Lecture 08: When disaster strikes and all else fails

Size: px
Start display at page:

Download "Lecture 08: When disaster strikes and all else fails"

Transcription

1 Lecture 08: When disaster strikes and all else fails Hands-on Unix system administration DeCal / 27

2 Projects groups of four people submit one form per group with proposed project ideas and SSH public keys we ll be provisioning VMs and sending out an announcement 2 / 27

3 What s up? What s hosing? What s in use? Too much traffic files Low-level files terminals sudo Other tools 3 / 27

4 What s up? What s up? What s hosing? What s in use? Too much traffic files Low-level files terminals sudo Other tools uptime: how long continuously running, what s the load average 1, 5, 15 min average number of processes waiting for CPU (or IO) w, who: who s logged in on machine write: write to a logged-in user wall: write to all logged-in users 4 / 27

5 What s hosing? What s up? What s hosing? What s in use? Too much traffic files Low-level files terminals sudo Other tools top, htop (Linux), ps (ps aux, ps elf) similarly iftop for network interface bandwidth, iotop (Linux) for disk IO 5 / 27

6 What s in use? What s up? What s hosing? What s in use? Too much traffic files Low-level files terminals sudo Other tools The action can t be completed... in use (Windows) The operation can t be completed... in use (Mac OS X) lsof for files lsof -i for network ports see also: netstat -pant, fuser 6 / 27

7 Too much traffic What s up? What s hosing? What s in use? Too much traffic files Low-level files terminals sudo Other tools netcat: pipe over TCP/UDP wireshark, tshark, tcpdump: packet sniffer/analyzer nmap: network scanner 7 / 27

8 Too many files What s up? What s hosing? What s in use? Too much traffic files Low-level files terminals sudo Other tools du, df: directory, filesystem disk space usage scp (secure copy): transfer files over SSH rsync (remote sync): intelligently transfer files (often over SSH) tar (tape archiver): combine files into a tarball 8 / 27

9 Low-level files What s up? What s hosing? What s in use? Too much traffic files Low-level files terminals sudo Other tools fdisk, parted (Linux): edit partition table fsck: check filesystem for errors dd: copy block devices 9 / 27

10 Too many terminals What s up? What s hosing? What s in use? Too much traffic files Low-level files terminals sudo Other tools screen, tmux metaterminal access multiple terminal sessions inside a single terminal session other features: persistence (after logging off), session sharing (between users) 10 / 27

11 sudo What s up? What s hosing? What s in use? Too much traffic files Low-level files terminals sudo Other tools sudo: switch user do (usually used to give your command root powers) via xkcd.com 11 / 27

12 Other tools What s up? What s hosing? What s in use? Too much traffic files Low-level files terminals sudo Other tools ldd (shared library dependencies), truss or strace (trace system calls) md5sum: file checksum watch: execute command and repeatedly show output seq: print sequence of numbers 12 / 27

13 Software meltdowns Hardware meltdowns Criminals on the loose Escalation of problems 2003 Northeast blackout 2003 Northeast blackout 13 / 27

14 Software meltdowns Software meltdowns Hardware meltdowns Criminals on the loose Escalation of problems 2003 Northeast blackout 2003 Northeast blackout system load (uptime command) too damn high remote access (networking, firewall, SSH) broken 14 / 27

15 Hardware meltdowns Software meltdowns Hardware meltdowns Criminals on the loose Escalation of problems 2003 Northeast blackout 2003 Northeast blackout failed hard drives failed fans, power supplies, CPU, RAM 15 / 27

16 Criminals on the loose Software meltdowns Hardware meltdowns Criminals on the loose Escalation of problems 2003 Northeast blackout 2003 Northeast blackout crackers will do Bad Things compromised accounts looks can be deceiving, uncertain what to trust 16 / 27

17 Escalation of problems Software meltdowns Hardware meltdowns Criminals on the loose Escalation of problems 2003 Northeast blackout 2003 Northeast blackout we like to build systems on top of each other if one thing fails, it may break other things, causing other things to fail 17 / 27

18 2003 Northeast blackout August 13, 2003, 9:21pm EDT (via en.wikipedia.org) 18 / 27

19 2003 Northeast blackout August 14, 2003, 9:03pm EDT (via en.wikipedia.org) 19 / 27

20 Be Prepared Power Out-of-band Redundancy Monitoring Security Backups 20 / 27

21 Be Prepared Be Prepared Power Out-of-band Redundancy Monitoring Security Backups Boy Scout motto Murphy s Law: Anything that can go wrong, will go wrong. s happens 21 / 27

22 Power Be Prepared Power Out-of-band Redundancy Monitoring Security Backups Uninterruptible Power Supply (UPS) many UPSes can remotely power cycle servers 22 / 27

