More DEV Less OPS. An introduction to Opsview s Event Handlers. Summary Strategy What Kind of Automation Do I Want?...
|
|
- Raymond Griffith
- 5 years ago
- Views:
Transcription
1 More DEV Less OPS An introduction to Opsview s Event Handlers Summary... 1 Strategy... 2 What Kind of Automation Do I Want?... 2 When Should This Occur?... 2 Soft States... 3 Dependency Mapping... 3 Detecting Bugs without Loss of Service... 5 Implementation... 7 How Do Event Handlers Work in Opsview?... 7 Process Flow... 7 Writing Event Handlers... 8 Remedy Scripts... 9 Let s Do It... 11
2 Page 1 Summary Monitoring software does not serve the purpose of replacing technical talent. Instead, it is there to make the lives of technical resources easier by removing tedious tasks from their day. By freeing up time, these resources can be better utilized by the business to do more development and spend less time maintaining the existing systems. The end goal in any monitoring project should be maintaining uptime by quickly resolving problems as they come up. Often the question Have you The trick is to adopt automatic resolution into your agile methodology. Each sprint yields new things that can break so it makes sense to create rules and scripts that can automatically fix things when they break. However, automatically restarting services serves to cover up the problem rather than truly fix it. This means that to effectively police this we will need to report on how often these corrective steps are taken. The more frequent the automatic resolution, the worse the bug. The best thing about this is that bugs are detected without causing an interruption of service. tried turning it off and on again? may offer the solution to any outages that arise, so a new question must be asked. If a simple, repetitive task is most often the answer; why is human capital being wasted on something that a computer can do? This approach means that unavoidable bugs should no longer cause systemic outages. These bumps in the road can even occur in production and they can be fixed automatically so that they don t lead to more serious problems. This can amount to less firefighting, less code regression and more time spent on the next thing.
3 Page 2 Strategy Automation cannot be effectively implemented without a little bit of planning. By rolling out automation hastily, you might exclude tasks that would have been helpful or introduce noise to the system by automating too many things. This section will help you to determine when automation is most appropriate. It will also help you to determine where in the process these methods should be introduced so that it can be most effective without causing more problems than it alleviates. This whitepaper will go over the following questions: Which tasks are better automated? Under what conditions should this automation occur? How would this be achieved in a tool like Opsview? What Kind of Automation Do I Want? This is going to vary by environment. The best way to determine which tasks should be automated is by consulting your ticketing system. What are some of your most common problems? What actions are most often taken by the team to fix these common problems? Do any patterns emerge? When patterns emerge we have found tasks that can potentially be automated. This will make the entire team more effective by taking the tedium out of their lives so that they are better focused on jobs that will require the creativity and intuition that computers are not good at. The examples of this paper are going to focus on three different automated tasks: Restart a service Renice a process Kill a process Each of these corrective actions will be performed under different conditions which we will get into in the next section. When Should This Occur? We have established what corrective actions we wish to try. Now it is time to carefully consider when these actions are most appropriate. The first thing that we will consider is the concept of a soft state or a buffer period between an initial failure and when an alert is sent out for human intervention. Next we will introduce dependencies between services as it relates to the ability to monitor. This will not only help to track down root causes of failures more easily but will also prevent excessive automated action which could get quite noisy if introduced incorrectly.
4 Page 3 Soft States To best leverage automation in your monitoring system it is important to give the automated tasks a chance to try and fix the problem before human intervention is required. This is best accomplished by introducing a time buffer or soft state where event handlers run before any notifications are sent out. First, the monitoring tool will notice if the corrective action has worked more quickly. Second, different corrective actions can be attempted at each retry attempt. This prevents your monitoring tool from trying the same solution over and over again and expecting different results; often considered the definition of insanity. Dependency Mapping There are two different possibilities for introducing a buffer period. You could either introduce a single wait period for a predefined amount of time or you could introduce a retry period of smaller time increments and set your buffer period to be a number of retry intervals. In order to take automatic corrective action, you must have a handle on the service level dependencies at play. For example, there are many Apache service checks to determine the availability and performance of your web server. We do not want each and every one of these service checks to restart the apache2 or httpd service every time that they fail. This would result in far too many restarts. Opsview takes the later approach. By introducing multiple shorter retry periods two benefits arise. Instead you want a parent level service check to be responsible for this task when there is a systemic TIME 0 OK WARNING WARNING OK OK OK CRITICAL WARNING CRITICAL UNKNOWN OK EVENT HANDLER MAX_CHECK_ATTEMPT - 3 NOTIFICATION
5 Page 4 problem that is affecting all apache service checks. It is important to note that dependencies in a monitoring tool must be considered from the point of view of the monitoring server. For example, the figure below indicates many service checks that may be associated with a common web application running a LAMP stack. In order to monitor these end metrics the host must first be up. This is verified with the host check command. Next it is important to check that the port required for monitoring that service is active. In this example the next level of dependency is to check the tcp response of ports 5666 (agent), 80 or 443 (HTTP/HTTPS), and 3306 (MySQL Listener) to make sure that there isn t a network problem like a firewall restriction. Next is where we verify that the service is running which is commonly checked by verifying that the number of processes for that user is greater than zero. It is important to consider that you may require the agent to monitor these processes. If that is the case, process or service status monitoring must be dependent on the previously checked agent response. Now it is possible to gather the more granular details about the web application. Automatic resolution should take place at the highest parent service that makes sense. For example killing parent processes when zombie processes get out of control or renicing runaway processes should be done at the immediate service check level. However, restarting a service should be AGENT CONNECT MEMORY & SWAP CPU LOAD DISK UTILIZATION L APACHE PROCESS HOST CHECK HTTP HTTPS ACTIVE SESSIONS IDLE WORKERS TRAFFIC A MYSQL PROCESS DB LISTENER CONNECTIONS BYTES IN/OUT OPEN FILES M CUSTOM PHP, PYTHON OR PERL CHECKS P HOST NETWORK PROCESS
6 Page 5 done at the process or service status level. Detecting Bugs without Loss of Service Now we have effectively maximized uptime by taking some of the tedious tasks out of the DEVOPS team s day. But have we actually fixed any of these problems? This is where it is important to run events reports against longer time windows. Frequent restarts or other regular corrective An example of such a report is shown on the next page. The first section outlines the number of state changes and the severity by day. This gives you a clear way of associating business events like code releases with the number of event handlers that are run. The second section lists a description of all of the events so that you can tell what the problems are and which corrective actions were taken in response. action may maximize uptime, but it may only be treating the symptom of a more serious underlying condition. To determine how often corrective action is taken you will have to isolate the parent level service checks that run your event handlers. It is then important to note all SOFT problem states that never go to a HARD state. By noting how many soft state events occur before resolution you will know which corrective action fixed the problem that time.
