Lecture 08: When disaster strikes and all else fails
|
|
- Anastasia Hoover
- 5 years ago
- Views:
Transcription
1 Lecture 08: When disaster strikes and all else fails Hands-on Unix system administration DeCal / 27
2 Projects groups of four people submit one form per group with proposed project ideas and SSH public keys we ll be provisioning VMs and sending out an announcement 2 / 27
3 What s up? What s hosing? What s in use? Too much traffic files Low-level files terminals sudo Other tools 3 / 27
4 What s up? What s up? What s hosing? What s in use? Too much traffic files Low-level files terminals sudo Other tools uptime: how long continuously running, what s the load average 1, 5, 15 min average number of processes waiting for CPU (or IO) w, who: who s logged in on machine write: write to a logged-in user wall: write to all logged-in users 4 / 27
5 What s hosing? What s up? What s hosing? What s in use? Too much traffic files Low-level files terminals sudo Other tools top, htop (Linux), ps (ps aux, ps elf) similarly iftop for network interface bandwidth, iotop (Linux) for disk IO 5 / 27
6 What s in use? What s up? What s hosing? What s in use? Too much traffic files Low-level files terminals sudo Other tools The action can t be completed... in use (Windows) The operation can t be completed... in use (Mac OS X) lsof for files lsof -i for network ports see also: netstat -pant, fuser 6 / 27
7 Too much traffic What s up? What s hosing? What s in use? Too much traffic files Low-level files terminals sudo Other tools netcat: pipe over TCP/UDP wireshark, tshark, tcpdump: packet sniffer/analyzer nmap: network scanner 7 / 27
8 Too many files What s up? What s hosing? What s in use? Too much traffic files Low-level files terminals sudo Other tools du, df: directory, filesystem disk space usage scp (secure copy): transfer files over SSH rsync (remote sync): intelligently transfer files (often over SSH) tar (tape archiver): combine files into a tarball 8 / 27
9 Low-level files What s up? What s hosing? What s in use? Too much traffic files Low-level files terminals sudo Other tools fdisk, parted (Linux): edit partition table fsck: check filesystem for errors dd: copy block devices 9 / 27
10 Too many terminals What s up? What s hosing? What s in use? Too much traffic files Low-level files terminals sudo Other tools screen, tmux metaterminal access multiple terminal sessions inside a single terminal session other features: persistence (after logging off), session sharing (between users) 10 / 27
11 sudo What s up? What s hosing? What s in use? Too much traffic files Low-level files terminals sudo Other tools sudo: switch user do (usually used to give your command root powers) via xkcd.com 11 / 27
12 Other tools What s up? What s hosing? What s in use? Too much traffic files Low-level files terminals sudo Other tools ldd (shared library dependencies), truss or strace (trace system calls) md5sum: file checksum watch: execute command and repeatedly show output seq: print sequence of numbers 12 / 27
13 Software meltdowns Hardware meltdowns Criminals on the loose Escalation of problems 2003 Northeast blackout 2003 Northeast blackout 13 / 27
14 Software meltdowns Software meltdowns Hardware meltdowns Criminals on the loose Escalation of problems 2003 Northeast blackout 2003 Northeast blackout system load (uptime command) too damn high remote access (networking, firewall, SSH) broken 14 / 27
15 Hardware meltdowns Software meltdowns Hardware meltdowns Criminals on the loose Escalation of problems 2003 Northeast blackout 2003 Northeast blackout failed hard drives failed fans, power supplies, CPU, RAM 15 / 27
16 Criminals on the loose Software meltdowns Hardware meltdowns Criminals on the loose Escalation of problems 2003 Northeast blackout 2003 Northeast blackout crackers will do Bad Things compromised accounts looks can be deceiving, uncertain what to trust 16 / 27
17 Escalation of problems Software meltdowns Hardware meltdowns Criminals on the loose Escalation of problems 2003 Northeast blackout 2003 Northeast blackout we like to build systems on top of each other if one thing fails, it may break other things, causing other things to fail 17 / 27
18 2003 Northeast blackout August 13, 2003, 9:21pm EDT (via en.wikipedia.org) 18 / 27
19 2003 Northeast blackout August 14, 2003, 9:03pm EDT (via en.wikipedia.org) 19 / 27
20 Be Prepared Power Out-of-band Redundancy Monitoring Security Backups 20 / 27
21 Be Prepared Be Prepared Power Out-of-band Redundancy Monitoring Security Backups Boy Scout motto Murphy s Law: Anything that can go wrong, will go wrong. s happens 21 / 27
