computers are not good at. The examples of this paper are going to focus on three different automated tasks: Restart a service Renice a process Kill a process Each of these corrective actions will be performed under different conditions which we will get into in the next section. When Should This Occur? We have established what corrective actions we wish to try. Now it is time to carefully consider when these actions are most appropriate. The first thing that we will consider is the concept of a soft state or a buffer period between an initial failure and when an alert is sent out for human intervention. Next we will introduce dependencies between services as it relates to the ability to monitor. This will not only help to track down root causes of failures more easily but will also prevent excessive automated action which could get quite noisy if introduced incorrectly.

4 Page 3 Soft States To best leverage automation in your monitoring system it is important to give the automated tasks a chance to try and fix the problem before human intervention is required. This is best accomplished by introducing a time buffer or soft state where event handlers run before any notifications are sent out. First, the monitoring tool will notice if the corrective action has worked more quickly. Second, different corrective actions can be attempted at each retry attempt. This prevents your monitoring tool from trying the same solution over and over again and expecting different results; often considered the definition of insanity. Dependency Mapping There are two different possibilities for introducing a buffer period. You could either introduce a single wait period for a predefined amount of time or you could introduce a retry period of smaller time increments and set your buffer period to be a number of retry intervals. In order to take automatic corrective action, you must have a handle on the service level dependencies at play. For example, there are many Apache service checks to determine the availability and performance of your web server. We do not want each and every one of these service checks to restart the apache2 or httpd service every time that they fail. This would result in far too many restarts. Opsview takes the later approach. By introducing multiple shorter retry periods two benefits arise. Instead you want a parent level service check to be responsible for this task when there is a systemic TIME 0 OK WARNING WARNING OK OK OK CRITICAL WARNING CRITICAL UNKNOWN OK EVENT HANDLER MAX_CHECK_ATTEMPT - 3 NOTIFICATION

5 Page 4 problem that is affecting all apache service checks. It is important to note that dependencies in a monitoring tool must be considered from the point of view of the monitoring server. For example, the figure below indicates many service checks that may be associated with a common web application running a LAMP stack. In order to monitor these end metrics the host must first be up. This is verified with the host check command. Next it is important to check that the port required for monitoring that service is active. In this example the next level of dependency is to check the tcp response of ports 5666 (agent), 80 or 443 (HTTP/HTTPS), and 3306 (MySQL Listener) to make sure that there isn t a network problem like a firewall restriction. Next is where we verify that the service is running which is commonly checked by verifying that the number of processes for that user is greater than zero. It is important to consider that you may require the agent to monitor these processes. If that is the case, process or service status monitoring must be dependent on the previously checked agent response. Now it is possible to gather the more granular details about the web application. Automatic resolution should take place at the highest parent service that makes sense. For example killing parent processes when zombie processes get out of control or renicing runaway processes should be done at the immediate service check level. However, restarting a service should be AGENT CONNECT MEMORY & SWAP CPU LOAD DISK UTILIZATION L APACHE PROCESS HOST CHECK HTTP HTTPS ACTIVE SESSIONS IDLE WORKERS TRAFFIC A MYSQL PROCESS DB LISTENER CONNECTIONS BYTES IN/OUT OPEN FILES M CUSTOM PHP, PYTHON OR PERL CHECKS P HOST NETWORK PROCESS

6 Page 5 done at the process or service status level. Detecting Bugs without Loss of Service Now we have effectively maximized uptime by taking some of the tedious tasks out of the DEVOPS team s day. But have we actually fixed any of these problems? This is where it is important to run events reports against longer time windows. Frequent restarts or other regular corrective An example of such a report is shown on the next page. The first section outlines the number of state changes and the severity by day. This gives you a clear way of associating business events like code releases with the number of event handlers that are run. The second section lists a description of all of the events so that you can tell what the problems are and which corrective actions were taken in response. action may maximize uptime, but it may only be treating the symptom of a more serious underlying condition. To determine how often corrective action is taken you will have to isolate the parent level service checks that run your event handlers. It is then important to note all SOFT problem states that never go to a HARD state. By noting how many soft state events occur before resolution you will know which corrective action fixed the problem that time.

7 Page 6

8 Page 7 Implementation This next section will outline the way that event handlers work in Opsview. It will identify the steps that Opsview goes through from event to response. This section will provide some tips about writing your event handlers and remedy scripts that will run on the monitoring server and end device respectively. Finally it will walk through an actual lab exercise that you may choose to put into practice in your own environment. How Do Event Handlers Work in Opsview? When using Opsview, understanding the workflow of the event handlers is essential to implementing an effective automation strategy. This section of the article will isolate the process that occurs between detecting a state change and executing a script to potentially correct the condition. Throughout the process there will be environment variables to consult that are vital to understanding what the current conditions are and what action should be taken. Process Flow When a state change occurs there are multiple steps that occur before a script is run on the end device. First we must consider the monitoring server side. The service check or host has an event handler definition. This entry is the name and set of parameters for a script run in the location, /usr/ local/nagios/libexec/eventhandlers/. These scripts have environment variables available to them. This State Change Occurs Monitoring Server Runs Event Handler Logic Monitoring Server Issues Agent Command Agent Maps Command to Remedy Script Nagios User Executes Remedy Script

