Performance measurements of syslog-ng Premium Edition 4 F1

Size: px
Start display at page:

Download "Performance measurements of syslog-ng Premium Edition 4 F1"

Transcription

1 Performance measurements of syslog-ng Premium Edition 4 F1 October 13, 2011 Abstract Performance analysis of syslog-ng Premium Edition Copyright BalaBit IT Security Ltd.

2 Table of Contents 1. Preface Executive summary Optimizing multithreaded performance Use cases for performance improvement The test environment Interpreting the measurement results Summary About BalaBit Appendix 1. Detailed results

3 Preface 1. Preface This document summarizes the findings of several performance tests and measurements carried out on different versions of syslog-ng Premium Edition. The main focus was syslog-ng PE version 4 F1, but similar performance tests will be performed and published regularly with every major syslog-ng PE release. 3

4 Executive summary 2. Executive summary The main findings of the performance tests are as follows: The fastest way the syslog-ng PE application can receive log messages from the network is using plain TCP transport with the syslog() source driver. Using the tcp() driver is not significantly slower. Starting with version, syslog-ng PE can be run in multithreaded mode to scale to multiple CPUs or cores for increased performance. In case of multiple connections, the performance rates have been tested with 10 and 100 connections, and in both cases the results are the same. Depending on the exact syslog-ng PE configuration, environment, and other parameters, syslog-ng PE is capable of processing: over messages per second when receiving messages from a single connection and storing them in text files; over messages per second when receiving messages from a single connection and storing them in logstore files; over messages per second when receiving messages from multiple connections and storing them in text files; over messages per second when receiving messages from multiple connections and storing them in logstore files; over messages per second when receiving messages from secure (TLS-encrypted) connections and storing them in text files. Note By default, syslog-ng PE runs in single-thread mode. Multithreading must be explicitly enabled in the syslog-ng PE configuration file using the threaded(yes) option. The tests were performed using 200-byte log messages and ran for 120 seconds. Note In certain cases, the rate of writing into plain-text files has increased from messages per second to messages per second since syslog-ng PE version 4.0. The rate of writing into logstore files has increased in certain cases from messages per second to messages per second since syslog-ng PE version 4.0. Using TLS-encrypted transport seriously degrades the rate of receiving messages, down to a rate of 30% of normal performance. PatternDB only works on one thread. Therefore, using PattnerDB can significantly decrease performance. If you are receiving lots of messages, but not all of them are processed with PatternDB, there is no significant performance degradation. If you are receiving messages through one connection only, performance will be better without multithreading (threaded(no)). 4

5 Optimizing multithreaded performance Using disk buffer on the client side can significantly degrade performance. This is especially the case if relays that are heavily loaded are used together with diskbuffer enabled on relays. Performance can also be degraded if lots of messages are received on the syslog-ng server, and are forwarded through the network (for example to a log analyzer or SIEM), and therefore disk buffer is enabled on the server as well. Regarding flow-control, using soft flow-control is faster by 10% than using hard flow-control. Higher stats_level decreases the performance. For example, stats_level(2) means -10% in performance. Simple filtering (for example, filtering on facility or tag) decreases the performance only by a few percent. However, regular expressions significantly decrease the message-processing rate, by about 50-75%, depending on the complexity of the regular expression. Version of syslog-ng PE provides true multi-core support. For the best performance, use multicore hardware for both the source and the destination side. For details on using multi-threading, see Chapter Multithreading and scaling in syslog-ng PE in The syslog-ng Premium Edition Administrator Guide Optimizing multithreaded performance Destinations that have a queue process that queue in a single thread. Multiple sources can send messages to the same queue, so the queue can scale to multiple CPUs. However, when the writer thread writes the queue contents to the destination, it will be single-threaded. Message parsing, rewrite rules, filters, and other types of message processing is performed by the reader thread in a sequential manner. This means that such operations can scale only if reading messages from the source can be multithreaded. For example, if a tcp source can process messages from different connections (clients) in separate threads. If the source cannot use multiple threads to process the messages, the operations will not scale. To improve the processing power of syslog-ng PE and scale to more processors, use the following methods: To improve scaling on the source side, use more sources, for example, more source files, or receive the messages from more parallel connections. For network sources, you can also configure a part of your clients to send the messages to a different port of your syslog-ng server, and use separate source definitions for each port. On the destination side, when writing the log messages to files, use macros in the filename to split the messages to separate files (for example, using the $HOST macro). Files with macros in their filenames are processed in separate writer threads. On the destination side, when sending messages to a syslog-ng server, you can use multiple connections to the server if you configure the syslog-ng server to receive messages on multiple ports, and configure the clients to use both ports Use cases for performance improvement Improving performance with lots of connections. If there are several thousand active connections simultaneously, it is advised to place relay syslog-ng-s on another computer in front of the syslog-ng. Switching between the active connections is time-consuming, while the amount of incoming messages is usually not significant. This problem is solved by using relays, since they are collecting the logs. The syslog-ng solution can handle lots of log messages sent from a few connections easily. 5

6 Use cases for performance improvement Storing lots of log messages. It requires large free disk space if syslog-ng receives lots of messages per second (note that syslog-ng can process messages at even 100 MB/sec speed). In this case it is advised to use compressed logstore instead of file for storing data. The size of a compressed logstore (compress(3)) is only a few percent of the file destination. Obviously, the effectiveness of the compression depends on the pattern of the incoming messages, but since most of the time the log messages consist of simple text messages, they can be compressed quite effectively (around 90% compression rate). Writing data into SQL database. The syslog-ng will only commit after the amount of inserts set in flush-lines(), if flags(explicit-commints) is enabled and the value of flush-lines() is raised. The speed of writing into an SQL database can be 2-3 times faster if flush-lines(100) and flags(explicit-commints) is enabled. Filtering messages. It is advised to use the simplest filters when filtering incoming messages. If a message can be filtered with several types of filters, check the measured data. For example, if a message is filtered with a complicated regexp, the performance of syslog-ng can drop down to 5%, whereas if tag or facility, there is no performance decrease. Identifying bottlenecks. It is advised to first identify the bottlenecks if the performance of syslog-ng seems to be too low. For example, if syslog-ng is writing on slow disks at the destination side, upgrading the source side device will not help increasing the performance. 6

7 The test environment 3. The test environment The test environment consisted of a single client and a server hardware, connected via a Gigabit switch. Note that in certain test runs, the client opened several separate connections to the servers to simulate real-life logging environments. The syslog-ng Premium Edition application was installed from the.run package. The client and the server hardware were identical with the following main parameters: 2x Intel Xeon Processor E5620 (12M Cache, 2.40 GHz, 5.86 GT/s Intel QPI, quad-core) 18 GB RAM Western Digital RE3 WD2502ABYS 250GB 7200 RPM 16MB Cache SATA 3.0Gb/s 3.5" Internal Hard Drives The main operating system of the hosts was ubuntu-lucid-x64, but the syslog-ng PE client and server applications were running in chrooted debian-etch-x64 environments. 7