7 Page 6
8 Page 7 Implementation This next section will outline the way that event handlers work in Opsview. It will identify the steps that Opsview goes through from event to response. This section will provide some tips about writing your event handlers and remedy scripts that will run on the monitoring server and end device respectively. Finally it will walk through an actual lab exercise that you may choose to put into practice in your own environment. How Do Event Handlers Work in Opsview? When using Opsview, understanding the workflow of the event handlers is essential to implementing an effective automation strategy. This section of the article will isolate the process that occurs between detecting a state change and executing a script to potentially correct the condition. Throughout the process there will be environment variables to consult that are vital to understanding what the current conditions are and what action should be taken. Process Flow When a state change occurs there are multiple steps that occur before a script is run on the end device. First we must consider the monitoring server side. The service check or host has an event handler definition. This entry is the name and set of parameters for a script run in the location, /usr/ local/nagios/libexec/eventhandlers/. These scripts have environment variables available to them. This State Change Occurs Monitoring Server Runs Event Handler Logic Monitoring Server Issues Agent Command Agent Maps Command to Remedy Script Nagios User Executes Remedy Script
9 Page 8 are usually available in event handlers are also means that an event handler script can be aware of available in Opsview. The rule is to reference the host, service check, state type, service status and check attempt that was true at the time the script was run. This means that different agent commands can be issued at the event handler script level for Critical events vs. Warning events. The event handler script can also iterate through multiple remedy steps based on the check attempt. This means that you can try to restart a service when it first fails but if that doesn t work you can try to stop and start the service instead before classifying it as a hard failure where a human needs to be involved. The agent command that is issued to the end device needs to be interpreted. This means that when the agent receives a check_nrpe c command, it needs to understand what the c parameter means. To do this, the agent consults the file nrpe.cfg which has a mapping between -c entries and local scripts. Once this is achieved, it is just a matter of making sure that nagios user has sufficient privileges to run the UNIX commands in the script. Writing Event Handlers There are a variety of environment variables available at the event handler level. The general $NAGIOS_<MACRO NAME> inside of the script logic. This means that $HOSTADDRESS$ would be named $NAGIOS_HOSTADDRESS in the Opsview event handler. It is important to eliminate redundancy inside of event handlers because you don t want to try the same corrective action more than once under the same conditions. You also want to make sure that some form of corrective action takes place every retry interval. The most important macros to use in your event handler script (on the monitoring server side) are listed below: $NAGIOS_HOSTADDRESS the IP Address or DNS name of the end point. $NAGIOS_SERVICESTATE OK, WARNING or CRITICAL $NAGIOS_SERVICESTATETYPE SOFT or HARD $NAGIOS_SERVICEATTEMPT numeric number of check attempts starting at one. These macros can be leveraged to create different corrective actions for a HARD OK instead of a SOFT OK. It can also be used to take separate corrective actions for each value of Service Attempt. Each condition should have some logger action and a check_nrpe command issued to the rule of thumb is that all Nagios macros that
10 Page 9 / bin etc home usr var local nagios etc libexec nrpe_local nrpe.cfg eventhandlers plugins.cfg evhandle.cfg eh_kill eh_renice eh_restart end device to make the agent run a local script. The syntax of a check_nrpe command is listed below: $ cd /usr/local/nagios/libexec/ $./check_nrpe -H $NRPE_HOSTADDRESS$ -c <agent_command> -a <parameters> scripts on the master. It may be appropriate to follow a naming convention such as eh_* for better organization and improved sorting. The second consideration is command definition at the agent s configuration files. Verify that the final Remedy Scripts There are three main considerations when creating a remedy script. The first is where to place the script. Best practice dictates that all remedy scripts should be stored under /usr/local/nagios/ libexec/eventhandlers/ just like the event handler line in /usr/local/nagios/etc/nrpe.cfg on the agent side is an uncommented include_dir=/usr/local/ nagios/etc/nrpe_local which points the agent s configurations to a local directory. The file nrpe. cfg may be overwritten as a part of agent upgrades so all local configurations should be stored under the nrpe_local/ directory. Any file with a.cfg