9 Page 8 are usually available in event handlers are also means that an event handler script can be aware of available in Opsview. The rule is to reference the host, service check, state type, service status and check attempt that was true at the time the script was run. This means that different agent commands can be issued at the event handler script level for Critical events vs. Warning events. The event handler script can also iterate through multiple remedy steps based on the check attempt. This means that you can try to restart a service when it first fails but if that doesn t work you can try to stop and start the service instead before classifying it as a hard failure where a human needs to be involved. The agent command that is issued to the end device needs to be interpreted. This means that when the agent receives a check_nrpe c command, it needs to understand what the c parameter means. To do this, the agent consults the file nrpe.cfg which has a mapping between -c entries and local scripts. Once this is achieved, it is just a matter of making sure that nagios user has sufficient privileges to run the UNIX commands in the script. Writing Event Handlers There are a variety of environment variables available at the event handler level. The general $NAGIOS_<MACRO NAME> inside of the script logic. This means that $HOSTADDRESS$ would be named $NAGIOS_HOSTADDRESS in the Opsview event handler. It is important to eliminate redundancy inside of event handlers because you don t want to try the same corrective action more than once under the same conditions. You also want to make sure that some form of corrective action takes place every retry interval. The most important macros to use in your event handler script (on the monitoring server side) are listed below: $NAGIOS_HOSTADDRESS the IP Address or DNS name of the end point. $NAGIOS_SERVICESTATE OK, WARNING or CRITICAL $NAGIOS_SERVICESTATETYPE SOFT or HARD $NAGIOS_SERVICEATTEMPT numeric number of check attempts starting at one. These macros can be leveraged to create different corrective actions for a HARD OK instead of a SOFT OK. It can also be used to take separate corrective actions for each value of Service Attempt. Each condition should have some logger action and a check_nrpe command issued to the rule of thumb is that all Nagios macros that

10 Page 9 / bin etc home usr var local nagios etc libexec nrpe_local nrpe.cfg eventhandlers plugins.cfg evhandle.cfg eh_kill eh_renice eh_restart end device to make the agent run a local script. The syntax of a check_nrpe command is listed below: $ cd /usr/local/nagios/libexec/ $./check_nrpe -H $NRPE_HOSTADDRESS$ -c <agent_command> -a <parameters> scripts on the master. It may be appropriate to follow a naming convention such as eh_* for better organization and improved sorting. The second consideration is command definition at the agent s configuration files. Verify that the final Remedy Scripts There are three main considerations when creating a remedy script. The first is where to place the script. Best practice dictates that all remedy scripts should be stored under /usr/local/nagios/ libexec/eventhandlers/ just like the event handler line in /usr/local/nagios/etc/nrpe.cfg on the agent side is an uncommented include_dir=/usr/local/ nagios/etc/nrpe_local which points the agent s configurations to a local directory. The file nrpe. cfg may be overwritten as a part of agent upgrades so all local configurations should be stored under the nrpe_local/ directory. Any file with a.cfg

11 Page 10 extension in nrpe_local or any subdirectory will be included in the agent s configurations. It is therefore best practice to create a file named eventhandlers.cfg under the nrpe_local directory for remedy script command definitions. This file will contain command definitions that map agent commands to local scripts. The third consideration that must be made about remedy scripts is what the nagios user is allowed to do on the end device. These corrective actions are going to be carried out by the nagios user and so certain privileges may have to be raised for the user. This may mean giving limited sudo access to the nagios user. Ensure that any corrective action that you want to take is possible as the nagios user command[eh_kill]= sudo /usr/local/nagios/libexec/eventhandlers/eh_kill $ARG1$ command[eh_renice]= sudo /usr/local/nagios/libexec/eventhandlers/eh_renice $ARG1$ command[eh_restart]= sudo /usr/local/nagios/libexec/eventhandlers/eh_restart $ARG1$ This is what the c argument to an agent command will be mapped to. For example, running the following command at the monitoring server: before deploying to production. It will be your job to determine the trade-offs of corrective action and raising the nagios user s privileges at the end device. $ /usr/local/nagios/libexec/check_nrpe H $NAGIOS_HOSTADDRESS c eh_restart a -s apache2 r Would be equivalent to the nagios user running the following command at the end point: $ sudo /usr/local/nagios/libexec/ eventhandlers/eh_restart s apache2 r

12 Page 11 Let s Do It Putting this into practice should be developed in the reverse of the event handler process flow so that each step can be effectively tested. First we write the script that issues the UNIX commands like service, renice, or kill. We will first test these commands as the root user. Next, we will make sure that the nagios user has sufficient privileges to issue these commands by granting conditional sudo access in such a way that it cannot be exploited. We then define the mapping between an agent command and the sudo execution of this script and restart the Opsview agent. Back on the monitoring server, the event handler logic needs to be written so that separate agent commands can be issued depending on the conditions that exist on the end device. It is then that the event handler can be assigned to the parent-level service check. 1. Write remedy scripts that issue UNIX commands. eh_restart_service s servicename r {restart} f {stop service then start service} eh_renice_process p <pid> -n <numeric nice value> eh_kill_process p <pid> -s <signal type> 2. Determine which commands or scripts you need to give sudo access to for the nagios user. $ whereis service service: /usr/sbin/service /usr/share/man /man8/service.8.gz $ whereis renice renice: /usr/bin/renice /usr/share/man/man1/renice.1.gz $ whereis kill kill: /bin/kill /usr/share/man/man1/kill.1.gz 3. Change the permissions of the nagios user to grant the limited sudo access. $ visudo nagios ALL=(root) NOPASSWD: /usr/sbin/service, /usr/bin/renice, /bin/kill