8 Interpreting the measurement results 4. Interpreting the measurement results Several different measurements were performed in various syslog-ng configurations and settings. These are listed in Appendix 1, Detailed results (p. 11) in the following format. -log_destination_file_macro-threaded_no-active-idle_100-0-log_source_legacy_tcpplatform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=200, bandwidth= kb/sec Size of stored outputfiles: 3.2G The results can be interpreted as follows: The configuration parameters of the syslog-ng PE server are listed as a string of name-value pairs. Whitespaces in the name are replaced with underscores. For example -log_destination_file_macro-threaded_no-active-idle_ log_source_legacy_tcp-platform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no: hw_config: The identifier of the hardware configuration used in the tests. For details, see Section 3, The test environment (p. 7). platform: The operating system and architecture used in the test, for example, debian-etch_amd64. log_source: The type of source driver used in the test. The legacy name refers to syslog-ng drivers using the BSD-syslog standard (RFC3164), while syslog to the IETF-syslog standards (RFC5424). log_size: The length of the log messages in bytes. flush_lines: The value of the flush_lines() parameter. modifiers: Modifications (for example, rewriting or filtering) used in the log path (if any). file/logstore: All incoming messages are written into the same file or logstore. file/logstore_macro: All messages from each connection are written into a separate file or logstore. threaded: Whether multi-threading is used or not. active-idle: The number of active and idle connections between the client and the server. Log messages were transferred only in the active connections. fetch_limit-iw_size: The values of the fetch_limit() and iw_size() parameters, respectively. log_destination: The type of destination driver used in the test. runtime: The length of the test run (in seconds). journal_block_size: The value of the journal_block_size parameter. 8

9 Interpreting the measurement results max_connections: The value of the max_connections parameter. Test results measured on the syslog-ng PE client, for example average rate = msg/sec, count= , time= , (last) msg size=200, bandwidth= kb/sec: Average rate: The rate of messages the client sent the log messages to the server (messages per second). Count: The total number of log messages sent by the clients during the test run. Time: The length of the test run (in seconds). Msg size: The size of the log messages sent by the client (in bytes). Bandwidth: The total bandwith used by the client connections (in kilobytes per seconds). 9

10 Summary 5. Summary The test measurements show that the processing capabilities of syslog-ng Premium Edition have increased significantly in version 4.1, and that syslog-ng PE is capable of receiving and processing high-volume log traffic About BalaBit BalaBit IT Security Ltd. is a developer of network security solutions satisfying the highest standards. BalaBit was founded and is currently owned by Hungarian individuals. Its main products are the syslog-ng system logging software, which is the most widely used alternative syslog solution of the world; the syslog-ng Store Box logserver appliance; Zorp, a modular proxy gateway capable of inspecting over twenty protocols, including encrypted ones like SSL and SSH, and the Shell Control Box, an appliance that can transparently control, audit, and replay SSH, RDP, VNC, Citrix, and Telnet traffic. To learn more about commercial and open source BalaBit products, request an evaluation version, or find a reseller, visit the following links: The syslog-ng homepage Shell Control Box homepage syslog-ng Store Box (SSB) homepage Product manuals, guides, and other documentation Register and request an evaluation version Find a reseller All questions, comments or inquiries should be directed to or by post to the following address: BalaBit IT Security 1115 Budapest, Bártfai str. 54 Phone: Fax: Web: Copyright 2011 BalaBit IT Security Ltd. Some rights reserved. This document is published under the Creative Commons Attribution Noncommercial No Derivative Works (byncnd) 3.0 license. All other product names mentioned herein are the trademarks of their respective owners. The latest version is always available at the BalaBit Documentation Page. 10

11 Appendix 1. Detailed results The following measurement results were obtained using syslog-ng PE in the environment described in Section 3, The test environment (p. 7). -log_destination_file_macro-threaded_no-active-idle_100-0-log_source_legacy_tcpplatform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=200, bandwidth= kb/sec Size of stored outputfiles: 3.2G -log_destination_file_macro-threaded_no-active-idle_100-0-log_source_legacy_tcp_tls-platform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=200, bandwidth= kb/sec Size of stored outputfiles: 926M -log_destination_file_macro-threaded_no-active-idle_100-0-log_source_legacy_udpplatform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no server side average rate = msg/sec

12 Size of stored outputfiles: 1.7G -log_destination_file_macro-threaded_no-active-idle_100-0-log_source_syslog_tcpplatform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=204, bandwidth= kb/sec Size of stored outputfiles: 3.1G -log_destination_file_macro-threaded_no-active-idle_100-0-log_source_syslog_tcp_tls-platform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=204, bandwidth= kb/sec Size of stored outputfiles: 888M -log_destination_file_macro-threaded_no-active-idle_10-0-log_source_legacy_tcpplatform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=200, bandwidth= kb/sec 12

13 Size of stored outputfiles: 3.4G -log_destination_file_macro-threaded_no-active-idle_10-0-log_source_legacy_tcp_tls-platform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=200, bandwidth= kb/sec Size of stored outputfiles: 958M -log_destination_file_macro-threaded_no-active-idle_10-0-log_source_legacy_udpplatform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no server side average rate = msg/sec Size of stored outputfiles: 2.3G -log_destination_file_macro-threaded_no-active-idle_10-0-log_source_syslog_tcpplatform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=204, bandwidth= kb/sec Size of stored outputfiles: 3.3G 13

14 -log_destination_file_macro-threaded_no-active-idle_10-0-log_source_syslog_tcp_tls-platform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=204, bandwidth= kb/sec Size of stored outputfiles: 892M -log_destination_file_macro-threaded_no-active-idle_1-0-log_source_legacy_tcpplatform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=200, bandwidth= kb/sec Size of stored outputfiles: 3.2G -log_destination_file_macro-threaded_no-active-idle_1-0-log_source_legacy_tcp_tls-platform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=200, bandwidth= kb/sec Size of stored outputfiles: 990M 14

15 -log_destination_file_macro-threaded_no-active-idle_1-0-log_source_legacy_udpplatform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no server side average rate = msg/sec Size of stored outputfiles: 2.9G -log_destination_file_macro-threaded_no-active-idle_1-0-log_source_syslog_tcpplatform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=204, bandwidth= kb/sec Size of stored outputfiles: 3.4G -log_destination_file_macro-threaded_no-active-idle_1-0-log_source_syslog_tcp_tls-platform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=204, bandwidth= kb/sec Size of stored outputfiles: 853M -log_destination_file_macro-threaded_yes-active-idle_100-0-log_source_legacy_tcpplatform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no 15