22 Power Be Prepared Power Out-of-band Redundancy Monitoring Security Backups Uninterruptible Power Supply (UPS) many UPSes can remotely power cycle servers 22 / 27
23 Out-of-band Be Prepared Power Out-of-band Redundancy Monitoring Security Backups separate hardware that can be remotely accessed independent from rest of hardware, dedicated NIC can access BIOS, power cycle, provide visual display e.g., IPMI, Dell DRAC, Sun LOM 23 / 27
24 Redundancy Be Prepared Power Out-of-band Redundancy Monitoring Security Backups dual redundant power supplies typical RAID failover servers for high availability spare parts (hard drives!) for swapping 24 / 27
25 Monitoring Be Prepared Power Out-of-band Redundancy Monitoring Security Backups many large scale operations (Google, Facebook) have many failed servers at any point in time, monitoring servers reroute traffic appropriately monitor syslog SNMP traps alarm notification by , text message 25 / 27
26 Security Be Prepared Power Out-of-band Redundancy Monitoring Security Backups subscribe to OS security announcements Intrusion Detection Software (e.g., snort, bro) be wary of lax permissions limit root access 26 / 27
27 Backups Be Prepared Power Out-of-band Redundancy Monitoring Security Backups user data, system configuration ideally daily, weekly, monthly rotations RAID is not a backup e.g., rsync, cron, rsnapshot 27 / 27
IT 341: Introduction to System Administration. Notes for Project #8: Backing Up Files with rsync
IT 341: Introduction to System Administration Notes for Project #8: Backing Up Files with rsync These notes explain some of the concepts you will encounter in Project #08: Backing Up Files with rsync Topics
More informationrsync link-dest Local, rotated, quick and useful backups!
rsync link-dest Local, rotated, quick and useful backups! Scope No complete scripts will be presented Just enough so that a competent scripter will be able to build what they need Unixes used: OpenBSD,
More informationPrerequisites: Students must be proficient in general computing skills but not necessarily experienced with Linux or Unix. Supported Distributions:
This GL124 course is designed to follow an identical set of topics as the Red Hat RH124 course with the added benefit of very comprehensive lab exercises and detailed lecture material. The Red Hat Enterprise
More informationBasic Linux Security. Roman Bohuk University of Virginia
Basic Linux Security Roman Bohuk University of Virginia What is Linux? An open source operating system Project started by Linus Torvalds kernel Kernel: core program that controls everything else (controls
More informationWe're Not CIS. The Technical Staff & Computing Facilities. User Community. What CIS Does for CS. CIS: Computing and Information Services.
We're Not CIS CIS: Computing and Information Services The Technical Staff & Computing Facilities Campus Computing Provides the Univ's computing infrastructure Course registration (Banner) Payroll (via
More information1 LINUX KERNEL & DEVICES
GL-250: Red Hat Linux Systems Administration Course Length: 5 days Course Description: The GL250 is an in-depth course that explores installation, configuration and maintenance of Linux systems. The course
More informationHoneypot Hacker Tracking and Computer Forensics
Honeypot Hacker Tracking and Computer Forensics Manfred Hung manfred.hung@pisa.org.hk Agenda Honeypot History Value of Honeypot Honeypot Technology Common Honypot products/solutions Honeypot deployment
More informationWe're Not CIS. The Technical Staff & Computing Facilities. What CIS Does for CS. User Community
We're Not CIS The Technical Staff & Computing Facilities CIS: Computing and Information Services Campus Computing Provides the Univ's computing infrastructure Course registration (Banner) Payroll (via
More informationOperating system hardening
Operating system Comp Sci 3600 Security Outline 1 2 3 4 5 6 What is OS? Hardening process that includes planning, ation, uration, update, and maintenance of the operating system and the key applications
More informationShort Read Sequencing Analysis Workshop
Short Read Sequencing Analysis Workshop Day 2 Learning the Linux Compute Environment In-class Slides Matt Hynes-Grace Manager of IT Operations, BioFrontiers Institute Review of Day 2 Videos Video 1 Introduction
More informationZadara Enterprise Storage in
Zadara Enterprise Storage in Google Cloud Platform (GCP) Deployment Guide March 2017 Revision A 2011 2017 ZADARA Storage, Inc. All rights reserved. Zadara Storage / GCP - Deployment Guide Page 1 Contents
More informationCL030 is a csage Certification Preparatory Course!