13 Page 12 Alternatively this comma separated list could be your remedy scripts themselves. By running the script in sudo mode, you are essentially applying sudo to all commands inside of the script. $ chown root:root /usr/local/nagios/libexec/eventhandlers/eh_restart_service $ chown root:root /usr/local/nagios/libexec/eventhandlers/eh_renice_process $ chown root:root /usr/local/nagios/libexec/eventhandlers/eh_kill_process $ visudo nagios ALL=(root) NOPASSWD: /usr/local/nagios/libexec/eventhandlers/eh_restart_service, /usr/local/nagios/libexec/eventhandlers/eh_renice_process, /usr/local/nagios/libexec/eventhandlers/eh_kill_process Now that these scripts can be executed at the root level by the nagios user it is imperative to change the ownership of these scripts to root so that they cannot be moved or modified for malicious means. 4. Define your agent commands in nrpe.cfg. $ vi /usr/local/nagios/etc/nrpe_local/eventhandlers.cfg command[eh_kill]=/usr/local/nagios/libexec/eventhandlers/eh_kill $ARG1$ command[eh_renice]=/usr/local/nagios/libexec/eventhandlers/eh_renice $ARG1$ command[eh_restart]=/usr/local/nagios/libexec/eventhandlers/eh_restart $ARG1$ If you have chosen to give the nagios user sudo access to the script, rather than the commands, make sure that the command definition includes sudo before the script s path. 5. Don t forget to restart or reload the opsview-agent service to pick up these new configurations. $ service opsview-agent restart 6. Test your agent commands on the monitoring server side. $ cd /usr/local/nagios/libexec $./check_nrpe H <agent address> -c eh_service_restart a -s <service> r

14 Page Write the event handler scripts on the monitoring server side. $vi /usr/local/nagios/libexec/eventhandlers/restart_service #!/bin/sh case $SERVICESTATE$ in OK ) case $SERVICESTATETYPE$ in SOFT ) ;; HARD ) #Recovery Action ;; WARNING ) ;; UNKNOWN ) ;; CRITICAL ) case $SERVICEATTEMPT$ in 1) /usr/local/nagios/libexec/check_nrpe H $HOSTADDRESS c eh_restart_service a -s $1 -r ;; 2) /usr/local/nagios/libexec/check_nrpe H $HOSTADDRESS c eh_restart_service a -s $1 -m ;; ;; esac exit 0 8. Assign the event handler to the appropriate service checks. Now the apache service will be restarted every time that there is a problem connecting to the server on port 80 or 443.

Purpose. Target Audience. Prerequisites. What Is An Event Handler? Nagios XI. Introduction to Event Handlers

Purpose. Target Audience. Prerequisites. What Is An Event Handler? Nagios XI. Introduction to Event Handlers Purpose This document describes how to use event handlers in to take predefined actions when the hosts or services you are monitoring change state. Event handlers are used to automate processes taken when

More information

These instructions cover how to install and use pre-compiled binaries to monitor AIX 5.3 using NRPE.

These instructions cover how to install and use pre-compiled binaries to monitor AIX 5.3 using NRPE. Purpose This document describes how to monitor AIX servers using or Nagios Core. The instructions were contributed by Joshua Whitaker, who successfully configured to monitor AIX 5.3 servers, thanks Joshua!

More information

Monitoring a HPC Cluster with Nagios

Monitoring a HPC Cluster with Nagios Cluster with Scuola Internazionale Superiore di Studi Avanzati Trieste 2009-04-01 1 2009-04-03 1 Try again... Fail better. Outline 1 2 3 Installation for Monitoring @SISSA Cluster with What is? «R is a

More information

How To Monitor Apache Cassandra Distributed Databases

How To Monitor Apache Cassandra Distributed Databases Purpose This document describes how to configure to monitor Apache Cassandra distributed database implementations in order to ensure that data, as well as the hardware housing it, is operating properly.

More information

Getting Started User s Guide

Getting Started User s Guide Getting Started User s Guide Savision iq V2.3 Contents 1. Introduction... 4 1.1 About this Guide... 4 1.2 Understanding Savision iq... 4 2. First Run Experience... 4 2.1 Adding the License Key... 5 2.2

More information

Install some base packages. I recommend following this guide as root on a new VPS or using sudo su, it will make running setup just a touch easier.

Install some base packages. I recommend following this guide as root on a new VPS or using sudo su, it will make running setup just a touch easier. Nagios 4 on Ubuntu 16 Install some base packages. I recommend following this guide as root on a new VPS or using sudo su, it will make running setup just a touch easier. apt-get install php-gd build-essential

More information

This document is intended for use by Nagios Administrators that want to use Slack for notifications.

This document is intended for use by Nagios Administrators that want to use Slack for notifications. Purpose This document describes how integrate the Slack messaging platform with. This integration will allow to send notifications to Slack channels, enabling teams to see the health of their devices monitored

More information

Services: Monitoring and Logging. 9/16/2018 IST346: Info Tech Management & Administration 1

Services: Monitoring and Logging. 9/16/2018 IST346: Info Tech Management & Administration 1 Services: Monitoring and Logging 9/16/2018 IST346: Info Tech Management & Administration 1 Recall: Server vs. Service A server is a computer. A service is an offering provided by server(s). HTTP 9/16/2018

More information

NRPE DOCUMENTATIOND. Copyright (c) Ethan Galstad. Last Updated: 17 November Contents

NRPE DOCUMENTATIOND. Copyright (c) Ethan Galstad. Last Updated: 17 November Contents NRPE OCUMENTATION Copyright (c) 1999-2017 Ethan Galstad Last Updated: 17 November 2017 Contents 1. Introduction... 2 a) Purpose... 2 b) esign Overview... 2 2. Example Uses... 3 a) irect Checks... 3 b)

More information

Function. Description

Function. Description Function Check In Get / Checkout Description Checking in a file uploads the file from the user s hard drive into the vault and creates a new file version with any changes to the file that have been saved.