16 average rate = msg/sec, count= , time= , (average) msg size=200, bandwidth= kb/sec Size of stored outputfiles: 11G -log_destination_file_macro-threaded_yes-active-idle_100-0-log_source_legacy_tcp_tls-platform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=200, bandwidth= kb/sec Size of stored outputfiles: 2.7G -log_destination_file_macro-threaded_yes-active-idle_100-0-log_source_legacy_udpplatform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no server side average rate = msg/sec Size of stored outputfiles: 1.7G -log_destination_file_macro-threaded_yes-active-idle_100-0-log_source_syslog_tcpplatform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=204, bandwidth= kb/sec 16

17 0 0 0 Size of stored outputfiles: 11G -log_destination_file_macro-threaded_yes-active-idle_100-0-log_source_syslog_tcp_tls-platform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=204, bandwidth= kb/sec Size of stored outputfiles: 3.7G -log_destination_file_macro-threaded_yes-active-idle_10-0-log_source_legacy_tcpplatform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=200, bandwidth= kb/sec Size of stored outputfiles: 13G -log_destination_file_macro-threaded_yes-active-idle_10-0-log_source_legacy_tcp_tls-platform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=200, bandwidth= kb/sec 17

18 Size of stored outputfiles: 4.1G -log_destination_file_macro-threaded_yes-active-idle_10-0-log_source_legacy_udpplatform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no server side average rate = msg/sec Size of stored outputfiles: 2.6G -log_destination_file_macro-threaded_yes-active-idle_10-0-log_source_syslog_tcpplatform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=204, bandwidth= kb/sec Size of stored outputfiles: 12G -log_destination_file_macro-threaded_yes-active-idle_10-0-log_source_syslog_tcp_tls-platform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=204, bandwidth= kb/sec 18

19 Size of stored outputfiles: 3.8G -log_destination_file_macro-threaded_yes-active-idle_1-0-log_source_legacy_tcpplatform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=200, bandwidth= kb/sec Size of stored outputfiles: 2.5G -log_destination_file_macro-threaded_yes-active-idle_1-0-log_source_legacy_tcp_tls-platform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=200, bandwidth= kb/sec Size of stored outputfiles: 890M -log_destination_file_macro-threaded_yes-active-idle_1-0-log_source_legacy_udpplatform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no server side average rate = msg/sec 19

20 Size of stored outputfiles: 2.0G -log_destination_file_macro-threaded_yes-active-idle_1-0-log_source_syslog_tcpplatform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=204, bandwidth= kb/sec Size of stored outputfiles: 2.5G -log_destination_file_macro-threaded_yes-active-idle_1-0-log_source_syslog_tcp_tls-platform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=204, bandwidth= kb/sec Size of stored outputfiles: 828M -log_destination_file_macro-threaded_no-active-idle_100-0-log_source_syslog_tcpplatform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=204, bandwidth= kb/sec

21 0 Size of stored outputfiles: 3.0G -log_destination_file_macro-threaded_no-active-idle_10-0-log_source_syslog_tcpplatform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=204, bandwidth= kb/sec Size of stored outputfiles: 3.3G -log_destination_file_macro-threaded_no-active-idle_1-0-log_source_syslog_tcpplatform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=204, bandwidth= kb/sec Size of stored outputfiles: 3.4G -log_destination_file_macro-threaded_yes-active-idle_100-0-log_source_syslog_tcpplatform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=204, bandwidth= kb/sec

22 Size of stored outputfiles: 9.8G -log_destination_file_macro-threaded_yes-active-idle_10-0-log_source_syslog_tcpplatform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=204, bandwidth= kb/sec Size of stored outputfiles: 12G -log_destination_file_macro-threaded_yes-active-idle_1-0-log_source_syslog_tcpplatform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=204, bandwidth= kb/sec Size of stored outputfiles: 2.6G -log_destination_file-threaded_no-active-idle_100-0-log_source_syslog_tcpplatform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=204, bandwidth= kb/sec

23 Size of stored outputfiles: 4.0G -log_destination_file-threaded_no-active-idle_10-0-log_source_syslog_tcp-platform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=204, bandwidth= kb/sec Size of stored outputfiles: 4.1G -log_destination_file-threaded_no-active-idle_1-0-log_source_syslog_tcp-platform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=204, bandwidth= kb/sec Size of stored outputfiles: 4.3G -log_destination_file-threaded_yes-active-idle_100-0-log_source_syslog_tcpplatform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=204, bandwidth= kb/sec

24 Size of stored outputfiles: 8.6G -log_destination_file-threaded_yes-active-idle_10-0-log_source_syslog_tcpplatform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=204, bandwidth= kb/sec Size of stored outputfiles: 9.6G -log_destination_file-threaded_yes-active-idle_1-0-log_source_syslog_tcp-platform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=204, bandwidth= kb/sec Size of stored outputfiles: 3.1G -log_destination_logstore_macro-threaded_no-active-idle_100-0-log_source_syslog_tcp-platform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=204, bandwidth= kb/sec 0 0 Used compress : 3 Used journal_block_size :

25 Size of stored outputfiles: 54M -log_destination_logstore_macro-threaded_no-active-idle_10-0-log_source_syslog_tcp-platform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=204, bandwidth= kb/sec Used compress : 3 Used journal_block_size : Size of stored outputfiles: 55M -log_destination_logstore_macro-threaded_no-active-idle_1-0-log_source_syslog_tcp-platform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=204, bandwidth= kb/sec Used compress : 3 Used journal_block_size : Size of stored outputfiles: 57M -log_destination_logstore_macro-threaded_yes-active-idle_100-0-log_source_syslog_tcp-platform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=204, bandwidth= kb/sec

26 Used compress : 3 Used journal_block_size : Size of stored outputfiles: 157M -log_destination_logstore_macro-threaded_yes-active-idle_10-0-log_source_syslog_tcp-platform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=204, bandwidth= kb/sec Used compress : 3 Used journal_block_size : Size of stored outputfiles: 189M -log_destination_logstore_macro-threaded_yes-active-idle_1-0-log_source_syslog_tcp-platform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=204, bandwidth= kb/sec Used compress : 3 Used journal_block_size : Size of stored outputfiles: 46M -log_destination_logstore-threaded_no-active-idle_100-0-log_source_syslog_tcpplatform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no 26