23 Out-of-band Be Prepared Power Out-of-band Redundancy Monitoring Security Backups separate hardware that can be remotely accessed independent from rest of hardware, dedicated NIC can access BIOS, power cycle, provide visual display e.g., IPMI, Dell DRAC, Sun LOM 23 / 27

24 Redundancy Be Prepared Power Out-of-band Redundancy Monitoring Security Backups dual redundant power supplies typical RAID failover servers for high availability spare parts (hard drives!) for swapping 24 / 27

25 Monitoring Be Prepared Power Out-of-band Redundancy Monitoring Security Backups many large scale operations (Google, Facebook) have many failed servers at any point in time, monitoring servers reroute traffic appropriately monitor syslog SNMP traps alarm notification by , text message 25 / 27

26 Security Be Prepared Power Out-of-band Redundancy Monitoring Security Backups subscribe to OS security announcements Intrusion Detection Software (e.g., snort, bro) be wary of lax permissions limit root access 26 / 27

27 Backups Be Prepared Power Out-of-band Redundancy Monitoring Security Backups user data, system configuration ideally daily, weekly, monthly rotations RAID is not a backup e.g., rsync, cron, rsnapshot 27 / 27

IT 341: Introduction to System Administration. Notes for Project #8: Backing Up Files with rsync

IT 341: Introduction to System Administration. Notes for Project #8: Backing Up Files with rsync IT 341: Introduction to System Administration Notes for Project #8: Backing Up Files with rsync These notes explain some of the concepts you will encounter in Project #08: Backing Up Files with rsync Topics

More information

rsync link-dest Local, rotated, quick and useful backups!

rsync link-dest Local, rotated, quick and useful backups! rsync link-dest Local, rotated, quick and useful backups! Scope No complete scripts will be presented Just enough so that a competent scripter will be able to build what they need Unixes used: OpenBSD,

More information

Prerequisites: Students must be proficient in general computing skills but not necessarily experienced with Linux or Unix. Supported Distributions:

Prerequisites: Students must be proficient in general computing skills but not necessarily experienced with Linux or Unix. Supported Distributions: This GL124 course is designed to follow an identical set of topics as the Red Hat RH124 course with the added benefit of very comprehensive lab exercises and detailed lecture material. The Red Hat Enterprise

More information

Basic Linux Security. Roman Bohuk University of Virginia

Basic Linux Security. Roman Bohuk University of Virginia Basic Linux Security Roman Bohuk University of Virginia What is Linux? An open source operating system Project started by Linus Torvalds kernel Kernel: core program that controls everything else (controls

More information

We're Not CIS. The Technical Staff & Computing Facilities. User Community. What CIS Does for CS. CIS: Computing and Information Services.

We're Not CIS. The Technical Staff & Computing Facilities. User Community. What CIS Does for CS. CIS: Computing and Information Services. We're Not CIS CIS: Computing and Information Services The Technical Staff & Computing Facilities Campus Computing Provides the Univ's computing infrastructure Course registration (Banner) Payroll (via

More information

1 LINUX KERNEL & DEVICES

1 LINUX KERNEL & DEVICES GL-250: Red Hat Linux Systems Administration Course Length: 5 days Course Description: The GL250 is an in-depth course that explores installation, configuration and maintenance of Linux systems. The course

More information

Honeypot Hacker Tracking and Computer Forensics

Honeypot Hacker Tracking and Computer Forensics Honeypot Hacker Tracking and Computer Forensics Manfred Hung manfred.hung@pisa.org.hk Agenda Honeypot History Value of Honeypot Honeypot Technology Common Honypot products/solutions Honeypot deployment

More information

We're Not CIS. The Technical Staff & Computing Facilities. What CIS Does for CS. User Community

We're Not CIS. The Technical Staff & Computing Facilities. What CIS Does for CS. User Community We're Not CIS The Technical Staff & Computing Facilities CIS: Computing and Information Services Campus Computing Provides the Univ's computing infrastructure Course registration (Banner) Payroll (via

More information

Operating system hardening

Operating system hardening Operating system Comp Sci 3600 Security Outline 1 2 3 4 5 6 What is OS? Hardening process that includes planning, ation, uration, update, and maintenance of the operating system and the key applications

More information

Short Read Sequencing Analysis Workshop

Short Read Sequencing Analysis Workshop Short Read Sequencing Analysis Workshop Day 2 Learning the Linux Compute Environment In-class Slides Matt Hynes-Grace Manager of IT Operations, BioFrontiers Institute Review of Day 2 Videos Video 1 Introduction

More information

Zadara Enterprise Storage in

Zadara Enterprise Storage in Zadara Enterprise Storage in Google Cloud Platform (GCP) Deployment Guide March 2017 Revision A 2011 2017 ZADARA Storage, Inc. All rights reserved. Zadara Storage / GCP - Deployment Guide Page 1 Contents

More information

CL030 is a csage Certification Preparatory Course!