More information

Plugin Monitoring for GLPI

Plugin Monitoring for GLPI Plugin Monitoring for GLPI Introduction 2 TOC 3 Contents Preface: Introduction...v Goals of this project... v Why is it revolutionary?...v Links...v Internet site...v IRC-Channel...vi Terms used in this

More information

Red Hat Ceph Storage 3

Red Hat Ceph Storage 3 Red Hat Ceph Storage 3 Monitoring Ceph for Red Hat Enterprise Linux with Nagios Monitoring Ceph for Red Hat Enterprise Linux with Nagios Core. Last Updated: 2018-06-21 Red Hat Ceph Storage 3 Monitoring

More information

IMC Network Traffic Analyzer 7.2 (E0401P04) Copyright 2016 Hewlett Packard Enterprise Development LP

IMC Network Traffic Analyzer 7.2 (E0401P04) Copyright 2016 Hewlett Packard Enterprise Development LP Network Traffic Analyzer 7.2 (E0401P04) Copyright 2016 Hewlett Packard Enterprise Development LP Table of Contents 1. What's New in this Release 2. Problems Fixed in this Release 3. Software Distribution

More information

Backing Up And Restoring Your Nagios XI System

Backing Up And Restoring Your Nagios XI System Backing Up And Restoring Your System Purpose This document describes how to backup a installation and restore a installation from a previously made backup. Backups are an important aspect of administration

More information

How can you manage what you can t see?

How can you manage what you can t see? How can you manage what you can t see? Know what you have with Panda Cloud Systems Management Business challenge: You can t manage it if you don t know it exists. Do you have 100% permanent visibility

More information

Performance Monitors Setup Guide

Performance Monitors Setup Guide Performance Monitors Setup Guide Version 1.0 2017 EQ-PERF-MON-20170530 Equitrac Performance Monitors Setup Guide Document Revision History Revision Date May 30, 2017 Revision List Initial Release 2017

More information

Linux System Administration

Linux System Administration System Processes Objective At the conclusion of this module, the student will be able to: Describe and define a process Identify a process ID, the parent process and the child process Learn the PID for

More information

Checking Resource Usage in Fedora (Linux)

Checking Resource Usage in Fedora (Linux) Lab 5C Checking Resource Usage in Fedora (Linux) Objective In this exercise, the student will learn how to check the resources on a Fedora system. This lab covers the following commands: df du top Equipment

More information

Securing Unix Filesystems - When Good Permissions Go Bad

Securing Unix Filesystems - When Good Permissions Go Bad Securing Unix Filesystems - When Good Permissions Go Bad Introduction Unix has a very elegant and flexible permission system at the heart of its filesystem security. These permissions allow and/or disallow

More information

Configuring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved.

Configuring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved. Configuring the Oracle Network Environment Objectives After completing this lesson, you should be able to: Use Enterprise Manager to: Create additional listeners Create Oracle Net Service aliases Configure

More information

Learning Nagios 4. Wojciech Kocjan. Chapter No.1 "Introducing Nagios"

Learning Nagios 4. Wojciech Kocjan. Chapter No.1 Introducing Nagios Learning Nagios 4 Wojciech Kocjan Chapter No.1 "Introducing Nagios" In this package, you will find: A Biography of the author of the book A preview chapter from the book, Chapter NO.1 "Introducing Nagios"

More information

Visual Design Flows for Faster Debug and Time to Market FlowTracer White Paper

Visual Design Flows for Faster Debug and Time to Market FlowTracer White Paper Visual Design Flows for Faster Debug and Time to Market FlowTracer White Paper 2560 Mission College Blvd., Suite 130 Santa Clara, CA 95054 (408) 492-0940 Introduction As System-on-Chip (SoC) designs have

More information

Web Attacks Lab. 35 Points Group Lab Due Date: Lesson 16

Web Attacks Lab. 35 Points Group Lab Due Date: Lesson 16 CS482 SQL and XSS Attack Lab AY172 1 Web Attacks Lab 35 Points Group Lab Due Date: Lesson 16 Derived from c 2006-2014 Wenliang Du, Syracuse University. Do not redistribute with explicit consent from MAJ

More information

This document is intended for use by Nagios XI Administrators who wish to monitor JMX applications.

This document is intended for use by Nagios XI Administrators who wish to monitor JMX applications. Monitoring JMX With Purpose This document will cover how to monitor Java application servers using the check_jmx plugin within, in order for users to be notified when java applications are not functioning

More information

System Administration for Beginners

System Administration for Beginners System Administration for Beginners Week 5 Notes March 16, 2009 1 Introduction In the previous weeks, we have covered much of the basic groundwork needed in a UNIX environment. In the upcoming weeks, we

More information

Purpose. Target Audience. Solution Overview NCPA. Using NCPA For Passive Checks

Purpose. Target Audience. Solution Overview NCPA. Using NCPA For Passive Checks Using For Passive Checks Purpose This document describes how to configure the Nagios Cross Platform Agent () to send passive check results to Nagios XI or Nagios Core using Nagios Remote Data Processor

More information

Plugin Monitoring for GLPI

Plugin Monitoring for GLPI Plugin Monitoring for GLPI Introduction 2 TOC 3 Contents Preface: Introduction...v Goals of this project... v Why is it revolutionnary?...v Links...v Internet site...v IRC-Channel...v Terms used in this

More information

CHAPTER 2. Troubleshooting CGI Scripts

CHAPTER 2. Troubleshooting CGI Scripts CHAPTER 2 Troubleshooting CGI Scripts OVERVIEW Web servers and their CGI environment can be set up in a variety of ways. Chapter 1 covered the basics of the installation and configuration of scripts. However,

More information

Linux Systems Administration Getting Started with Linux

Linux Systems Administration Getting Started with Linux Linux Systems Administration Getting Started with Linux Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International

More information

Operating Systems Lab 1 (Users, Groups, and Security)

Operating Systems Lab 1 (Users, Groups, and Security) Operating Systems Lab 1 (Users, Groups, and Security) Overview This chapter covers the most common commands related to users, groups, and security. It will also discuss topics like account creation/deletion,