27 average rate = msg/sec, count= , time= , (average) msg size=204, bandwidth= kb/sec 0 0 Used compress : 3 Used journal_block_size : Size of stored outputfiles: 52M -log_destination_logstore-threaded_no-active-idle_10-0-log_source_syslog_tcpplatform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=204, bandwidth= kb/sec Used compress : 3 Used journal_block_size : Size of stored outputfiles: 65M -log_destination_logstore-threaded_no-active-idle_1-0-log_source_syslog_tcpplatform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=204, bandwidth= kb/sec Used compress : 3 Used journal_block_size :

28 Size of stored outputfiles: 64M -log_destination_logstore-threaded_yes-active-idle_100-0-log_source_syslog_tcpplatform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=204, bandwidth= kb/sec 0 0 Used compress : 3 Used journal_block_size : Size of stored outputfiles: 70M -log_destination_logstore-threaded_yes-active-idle_10-0-log_source_syslog_tcpplatform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=204, bandwidth= kb/sec Used compress : 3 Used journal_block_size : Size of stored outputfiles: 63M -log_destination_logstore-threaded_yes-active-idle_1-0-log_source_syslog_tcpplatform_debian-etch_amd64-syslogger_syslogd-modifiers_na-logstore_encryption_no average rate = msg/sec, count= , time= , (average) msg size=204, bandwidth= kb/sec Used compress : 3 Used journal_block_size :

Performance Guideline for syslog-ng Premium Edition 5 LTS

Performance Guideline for syslog-ng Premium Edition 5 LTS Performance Guideline for syslog-ng Premium Edition 5 LTS May 08, 2015 Abstract Performance analysis of syslog-ng Premium Edition Copyright 1996-2015 BalaBit S.a.r.l. Table of Contents 1. Preface... 3

More information

Distributed syslog architectures with syslog-ng Premium Edition

Distributed syslog architectures with syslog-ng Premium Edition Distributed syslog architectures with syslog-ng Premium Edition May 12, 2011 The advantages of using syslog-ng Premium Edition to create distributed system logging architectures. Copyright 1996-2011 BalaBit

More information

What is new in syslog-ng Premium Edition 4 F1

What is new in syslog-ng Premium Edition 4 F1 What is new in syslog-ng Premium Edition 4 F1 August 26, 2011 Copyright 1996-2011 BalaBit IT Security Ltd. Table of Contents 1. Preface... 3 2. New module architecture... 4 3. Multithreading, scaling,

More information

The syslog-ng Premium Edition 5LTS

The syslog-ng Premium Edition 5LTS The syslog-ng Premium Edition 5LTS PRODUCT DESCRIPTION Copyright 2000-2013 BalaBit IT Security All rights reserved. www.balabit.com Introduction The syslog-ng Premium Edition enables enterprises to collect,

More information

The syslog-ng Premium Edition 5F2

The syslog-ng Premium Edition 5F2 The syslog-ng Premium Edition 5F2 PRODUCT DESCRIPTION Copyright 2000-2014 BalaBit IT Security All rights reserved. www.balabit.com Introduction The syslog-ng Premium Edition enables enterprises to collect,

More information

The syslog-ng Store Box 3 F2

The syslog-ng Store Box 3 F2 The syslog-ng Store Box 3 F2 PRODUCT DESCRIPTION Copyright 2000-2014 BalaBit IT Security All rights reserved. www.balabit.com Introduction The syslog-ng Store Box (SSB) is a high-reliability and high-performance

More information

The syslog-ng Store Box 3 LTS

The syslog-ng Store Box 3 LTS The syslog-ng Store Box 3 LTS PRODUCT DESCRIPTION Copyright 2000-2012 BalaBit IT Security All rights reserved. www.balabit.com Introduction The syslog-ng Store Box (SSB) is a high-reliability and high-performance

More information

Windows Quick Start Guide for syslog-ng Premium Edition 5 LTS

Windows Quick Start Guide for syslog-ng Premium Edition 5 LTS Windows Quick Start Guide for syslog-ng Premium Edition 5 LTS November 19, 2015 Copyright 1996-2015 Balabit SA Table of Contents 1. Introduction... 3 1.1. Scope... 3 1.2. Supported platforms... 4 2. Installation...

More information

Achieving Nanosecond Latency Between Applications with IPC Shared Memory Messaging

Achieving Nanosecond Latency Between Applications with IPC Shared Memory Messaging Achieving Nanosecond Latency Between Applications with IPC Shared Memory Messaging In some markets and scenarios where competitive advantage is all about speed, speed is measured in micro- and even nano-seconds.

More information

syslog-ng Store Box PRODUCT DESCRIPTION Copyright 2000-2009 BalaBit IT Security All rights reserved. www.balabit.com

syslog-ng Store Box PRODUCT DESCRIPTION Copyright 2000-2009 BalaBit IT Security All rights reserved. www.balabit.com syslog-ng Store Box PRODUCT DESCRIPTION Copyright 2000-2009 BalaBit IT Security All rights reserved. www.balabit.com Introduction Log messages contain information about the events happening on the hosts.

More information

syslog-ng Product Line

syslog-ng Product Line www.balabit.com syslog-ng Product Line syslog-ng Description www.balabit.com IT environments constantly generate important data in log messages syslog-ng Collects Filters Classifies Normalizes Stores Transfers

More information

NetScaler VPX FAQ. Table of Contents

NetScaler VPX FAQ. Table of Contents NetScaler VPX FAQ Table of Contents Feature and Functionality Frequently Asked Questions... 2 Pricing and Packaging Frequently Asked Questions... 4 NetScaler VPX Express Frequently Asked Questions... 5

More information

PCI DSS compliance and log management

PCI DSS compliance and log management PCI DSS compliance and log management March 11, 2014 Abstract How to control and audit remote access to your servers to comply with PCI DSS using the syslog-ng Store Box Copyright 1996-2014 BalaBit IT

More information

The syslog-ng 3.0 Administrator Guide

The syslog-ng 3.0 Administrator Guide The syslog-ng 3.0 Administrator Guide Seventh Edition Published Aug 19, 2009 This manual is the primary documentation of the syslog-ng 3.0 product line, including syslog-ng Open Source Edition (syslog-ng

More information

Windows Server Performance Monitoring

Windows Server Performance Monitoring Spot server problems before they are noticed The system s really slow today! How often have you heard that? Finding the solution isn t so easy. The obvious questions to ask are why is it running slowly

More information

The Lagopus SDN Software Switch. 3.1 SDN and OpenFlow. 3. Cloud Computing Technology

The Lagopus SDN Software Switch. 3.1 SDN and OpenFlow. 3. Cloud Computing Technology 3. The Lagopus SDN Software Switch Here we explain the capabilities of the new Lagopus software switch in detail, starting with the basics of SDN and OpenFlow. 3.1 SDN and OpenFlow Those engaged in network-related