Corder Enterprises International Building World Class MIS Teams, for you! CL030 is a csage Certification Preparatory Course! CL030 - LINUX System Administration Course Description: Learn and practice essential
More informationLinux Hardware Management. Linux System Administration COMP2018 Summer 2017
Linux Hardware Management Linux System Administration COMP2018 Summer 2017 Hardware Resources CPU refers to the primary computing resource and is measured in processor cores RAM refers to the volatile
More informationThe Wonderful World of Services VINCE
The Wonderful World of Services VINCE Agenda definitions services for Windows and Linux breaks? auditing Linux logs for Linux useful tools Goals develop a better understanding of Linux and Windows services
More informationLinux+ Guide to Linux Certification, Third Edition
Linux+ Guide to Linux Certification, Third Edition Chapter 14 Troubleshooting, Performance, and Security Objectives Describe and outline good troubleshooting practices Effectively troubleshoot common hardware-
More informationINFRASTRUCTURE BEST PRACTICES FOR PERFORMANCE
INFRASTRUCTURE BEST PRACTICES FOR PERFORMANCE Michael Poulson and Devin Jansen EMS Software Software Support Engineer October 16-18, 2017 Performance Improvements and Best Practices Medium-Volume Traffic
More informationNetwork Traffic Analysis - Course Outline
Network Traffic Analysis - Course Outline This course is designed for system/network administrations with an overall understanding of computer networking. At the end of this course, students will have
More information1 Data Center Requirements
1 Data Center Requirements The following are MassDOT s standard Data Center requirements. 1.1 Data Center General Requirements 1.1.1 The CSC Operator shall furnish, or contract with a third-party provider
More informationCompTIA Linux Course Overview. Prerequisites/Audience. Course Outline. Exam Code: XK0-002 Course Length: 5 Days
CompTIA Linux+ 2009 Exam Code: XK0-002 Course Length: 5 Days Course Overview This instructor-led course will prepare students for the 2009 CompTIA Linux+ certification exam. It provides a comprehensive
More informationOracle Linux 7: System Administration Ed 1
Oracle University Contact Us: +603 2299 3600, 1 800 80 6277 Oracle Linux 7: System Administration Ed 1 Duration: 5 Days What you will learn The Oracle Linux 7: System Administration training helps you
More information"Charting the Course... Enterprise Linux System Administration Course Summary
Course Summary Description This is an in-depth course that explores installation, configuration and maintenance of Linux systems. The course focuses on issues universal to every workstation and server.