More information

Administering a SQL Database Infrastructure

Administering a SQL Database Infrastructure Administering a SQL Database Infrastructure 20764B; 5 Days; Instructor-led Course Description This five-day instructor-led course provides students who administer and maintain SQL Server databases with

More information

Linux Virtual Machine (VM) Provisioning on the Hyper-V Platform

Linux Virtual Machine (VM) Provisioning on the Hyper-V Platform I T S E R V I C E S Son Truong Systems & Operations Unix Technical Lead November 2016 SERVER PROVISIONING: Linux Virtual Machine (VM) Provisioning on the Hyper-V Platform Standard Linux VM Introduction

More information

DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER

DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER Table of Contents Table of Contents Introducing the F5 and Oracle Access Manager configuration Prerequisites and configuration notes... 1 Configuration

More information

Announcement. Exercise #2 will be out today. Due date is next Monday

Announcement. Exercise #2 will be out today. Due date is next Monday Announcement Exercise #2 will be out today Due date is next Monday Major OS Developments 2 Evolution of Operating Systems Generations include: Serial Processing Simple Batch Systems Multiprogrammed Batch

More information

Installing SmartSense on HDP

Installing SmartSense on HDP 1 Installing SmartSense on HDP Date of Publish: 2018-07-12 http://docs.hortonworks.com Contents SmartSense installation... 3 SmartSense system requirements... 3 Operating system, JDK, and browser requirements...3

More information

"Charting the Course... MOC C: Administering an SQL Database Infrastructure. Course Summary

Charting the Course... MOC C: Administering an SQL Database Infrastructure. Course Summary Description Course Summary This five-day instructor-led course provides students who administer and maintain SQL databases with the knowledge and skills to administer a SQL server database infrastructure.

More information

Table of Contents. Server Migrations Hints, tips and planning considerations

Table of Contents. Server Migrations Hints, tips and planning considerations Server Migrations Hints, tips and planning considerations Table of Contents Introduction:...2 Overview:...2 Migrating your server...2 Audit of the existing server:...2 Preparing the new server:...3 Syncing

More information

simplevisor Documentation

simplevisor Documentation simplevisor Documentation Release 1.2 Massimo Paladin June 27, 2016 Contents 1 Main Features 1 2 Installation 3 3 Configuration 5 4 simplevisor command 9 5 simplevisor-control command 13 6 Supervisor

More information

Troubleshooting the Installation

Troubleshooting the Installation APPENDIX A Troubleshooting the Installation This appendix provides troubleshooting information for Essentials installation and setup, and contains the following sections: If the Installer Window Does Not

More information

Step-by-Step Setup for the openitcockpit Monitoring System. Installation guide

Step-by-Step Setup for the openitcockpit Monitoring System. Installation guide Step-by-Step Setup for the openitcockpit Monitoring System Installation guide Version: May 2016 Legal it-novum GmbH Edelzeller Strasse 44 36043 Fulda Germany Tel: +49 661 103-333 Fax: +49 661 103-597 info@it-novum.com

More information

EventSentry Quickstart Guide

EventSentry Quickstart Guide Contents I Part I About This Guide 2 Part II Overview 3 Part III Installing EventSentry 6 1 Installation with... Setup 7 2 Management Application... 8 3 Configuration... 9 4 Remote Update... 12 5 Heartbeat

More information

Ticketing Service 1 Request Tracker (RT) Installation and Configuration

Ticketing Service 1 Request Tracker (RT) Installation and Configuration Ticketing Service 1 Request Tracker (RT) Installation and Configuration 1.1 Notes: This lab note is taken from NSRC Workshop LAB, therefore requested to change pcx.ws.nsrc.org with your domain. Commands

More information

Windows 2000 / XP / Vista User Guide

Windows 2000 / XP / Vista User Guide Windows 2000 / XP / Vista User Guide Version 5.5.1.0 September 2008 Backup Island v5.5 Copyright Notice The use and copying of this product is subject to a license agreement. Any other use is prohibited.

More information

Quick KVM 1.1. User s Guide. ClearCube Technology, Inc.

Quick KVM 1.1. User s Guide. ClearCube Technology, Inc. Quick KVM 1.1 User s Guide ClearCube Technology, Inc. Copyright 2005, ClearCube Technology, Inc. All rights reserved. Under copyright laws, this publication may not be reproduced or transmitted in any

More information

9.2 Linux Essentials Exam Objectives

9.2 Linux Essentials Exam Objectives 9.2 Linux Essentials Exam Objectives This chapter will cover the topics for the following Linux Essentials exam objectives: Topic 3: The Power of the Command Line (weight: 10) 3.3: Turning Commands into

More information

Course 20764: Administering a SQL Database Infrastructure

Course 20764: Administering a SQL Database Infrastructure Course 20764: Administering a SQL Database Infrastructure About this course: This five-day instructor-led course provides students who administer and maintain SQL Server databases with the knowledge and

More information

MassTransit Server Installation Guide for Windows

MassTransit Server Installation Guide for Windows MassTransit 6.1.1 Server Installation Guide for Windows November 24, 2009 Group Logic, Inc. 1100 North Glebe Road, Suite 800 Arlington, VA 22201 Phone: 703-528-1555 Fax: 703-528-3296 E-mail: info@grouplogic.com

More information

CPSC 341 OS & Networks. Processes. Dr. Yingwu Zhu

CPSC 341 OS & Networks. Processes. Dr. Yingwu Zhu CPSC 341 OS & Networks Processes Dr. Yingwu Zhu Process Concept Process a program in execution What is not a process? -- program on a disk A process is an active object, but a program is just a file It

More information

Security Fundamentals for your Privileged Account Security Deployment

Security Fundamentals for your Privileged Account Security Deployment Security Fundamentals for your Privileged Account Security Deployment February 2016 Copyright 1999-2016 CyberArk Software Ltd. All rights reserved. CAVSEC-PASSF-0216 Compromising privileged accounts is