More information

What is new in syslog-ng Premium Edition 5 F3

What is new in syslog-ng Premium Edition 5 F3 What is new in syslog-ng Premium Edition 5 F3 June 17, 2015 Copyright 1996-2015 BalaBit S.a.r.l. Table of Contents 1. Preface... 3 2. Hadoop Distributed File System (HDFS) support... 4 3. Displaying license-related

More information

Delivering Quality in Software Performance and Scalability Testing

Delivering Quality in Software Performance and Scalability Testing Delivering Quality in Software Performance and Scalability Testing Abstract Khun Ban, Robert Scott, Kingsum Chow, and Huijun Yan Software and Services Group, Intel Corporation {khun.ban, robert.l.scott,

More information

Cloud Storage. Parallels. Performance Benchmark Results. White Paper. www.parallels.com

Cloud Storage. Parallels. Performance Benchmark Results. White Paper. www.parallels.com Parallels Cloud Storage White Paper Performance Benchmark Results www.parallels.com Table of Contents Executive Summary... 3 Architecture Overview... 3 Key Features... 4 No Special Hardware Requirements...

More information

Amadeus SAS Specialists Prove Fusion iomemory a Superior Analysis Accelerator

Amadeus SAS Specialists Prove Fusion iomemory a Superior Analysis Accelerator WHITE PAPER Amadeus SAS Specialists Prove Fusion iomemory a Superior Analysis Accelerator 951 SanDisk Drive, Milpitas, CA 95035 www.sandisk.com SAS 9 Preferred Implementation Partner tests a single Fusion

More information

What is new in Zorp Professional 6

What is new in Zorp Professional 6 What is new in Zorp Professional 6 April 17, 2015 Copyright 1996-2015 BalaBit IT Security Ltd. Table of Contents 1. Preface... 3 2. Reusable Encryption policies... 4 3. Server Name Indication... 5 4. New

More information

Deploying in a Distributed Environment

Deploying in a Distributed Environment Deploying in a Distributed Environment Distributed enterprise networks have many remote locations, ranging from dozens to thousands of small offices. Typically, between 5 and 50 employees work at each

More information

The syslog-ng Store Box 4 LTS Administrator Guide

The syslog-ng Store Box 4 LTS Administrator Guide The syslog-ng Store Box 4 LTS Administrator Guide Publication date January 21, 2016 Abstract This document is the primary manual of the syslog-ng Store Box 4 LTS. Copyright 1996-2016 Balabit SA This guide

More information

Purpose... 3. Computer Hardware Configurations... 6 Single Computer Configuration... 6 Multiple Server Configurations... 7. Data Encryption...

Purpose... 3. Computer Hardware Configurations... 6 Single Computer Configuration... 6 Multiple Server Configurations... 7. Data Encryption... Contents Purpose... 3 Background on Keyscan Software... 3 Client... 4 Communication Service... 4 SQL Server 2012 Express... 4 Aurora Optional Software Modules... 5 Computer Hardware Configurations... 6

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Microsoft Exchange Server 2003 Deployment Considerations

Microsoft Exchange Server 2003 Deployment Considerations Microsoft Exchange Server 3 Deployment Considerations for Small and Medium Businesses A Dell PowerEdge server can provide an effective platform for Microsoft Exchange Server 3. A team of Dell engineers

More information

MAGENTO HOSTING Progressive Server Performance Improvements

MAGENTO HOSTING Progressive Server Performance Improvements MAGENTO HOSTING Progressive Server Performance Improvements Simple Helix, LLC 4092 Memorial Parkway Ste 202 Huntsville, AL 35802 sales@simplehelix.com 1.866.963.0424 www.simplehelix.com 2 Table of Contents

More information

Streaming and Virtual Hosted Desktop Study: Phase 2

Streaming and Virtual Hosted Desktop Study: Phase 2 IT@Intel White Paper Intel Information Technology Computing Models April 1 Streaming and Virtual Hosted Desktop Study: Phase 2 Our current findings indicate that streaming provides better server loading

More information

InterScan Web Security Virtual Appliance

InterScan Web Security Virtual Appliance InterScan Web Security Virtual Appliance Sizing Guide for version 6.0 July 2013 TREND MICRO INC. 10101 N. De Anza Blvd. Cupertino, CA 95014 www.trendmicro.com Toll free: +1 800.228.5651 Fax: +1 408.257.2003

More information

What is new in BalaBit Shell Control Box 4 LTS

What is new in BalaBit Shell Control Box 4 LTS What is new in BalaBit Shell Control Box 4 LTS October 12, 2015 Copyright 1996-2015 BalaBit SA Table of Contents 1. Preface... 3 1.1. Versions and releases of SCB... 3 2. Changes specific to 4.0.6... 4

More information

Distributed File System. MCSN N. Tonellotto Complements of Distributed Enabling Platforms

Distributed File System. MCSN N. Tonellotto Complements of Distributed Enabling Platforms Distributed File System 1 How do we get data to the workers? NAS Compute Nodes SAN 2 Distributed File System Don t move data to workers move workers to the data! Store data on the local disks of nodes

More information

Rebasoft Auditor Quick Start Guide

Rebasoft Auditor Quick Start Guide Copyright Rebasoft Limited: 2009-2011 1 Release 2.1, Rev. 1 Copyright Notice Copyright 2009-2011 Rebasoft Ltd. All rights reserved. REBASOFT Software, the Rebasoft logo, Rebasoft Auditor are registered

More information

The syslog-ng Premium Edition 5 LTS Administrator Guide

The syslog-ng Premium Edition 5 LTS Administrator Guide The syslogng Premium Edition 5 LTS Administrator Guide Publication date October 12, 2015 Abstract This manual is the primary documentation of the syslogng Premium Edition 5 LTS product. Copyright 19962015

More information

ACE Management Server Deployment Guide VMware ACE 2.0

ACE Management Server Deployment Guide VMware ACE 2.0 Technical Note ACE Management Server Deployment Guide VMware ACE 2.0 This technical note provides guidelines for the deployment of VMware ACE Management Servers, including capacity planning and best practices.