CL030 is a csage Certification Preparatory Course! Corder Enterprises International Building World Class MIS Teams, for you! CL030 is a csage Certification Preparatory Course! CL030 - LINUX System Administration Course Description: Learn and practice essential

More information

Linux Hardware Management. Linux System Administration COMP2018 Summer 2017

Linux Hardware Management. Linux System Administration COMP2018 Summer 2017 Linux Hardware Management Linux System Administration COMP2018 Summer 2017 Hardware Resources CPU refers to the primary computing resource and is measured in processor cores RAM refers to the volatile

More information

The Wonderful World of Services VINCE

The Wonderful World of Services VINCE The Wonderful World of Services VINCE Agenda definitions services for Windows and Linux breaks? auditing Linux logs for Linux useful tools Goals develop a better understanding of Linux and Windows services

More information

Linux+ Guide to Linux Certification, Third Edition

Linux+ Guide to Linux Certification, Third Edition Linux+ Guide to Linux Certification, Third Edition Chapter 14 Troubleshooting, Performance, and Security Objectives Describe and outline good troubleshooting practices Effectively troubleshoot common hardware-

More information

INFRASTRUCTURE BEST PRACTICES FOR PERFORMANCE

INFRASTRUCTURE BEST PRACTICES FOR PERFORMANCE INFRASTRUCTURE BEST PRACTICES FOR PERFORMANCE Michael Poulson and Devin Jansen EMS Software Software Support Engineer October 16-18, 2017 Performance Improvements and Best Practices Medium-Volume Traffic

More information

Network Traffic Analysis - Course Outline

Network Traffic Analysis - Course Outline Network Traffic Analysis - Course Outline This course is designed for system/network administrations with an overall understanding of computer networking. At the end of this course, students will have

More information

1 Data Center Requirements

1 Data Center Requirements 1 Data Center Requirements The following are MassDOT s standard Data Center requirements. 1.1 Data Center General Requirements 1.1.1 The CSC Operator shall furnish, or contract with a third-party provider

More information

CompTIA Linux Course Overview. Prerequisites/Audience. Course Outline. Exam Code: XK0-002 Course Length: 5 Days

CompTIA Linux Course Overview. Prerequisites/Audience. Course Outline. Exam Code: XK0-002 Course Length: 5 Days CompTIA Linux+ 2009 Exam Code: XK0-002 Course Length: 5 Days Course Overview This instructor-led course will prepare students for the 2009 CompTIA Linux+ certification exam. It provides a comprehensive

More information

Oracle Linux 7: System Administration Ed 1

Oracle Linux 7: System Administration Ed 1 Oracle University Contact Us: +603 2299 3600, 1 800 80 6277 Oracle Linux 7: System Administration Ed 1 Duration: 5 Days What you will learn The Oracle Linux 7: System Administration training helps you

More information

"Charting the Course... Enterprise Linux System Administration Course Summary

Charting the Course... Enterprise Linux System Administration Course Summary Course Summary Description This is an in-depth course that explores installation, configuration and maintenance of Linux systems. The course focuses on issues universal to every workstation and server.

More information

CS197U: A Hands on Introduction to Unix

CS197U: A Hands on Introduction to Unix CS197U: A Hands on Introduction to Unix Lecture 4: My First Linux System Tian Guo University of Massachusetts Amherst CICS 1 Reminders Assignment 2 was due before class Assignment 3 will be posted soon

More information

Security principles Host security

Security principles Host security Security principles Host security These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Host Security:

More information

LPI201 LPIC-2 Exam Prep (Course 1) (LPI201) HL965S

LPI201 LPIC-2 Exam Prep (Course 1) (LPI201) HL965S Course data sheet HPE course number Course length Delivery mode View schedule, local pricing, and register View related courses HL965S 4 days ILT,VILT View now View now LPI201 LPIC-2 Exam Prep (Course

More information

Introduction to Cisco BAMS

Introduction to Cisco BAMS CHAPTER 1 The Cisco Billing and Measurements Server (BAMS) collects, formats, and stores billing and measurements data from the Cisco Media Gateway Controller (MGC), either a Cisco VSC3000 virtual switch

More information

Oracle Linux 7: System Administration Ed 1

Oracle Linux 7: System Administration Ed 1 Oracle University Contact Us: Local: 1800 103 4775 Intl: +91 80 67863102 Oracle Linux 7: System Administration Ed 1 Duration: 5 Days What you will learn The Oracle Linux 7: System Administration training

More information

Oracle Linux 7: System Administration Ed 1 LVC

Oracle Linux 7: System Administration Ed 1 LVC Oracle University Contact Us: +27 (0)11 319-4111 Oracle Linux 7: System Administration Ed 1 LVC Duration: 5 Days What you will learn The Oracle Linux 7: System Administration training helps you develop