More information

TANDBERG Management Suite - Redundancy Configuration and Overview

TANDBERG Management Suite - Redundancy Configuration and Overview Management Suite - Redundancy Configuration and Overview TMS Software version 11.7 TANDBERG D50396 Rev 2.1.1 This document is not to be reproduced in whole or in part without the permission in writing

More information

The Wonderful World of Services VINCE

The Wonderful World of Services VINCE The Wonderful World of Services VINCE Agenda definitions services for Windows and Linux breaks? auditing Linux logs for Linux useful tools Goals develop a better understanding of Linux and Windows services

More information

FieldView. Management Suite

FieldView. Management Suite FieldView The FieldView Management Suite (FMS) system allows administrators to view the status of remote FieldView System endpoints, create and apply system configurations, and manage and apply remote

More information

New Features Guide EventTracker v6.2

New Features Guide EventTracker v6.2 New Features Guide EventTracker v6.2 Publication Date: Aug 04, 2008 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com The information contained in this document represents the

More information

ffproxy (8) FreeBSD System Manager s Manual ffproxy (8)

ffproxy (8) FreeBSD System Manager s Manual ffproxy (8) NAME ffproxy filtering HTTP/HTTPS proxy server SYNOPSIS ffproxy [ p port] [ c ip hostname] [ C ip hostname] [ l childs] [ u uid user g gid group] [ r dir] [ D datadir] [ x proxyip proxyhost X proxyport]

More information

Training 24x7 DBA Support Staffing. Administering a SQL Database Infrastructure (40 Hours) Exam

Training 24x7 DBA Support Staffing. Administering a SQL Database Infrastructure (40 Hours) Exam Administering a SQL Database Infrastructure (40 Hours) Exam 70-764 Prerequisites Basic knowledge of the Microsoft Windows operating system and its core functionality. Working knowledge of Transact-SQL.

More information

Hands-on Exercise Hadoop

Hands-on Exercise Hadoop Department of Economics and Business Administration Chair of Business Information Systems I Prof. Dr. Barbara Dinter Big Data Management Hands-on Exercise Hadoop Building and Testing a Hadoop Cluster by

More information

STORAGECRAFT SHADOWPROTECT 5 DESKTOP

STORAGECRAFT SHADOWPROTECT 5 DESKTOP STORAGECRAFT SHADOWPROTECT 5 DESKTOP PRODUCT BRIEF 1 THE CHALLENGE OF BUSINESS CONTINUITY Businesses are becoming less centralized in the 21st century with many more workers relying on laptops as their

More information

Integrating with your Third Party Monitoring Software

Integrating with your Third Party Monitoring Software Integrating with your Third Party Monitoring Software OVERVIEW When using a software that monitors your networks, the notifications can be sent to NetHelpDesk, and handled in different ways. There are

More information

Garment Documentation

Garment Documentation Garment Documentation Release 0.1 Evan Borgstrom March 25, 2014 Contents i ii A collection of fabric tasks that roll up into a single deploy function. The whole process is coordinated through a single

More information

Red Hat Ceph Storage 3

Red Hat Ceph Storage 3 Red Hat Ceph Storage 3 Monitoring Ceph for Ubuntu with Nagios Monitoring Ceph for Ubuntu with Nagios Core. Last Updated: 2018-09-07 Red Hat Ceph Storage 3 Monitoring Ceph for Ubuntu with Nagios Monitoring

More information

Performing an ObserveIT Upgrade Using the Interactive Installer

Performing an ObserveIT Upgrade Using the Interactive Installer Performing an ObserveIT Upgrade Using the Interactive Installer ABOUT THIS DOCUMENT This document contains detailed procedures and instructions on how to upgrade ObserveIT by using the interactive "One

More information

Xton Access Manager GETTING STARTED GUIDE

Xton Access Manager GETTING STARTED GUIDE Xton Access Manager GETTING STARTED GUIDE XTON TECHNOLOGIES, LLC PHILADELPHIA Copyright 2017. Xton Technologies LLC. Contents Introduction... 2 Technical Support... 2 What is Xton Access Manager?... 3

More information

Microsoft Administering a SQL Database Infrastructure

Microsoft Administering a SQL Database Infrastructure 1800 ULEARN (853 276) www.ddls.com.au Microsoft 20764 - Administering a SQL Database Infrastructure Length 5 days Price $4290.00 (inc GST) Version C Overview This five-day instructor-led course provides

More information

Who am I? I m a python developer who has been working on OpenStack since I currently work for Aptira, who do OpenStack, SDN, and orchestration

Who am I? I m a python developer who has been working on OpenStack since I currently work for Aptira, who do OpenStack, SDN, and orchestration Who am I? I m a python developer who has been working on OpenStack since 2011. I currently work for Aptira, who do OpenStack, SDN, and orchestration consulting. I m here today to help you learn from my

More information

Monitoring SharePoint 2007/ 2010/ 2013 Server using EventTracker

Monitoring SharePoint 2007/ 2010/ 2013 Server using EventTracker Monitoring SharePoint 2007/ 2010/ 2013 Server using EventTracker Publication Date: June 12, 2012 Abstract EventTracker allows you to effectively manage your systems and provides operational efficiencies

More information

Processing Troubleshooting Guide

Processing Troubleshooting Guide Processing Troubleshooting Guide March 5, 2018 - Version 9.5.411.4 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

More information

KEMP 360 Vision. KEMP 360 Vision. Product Overview

KEMP 360 Vision. KEMP 360 Vision. Product Overview KEMP 360 Vision Product Overview VERSION: 1.0 UPDATED: SEPTEMBER 2016 Table of Contents 1 Introduction... 3 1.1 Document Purpose... 3 1.2 Intended Audience... 3 2 Architecture... 4 3 Sample Scenarios...