More information

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.1.0.XXX Requirements and Implementation Guide (Rev 4-10209) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis Training Series

More information

Virtuoso and Database Scalability

Virtuoso and Database Scalability Virtuoso and Database Scalability By Orri Erling Table of Contents Abstract Metrics Results Transaction Throughput Initializing 40 warehouses Serial Read Test Conditions Analysis Working Set Effect of

More information

Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual

Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual www.hillstonenet.com Preface Conventions Content This document follows the conventions below: CLI Tip: provides

More information

D1.2 Network Load Balancing

D1.2 Network Load Balancing D1. Network Load Balancing Ronald van der Pol, Freek Dijkstra, Igor Idziejczak, and Mark Meijerink SARA Computing and Networking Services, Science Park 11, 9 XG Amsterdam, The Netherlands June ronald.vanderpol@sara.nl,freek.dijkstra@sara.nl,

More information

syslog-ng 3.0 Monitoring logs with Nagios

syslog-ng 3.0 Monitoring logs with Nagios syslog-ng 3.0 Monitoring logs with Nagios Scheidler Balázs balazs.scheidler@balabit.hu Table of Contents Short introduction to syslog The syslog-ng story Changes in the log processing landscape New vision

More information

Performance Characteristics of VMFS and RDM VMware ESX Server 3.0.1

Performance Characteristics of VMFS and RDM VMware ESX Server 3.0.1 Performance Study Performance Characteristics of and RDM VMware ESX Server 3.0.1 VMware ESX Server offers three choices for managing disk access in a virtual machine VMware Virtual Machine File System

More information

Microsoft Windows Server 2003 with Internet Information Services (IIS) 6.0 vs. Linux Competitive Web Server Performance Comparison

Microsoft Windows Server 2003 with Internet Information Services (IIS) 6.0 vs. Linux Competitive Web Server Performance Comparison April 23 11 Aviation Parkway, Suite 4 Morrisville, NC 2756 919-38-28 Fax 919-38-2899 32 B Lakeside Drive Foster City, CA 9444 65-513-8 Fax 65-513-899 www.veritest.com info@veritest.com Microsoft Windows

More information

ProCurve Manager Plus 2.2

ProCurve Manager Plus 2.2 NEW ProCurve Manager Plus 2.2 ProCurve Manager Plus 2.2 is a secure, advanced Windows -based network management platform that allows administrators to configure, update, monitor, and troubleshoot ProCurve

More information

Minimum Software and Hardware Requirements

Minimum Software and Hardware Requirements Version 5 Jet and Version 5 SQL Minimum Software and Hardware Requirements Please note that these minimum requirements are designed to give adequate performance when running a simple database on the local

More information

The syslog-ng Open Source Edition 3.2 Administrator Guide

The syslog-ng Open Source Edition 3.2 Administrator Guide The syslog-ng Open Source Edition 3.2 Administrator Guide Publication date July 14, 2011 Abstract This manual is the primary documentation of the syslog-ng Open Source Edition 3.2 application. Revision

More information

Networking and High Availability

Networking and High Availability TECHNICAL BRIEF Networking and High Availability Deployment Note Imperva appliances support a broad array of deployment options, enabling seamless integration into any data center environment. can be configured

More information

System Requirements - filesmart

System Requirements - filesmart System Requirements - filesmart The following are minimum and recommended system requirements for filesmart. Whilst the program will operate on the minimums listed, we strongly suggest you meet or exceed

More information

Performance Report Modular RAID for PRIMERGY

Performance Report Modular RAID for PRIMERGY Performance Report Modular RAID for PRIMERGY Version 1.1 March 2008 Pages 15 Abstract This technical documentation is designed for persons, who deal with the selection of RAID technologies and RAID controllers

More information

Enterprise Deployment: Laserfiche 8 in a Virtual Environment. White Paper

Enterprise Deployment: Laserfiche 8 in a Virtual Environment. White Paper Enterprise Deployment: Laserfiche 8 in a Virtual Environment White Paper August 2008 The information contained in this document represents the current view of Compulink Management Center, Inc on the issues

More information

SIDN Server Measurements

SIDN Server Measurements SIDN Server Measurements Yuri Schaeffer 1, NLnet Labs NLnet Labs document 2010-003 July 19, 2010 1 Introduction For future capacity planning SIDN would like to have an insight on the required resources

More information

Accelerating Server Storage Performance on Lenovo ThinkServer

Accelerating Server Storage Performance on Lenovo ThinkServer Accelerating Server Storage Performance on Lenovo ThinkServer Lenovo Enterprise Product Group April 214 Copyright Lenovo 214 LENOVO PROVIDES THIS PUBLICATION AS IS WITHOUT WARRANTY OF ANY KIND, EITHER

More information

Performance in the Infragistics WebDataGrid for Microsoft ASP.NET AJAX. Contents. Performance and User Experience... 2

Performance in the Infragistics WebDataGrid for Microsoft ASP.NET AJAX. Contents. Performance and User Experience... 2 Performance in the Infragistics WebDataGrid for Microsoft ASP.NET AJAX An Infragistics Whitepaper Contents Performance and User Experience... 2 Exceptional Performance Best Practices... 2 Testing the WebDataGrid...

More information

The syslog-ng Open Source Edition 3.6 Administrator Guide

The syslog-ng Open Source Edition 3.6 Administrator Guide The syslog-ng Open Source Edition 3.6 Administrator Guide Publication date November 18, 2015 Abstract This manual is the primary documentation of the syslog-ng Open Source Edition 3.6 application. Copyright

More information

10.2 Requirements for ShoreTel Enterprise Systems

10.2 Requirements for ShoreTel Enterprise Systems 10.2 Requirements for ShoreTel Enterprise Systems The ShoreTel Enterprise Edition system is scalable. For economy, ShoreTel Enterprise customers provide their own server hardware, allowing them to build

More information

HP reference configuration for entry-level SAS Grid Manager solutions

HP reference configuration for entry-level SAS Grid Manager solutions HP reference configuration for entry-level SAS Grid Manager solutions Up to 864 simultaneous SAS jobs and more than 3 GB/s I/O throughput Technical white paper Table of contents Executive summary... 2

More information

Virtualizing SQL Server 2008 Using EMC VNX Series and Microsoft Windows Server 2008 R2 Hyper-V. Reference Architecture

Virtualizing SQL Server 2008 Using EMC VNX Series and Microsoft Windows Server 2008 R2 Hyper-V. Reference Architecture Virtualizing SQL Server 2008 Using EMC VNX Series and Microsoft Windows Server 2008 R2 Hyper-V Copyright 2011 EMC Corporation. All rights reserved. Published February, 2011 EMC believes the information

More information

INSTALLATION GUIDE. AXIS Camera Station

INSTALLATION GUIDE. AXIS Camera Station INSTALLATION GUIDE AXIS Camera Station About this Guide This guide is intended for administrators and users of the AXIS Camera Station, and is applicable for software release 3.50 and later. It covers

More information

GFI Product Manual. Deployment Guide

GFI Product Manual. Deployment Guide GFI Product Manual Deployment Guide http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of