11 Page 10 extension in nrpe_local or any subdirectory will be included in the agent s configurations. It is therefore best practice to create a file named eventhandlers.cfg under the nrpe_local directory for remedy script command definitions. This file will contain command definitions that map agent commands to local scripts. The third consideration that must be made about remedy scripts is what the nagios user is allowed to do on the end device. These corrective actions are going to be carried out by the nagios user and so certain privileges may have to be raised for the user. This may mean giving limited sudo access to the nagios user. Ensure that any corrective action that you want to take is possible as the nagios user command[eh_kill]= sudo /usr/local/nagios/libexec/eventhandlers/eh_kill $ARG1$ command[eh_renice]= sudo /usr/local/nagios/libexec/eventhandlers/eh_renice $ARG1$ command[eh_restart]= sudo /usr/local/nagios/libexec/eventhandlers/eh_restart $ARG1$ This is what the c argument to an agent command will be mapped to. For example, running the following command at the monitoring server: before deploying to production. It will be your job to determine the trade-offs of corrective action and raising the nagios user s privileges at the end device. $ /usr/local/nagios/libexec/check_nrpe H $NAGIOS_HOSTADDRESS c eh_restart a -s apache2 r Would be equivalent to the nagios user running the following command at the end point: $ sudo /usr/local/nagios/libexec/ eventhandlers/eh_restart s apache2 r
12 Page 11 Let s Do It Putting this into practice should be developed in the reverse of the event handler process flow so that each step can be effectively tested. First we write the script that issues the UNIX commands like service, renice, or kill. We will first test these commands as the root user. Next, we will make sure that the nagios user has sufficient privileges to issue these commands by granting conditional sudo access in such a way that it cannot be exploited. We then define the mapping between an agent command and the sudo execution of this script and restart the Opsview agent. Back on the monitoring server, the event handler logic needs to be written so that separate agent commands can be issued depending on the conditions that exist on the end device. It is then that the event handler can be assigned to the parent-level service check. 1. Write remedy scripts that issue UNIX commands. eh_restart_service s servicename r {restart} f {stop service then start service} eh_renice_process p <pid> -n <numeric nice value> eh_kill_process p <pid> -s <signal type> 2. Determine which commands or scripts you need to give sudo access to for the nagios user. $ whereis service service: /usr/sbin/service /usr/share/man /man8/service.8.gz $ whereis renice renice: /usr/bin/renice /usr/share/man/man1/renice.1.gz $ whereis kill kill: /bin/kill /usr/share/man/man1/kill.1.gz 3. Change the permissions of the nagios user to grant the limited sudo access. $ visudo nagios ALL=(root) NOPASSWD: /usr/sbin/service, /usr/bin/renice, /bin/kill
13 Page 12 Alternatively this comma separated list could be your remedy scripts themselves. By running the script in sudo mode, you are essentially applying sudo to all commands inside of the script. $ chown root:root /usr/local/nagios/libexec/eventhandlers/eh_restart_service $ chown root:root /usr/local/nagios/libexec/eventhandlers/eh_renice_process $ chown root:root /usr/local/nagios/libexec/eventhandlers/eh_kill_process $ visudo nagios ALL=(root) NOPASSWD: /usr/local/nagios/libexec/eventhandlers/eh_restart_service, /usr/local/nagios/libexec/eventhandlers/eh_renice_process, /usr/local/nagios/libexec/eventhandlers/eh_kill_process Now that these scripts can be executed at the root level by the nagios user it is imperative to change the ownership of these scripts to root so that they cannot be moved or modified for malicious means. 4. Define your agent commands in nrpe.cfg. $ vi /usr/local/nagios/etc/nrpe_local/eventhandlers.cfg command[eh_kill]=/usr/local/nagios/libexec/eventhandlers/eh_kill $ARG1$ command[eh_renice]=/usr/local/nagios/libexec/eventhandlers/eh_renice $ARG1$ command[eh_restart]=/usr/local/nagios/libexec/eventhandlers/eh_restart $ARG1$ If you have chosen to give the nagios user sudo access to the script, rather than the commands, make sure that the command definition includes sudo before the script s path. 5. Don t forget to restart or reload the opsview-agent service to pick up these new configurations. $ service opsview-agent restart 6. Test your agent commands on the monitoring server side. $ cd /usr/local/nagios/libexec $./check_nrpe H <agent address> -c eh_service_restart a -s <service> r
14 Page Write the event handler scripts on the monitoring server side. $vi /usr/local/nagios/libexec/eventhandlers/restart_service #!/bin/sh case $SERVICESTATE$ in OK ) case $SERVICESTATETYPE$ in SOFT ) ;; HARD ) #Recovery Action ;; WARNING ) ;; UNKNOWN ) ;; CRITICAL ) case $SERVICEATTEMPT$ in 1) /usr/local/nagios/libexec/check_nrpe H $HOSTADDRESS c eh_restart_service a -s $1 -r ;; 2) /usr/local/nagios/libexec/check_nrpe H $HOSTADDRESS c eh_restart_service a -s $1 -m ;; ;; esac exit 0 8. Assign the event handler to the appropriate service checks. Now the apache service will be restarted every time that there is a problem connecting to the server on port 80 or 443.