More informationCS197U: A Hands on Introduction to Unix
CS197U: A Hands on Introduction to Unix Lecture 4: My First Linux System Tian Guo University of Massachusetts Amherst CICS 1 Reminders Assignment 2 was due before class Assignment 3 will be posted soon
More informationSecurity principles Host security
Security principles Host security These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Host Security:
More informationLPI201 LPIC-2 Exam Prep (Course 1) (LPI201) HL965S
Course data sheet HPE course number Course length Delivery mode View schedule, local pricing, and register View related courses HL965S 4 days ILT,VILT View now View now LPI201 LPIC-2 Exam Prep (Course
More informationIntroduction to Cisco BAMS
CHAPTER 1 The Cisco Billing and Measurements Server (BAMS) collects, formats, and stores billing and measurements data from the Cisco Media Gateway Controller (MGC), either a Cisco VSC3000 virtual switch
More informationOracle Linux 7: System Administration Ed 1
Oracle University Contact Us: Local: 1800 103 4775 Intl: +91 80 67863102 Oracle Linux 7: System Administration Ed 1 Duration: 5 Days What you will learn The Oracle Linux 7: System Administration training
More informationOracle Linux 7: System Administration Ed 1 LVC
Oracle University Contact Us: +27 (0)11 319-4111 Oracle Linux 7: System Administration Ed 1 LVC Duration: 5 Days What you will learn The Oracle Linux 7: System Administration training helps you develop
More informationDS Series Solutions Integrated Solutions for Secure, Centralized Data Center Management
DS Series Solutions Integrated Solutions for Secure, Centralized Data Center Management DS Series Solutions IT Infrastructure Management Tools to Reduce IT Operational Costs and Increase IT Productivity
More informationContingency Planning and Backups: SSH/SCP, Deltas, and Rsync
License Contingency Planning and Backups: SSH/SCP, Deltas, and Rsync This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported
More informationRedHat Certified Engineer
RedHat Certified Engineer Red Hat Certified Engineer (RHCE) is a performance-based test that measures actual competency on live systems. Called the "crown jewel of Linux certifications," RHCE proves an
More informationCisco Prime Performance 1.3 Installation Requirements
1 CHAPTER Cisco Prime Performance 1.3 Installation Requirements The following topics provide the hardware and software requirements for installing Cisco Prime Performance Manager 1.3: Gateway and Unit
More informationRequirements and Dependencies
CHAPTER 2 You can install and use Security Manager as a standalone product or in combination with several other Cisco Security Management Suite applications, including optional applications that you can
More informationCisco Unified CM Disaster Recovery System
Cisco Unified CM Disaster Recovery System Disaster Recovery System, page 1 Quick-reference tables for backup and restore procedures, page 3 Supported features and components, page 5 System requirements,
More informationA High Performance, High Reliability Perforce Server. Shiv Sikand, IC Manage Marc Lewert, Angela Thomas, TiVo
A High Performance, High Reliability Perforce Server Shiv Sikand, IC Manage Marc Lewert, Angela Thomas, TiVo Advanced Perforce Solutions Semiconductor design companies Design tool plug-ins Cadence, Synopsys,
More informationLinux Essentials. Smith, Roderick W. Table of Contents ISBN-13: Introduction xvii. Chapter 1 Selecting an Operating System 1
Linux Essentials Smith, Roderick W. ISBN-13: 9781118106792 Table of Contents Introduction xvii Chapter 1 Selecting an Operating System 1 What Is an OS? 1 What Is a Kernel? 1 What Else Identifies an OS?
More informationhash Remember the full pathname of a name argument head Output the first part of file(s) history Command History hostname Print or set system name
LINUX Commands alias Create an alias apropos Search Help manual pages (man -k) awk Find and Replace text, database sort/validate/index break Exit from a loop builtin Run a shell builtin bzip2 Compress
More informationInstalling Dell OpenManage 4.5 Software in a VMware ESX Server Software 2.5.x Environment
Installing Dell OpenManage 4.5 Software in a VMware ESX Server Software 2.5.x Environment Notes, Notices, and Cautions NOTE: A NOTE indicates important information that helps you make better use of your
More informationThe table below lists the domains measured by this examination and the extent to which they are represented in the examination.
Introduction The Linux+ Certification is designed to measure the competencies of the Linux Professional with six to twelve months experience with the Linux operating system. This person provides basic
More information68 - Point Checklist Revised May 2017
karlp@smallbizthoughts.com www.smallbizthoughts.com 68 - Point Checklist Revised May 2017 Date: Client: Contact: Technician: Phone: Address: City / Zip: Client Interview 1. Are there any known issues?