More information

CorreLog. Ping Monitor Adapter Software Users Manual

CorreLog. Ping Monitor Adapter Software Users Manual CorreLog Ping Monitor Adapter Software Users Manual http://www.correlog.com mailto:info@correlog.com CorreLog, Ping Monitor Users Manual Copyright 2008-2017, CorreLog, Inc. All rights reserved. No part

More information

Laserfiche Rio 10.3: Deployment Guide. White Paper

Laserfiche Rio 10.3: Deployment Guide. White Paper Laserfiche Rio 10.3: Deployment Guide White Paper January 2018 Table of Contents How Laserfiche Licensing Works... 4 Types of Licenses... 4 Named User Licenses... 4 WebLink Public Portal Licenses... 6

More information

NWC 2011 Monitoring a Cloud Infrastructure in a Multi-Region Topology

NWC 2011 Monitoring a Cloud Infrastructure in a Multi-Region Topology NWC 2011 Monitoring a Cloud Infrastructure in a Multi-Region Topology Nicolas Brousse nicolas@tubemogul.com September 29th 2011 1 Introduction - About the speaker My name is Nicolas Brousse I previously

More information

Adopting Agile Practices

Adopting Agile Practices Adopting Agile Practices Ian Charlton Managing Consultant ReleasePoint Software Testing Solutions ANZTB SIGIST (Perth) 30 November 2010 Tonight s Agenda What is Agile? Why is Agile Important to Testers?

More information

E N F U Z I O N 3 D U S E R G U I D E. Axceleon, Inc. EnFuzion3D User Guide. For Windows, OS X and Linux Users

E N F U Z I O N 3 D U S E R G U I D E. Axceleon, Inc. EnFuzion3D User Guide. For Windows, OS X and Linux Users Axceleon, Inc. EnFuzion3D 2015.1 User Guide For Windows, OS X and Linux Users Legal Notices EnFuzion3D 2015 User Guide for Windows, OS X and Linux Users Document Version: 2015.1 Publication Date: 2015.07.21

More information

If you re the administrator on any network,

If you re the administrator on any network, Let s do an inventory! If you re the administrator on any network, chances are you ve already faced the need to make an inventory. In fact, keeping a list of all the computers, monitors, software and other

More information

Bitnami MySQL for Huawei Enterprise Cloud

Bitnami MySQL for Huawei Enterprise Cloud Bitnami MySQL for Huawei Enterprise Cloud Description MySQL is a fast, reliable, scalable, and easy to use open-source relational database system. MySQL Server is intended for mission-critical, heavy-load

More information

CPS221 Lecture: Operating System Protection

CPS221 Lecture: Operating System Protection Objectives CPS221 Lecture: Operating System Protection last revised 9/5/12 1. To explain the use of two CPU modes as the basis for protecting privileged instructions and memory 2. To introduce basic protection

More information

GNU/Linux: An Essential Guide for Students Undertaking BLOSSOM

GNU/Linux: An Essential Guide for Students Undertaking BLOSSOM Copyright: The development of this document is funded by Higher Education of Academy. Permission is granted to copy, distribute and /or modify this document under a license compliant with the Creative

More information

Configuration Manager

Configuration Manager CHAPTER 7 This chapter describes how to perform routine Cisco VXC Manager configuration management tasks using the Administrator Console. It provides information on managing the configuration settings

More information

Cloud Monitoring as a Service. Built On Machine Learning

Cloud Monitoring as a Service. Built On Machine Learning Cloud Monitoring as a Service Built On Machine Learning Table of Contents 1 2 3 4 5 6 7 8 9 10 Why Machine Learning Who Cares Four Dimensions to Cloud Monitoring Data Aggregation Anomaly Detection Algorithms

More information

Purpose. Target Audience. Install SNMP On The Remote Linux Machine. Nagios XI. Monitoring Linux Using SNMP

Purpose. Target Audience. Install SNMP On The Remote Linux Machine. Nagios XI. Monitoring Linux Using SNMP Purpose This document describes how to monitor Linux machines with using SNMP. SNMP is an agentless method of monitoring network devices and servers, and is often preferable to installing dedicated agents

More information

Introduction to Programming Style

Introduction to Programming Style Introduction to Programming Style Thaddeus Aid The IT Learning Programme The University of Oxford, UK 30 July, 2013 Abstract Programming style is the part of the program that the human reads and the compiler

More information

Duration: 5 Days Course Code: M20764 Version: B Delivery Method: Elearning (Self-paced)

Duration: 5 Days Course Code: M20764 Version: B Delivery Method: Elearning (Self-paced) Administering a SQL Database Infrastructure Duration: 5 Days Course Code: M20764 Version: B Delivery Method: Elearning (Self-paced) Overview: This five-day instructor-led course provides students who administer

More information

Frequently Asked Questions About Performance Monitor

Frequently Asked Questions About Performance Monitor APPENDIXA Frequently Asked Questions About Performance Monitor The following topics answer common questions about Performance monitor and contain troubleshooting tips: Installation, page A-1 Importing,

More information

The Swiss Army Knife netcat

The Swiss Army Knife netcat The Swiss Army Knife netcat Lab Objectives In this lab, you will perform the following six labs: Lab 1 Use Netcat for Port Scanning Lab 2 Use Netcat for Banner Grabbing Lab 3 Use Netcat to Transfer Files

More information

Installing Koha on Windows XP. Amandeep Kapila

Installing Koha on Windows XP. Amandeep Kapila Installing Koha on Windows XP For MLIS Online by Amandeep Kapila 0 Introduction KOHA is an Integrated Library System with all the features that are required in day to day library management operations.