Purpose. Target Audience. Prerequisites. What Is An Event Handler? Nagios XI. Introduction to Event Handlers
Purpose This document describes how to use event handlers in to take predefined actions when the hosts or services you are monitoring change state. Event handlers are used to automate processes taken when
More informationThese instructions cover how to install and use pre-compiled binaries to monitor AIX 5.3 using NRPE.
Purpose This document describes how to monitor AIX servers using or Nagios Core. The instructions were contributed by Joshua Whitaker, who successfully configured to monitor AIX 5.3 servers, thanks Joshua!
More informationMonitoring a HPC Cluster with Nagios
Cluster with Scuola Internazionale Superiore di Studi Avanzati Trieste 2009-04-01 1 2009-04-03 1 Try again... Fail better. Outline 1 2 3 Installation for Monitoring @SISSA Cluster with What is? «R is a
More informationHow To Monitor Apache Cassandra Distributed Databases
Purpose This document describes how to configure to monitor Apache Cassandra distributed database implementations in order to ensure that data, as well as the hardware housing it, is operating properly.
More informationGetting Started User s Guide
Getting Started User s Guide Savision iq V2.3 Contents 1. Introduction... 4 1.1 About this Guide... 4 1.2 Understanding Savision iq... 4 2. First Run Experience... 4 2.1 Adding the License Key... 5 2.2
More informationInstall some base packages. I recommend following this guide as root on a new VPS or using sudo su, it will make running setup just a touch easier.
Nagios 4 on Ubuntu 16 Install some base packages. I recommend following this guide as root on a new VPS or using sudo su, it will make running setup just a touch easier. apt-get install php-gd build-essential
More informationThis document is intended for use by Nagios Administrators that want to use Slack for notifications.
Purpose This document describes how integrate the Slack messaging platform with. This integration will allow to send notifications to Slack channels, enabling teams to see the health of their devices monitored
More informationServices: Monitoring and Logging. 9/16/2018 IST346: Info Tech Management & Administration 1
Services: Monitoring and Logging 9/16/2018 IST346: Info Tech Management & Administration 1 Recall: Server vs. Service A server is a computer. A service is an offering provided by server(s). HTTP 9/16/2018
More informationNRPE DOCUMENTATIOND. Copyright (c) Ethan Galstad. Last Updated: 17 November Contents
NRPE OCUMENTATION Copyright (c) 1999-2017 Ethan Galstad Last Updated: 17 November 2017 Contents 1. Introduction... 2 a) Purpose... 2 b) esign Overview... 2 2. Example Uses... 3 a) irect Checks... 3 b)
More informationFunction. Description
Function Check In Get / Checkout Description Checking in a file uploads the file from the user s hard drive into the vault and creates a new file version with any changes to the file that have been saved.
More informationPlugin Monitoring for GLPI
Plugin Monitoring for GLPI Introduction 2 TOC 3 Contents Preface: Introduction...v Goals of this project... v Why is it revolutionary?...v Links...v Internet site...v IRC-Channel...vi Terms used in this
More informationRed Hat Ceph Storage 3
Red Hat Ceph Storage 3 Monitoring Ceph for Red Hat Enterprise Linux with Nagios Monitoring Ceph for Red Hat Enterprise Linux with Nagios Core. Last Updated: 2018-06-21 Red Hat Ceph Storage 3 Monitoring
More informationIMC Network Traffic Analyzer 7.2 (E0401P04) Copyright 2016 Hewlett Packard Enterprise Development LP
Network Traffic Analyzer 7.2 (E0401P04) Copyright 2016 Hewlett Packard Enterprise Development LP Table of Contents 1. What's New in this Release 2. Problems Fixed in this Release 3. Software Distribution
More informationBacking Up And Restoring Your Nagios XI System
Backing Up And Restoring Your System Purpose This document describes how to backup a installation and restore a installation from a previously made backup. Backups are an important aspect of administration
More informationHow can you manage what you can t see?
How can you manage what you can t see? Know what you have with Panda Cloud Systems Management Business challenge: You can t manage it if you don t know it exists. Do you have 100% permanent visibility
More informationPerformance Monitors Setup Guide
Performance Monitors Setup Guide Version 1.0 2017 EQ-PERF-MON-20170530 Equitrac Performance Monitors Setup Guide Document Revision History Revision Date May 30, 2017 Revision List Initial Release 2017
More informationLinux System Administration
System Processes Objective At the conclusion of this module, the student will be able to: Describe and define a process Identify a process ID, the parent process and the child process Learn the PID for
More informationChecking Resource Usage in Fedora (Linux)
Lab 5C Checking Resource Usage in Fedora (Linux) Objective In this exercise, the student will learn how to check the resources on a Fedora system. This lab covers the following commands: df du top Equipment
More informationSecuring Unix Filesystems - When Good Permissions Go Bad
Securing Unix Filesystems - When Good Permissions Go Bad Introduction Unix has a very elegant and flexible permission system at the heart of its filesystem security. These permissions allow and/or disallow
More informationConfiguring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved.