More information

DS Series Solutions Integrated Solutions for Secure, Centralized Data Center Management

DS Series Solutions Integrated Solutions for Secure, Centralized Data Center Management DS Series Solutions Integrated Solutions for Secure, Centralized Data Center Management DS Series Solutions IT Infrastructure Management Tools to Reduce IT Operational Costs and Increase IT Productivity

More information

Contingency Planning and Backups: SSH/SCP, Deltas, and Rsync

Contingency Planning and Backups: SSH/SCP, Deltas, and Rsync License Contingency Planning and Backups: SSH/SCP, Deltas, and Rsync This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported

More information

RedHat Certified Engineer

RedHat Certified Engineer RedHat Certified Engineer Red Hat Certified Engineer (RHCE) is a performance-based test that measures actual competency on live systems. Called the "crown jewel of Linux certifications," RHCE proves an

More information

Cisco Prime Performance 1.3 Installation Requirements

Cisco Prime Performance 1.3 Installation Requirements 1 CHAPTER Cisco Prime Performance 1.3 Installation Requirements The following topics provide the hardware and software requirements for installing Cisco Prime Performance Manager 1.3: Gateway and Unit

More information

Requirements and Dependencies

Requirements and Dependencies CHAPTER 2 You can install and use Security Manager as a standalone product or in combination with several other Cisco Security Management Suite applications, including optional applications that you can

More information

Cisco Unified CM Disaster Recovery System

Cisco Unified CM Disaster Recovery System Cisco Unified CM Disaster Recovery System Disaster Recovery System, page 1 Quick-reference tables for backup and restore procedures, page 3 Supported features and components, page 5 System requirements,

More information

A High Performance, High Reliability Perforce Server. Shiv Sikand, IC Manage Marc Lewert, Angela Thomas, TiVo

A High Performance, High Reliability Perforce Server. Shiv Sikand, IC Manage Marc Lewert, Angela Thomas, TiVo A High Performance, High Reliability Perforce Server Shiv Sikand, IC Manage Marc Lewert, Angela Thomas, TiVo Advanced Perforce Solutions Semiconductor design companies Design tool plug-ins Cadence, Synopsys,

More information

Linux Essentials. Smith, Roderick W. Table of Contents ISBN-13: Introduction xvii. Chapter 1 Selecting an Operating System 1

Linux Essentials. Smith, Roderick W. Table of Contents ISBN-13: Introduction xvii. Chapter 1 Selecting an Operating System 1 Linux Essentials Smith, Roderick W. ISBN-13: 9781118106792 Table of Contents Introduction xvii Chapter 1 Selecting an Operating System 1 What Is an OS? 1 What Is a Kernel? 1 What Else Identifies an OS?

More information

hash Remember the full pathname of a name argument head Output the first part of file(s) history Command History hostname Print or set system name

hash Remember the full pathname of a name argument head Output the first part of file(s) history Command History hostname Print or set system name LINUX Commands alias Create an alias apropos Search Help manual pages (man -k) awk Find and Replace text, database sort/validate/index break Exit from a loop builtin Run a shell builtin bzip2 Compress

More information

Installing Dell OpenManage 4.5 Software in a VMware ESX Server Software 2.5.x Environment

Installing Dell OpenManage 4.5 Software in a VMware ESX Server Software 2.5.x Environment Installing Dell OpenManage 4.5 Software in a VMware ESX Server Software 2.5.x Environment Notes, Notices, and Cautions NOTE: A NOTE indicates important information that helps you make better use of your

More information

The table below lists the domains measured by this examination and the extent to which they are represented in the examination.

The table below lists the domains measured by this examination and the extent to which they are represented in the examination. Introduction The Linux+ Certification is designed to measure the competencies of the Linux Professional with six to twelve months experience with the Linux operating system. This person provides basic

More information

68 - Point Checklist Revised May 2017

68 - Point Checklist Revised May 2017 karlp@smallbizthoughts.com www.smallbizthoughts.com 68 - Point Checklist Revised May 2017 Date: Client: Contact: Technician: Phone: Address: City / Zip: Client Interview 1. Are there any known issues?