More informationABOUT ZEPCAM SOFTWARE INSTALLATION MANAGEMENT AND BACKUPS. Description What is it Installation requirement Server requirement
1 ABOUT ZEPCAM SOFTWARE Description What is it Installation requirement Server requirement INSTALLATION Create a bootable USB Networking Disk partitioning Bootloader configuration Setup Registration Administrator
More informationLinux Systems Security. Backup and Change Management NETS Fall 2016
Linux Systems Security Backup and Change Management NETS1028 - Fall 2016 Backup Security breaches can cast doubt on entire installations or render them corrupt Files or entire systems may have to be recovered
More informationOracle Linux System AdministrationNEW
Oracle University Contact Us: 1.800.529.0165 Oracle Linux System AdministrationNEW Duration: 5 Days What you will learn The Oracle Linux System Administration course covers a range of skills including
More informationOracle Linux 5 & 6 System Administration TOD
Oracle University Contact Us: Local: 0845 777 7 711 Intl: +44 845 777 7 711 Oracle Linux 5 & 6 System Administration TOD Duration: 5 Days What you will learn The Oracle Linux System Administration course
More informationOracle Linux 5 & 6 System Administration
Oracle University Contact Us: 1.800.529.0165 Oracle Linux 5 & 6 System Administration Duration: 5 Days What you will learn This Oracle Linux System Administration training helps you develop a range of
More informationInstalling Cisco APIC-EM on a Virtual Machine
About the Virtual Machine Installation, page 1 System Requirements Virtual Machine, page 2 Pre-Install Checklists, page 4 Cisco APIC-EM Ports Reference, page 7 Verifying the Cisco ISO Image, page 8 Installing
More informationStorage Protocol Offload for Virtualized Environments Session 301-F
Storage Protocol Offload for Virtualized Environments Session 301-F Dennis Martin, President August 2016 1 Agenda About Demartek Offloads I/O Virtualization Concepts RDMA Concepts Overlay Networks and
More informationCOS 318: Operating Systems. File Systems. Topics. Evolved Data Center Storage Hierarchy. Traditional Data Center Storage Hierarchy
Topics COS 318: Operating Systems File Systems hierarchy File system abstraction File system operations File system protection 2 Traditional Data Center Hierarchy Evolved Data Center Hierarchy Clients
More informationForeword by Todd Heberlein
ConteNTS in Detail About the Author Foreword by Todd Heberlein xvii xix Preface xxv Audience... xxvi Prerequisites... xxvii A Note on Software and Protocols... xxvii Scope.... xxviii Acknowledgments...
More informationHANDS UP IF YOU DON T HAVE A VM OR IF YOU DON T REMEMBER YOUR PASSWORDS. Or something broke
HANDS UP IF YOU DON T HAVE A VM OR IF YOU DON T REMEMBER YOUR PASSWORDS Or something broke Securing your VM 101 Getting Comfy in Linux -> Comfort ++ You After This Talk Quick recap from last week. Setup
More informationcisco. Number: Passing Score: 800 Time Limit: 120 min.
500-006 cisco Number: 500-006 Passing Score: 800 Time Limit: 120 min Question Set 1 QUESTION 1 How many conferencing bridges can a single full-capacity Cisco TelePresence Conductor support? A. 1 B. 10
More informationCisco Emergency Responder Installation
Overview, page 1 Hardware and Software Prerequisites, page 1 System Preparations, page 2 Installation and Migration on the Cisco UCS Server, page 4 Installation on a New System, page 13 Emergency Responder
More informationMcAfee Network Security Platform 8.3
8.3.7.52-8.3.3.27-2.11.9 Manager-XC-Cluster Release Notes McAfee Network Security Platform 8.3 Revision C Contents About this release New features Enhancements Resolved issues Installation instructions
More informationFundamentals of Linux Platform Security
Fundamentals of Linux Platform Security Security Training Course Dr. Charles J. Antonelli The University of Michigan 2012 Hands-On Network Security Module 1 Reconnaissance Tools Roadmap Review of generally
More informationFundamentals of Linux Platform Security. Hands-On Network Security. Roadmap. Security Training Course. Module 1 Reconnaissance Tools
Fundamentals of Linux Platform Security Security Training Course Dr. Charles J. Antonelli The University of Michigan 2012 Hands-On Network Security Module 1 Reconnaissance Tools Roadmap Review of generally
More informationOracle - Oracle Linux 5 6 System Administration Ed 3
Oracle - Oracle Linux 5 6 System Administration Ed 3 Code: Lengt h: URL: D74508GC30 5 days View Online The Oracle Linux 5 & 6 System Administration course covers a range of skills including installation,
More informationEnterprise Linux System Administration
Enterprise Linux System Administration Course GL250, 5 Days, Hands-On, Instructor-Led Introduction The GL250 is an in-depth course that explores installation, configuration and maintenance of Linux systems.