Configuring the Oracle Network Environment Objectives After completing this lesson, you should be able to: Use Enterprise Manager to: Create additional listeners Create Oracle Net Service aliases Configure
More informationLearning Nagios 4. Wojciech Kocjan. Chapter No.1 "Introducing Nagios"
Learning Nagios 4 Wojciech Kocjan Chapter No.1 "Introducing Nagios" In this package, you will find: A Biography of the author of the book A preview chapter from the book, Chapter NO.1 "Introducing Nagios"
More informationVisual Design Flows for Faster Debug and Time to Market FlowTracer White Paper
Visual Design Flows for Faster Debug and Time to Market FlowTracer White Paper 2560 Mission College Blvd., Suite 130 Santa Clara, CA 95054 (408) 492-0940 Introduction As System-on-Chip (SoC) designs have
More informationWeb Attacks Lab. 35 Points Group Lab Due Date: Lesson 16
CS482 SQL and XSS Attack Lab AY172 1 Web Attacks Lab 35 Points Group Lab Due Date: Lesson 16 Derived from c 2006-2014 Wenliang Du, Syracuse University. Do not redistribute with explicit consent from MAJ
More informationThis document is intended for use by Nagios XI Administrators who wish to monitor JMX applications.
Monitoring JMX With Purpose This document will cover how to monitor Java application servers using the check_jmx plugin within, in order for users to be notified when java applications are not functioning
More informationSystem Administration for Beginners
System Administration for Beginners Week 5 Notes March 16, 2009 1 Introduction In the previous weeks, we have covered much of the basic groundwork needed in a UNIX environment. In the upcoming weeks, we
More informationPurpose. Target Audience. Solution Overview NCPA. Using NCPA For Passive Checks
Using For Passive Checks Purpose This document describes how to configure the Nagios Cross Platform Agent () to send passive check results to Nagios XI or Nagios Core using Nagios Remote Data Processor
More informationPlugin Monitoring for GLPI
Plugin Monitoring for GLPI Introduction 2 TOC 3 Contents Preface: Introduction...v Goals of this project... v Why is it revolutionnary?...v Links...v Internet site...v IRC-Channel...v Terms used in this
More informationCHAPTER 2. Troubleshooting CGI Scripts
CHAPTER 2 Troubleshooting CGI Scripts OVERVIEW Web servers and their CGI environment can be set up in a variety of ways. Chapter 1 covered the basics of the installation and configuration of scripts. However,
More informationLinux Systems Administration Getting Started with Linux
Linux Systems Administration Getting Started with Linux Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International
More informationOperating Systems Lab 1 (Users, Groups, and Security)
Operating Systems Lab 1 (Users, Groups, and Security) Overview This chapter covers the most common commands related to users, groups, and security. It will also discuss topics like account creation/deletion,
More informationAdministering a SQL Database Infrastructure
Administering a SQL Database Infrastructure 20764B; 5 Days; Instructor-led Course Description This five-day instructor-led course provides students who administer and maintain SQL Server databases with
More informationLinux Virtual Machine (VM) Provisioning on the Hyper-V Platform
I T S E R V I C E S Son Truong Systems & Operations Unix Technical Lead November 2016 SERVER PROVISIONING: Linux Virtual Machine (VM) Provisioning on the Hyper-V Platform Standard Linux VM Introduction
More informationDEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER
DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER Table of Contents Table of Contents Introducing the F5 and Oracle Access Manager configuration Prerequisites and configuration notes... 1 Configuration
More informationAnnouncement. Exercise #2 will be out today. Due date is next Monday
Announcement Exercise #2 will be out today Due date is next Monday Major OS Developments 2 Evolution of Operating Systems Generations include: Serial Processing Simple Batch Systems Multiprogrammed Batch
More informationInstalling SmartSense on HDP
1 Installing SmartSense on HDP Date of Publish: 2018-07-12 http://docs.hortonworks.com Contents SmartSense installation... 3 SmartSense system requirements... 3 Operating system, JDK, and browser requirements...3
More information"Charting the Course... MOC C: Administering an SQL Database Infrastructure. Course Summary
Description Course Summary This five-day instructor-led course provides students who administer and maintain SQL databases with the knowledge and skills to administer a SQL server database infrastructure.
More informationTable of Contents. Server Migrations Hints, tips and planning considerations
Server Migrations Hints, tips and planning considerations Table of Contents Introduction:...2 Overview:...2 Migrating your server...2 Audit of the existing server:...2 Preparing the new server:...3 Syncing
More informationsimplevisor Documentation
simplevisor Documentation Release 1.2 Massimo Paladin June 27, 2016 Contents 1 Main Features 1 2 Installation 3 3 Configuration 5 4 simplevisor command 9 5 simplevisor-control command 13 6 Supervisor
More informationTroubleshooting the Installation
APPENDIX A Troubleshooting the Installation This appendix provides troubleshooting information for Essentials installation and setup, and contains the following sections: If the Installer Window Does Not
More informationStep-by-Step Setup for the openitcockpit Monitoring System. Installation guide
Step-by-Step Setup for the openitcockpit Monitoring System Installation guide Version: May 2016 Legal it-novum GmbH Edelzeller Strasse 44 36043 Fulda Germany Tel: +49 661 103-333 Fax: +49 661 103-597 info@it-novum.com
More informationEventSentry Quickstart Guide
Contents I Part I About This Guide 2 Part II Overview 3 Part III Installing EventSentry 6 1 Installation with... Setup 7 2 Management Application... 8 3 Configuration... 9 4 Remote Update... 12 5 Heartbeat
More informationTicketing Service 1 Request Tracker (RT) Installation and Configuration
Ticketing Service 1 Request Tracker (RT) Installation and Configuration 1.1 Notes: This lab note is taken from NSRC Workshop LAB, therefore requested to change pcx.ws.nsrc.org with your domain. Commands
More informationWindows 2000 / XP / Vista User Guide
Windows 2000 / XP / Vista User Guide Version 5.5.1.0 September 2008 Backup Island v5.5 Copyright Notice The use and copying of this product is subject to a license agreement. Any other use is prohibited.