More information

ISO27001 compliance and Privileged Access Monitoring

ISO27001 compliance and Privileged Access Monitoring ISO27001 compliance and Privileged Access Monitoring February 24, 2014 Abstract How to control and audit remote access to your servers to comply with ISO27001:2013 using the BalaBit Shell Control Box Copyright

More information

BalaBit IT Security Insight Singaporean Internet Banking and Technology Risk Management Guidelines Compliance

BalaBit IT Security Insight Singaporean Internet Banking and Technology Risk Management Guidelines Compliance GUARDING YOUR BUSINESS BalaBit IT Security Insight Singaporean Internet Banking and Technology Risk Management Guidelines Compliance www.balabit.com In 2008, the Monetary Authority of Singapore (MAS),

More information

Removing Performance Bottlenecks in Databases with Red Hat Enterprise Linux and Violin Memory Flash Storage Arrays. Red Hat Performance Engineering

Removing Performance Bottlenecks in Databases with Red Hat Enterprise Linux and Violin Memory Flash Storage Arrays. Red Hat Performance Engineering Removing Performance Bottlenecks in Databases with Red Hat Enterprise Linux and Violin Memory Flash Storage Arrays Red Hat Performance Engineering Version 1.0 August 2013 1801 Varsity Drive Raleigh NC

More information

PARALLELS CLOUD STORAGE

PARALLELS CLOUD STORAGE PARALLELS CLOUD STORAGE Performance Benchmark Results 1 Table of Contents Executive Summary... Error! Bookmark not defined. Architecture Overview... 3 Key Features... 5 No Special Hardware Requirements...

More information

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc. Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet

More information

Hardware and Software Requirements. Release 7.5.x PowerSchool Student Information System

Hardware and Software Requirements. Release 7.5.x PowerSchool Student Information System Release 7.5.x PowerSchool Student Information System Released October 2012 Document Owner: Documentation Services This edition applies to Release 7.5.x of the PowerSchool software and to all subsequent

More information

RAID 5 rebuild performance in ProLiant

RAID 5 rebuild performance in ProLiant RAID 5 rebuild performance in ProLiant technology brief Abstract... 2 Overview of the RAID 5 rebuild process... 2 Estimating the mean-time-to-failure (MTTF)... 3 Factors affecting RAID 5 array rebuild

More information

IPRO ecapture Performance Report using BlueArc Titan Network Storage System

IPRO ecapture Performance Report using BlueArc Titan Network Storage System IPRO ecapture Performance Report using BlueArc Titan Network Storage System Allen Yen, BlueArc Corp Jesse Abrahams, IPRO Tech, Inc Introduction IPRO ecapture is an e-discovery application designed to handle

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not

More information

Cisco PIX vs. Checkpoint Firewall

Cisco PIX vs. Checkpoint Firewall Cisco PIX vs. Checkpoint Firewall Introduction Firewall technology ranges from packet filtering to application-layer proxies, to Stateful inspection; each technique gleaning the benefits from its predecessor.

More information

Nimsoft Monitor. sysloggtw Guide. v1.4 series

Nimsoft Monitor. sysloggtw Guide. v1.4 series Nimsoft Monitor sysloggtw Guide v1.4 series Legal Notices Copyright 2012, CA. All rights reserved. Warranty The material contained in this document is provided "as is," and is subject to being changed,

More information

Log Management with Open-Source Tools. Risto Vaarandi SEB Estonia

Log Management with Open-Source Tools. Risto Vaarandi SEB Estonia Log Management with Open-Source Tools Risto Vaarandi SEB Estonia Outline Why use open source tools for log management? Widely used logging protocols and recently introduced new standards Open-source syslog

More information

Muse Server Sizing. 18 June 2012. Document Version 0.0.1.9 Muse 2.7.0.0

Muse Server Sizing. 18 June 2012. Document Version 0.0.1.9 Muse 2.7.0.0 Muse Server Sizing 18 June 2012 Document Version 0.0.1.9 Muse 2.7.0.0 Notice No part of this publication may be reproduced stored in a retrieval system, or transmitted, in any form or by any means, without

More information

SierraVMI Sizing Guide

SierraVMI Sizing Guide SierraVMI Sizing Guide July 2015 SierraVMI Sizing Guide This document provides guidelines for choosing the optimal server hardware to host the SierraVMI gateway and the Android application server. The

More information

Geospatial Server Performance Colin Bertram UK User Group Meeting 23-Sep-2014

Geospatial Server Performance Colin Bertram UK User Group Meeting 23-Sep-2014 Geospatial Server Performance Colin Bertram UK User Group Meeting 23-Sep-2014 Topics Auditing a Geospatial Server Solution Web Server Strategies and Configuration Database Server Strategy and Configuration

More information

Oracle Database Scalability in VMware ESX VMware ESX 3.5

Oracle Database Scalability in VMware ESX VMware ESX 3.5 Performance Study Oracle Database Scalability in VMware ESX VMware ESX 3.5 Database applications running on individual physical servers represent a large consolidation opportunity. However enterprises

More information

System Requirements. SuccessMaker 5 Hosted

System Requirements. SuccessMaker 5 Hosted System Requirements SuccessMaker 5 Hosted System requirements are subject to change. For the latest information on system requirements, go to support.pearsonschool.com. For more information about Digital

More information

SYSTEM SETUP FOR SPE PLATFORMS

SYSTEM SETUP FOR SPE PLATFORMS BEST PRACTICE SYSTEM SETUP FOR SPE PLATFORMS Product Snow License Manager Version 7.0 Content System requirements SQL Server configuration Maintenance Test environment Document date 2015-10-15 ABOUT THIS

More information

Job Reference Guide. SLAMD Distributed Load Generation Engine. Version 1.8.2

Job Reference Guide. SLAMD Distributed Load Generation Engine. Version 1.8.2 Job Reference Guide SLAMD Distributed Load Generation Engine Version 1.8.2 June 2004 Contents 1. Introduction...3 2. The Utility Jobs...4 3. The LDAP Search Jobs...11 4. The LDAP Authentication Jobs...22

More information

Enabling Technologies for Distributed Computing

Enabling Technologies for Distributed Computing Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF Multi-core CPUs and Multithreading Technologies

More information

The safer, easier way to help you pass any IT exams. Industry Standard Architecture and Technology. Title : Version : Demo 1 / 5

The safer, easier way to help you pass any IT exams. Industry Standard Architecture and Technology. Title : Version : Demo 1 / 5 Exam : HP2-T16 Title : Industry Standard Architecture and Technology Version : Demo 1 / 5 1.How does single-mode fiber compare with multimode fiber? A. Single mode fiber has a higher bandwidth and lower

More information

OBSERVEIT DEPLOYMENT SIZING GUIDE

OBSERVEIT DEPLOYMENT SIZING GUIDE OBSERVEIT DEPLOYMENT SIZING GUIDE The most important number that drives the sizing of an ObserveIT deployment is the number of Concurrent Connected Users (CCUs) you plan to monitor. This document provides

More information

DiskSavvy Disk Space Analyzer. DiskSavvy DISK SPACE ANALYZER. User Manual. Version 8.7. Jun Flexense Ltd.