More information

ABOUT ZEPCAM SOFTWARE INSTALLATION MANAGEMENT AND BACKUPS. Description What is it Installation requirement Server requirement

ABOUT ZEPCAM SOFTWARE INSTALLATION MANAGEMENT AND BACKUPS. Description What is it Installation requirement Server requirement 1 ABOUT ZEPCAM SOFTWARE Description What is it Installation requirement Server requirement INSTALLATION Create a bootable USB Networking Disk partitioning Bootloader configuration Setup Registration Administrator

More information

Linux Systems Security. Backup and Change Management NETS Fall 2016

Linux Systems Security. Backup and Change Management NETS Fall 2016 Linux Systems Security Backup and Change Management NETS1028 - Fall 2016 Backup Security breaches can cast doubt on entire installations or render them corrupt Files or entire systems may have to be recovered

More information

Oracle Linux System AdministrationNEW

Oracle Linux System AdministrationNEW Oracle University Contact Us: 1.800.529.0165 Oracle Linux System AdministrationNEW Duration: 5 Days What you will learn The Oracle Linux System Administration course covers a range of skills including

More information

Oracle Linux 5 & 6 System Administration TOD

Oracle Linux 5 & 6 System Administration TOD Oracle University Contact Us: Local: 0845 777 7 711 Intl: +44 845 777 7 711 Oracle Linux 5 & 6 System Administration TOD Duration: 5 Days What you will learn The Oracle Linux System Administration course

More information

Oracle Linux 5 & 6 System Administration

Oracle Linux 5 & 6 System Administration Oracle University Contact Us: 1.800.529.0165 Oracle Linux 5 & 6 System Administration Duration: 5 Days What you will learn This Oracle Linux System Administration training helps you develop a range of

More information

Installing Cisco APIC-EM on a Virtual Machine

Installing Cisco APIC-EM on a Virtual Machine About the Virtual Machine Installation, page 1 System Requirements Virtual Machine, page 2 Pre-Install Checklists, page 4 Cisco APIC-EM Ports Reference, page 7 Verifying the Cisco ISO Image, page 8 Installing

More information

Storage Protocol Offload for Virtualized Environments Session 301-F

Storage Protocol Offload for Virtualized Environments Session 301-F Storage Protocol Offload for Virtualized Environments Session 301-F Dennis Martin, President August 2016 1 Agenda About Demartek Offloads I/O Virtualization Concepts RDMA Concepts Overlay Networks and

More information

COS 318: Operating Systems. File Systems. Topics. Evolved Data Center Storage Hierarchy. Traditional Data Center Storage Hierarchy

COS 318: Operating Systems. File Systems. Topics. Evolved Data Center Storage Hierarchy. Traditional Data Center Storage Hierarchy Topics COS 318: Operating Systems File Systems hierarchy File system abstraction File system operations File system protection 2 Traditional Data Center Hierarchy Evolved Data Center Hierarchy Clients

More information

Foreword by Todd Heberlein

Foreword by Todd Heberlein ConteNTS in Detail About the Author Foreword by Todd Heberlein xvii xix Preface xxv Audience... xxvi Prerequisites... xxvii A Note on Software and Protocols... xxvii Scope.... xxviii Acknowledgments...

More information

HANDS UP IF YOU DON T HAVE A VM OR IF YOU DON T REMEMBER YOUR PASSWORDS. Or something broke

HANDS UP IF YOU DON T HAVE A VM OR IF YOU DON T REMEMBER YOUR PASSWORDS. Or something broke HANDS UP IF YOU DON T HAVE A VM OR IF YOU DON T REMEMBER YOUR PASSWORDS Or something broke Securing your VM 101 Getting Comfy in Linux -> Comfort ++ You After This Talk Quick recap from last week. Setup

More information

cisco. Number: Passing Score: 800 Time Limit: 120 min.

cisco.  Number: Passing Score: 800 Time Limit: 120 min. 500-006 cisco Number: 500-006 Passing Score: 800 Time Limit: 120 min Question Set 1 QUESTION 1 How many conferencing bridges can a single full-capacity Cisco TelePresence Conductor support? A. 1 B. 10

More information

Cisco Emergency Responder Installation

Cisco Emergency Responder Installation Overview, page 1 Hardware and Software Prerequisites, page 1 System Preparations, page 2 Installation and Migration on the Cisco UCS Server, page 4 Installation on a New System, page 13 Emergency Responder

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 8.3.7.52-8.3.3.27-2.11.9 Manager-XC-Cluster Release Notes McAfee Network Security Platform 8.3 Revision C Contents About this release New features Enhancements Resolved issues Installation instructions

More information

Fundamentals of Linux Platform Security

Fundamentals of Linux Platform Security Fundamentals of Linux Platform Security Security Training Course Dr. Charles J. Antonelli The University of Michigan 2012 Hands-On Network Security Module 1 Reconnaissance Tools Roadmap Review of generally

More information

Fundamentals of Linux Platform Security. Hands-On Network Security. Roadmap. Security Training Course. Module 1 Reconnaissance Tools

Fundamentals of Linux Platform Security. Hands-On Network Security. Roadmap. Security Training Course. Module 1 Reconnaissance Tools Fundamentals of Linux Platform Security Security Training Course Dr. Charles J. Antonelli The University of Michigan 2012 Hands-On Network Security Module 1 Reconnaissance Tools Roadmap Review of generally

More information

Oracle - Oracle Linux 5 6 System Administration Ed 3

Oracle - Oracle Linux 5 6 System Administration Ed 3 Oracle - Oracle Linux 5 6 System Administration Ed 3 Code: Lengt h: URL: D74508GC30 5 days View Online The Oracle Linux 5 & 6 System Administration course covers a range of skills including installation,

More information

Enterprise Linux System Administration

Enterprise Linux System Administration Enterprise Linux System Administration Course GL250, 5 Days, Hands-On, Instructor-Led Introduction The GL250 is an in-depth course that explores installation, configuration and maintenance of Linux systems.