More informationQuick KVM 1.1. User s Guide. ClearCube Technology, Inc.
Quick KVM 1.1 User s Guide ClearCube Technology, Inc. Copyright 2005, ClearCube Technology, Inc. All rights reserved. Under copyright laws, this publication may not be reproduced or transmitted in any
More information9.2 Linux Essentials Exam Objectives
9.2 Linux Essentials Exam Objectives This chapter will cover the topics for the following Linux Essentials exam objectives: Topic 3: The Power of the Command Line (weight: 10) 3.3: Turning Commands into
More informationCourse 20764: Administering a SQL Database Infrastructure
Course 20764: Administering a SQL Database Infrastructure About this course: This five-day instructor-led course provides students who administer and maintain SQL Server databases with the knowledge and
More informationMassTransit Server Installation Guide for Windows
MassTransit 6.1.1 Server Installation Guide for Windows November 24, 2009 Group Logic, Inc. 1100 North Glebe Road, Suite 800 Arlington, VA 22201 Phone: 703-528-1555 Fax: 703-528-3296 E-mail: info@grouplogic.com
More informationCPSC 341 OS & Networks. Processes. Dr. Yingwu Zhu
CPSC 341 OS & Networks Processes Dr. Yingwu Zhu Process Concept Process a program in execution What is not a process? -- program on a disk A process is an active object, but a program is just a file It
More informationSecurity Fundamentals for your Privileged Account Security Deployment
Security Fundamentals for your Privileged Account Security Deployment February 2016 Copyright 1999-2016 CyberArk Software Ltd. All rights reserved. CAVSEC-PASSF-0216 Compromising privileged accounts is
More informationTANDBERG Management Suite - Redundancy Configuration and Overview
Management Suite - Redundancy Configuration and Overview TMS Software version 11.7 TANDBERG D50396 Rev 2.1.1 This document is not to be reproduced in whole or in part without the permission in writing
More informationThe Wonderful World of Services VINCE
The Wonderful World of Services VINCE Agenda definitions services for Windows and Linux breaks? auditing Linux logs for Linux useful tools Goals develop a better understanding of Linux and Windows services
More informationFieldView. Management Suite
FieldView The FieldView Management Suite (FMS) system allows administrators to view the status of remote FieldView System endpoints, create and apply system configurations, and manage and apply remote
More informationNew Features Guide EventTracker v6.2
New Features Guide EventTracker v6.2 Publication Date: Aug 04, 2008 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com The information contained in this document represents the
More informationffproxy (8) FreeBSD System Manager s Manual ffproxy (8)
NAME ffproxy filtering HTTP/HTTPS proxy server SYNOPSIS ffproxy [ p port] [ c ip hostname] [ C ip hostname] [ l childs] [ u uid user g gid group] [ r dir] [ D datadir] [ x proxyip proxyhost X proxyport]
More informationTraining 24x7 DBA Support Staffing. Administering a SQL Database Infrastructure (40 Hours) Exam
Administering a SQL Database Infrastructure (40 Hours) Exam 70-764 Prerequisites Basic knowledge of the Microsoft Windows operating system and its core functionality. Working knowledge of Transact-SQL.
More informationHands-on Exercise Hadoop
Department of Economics and Business Administration Chair of Business Information Systems I Prof. Dr. Barbara Dinter Big Data Management Hands-on Exercise Hadoop Building and Testing a Hadoop Cluster by
More informationSTORAGECRAFT SHADOWPROTECT 5 DESKTOP
STORAGECRAFT SHADOWPROTECT 5 DESKTOP PRODUCT BRIEF 1 THE CHALLENGE OF BUSINESS CONTINUITY Businesses are becoming less centralized in the 21st century with many more workers relying on laptops as their
More informationIntegrating with your Third Party Monitoring Software
Integrating with your Third Party Monitoring Software OVERVIEW When using a software that monitors your networks, the notifications can be sent to NetHelpDesk, and handled in different ways. There are
More informationGarment Documentation
Garment Documentation Release 0.1 Evan Borgstrom March 25, 2014 Contents i ii A collection of fabric tasks that roll up into a single deploy function. The whole process is coordinated through a single
More informationRed Hat Ceph Storage 3
Red Hat Ceph Storage 3 Monitoring Ceph for Ubuntu with Nagios Monitoring Ceph for Ubuntu with Nagios Core. Last Updated: 2018-09-07 Red Hat Ceph Storage 3 Monitoring Ceph for Ubuntu with Nagios Monitoring
More informationPerforming an ObserveIT Upgrade Using the Interactive Installer
Performing an ObserveIT Upgrade Using the Interactive Installer ABOUT THIS DOCUMENT This document contains detailed procedures and instructions on how to upgrade ObserveIT by using the interactive "One
More informationXton Access Manager GETTING STARTED GUIDE
Xton Access Manager GETTING STARTED GUIDE XTON TECHNOLOGIES, LLC PHILADELPHIA Copyright 2017. Xton Technologies LLC. Contents Introduction... 2 Technical Support... 2 What is Xton Access Manager?... 3
More informationMicrosoft Administering a SQL Database Infrastructure
1800 ULEARN (853 276) www.ddls.com.au Microsoft 20764 - Administering a SQL Database Infrastructure Length 5 days Price $4290.00 (inc GST) Version C Overview This five-day instructor-led course provides
More informationWho am I? I m a python developer who has been working on OpenStack since I currently work for Aptira, who do OpenStack, SDN, and orchestration
Who am I? I m a python developer who has been working on OpenStack since 2011. I currently work for Aptira, who do OpenStack, SDN, and orchestration consulting. I m here today to help you learn from my
More informationMonitoring SharePoint 2007/ 2010/ 2013 Server using EventTracker
Monitoring SharePoint 2007/ 2010/ 2013 Server using EventTracker Publication Date: June 12, 2012 Abstract EventTracker allows you to effectively manage your systems and provides operational efficiencies
More informationProcessing Troubleshooting Guide
Processing Troubleshooting Guide March 5, 2018 - Version 9.5.411.4 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
More informationKEMP 360 Vision. KEMP 360 Vision. Product Overview
KEMP 360 Vision Product Overview VERSION: 1.0 UPDATED: SEPTEMBER 2016 Table of Contents 1 Introduction... 3 1.1 Document Purpose... 3 1.2 Intended Audience... 3 2 Architecture... 4 3 Sample Scenarios...