More informationAcronis Monitoring Service
Acronis Monitoring Service PRODUCT DOCUMENTATION Table of contents 1 About the Acronis Monitoring Service...4 2 Software Requirements...4 3 Understanding basic concepts...5 4 Getting started...7 4.1 Setting
More informationSA2 v6 Linux System Administration II Net Configuration, Software, Troubleshooting
SA2 v6 Linux System Administration II Net Configuration, Software, Troubleshooting Synopsis: This is the second System Administration class, a follow-on class for new administrators with limited networking
More informationServices: Monitoring and Logging. 9/16/2018 IST346: Info Tech Management & Administration 1
Services: Monitoring and Logging 9/16/2018 IST346: Info Tech Management & Administration 1 Recall: Server vs. Service A server is a computer. A service is an offering provided by server(s). HTTP 9/16/2018
More informationEffective Use of CSAIL Storage
Effective Use of CSAIL Storage How to get the most out of your computing infrastructure Garrett Wollman, Jonathan Proulx, and Jay Sekora The Infrastructure Group Introduction Outline of this talk 1. Introductions
More informationStorage and File Hierarchy
COS 318: Operating Systems Storage and File Hierarchy Jaswinder Pal Singh Computer Science Department Princeton University (http://www.cs.princeton.edu/courses/cos318/) Topics Storage hierarchy File system
More informationIOPStor: Storage Made Easy. Key Business Features. Key Business Solutions. IOPStor IOP5BI50T Network Attached Storage (NAS) Page 1 of 5
IOPStor: Storage Made Easy Application data, virtual images, client files, email, the types of data central to running a successful business can seem endless. With IOPStor you finally have an advanced
More informationVenafi Platform. Architecture 1 Architecture Basic. Professional Services Venafi. All Rights Reserved.
Venafi Platform Architecture 1 Architecture Basic Professional Services 2018 Venafi. All Rights Reserved. Goals 1 2 3 4 5 Architecture Basics: An overview of Venafi Platform. Required Infrastructure: Services
More informationCOS 318: Operating Systems
COS 318: Operating Systems File Systems: Abstractions and Protection Jaswinder Pal Singh Computer Science Department Princeton University (http://www.cs.princeton.edu/courses/cos318/) Topics What s behind
More informationStaying Out of the Swamp
Staying Out of the Swamp Perforce User Conference 2001 Richard E. Baum Introduction Perforce runs well when given proper resources. CPU requirements are quite small. A server s I/O bandwidth is generally
More informationSERVICE DESCRIPTION DEDICATED SERVER
Contents Service Overview.... 3 Key Features... 3 Implementation... 4 Validation... 4 Implementation Process.... 4 Internal Kick-Off... 4 Customer Kick-Off... 5 Provisioning & Testing.... 5 Billing....