More information

Acronis Monitoring Service

Acronis Monitoring Service Acronis Monitoring Service PRODUCT DOCUMENTATION Table of contents 1 About the Acronis Monitoring Service...4 2 Software Requirements...4 3 Understanding basic concepts...5 4 Getting started...7 4.1 Setting

More information

SA2 v6 Linux System Administration II Net Configuration, Software, Troubleshooting

SA2 v6 Linux System Administration II Net Configuration, Software, Troubleshooting SA2 v6 Linux System Administration II Net Configuration, Software, Troubleshooting Synopsis: This is the second System Administration class, a follow-on class for new administrators with limited networking

More information

Services: Monitoring and Logging. 9/16/2018 IST346: Info Tech Management & Administration 1

Services: Monitoring and Logging. 9/16/2018 IST346: Info Tech Management & Administration 1 Services: Monitoring and Logging 9/16/2018 IST346: Info Tech Management & Administration 1 Recall: Server vs. Service A server is a computer. A service is an offering provided by server(s). HTTP 9/16/2018

More information

Effective Use of CSAIL Storage

Effective Use of CSAIL Storage Effective Use of CSAIL Storage How to get the most out of your computing infrastructure Garrett Wollman, Jonathan Proulx, and Jay Sekora The Infrastructure Group Introduction Outline of this talk 1. Introductions

More information

Storage and File Hierarchy

Storage and File Hierarchy COS 318: Operating Systems Storage and File Hierarchy Jaswinder Pal Singh Computer Science Department Princeton University (http://www.cs.princeton.edu/courses/cos318/) Topics Storage hierarchy File system

More information

IOPStor: Storage Made Easy. Key Business Features. Key Business Solutions. IOPStor IOP5BI50T Network Attached Storage (NAS) Page 1 of 5

IOPStor: Storage Made Easy. Key Business Features. Key Business Solutions. IOPStor IOP5BI50T Network Attached Storage (NAS) Page 1 of 5 IOPStor: Storage Made Easy Application data, virtual images, client files, email, the types of data central to running a successful business can seem endless. With IOPStor you finally have an advanced

More information

Venafi Platform. Architecture 1 Architecture Basic. Professional Services Venafi. All Rights Reserved.

Venafi Platform. Architecture 1 Architecture Basic. Professional Services Venafi. All Rights Reserved. Venafi Platform Architecture 1 Architecture Basic Professional Services 2018 Venafi. All Rights Reserved. Goals 1 2 3 4 5 Architecture Basics: An overview of Venafi Platform. Required Infrastructure: Services

More information

COS 318: Operating Systems

COS 318: Operating Systems COS 318: Operating Systems File Systems: Abstractions and Protection Jaswinder Pal Singh Computer Science Department Princeton University (http://www.cs.princeton.edu/courses/cos318/) Topics What s behind

More information

Staying Out of the Swamp

Staying Out of the Swamp Staying Out of the Swamp Perforce User Conference 2001 Richard E. Baum Introduction Perforce runs well when given proper resources. CPU requirements are quite small. A server s I/O bandwidth is generally

More information

SERVICE DESCRIPTION DEDICATED SERVER

SERVICE DESCRIPTION DEDICATED SERVER Contents Service Overview.... 3 Key Features... 3 Implementation... 4 Validation... 4 Implementation Process.... 4 Internal Kick-Off... 4 Customer Kick-Off... 5 Provisioning & Testing.... 5 Billing....

More information

MA0-104.Passguide PASSGUIDE MA0-104 Intel Security Certified Product Specialist Version 1.0

MA0-104.Passguide  PASSGUIDE MA0-104 Intel Security Certified Product Specialist Version 1.0 MA0-104.Passguide Number: MA0-104 Passing Score: 800 Time Limit: 120 min File Version: 1.0 PASSGUIDE MA0-104 Intel Security Certified Product Specialist Version 1.0 Exam A QUESTION 1 A SIEM can be effectively

More information

High Availability Overview Paper

High Availability Overview Paper High Availability Overview Paper March 2001 Please note: The information contained in this document is intended as a guide to implementing high availability systems. Please keep in mind, however, that

More information

Requirements for ALEPH 500 Installation

Requirements for ALEPH 500 Installation PROJECT DOCUMENTATION Requirements for ALEPH 500 Installation Ltd., 2002, 2003 Last Update: July 31, 2003 Table of Contents 1. SERVER HARDWARE AND SOFTWARE REQUIREMENTS... 3 1.1 Server...3 1.2 Filesystem