More informationCorreLog. Ping Monitor Adapter Software Users Manual
CorreLog Ping Monitor Adapter Software Users Manual http://www.correlog.com mailto:info@correlog.com CorreLog, Ping Monitor Users Manual Copyright 2008-2017, CorreLog, Inc. All rights reserved. No part
More informationLaserfiche Rio 10.3: Deployment Guide. White Paper
Laserfiche Rio 10.3: Deployment Guide White Paper January 2018 Table of Contents How Laserfiche Licensing Works... 4 Types of Licenses... 4 Named User Licenses... 4 WebLink Public Portal Licenses... 6
More informationNWC 2011 Monitoring a Cloud Infrastructure in a Multi-Region Topology
NWC 2011 Monitoring a Cloud Infrastructure in a Multi-Region Topology Nicolas Brousse nicolas@tubemogul.com September 29th 2011 1 Introduction - About the speaker My name is Nicolas Brousse I previously
More informationAdopting Agile Practices
Adopting Agile Practices Ian Charlton Managing Consultant ReleasePoint Software Testing Solutions ANZTB SIGIST (Perth) 30 November 2010 Tonight s Agenda What is Agile? Why is Agile Important to Testers?
More informationE N F U Z I O N 3 D U S E R G U I D E. Axceleon, Inc. EnFuzion3D User Guide. For Windows, OS X and Linux Users
Axceleon, Inc. EnFuzion3D 2015.1 User Guide For Windows, OS X and Linux Users Legal Notices EnFuzion3D 2015 User Guide for Windows, OS X and Linux Users Document Version: 2015.1 Publication Date: 2015.07.21
More informationIf you re the administrator on any network,
Let s do an inventory! If you re the administrator on any network, chances are you ve already faced the need to make an inventory. In fact, keeping a list of all the computers, monitors, software and other
More informationBitnami MySQL for Huawei Enterprise Cloud
Bitnami MySQL for Huawei Enterprise Cloud Description MySQL is a fast, reliable, scalable, and easy to use open-source relational database system. MySQL Server is intended for mission-critical, heavy-load
More informationCPS221 Lecture: Operating System Protection
Objectives CPS221 Lecture: Operating System Protection last revised 9/5/12 1. To explain the use of two CPU modes as the basis for protecting privileged instructions and memory 2. To introduce basic protection
More informationGNU/Linux: An Essential Guide for Students Undertaking BLOSSOM
Copyright: The development of this document is funded by Higher Education of Academy. Permission is granted to copy, distribute and /or modify this document under a license compliant with the Creative
More informationConfiguration Manager
CHAPTER 7 This chapter describes how to perform routine Cisco VXC Manager configuration management tasks using the Administrator Console. It provides information on managing the configuration settings
More informationCloud Monitoring as a Service. Built On Machine Learning
Cloud Monitoring as a Service Built On Machine Learning Table of Contents 1 2 3 4 5 6 7 8 9 10 Why Machine Learning Who Cares Four Dimensions to Cloud Monitoring Data Aggregation Anomaly Detection Algorithms
More informationPurpose. Target Audience. Install SNMP On The Remote Linux Machine. Nagios XI. Monitoring Linux Using SNMP
Purpose This document describes how to monitor Linux machines with using SNMP. SNMP is an agentless method of monitoring network devices and servers, and is often preferable to installing dedicated agents
More informationIntroduction to Programming Style
Introduction to Programming Style Thaddeus Aid The IT Learning Programme The University of Oxford, UK 30 July, 2013 Abstract Programming style is the part of the program that the human reads and the compiler
More informationDuration: 5 Days Course Code: M20764 Version: B Delivery Method: Elearning (Self-paced)
Administering a SQL Database Infrastructure Duration: 5 Days Course Code: M20764 Version: B Delivery Method: Elearning (Self-paced) Overview: This five-day instructor-led course provides students who administer
More informationFrequently Asked Questions About Performance Monitor
APPENDIXA Frequently Asked Questions About Performance Monitor The following topics answer common questions about Performance monitor and contain troubleshooting tips: Installation, page A-1 Importing,
More informationThe Swiss Army Knife netcat
The Swiss Army Knife netcat Lab Objectives In this lab, you will perform the following six labs: Lab 1 Use Netcat for Port Scanning Lab 2 Use Netcat for Banner Grabbing Lab 3 Use Netcat to Transfer Files
More informationInstalling Koha on Windows XP. Amandeep Kapila
Installing Koha on Windows XP For MLIS Online by Amandeep Kapila 0 Introduction KOHA is an Integrated Library System with all the features that are required in day to day library management operations.