More informationMA0-104.Passguide PASSGUIDE MA0-104 Intel Security Certified Product Specialist Version 1.0
MA0-104.Passguide Number: MA0-104 Passing Score: 800 Time Limit: 120 min File Version: 1.0 PASSGUIDE MA0-104 Intel Security Certified Product Specialist Version 1.0 Exam A QUESTION 1 A SIEM can be effectively
More informationHigh Availability Overview Paper
High Availability Overview Paper March 2001 Please note: The information contained in this document is intended as a guide to implementing high availability systems. Please keep in mind, however, that
More informationRequirements for ALEPH 500 Installation
PROJECT DOCUMENTATION Requirements for ALEPH 500 Installation Ltd., 2002, 2003 Last Update: July 31, 2003 Table of Contents 1. SERVER HARDWARE AND SOFTWARE REQUIREMENTS... 3 1.1 Server...3 1.2 Filesystem
More informationenalyzer enalyzer security
enalyzer enalyzer security A documentation that provides an in depth description, that can be read as is, or forwarded to IT departments demanding more technical information. Copenhagen, May 2018 www.enalyzer.com
More informationOne Voice Operations Center
Installation Operation and Maintenance Manual AudioCodes One Voice Operations Center One Voice Operations Center Version 7.4 IOM Manual Contents Table of Contents 1 Overview... 15 Pre-installation Information...17
More informationInControl 2 Software Appliance Setup Guide
InControl 2 Software Appliance Setup Guide (Last updated: 2017-11) Contents 1. Introduction Minimum Hardware Requirements 2. For VMware ESXi 6.0 and ESXi 5.5 (SCSI) Networking Creating InControl and DB
More informationProfiling tool. Prototype architecture. Prototype Architecture and components description
Profiling tool Prototype architecture In Figure 1 the communication of profiling tool in physical level is described. During the profiling phase, both the application on virtual machine and the profiling
More informationSystem Requirements. Things to Consider Before You Install Foglight NMS. Host Server Hardware and Software System Requirements
System Requirements This section contains information on the minimum system requirements for Foglight NMS. Before you can begin to download Foglight NMS, you must make sure that your computer meets the
More informationMinimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Enterprise
Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Enterprise SQL 2008 R2 Enterprise Restrictions 8 CPU 2 TB Ram Use Limit 524 PB Database Size High Availability Options Database Mirroring,
More informationTimeIPS Server. IPS256T Virtual Machine. Installation Guide
TimeIPS Server IPS256T Virtual Machine Installation Guide TimeIPS License Notification The terms and conditions applicable to the license of the TimeIPS software, sale of TimeIPS hardware and the provision
More informationActual4Test. Actual4test - actual test exam dumps-pass for IT exams
Actual4Test http://www.actual4test.com Actual4test - actual test exam dumps-pass for IT exams Exam : 201-450 Title : LPIC-2 Exam 201 - Part 1 of 2 - version 4.5 Vendor : Lpi Version : DEMO Get Latest &
More informationCyberStore DSS. Multi Award Winning. Broadberry. CyberStore DSS. Open-E DSS v7 based Storage Appliances. Powering these organisations
Multi Award Winning CyberStore DSS CyberStore DSS CyberStore DSS Storage Appliances: Open-E DSS v7 based Storage Appliances The CyberStore DSS range of iscsi SAN / NAS storage appliances include 1U-4U
More informationSecuring the Frisbee Multicast Disk Loader
Securing the Frisbee Multicast Disk Loader Robert Ricci, Jonathon Duerig University of Utah 1 What is Frisbee? 2 Frisbee is Emulab s tool to install whole disk images from a server to many clients using
More informationThe power of centralized computing at your fingertips
Pinnacle 3 Professional The power of centralized computing at your fingertips Philips Pinnacle 3 Professional specifications The power of centralized computing in a scalable offering for mid-size clinics
More informationApple 9L Mac OS X Advanced System Administration v
Apple Mac OS X Advanced System Administration v10.5 http://killexams.com/exam-detail/ QUESTION: 91 Package installers use checksumming to enable sandboxing within the kernel of any application contained
More informationReliable Storage Servers
Reliable Storage Servers Peter Ashford Ashford Computer 1 Intended Audience The intended audience for this presentation is people who perform one or more of the following tasks on storage servers: Specify
More informationDisaster Recovery System Administration Guide for Cisco Unified Communications Manager Release 8.0(2)
Disaster Recovery System Administration Guide for Cisco Unified Communications Manager Release 8.0(2) Published: April 2, 2010 This guide provides an overview of the Disaster Recovery System, describes
More informationIDP NetScreen-Security Manager Migration Guide
Intrusion Detection and Prevention IDP NetScreen-Security Manager Migration Guide Release 4.0r3 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Part
More informationSymantec Backup Exec Blueprints
Symantec Backup Exec Blueprints Blueprint for Large Installations Backup Exec Technical Services Backup & Recovery Technical Education Services Symantec Backup Exec Blueprints 1 Symantec Backup Exec Blueprints
More informationVMware vsphere with ESX 4.1 and vcenter 4.1
QWERTYUIOP{ Overview VMware vsphere with ESX 4.1 and vcenter 4.1 This powerful 5-day class is an intense introduction to virtualization using VMware s vsphere 4.1 including VMware ESX 4.1 and vcenter.