More information

enalyzer enalyzer security

enalyzer enalyzer security enalyzer enalyzer security A documentation that provides an in depth description, that can be read as is, or forwarded to IT departments demanding more technical information. Copenhagen, May 2018 www.enalyzer.com

More information

One Voice Operations Center

One Voice Operations Center Installation Operation and Maintenance Manual AudioCodes One Voice Operations Center One Voice Operations Center Version 7.4 IOM Manual Contents Table of Contents 1 Overview... 15 Pre-installation Information...17

More information

InControl 2 Software Appliance Setup Guide

InControl 2 Software Appliance Setup Guide InControl 2 Software Appliance Setup Guide (Last updated: 2017-11) Contents 1. Introduction Minimum Hardware Requirements 2. For VMware ESXi 6.0 and ESXi 5.5 (SCSI) Networking Creating InControl and DB

More information

Profiling tool. Prototype architecture. Prototype Architecture and components description

Profiling tool. Prototype architecture. Prototype Architecture and components description Profiling tool Prototype architecture In Figure 1 the communication of profiling tool in physical level is described. During the profiling phase, both the application on virtual machine and the profiling

More information

System Requirements. Things to Consider Before You Install Foglight NMS. Host Server Hardware and Software System Requirements

System Requirements. Things to Consider Before You Install Foglight NMS. Host Server Hardware and Software System Requirements System Requirements This section contains information on the minimum system requirements for Foglight NMS. Before you can begin to download Foglight NMS, you must make sure that your computer meets the

More information

Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Enterprise

Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Enterprise Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Enterprise SQL 2008 R2 Enterprise Restrictions 8 CPU 2 TB Ram Use Limit 524 PB Database Size High Availability Options Database Mirroring,

More information

TimeIPS Server. IPS256T Virtual Machine. Installation Guide

TimeIPS Server. IPS256T Virtual Machine. Installation Guide TimeIPS Server IPS256T Virtual Machine Installation Guide TimeIPS License Notification The terms and conditions applicable to the license of the TimeIPS software, sale of TimeIPS hardware and the provision

More information

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Actual4Test.   Actual4test - actual test exam dumps-pass for IT exams Actual4Test http://www.actual4test.com Actual4test - actual test exam dumps-pass for IT exams Exam : 201-450 Title : LPIC-2 Exam 201 - Part 1 of 2 - version 4.5 Vendor : Lpi Version : DEMO Get Latest &

More information

CyberStore DSS. Multi Award Winning. Broadberry. CyberStore DSS. Open-E DSS v7 based Storage Appliances. Powering these organisations

CyberStore DSS. Multi Award Winning. Broadberry. CyberStore DSS. Open-E DSS v7 based Storage Appliances. Powering these organisations Multi Award Winning CyberStore DSS CyberStore DSS CyberStore DSS Storage Appliances: Open-E DSS v7 based Storage Appliances The CyberStore DSS range of iscsi SAN / NAS storage appliances include 1U-4U

More information

Securing the Frisbee Multicast Disk Loader

Securing the Frisbee Multicast Disk Loader Securing the Frisbee Multicast Disk Loader Robert Ricci, Jonathon Duerig University of Utah 1 What is Frisbee? 2 Frisbee is Emulab s tool to install whole disk images from a server to many clients using

More information

The power of centralized computing at your fingertips

The power of centralized computing at your fingertips Pinnacle 3 Professional The power of centralized computing at your fingertips Philips Pinnacle 3 Professional specifications The power of centralized computing in a scalable offering for mid-size clinics

More information

Apple 9L Mac OS X Advanced System Administration v

Apple 9L Mac OS X Advanced System Administration v Apple Mac OS X Advanced System Administration v10.5 http://killexams.com/exam-detail/ QUESTION: 91 Package installers use checksumming to enable sandboxing within the kernel of any application contained

More information

Reliable Storage Servers

Reliable Storage Servers Reliable Storage Servers Peter Ashford Ashford Computer 1 Intended Audience The intended audience for this presentation is people who perform one or more of the following tasks on storage servers: Specify

More information

Disaster Recovery System Administration Guide for Cisco Unified Communications Manager Release 8.0(2)

Disaster Recovery System Administration Guide for Cisco Unified Communications Manager Release 8.0(2) Disaster Recovery System Administration Guide for Cisco Unified Communications Manager Release 8.0(2) Published: April 2, 2010 This guide provides an overview of the Disaster Recovery System, describes

More information

IDP NetScreen-Security Manager Migration Guide

IDP NetScreen-Security Manager Migration Guide Intrusion Detection and Prevention IDP NetScreen-Security Manager Migration Guide Release 4.0r3 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Part

More information

Symantec Backup Exec Blueprints

Symantec Backup Exec Blueprints Symantec Backup Exec Blueprints Blueprint for Large Installations Backup Exec Technical Services Backup & Recovery Technical Education Services Symantec Backup Exec Blueprints 1 Symantec Backup Exec Blueprints

More information

VMware vsphere with ESX 4.1 and vcenter 4.1

VMware vsphere with ESX 4.1 and vcenter 4.1 QWERTYUIOP{ Overview VMware vsphere with ESX 4.1 and vcenter 4.1 This powerful 5-day class is an intense introduction to virtualization using VMware s vsphere 4.1 including VMware ESX 4.1 and vcenter.