More informationInformatica Developer Tips for Troubleshooting Common Issues PowerCenter 8 Standard Edition. Eugene Gonzalez Support Enablement Manager, Informatica
Informatica Developer Tips for Troubleshooting Common Issues PowerCenter 8 Standard Edition Eugene Gonzalez Support Enablement Manager, Informatica 1 Agenda Troubleshooting PowerCenter issues require a
More informationWhat Building Multiple Scalable DC/OS Deployments Taught Me about Running Stateful Services on DC/OS
What Building Multiple Scalable DC/OS Deployments Taught Me about Running Stateful Services on DC/OS Nathan Shimek - VP of Client Solutions at New Context Dinesh Israin Senior Software Engineer at Portworx
More informationASTQB Advance Test Analyst Sample Exam Answer Key and Rationale
ASTQB Advance Test Analyst Sample Exam Answer Key and Rationale Total number points = 120 points Total number points to pass = 78 points Question Answer Explanation / Rationale Learning 1 A A is correct.
More informationProcess Time. Steven M. Bellovin January 25,
Multiprogramming Computers don t really run multiple programs simultaneously; it just appears that way Each process runs to completion, but intermixed with other processes Process 1 6 ticks Process 2 Process
More informationWHITE PAPER Application Performance Management. The Case for Adaptive Instrumentation in J2EE Environments
WHITE PAPER Application Performance Management The Case for Adaptive Instrumentation in J2EE Environments Why Adaptive Instrumentation?... 3 Discovering Performance Problems... 3 The adaptive approach...
More informationWHITE PAPER: ENTERPRISE AVAILABILITY. Introduction to Adaptive Instrumentation with Symantec Indepth for J2EE Application Performance Management
WHITE PAPER: ENTERPRISE AVAILABILITY Introduction to Adaptive Instrumentation with Symantec Indepth for J2EE Application Performance Management White Paper: Enterprise Availability Introduction to Adaptive
More informationThink Small to Scale Big
Think Small to Scale Big Intro to Containers for the Datacenter Admin Pete Zerger Principal Program Manager, MVP pete.zerger@cireson.com Cireson Lee Berg Blog, e-mail address, title Company Pete Zerger
More informationECE 550D Fundamentals of Computer Systems and Engineering. Fall 2017
ECE 550D Fundamentals of Computer Systems and Engineering Fall 2017 The Operating System (OS) Prof. John Board Duke University Slides are derived from work by Profs. Tyler Bletsch and Andrew Hilton (Duke)
More informationAmazon Web Services Hands on EC2 December, 2012
Amazon Web Services Hands on EC2 December, 2012 Copyright 2011-2012, Amazon Web Services, All Rights Reserved Page 1-42 Table of Contents Launch a Linux Instance... 4 Connect to the Linux Instance Using
More informationCyber security tips and self-assessment for business
Cyber security tips and self-assessment for business Last year one in five New Zealand SMEs experienced a cyber-attack, so it s essential to be prepared. Our friends at Deloitte have put together this
More informationProactive Performance Monitoring for Citrix XenApp & XenDesktop
Proactive Performance Monitoring for Citrix XenApp & XenDesktop TECHNOLOGY OVERVIEW In approximately one week, support tickets dropped by 25% Our customers were complaining about persistent slowness with
More informationParallelizing Windows Operating System Services Job Flows
ABSTRACT SESUG Paper PSA-126-2017 Parallelizing Windows Operating System Services Job Flows David Kratz, D-Wise Technologies Inc. SAS Job flows created by Windows operating system services have a problem:
More informationTzunami Deployer Lotus Notes Exporter Guide
Tzunami Deployer Lotus Notes Exporter Guide Version 2.5 Copyright 2010. Tzunami Inc. All rights reserved. All intellectual property rights in this publication are owned by Tzunami, Inc. and protected by
More informationBrownNow A Current Events Application for Brown University. Craig Hawkins Advisor: Stan Zdonik Masters Project Report, Brown University 2017
BrownNow A Current Events Application for Brown University Craig Hawkins Advisor: Stan Zdonik Masters Project Report, Brown University 2017 1. Introduction Brown University has an existing events notification
More informationForeScout Extended Module for Carbon Black
ForeScout Extended Module for Carbon Black Version 1.0 Table of Contents About the Carbon Black Integration... 4 Advanced Threat Detection with the IOC Scanner Plugin... 4 Use Cases... 5 Carbon Black Agent
More informationMost of the work is done in the context of the process rather than handled separately by the kernel
Process Control Process Abstraction for a running program Manages program s use of memory, cpu time, and i/o resources Most of the work is done in the context of the process rather than handled separately
More information