More information

Informatica Developer Tips for Troubleshooting Common Issues PowerCenter 8 Standard Edition. Eugene Gonzalez Support Enablement Manager, Informatica

Informatica Developer Tips for Troubleshooting Common Issues PowerCenter 8 Standard Edition. Eugene Gonzalez Support Enablement Manager, Informatica Informatica Developer Tips for Troubleshooting Common Issues PowerCenter 8 Standard Edition Eugene Gonzalez Support Enablement Manager, Informatica 1 Agenda Troubleshooting PowerCenter issues require a

More information

What Building Multiple Scalable DC/OS Deployments Taught Me about Running Stateful Services on DC/OS

What Building Multiple Scalable DC/OS Deployments Taught Me about Running Stateful Services on DC/OS What Building Multiple Scalable DC/OS Deployments Taught Me about Running Stateful Services on DC/OS Nathan Shimek - VP of Client Solutions at New Context Dinesh Israin Senior Software Engineer at Portworx

More information

ASTQB Advance Test Analyst Sample Exam Answer Key and Rationale

ASTQB Advance Test Analyst Sample Exam Answer Key and Rationale ASTQB Advance Test Analyst Sample Exam Answer Key and Rationale Total number points = 120 points Total number points to pass = 78 points Question Answer Explanation / Rationale Learning 1 A A is correct.

More information

Process Time. Steven M. Bellovin January 25,

Process Time. Steven M. Bellovin January 25, Multiprogramming Computers don t really run multiple programs simultaneously; it just appears that way Each process runs to completion, but intermixed with other processes Process 1 6 ticks Process 2 Process

More information

WHITE PAPER Application Performance Management. The Case for Adaptive Instrumentation in J2EE Environments

WHITE PAPER Application Performance Management. The Case for Adaptive Instrumentation in J2EE Environments WHITE PAPER Application Performance Management The Case for Adaptive Instrumentation in J2EE Environments Why Adaptive Instrumentation?... 3 Discovering Performance Problems... 3 The adaptive approach...

More information

WHITE PAPER: ENTERPRISE AVAILABILITY. Introduction to Adaptive Instrumentation with Symantec Indepth for J2EE Application Performance Management

WHITE PAPER: ENTERPRISE AVAILABILITY. Introduction to Adaptive Instrumentation with Symantec Indepth for J2EE Application Performance Management WHITE PAPER: ENTERPRISE AVAILABILITY Introduction to Adaptive Instrumentation with Symantec Indepth for J2EE Application Performance Management White Paper: Enterprise Availability Introduction to Adaptive

More information

Think Small to Scale Big

Think Small to Scale Big Think Small to Scale Big Intro to Containers for the Datacenter Admin Pete Zerger Principal Program Manager, MVP pete.zerger@cireson.com Cireson Lee Berg Blog, e-mail address, title Company Pete Zerger

More information

ECE 550D Fundamentals of Computer Systems and Engineering. Fall 2017

ECE 550D Fundamentals of Computer Systems and Engineering. Fall 2017 ECE 550D Fundamentals of Computer Systems and Engineering Fall 2017 The Operating System (OS) Prof. John Board Duke University Slides are derived from work by Profs. Tyler Bletsch and Andrew Hilton (Duke)

More information

Amazon Web Services Hands on EC2 December, 2012

Amazon Web Services Hands on EC2 December, 2012 Amazon Web Services Hands on EC2 December, 2012 Copyright 2011-2012, Amazon Web Services, All Rights Reserved Page 1-42 Table of Contents Launch a Linux Instance... 4 Connect to the Linux Instance Using

More information

Cyber security tips and self-assessment for business

Cyber security tips and self-assessment for business Cyber security tips and self-assessment for business Last year one in five New Zealand SMEs experienced a cyber-attack, so it s essential to be prepared. Our friends at Deloitte have put together this

More information

Proactive Performance Monitoring for Citrix XenApp & XenDesktop

Proactive Performance Monitoring for Citrix XenApp & XenDesktop Proactive Performance Monitoring for Citrix XenApp & XenDesktop TECHNOLOGY OVERVIEW In approximately one week, support tickets dropped by 25% Our customers were complaining about persistent slowness with

More information

Parallelizing Windows Operating System Services Job Flows

Parallelizing Windows Operating System Services Job Flows ABSTRACT SESUG Paper PSA-126-2017 Parallelizing Windows Operating System Services Job Flows David Kratz, D-Wise Technologies Inc. SAS Job flows created by Windows operating system services have a problem:

More information

Tzunami Deployer Lotus Notes Exporter Guide

Tzunami Deployer Lotus Notes Exporter Guide Tzunami Deployer Lotus Notes Exporter Guide Version 2.5 Copyright 2010. Tzunami Inc. All rights reserved. All intellectual property rights in this publication are owned by Tzunami, Inc. and protected by

More information

BrownNow A Current Events Application for Brown University. Craig Hawkins Advisor: Stan Zdonik Masters Project Report, Brown University 2017

BrownNow A Current Events Application for Brown University. Craig Hawkins Advisor: Stan Zdonik Masters Project Report, Brown University 2017 BrownNow A Current Events Application for Brown University Craig Hawkins Advisor: Stan Zdonik Masters Project Report, Brown University 2017 1. Introduction Brown University has an existing events notification

More information

ForeScout Extended Module for Carbon Black

ForeScout Extended Module for Carbon Black ForeScout Extended Module for Carbon Black Version 1.0 Table of Contents About the Carbon Black Integration... 4 Advanced Threat Detection with the IOC Scanner Plugin... 4 Use Cases... 5 Carbon Black Agent

More information

Most of the work is done in the context of the process rather than handled separately by the kernel

Most of the work is done in the context of the process rather than handled separately by the kernel Process Control Process Abstraction for a running program Manages program s use of memory, cpu time, and i/o resources Most of the work is done in the context of the process rather than handled separately

More information