More information

ENTERPRISE LINUX SYSTEM ADMINISTRATION

ENTERPRISE LINUX SYSTEM ADMINISTRATION ENTERPRISE LINUX SYSTEM ADMINISTRATION COURSE DESCRIPTION: The GL250 is an in-depth course that explores installation, configuration and maintenance of Linux systems. The course focuses on issues universal

More information

Rhapsody Interface Management and Administration. Presented by: Carolina Velasquez

Rhapsody Interface Management and Administration. Presented by: Carolina Velasquez Rhapsody Interface Management and Administration Presented by: Carolina Velasquez Welcome The Rhapsody Framework and Message Handling Web Management Console Monitoring and Management Engine Management,

More information

SDX :30:09 UTC Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement

SDX :30:09 UTC Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement SDX 9.3 2015-05-15 13:30:09 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents SDX 9.3... 5 SDX Administration... 6 Introduction... 7 Getting Started

More information

Mainframe Backup Modernization Disk Library for mainframe

Mainframe Backup Modernization Disk Library for mainframe Mainframe Backup Modernization Disk Library for mainframe Mainframe is more important than ever itunes Downloads Instagram Photos Twitter Tweets Facebook Likes YouTube Views Google Searches CICS Transactions

More information

Management Console User s Guide (AST 2500 Chipset)

Management Console User s Guide (AST 2500 Chipset) Management Console User s Guide (AST 2500 Chipset) Version: 1.2 Table of Contents Using Your Management Console... 2 Management Console Key Features and Functions... 3 Software Install... 4 Prerequisites

More information

One Voice Operations Center

One Voice Operations Center Installation Operation and Maintenance Manual AudioCodes One Voice Operations Center One Voice Operations Center Version 7.4 IOM Manual Contents Table of Contents 1 Overview... 17 Pre-installation Information...19

More information

"Charting the Course... Enterprise Linux System Administration. Course Summary

Charting the Course... Enterprise Linux System Administration. Course Summary Course Summary Description This is an in-depth course that explores installation, configuration and maintenance of Linux systems. The course focuses on issues universal to every workstation and server.

More information

Triton file systems - an introduction. slide 1 of 28

Triton file systems - an introduction. slide 1 of 28 Triton file systems - an introduction slide 1 of 28 File systems Motivation & basic concepts Storage locations Basic flow of IO Do's and Don'ts Exercises slide 2 of 28 File systems: Motivation Case #1:

More information

IT341 Introduction to System Administration. Project 4 - Backup Strategies with rsync and crontab

IT341 Introduction to System Administration. Project 4 - Backup Strategies with rsync and crontab IT341 Introduction to System Administration Project 4 - Backup Strategies with rsync and crontab Backup is one of the most important things a system administrator does. It is important to decide what data

More information

Build your own NAS with OpenMediaVault

Build your own NAS with OpenMediaVault Build your own NAS with OpenMediaVault Installation Minimum Requirements i486 or amd64 platform 1 GiB RAM 2 GiB HDD/DOM/CF/USB Thumb Drive used as OpenMediaVault system drive. Flash Drives without static

More information

Automated Out-of-Band management with Ansible and Redfish

Automated Out-of-Band management with Ansible and Redfish Automated Out-of-Band management with Ansible and Redfish Jose Delarosa Senior Linux Engineer at Dell EMC Jake Jackson Product Field Engineer at Ansible by Red Hat May 2 nd, 2017 Who are we Jose De la

More information

Virtualization and Performance

Virtualization and Performance Virtualization and Performance Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

More information

File Protection using rsync. Setup guide

File Protection using rsync. Setup guide File Protection using rsync Setup guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Overview... 2 2. Rsync technology... 3 Terminology... 3 Implementation... 3 3. Rsync data hosts...

More information

UNIX System Administration

UNIX System Administration $!... 14:13 $$... 14:13.netrc...12:27-28 /etc/fstab... 6:25 /etc/hosts.equiv... 8:23 /etc/inittab Entries... 4:8 /etc/netmasks... 8:22 /etc/shells... 12:25 /home... 6:69 /tmp...6:61-67 /usr... 6:70 /var...

More information