More informationENTERPRISE LINUX SYSTEM ADMINISTRATION
ENTERPRISE LINUX SYSTEM ADMINISTRATION COURSE DESCRIPTION: The GL250 is an in-depth course that explores installation, configuration and maintenance of Linux systems. The course focuses on issues universal
More informationRhapsody Interface Management and Administration. Presented by: Carolina Velasquez
Rhapsody Interface Management and Administration Presented by: Carolina Velasquez Welcome The Rhapsody Framework and Message Handling Web Management Console Monitoring and Management Engine Management,
More informationSDX :30:09 UTC Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement
SDX 9.3 2015-05-15 13:30:09 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents SDX 9.3... 5 SDX Administration... 6 Introduction... 7 Getting Started
More informationMainframe Backup Modernization Disk Library for mainframe
Mainframe Backup Modernization Disk Library for mainframe Mainframe is more important than ever itunes Downloads Instagram Photos Twitter Tweets Facebook Likes YouTube Views Google Searches CICS Transactions
More informationManagement Console User s Guide (AST 2500 Chipset)
Management Console User s Guide (AST 2500 Chipset) Version: 1.2 Table of Contents Using Your Management Console... 2 Management Console Key Features and Functions... 3 Software Install... 4 Prerequisites
More informationOne Voice Operations Center
Installation Operation and Maintenance Manual AudioCodes One Voice Operations Center One Voice Operations Center Version 7.4 IOM Manual Contents Table of Contents 1 Overview... 17 Pre-installation Information...19
More information"Charting the Course... Enterprise Linux System Administration. Course Summary
Course Summary Description This is an in-depth course that explores installation, configuration and maintenance of Linux systems. The course focuses on issues universal to every workstation and server.
More informationTriton file systems - an introduction. slide 1 of 28
Triton file systems - an introduction slide 1 of 28 File systems Motivation & basic concepts Storage locations Basic flow of IO Do's and Don'ts Exercises slide 2 of 28 File systems: Motivation Case #1:
More informationIT341 Introduction to System Administration. Project 4 - Backup Strategies with rsync and crontab
IT341 Introduction to System Administration Project 4 - Backup Strategies with rsync and crontab Backup is one of the most important things a system administrator does. It is important to decide what data
More informationBuild your own NAS with OpenMediaVault
Build your own NAS with OpenMediaVault Installation Minimum Requirements i486 or amd64 platform 1 GiB RAM 2 GiB HDD/DOM/CF/USB Thumb Drive used as OpenMediaVault system drive. Flash Drives without static
More informationAutomated Out-of-Band management with Ansible and Redfish
Automated Out-of-Band management with Ansible and Redfish Jose Delarosa Senior Linux Engineer at Dell EMC Jake Jackson Product Field Engineer at Ansible by Red Hat May 2 nd, 2017 Who are we Jose De la
More informationVirtualization and Performance
Virtualization and Performance Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
More informationFile Protection using rsync. Setup guide
File Protection using rsync Setup guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Overview... 2 2. Rsync technology... 3 Terminology... 3 Implementation... 3 3. Rsync data hosts...
More informationUNIX System Administration
$!... 14:13 $$... 14:13.netrc...12:27-28 /etc/fstab... 6:25 /etc/hosts.equiv... 8:23 /etc/inittab Entries... 4:8 /etc/netmasks... 8:22 /etc/shells... 12:25 /home... 6:69 /tmp...6:61-67 /usr... 6:70 /var...
More information