DiskSavvy Disk Space Analyzer. DiskSavvy DISK SPACE ANALYZER. User Manual. Version 8.7. Jun Flexense Ltd. DiskSavvy DISK SPACE ANALYZER User Manual Version 8.7 Jun 2016 www.disksavvy.com info@flexense.com 1 1 Product Overview...3 2 Product Versions...7 3 Using Desktop Versions...8 3.1 Product Installation

More information

Performance Evaluation of VMXNET3 Virtual Network Device VMware vsphere 4 build 164009

Performance Evaluation of VMXNET3 Virtual Network Device VMware vsphere 4 build 164009 Performance Study Performance Evaluation of VMXNET3 Virtual Network Device VMware vsphere 4 build 164009 Introduction With more and more mission critical networking intensive workloads being virtualized

More information

Introducing the Microsoft IIS deployment guide

Introducing the Microsoft IIS deployment guide Deployment Guide Deploying Microsoft Internet Information Services with the BIG-IP System Introducing the Microsoft IIS deployment guide F5 s BIG-IP system can increase the existing benefits of deploying

More information

Networking and High Availability

Networking and High Availability yeah SecureSphere Deployment Note Networking and High Availability Imperva SecureSphere appliances support a broad array of deployment options, enabling seamless integration into any data center environment.

More information

PLATO Learning Environment System and Configuration Requirements. for workstations. April 14, 2008

PLATO Learning Environment System and Configuration Requirements. for workstations. April 14, 2008 PLATO Learning Environment System and Configuration Requirements Version 1.1 (for use with Academic Systems Algebra only) for workstations April 14, 2008 Windows 2000 Professional with SP4 Windows XP Professional

More information

Acano solution. Virtualized Deployment R1.1 Installation Guide. Acano. February 2014 76-1025-03-B

Acano solution. Virtualized Deployment R1.1 Installation Guide. Acano. February 2014 76-1025-03-B Acano solution Virtualized Deployment R1.1 Installation Guide Acano February 2014 76-1025-03-B Contents Contents 1 Introduction... 3 1.1 Before You Start... 3 1.1.1 About the Acano virtualized solution...

More information

I3: Maximizing Packet Capture Performance. Andrew Brown

I3: Maximizing Packet Capture Performance. Andrew Brown I3: Maximizing Packet Capture Performance Andrew Brown Agenda Why do captures drop packets, how can you tell? Software considerations Hardware considerations Potential hardware improvements Test configurations/parameters

More information

Intel DPDK Boosts Server Appliance Performance White Paper

Intel DPDK Boosts Server Appliance Performance White Paper Intel DPDK Boosts Server Appliance Performance Intel DPDK Boosts Server Appliance Performance Introduction As network speeds increase to 40G and above, both in the enterprise and data center, the bottlenecks

More information

System Requirements Table of contents

System Requirements Table of contents Table of contents 1 Introduction... 2 2 Knoa Agent... 2 2.1 System Requirements...2 2.2 Environment Requirements...4 3 Knoa Server Architecture...4 3.1 Knoa Server Components... 4 3.2 Server Hardware Setup...5

More information

Microsoft SQL Server 2012 on Cisco UCS with iscsi-based Storage Access in VMware ESX Virtualization Environment: Performance Study

Microsoft SQL Server 2012 on Cisco UCS with iscsi-based Storage Access in VMware ESX Virtualization Environment: Performance Study White Paper Microsoft SQL Server 2012 on Cisco UCS with iscsi-based Storage Access in VMware ESX Virtualization Environment: Performance Study 2012 Cisco and/or its affiliates. All rights reserved. This

More information

WHITE PAPER FUJITSU PRIMERGY SERVER BASICS OF DISK I/O PERFORMANCE

WHITE PAPER FUJITSU PRIMERGY SERVER BASICS OF DISK I/O PERFORMANCE WHITE PAPER BASICS OF DISK I/O PERFORMANCE WHITE PAPER FUJITSU PRIMERGY SERVER BASICS OF DISK I/O PERFORMANCE This technical documentation is aimed at the persons responsible for the disk I/O performance

More information

Agility Database Scalability Testing

Agility Database Scalability Testing Agility Database Scalability Testing V1.6 November 11, 2012 Prepared by on behalf of Table of Contents 1 Introduction... 4 1.1 Brief... 4 2 Scope... 5 3 Test Approach... 6 4 Test environment setup... 7

More information

The syslog-ng Premium Edition 5 F3 Administrator Guide

The syslog-ng Premium Edition 5 F3 Administrator Guide The syslog-ng Premium Edition 5 F3 Administrator Guide Publication date June 17, 2015 Abstract This manual is the primary documentation of the syslog-ng Premium Edition 5 F3 product. Copyright 1996-2015

More information

The syslog-ng Open Source Edition 3.4 Administrator Guide

The syslog-ng Open Source Edition 3.4 Administrator Guide The syslog-ng Open Source Edition 3.4 Administrator Guide Publication date January 12, 2015 Abstract This manual is the primary documentation of the syslog-ng Open Source Edition 3.4 application. Copyright

More information

Understanding the Benefits of IBM SPSS Statistics Server

Understanding the Benefits of IBM SPSS Statistics Server IBM SPSS Statistics Server Understanding the Benefits of IBM SPSS Statistics Server Contents: 1 Introduction 2 Performance 101: Understanding the drivers of better performance 3 Why performance is faster

More information

McAfee Web Gateway 7.4.1

McAfee Web Gateway 7.4.1 Release Notes Revision B McAfee Web Gateway 7.4.1 Contents About this release New features and enhancements Resolved issues Installation instructions Known issues Find product documentation About this

More information

Cisco Application Networking Manager Version 2.0

Cisco Application Networking Manager Version 2.0 Cisco Application Networking Manager Version 2.0 Cisco Application Networking Manager (ANM) software enables centralized configuration, operations, and monitoring of Cisco data center networking equipment

More information

Features Overview Guide About new features in WhatsUp Gold v12

Features Overview Guide About new features in WhatsUp Gold v12 Features Overview Guide About new features in WhatsUp Gold v12 Contents CHAPTER 1 Learning about new features in Ipswitch WhatsUp Gold v12 Welcome to WhatsUp Gold... 1 What's new in WhatsUp Gold v12...

More information