Computer&Radioengineering

Size: px
Start display at page:

Download "Computer&Radioengineering"

Transcription

1 Computer&Radioengineering Computer&Radioengineering Bauhaus International Science press www. bhssci.com The Design and Research of the Monitoring System for Library Alliance Based on Cloud Computing Model Gro, G. Alexander 1, 2 ; Singh, Sukhdeep 1, 2 ; Schlingloff, Gregor 1, 2 ; Sakthithasan, Sripirakas 1 ; Pears, Russel 1 ; Koh, Yun Sing 2 1 Institute for Chemistry and Biotechnology, Ilmenau University of Technology, Germany 2 Institute of Micro and Nanotechnologies, IMN MacroNano, Ilmenau University of Technology, Germany jjadhn@163.com ARTICLE INFO Article history: Received 25 August 2012 Received in revised form 20 October 2012 Accepted 20 October 2012 Available online 29 October 2012 Keyword cloud computing; library alliance; host computer monitoring; monitoring service ABSTRACT Through the analysis of the running condition of the monitoring system for library alliance in cloud computing model, we design and research the monitoring platform of cloud computing resource based on B/C and C/S hybrid architecture. The innovation of this system is that it combined with third party plug-ins and class library. From the collection of the target data to analysis, it makes timely adjustment of cloud computing resources and implements monitoring and management through the figures and lists, which shows the usage conditions of resources. By this way, it ensures the safe operation of the library alliance monitoring system. 1. Introduction With he development of virtual, distributed storage and broadband Internet, a new type of computing model cloud computing is produced. Cloud computing refers to that subscriber terminal access to storage, calculation, data base and other computing

2 Sripirakas et al / Computer&Radioengineering (2014) resources through the remote connection. Cloud consists of distributed Internet infrastructures, such as network devices, server security equipment and so on, storing database and application software, which are needed in running system. Cloud terminal is some fixed or mobile Internet users. Cloud computing technology, with its advancement and the largest participatory of resource usage, brings opportunities to the development of library alliance. Compared with the traditional library alliance, the model of modern library alliance mainly depends on information technology and the Internet to cooperate. Meanwhile, cloud computing also brings challenges. The resources controlled by cloud platform and its usages are becoming more and more rich and diverse, which makes the cost and difficulty of maintaining cloud resources increase significantly. How to effectively regulate host computer and service on cloud platform and how to make its operation more convenient and efficient become the important research subject. Scholars at home and abroad have made many efforts in monitoring management of cloud computing. For example, based on the analysis of cloud computing platform of telecom, which is facing security threats, Song Xiaoning puts forward cloud computing security constructure for telecom, which includes cloud computing safety management and monitoring module. The design of cloud monitoring platform module has realized the dynamic information of virtual information of virtual node. According to the analysis of DDOS attacks, it also puts forward a DDOS attack scheme for detection and prevention. Based on the analysis of current research situation, the function of current cloud computing platform monitoring system are becoming more and more abundant, with the function of decision support. It can not only realize error alarm, issue tracking and also strengthen the function of report generation and performance optimization. But the core function of monitoring system is still monitor and alarm. Cross-platform, low interference and punctuality are the key points of the design based on cloud computing of library alliance system monitoring platform. To develop independently by using open source API will also reduce the budger burden of library alliance. Therefore, according to the essence of library alliance system monitoring platform under cloud computing, which pays attention to the monitoring function of software and hardware, this paper is going to discuss about the design and the principles of implementation of host monitoring, service monitoring and alarm module. 2. Overall Design of System 2.1 System Architecture Based on comprehensive analysis of the characteristics of current cloud computing monitoring system and the running condition of library alliance system, this monitoring platform adopts an overall plan, which is the combination of B/C and C/S architecture. In it, we use Agent/Server mode to monitor resources based on C/S structure, which means that we install Agent on a host computer in cloud in order to collect resource information of monitoring target. Then, Agent will send and register resource information to the server located in the sub-center and center of the library alliance. While to manage the resource of monitoring target, we adopt B/C structure.

3 20 Sripirakas et al / Computer&Radioengineering (2014)18-26 The Server adopts MVC pattern to show the users physical information of monitoring target in the form of text and charts by using the JBOSS and Tomact container. The users can visit monitoring platform through the browser. Monitoring platform completes the design of server architecture by using SSH framework. The overall system architecture is shown in figure 1. Fig 1. Overall architecture of monitoring platform base on B/C and C/S 2.2 Main Functions Because the cloud platform has a large number of host computers and the usage of resource is dynamic and changeable, so it needs to monitor resource information and load condition timely, accurately and dynamically. In such way, it can provide a basis for the dynamic deployment of resource in the cloud and also provide system performance information for related subsystems, so as to better realize the control and distribution of system resources. The main function of the monitoring platform can be summarized as cross platform ability to collect system information. First, it can not only monitor the running information of host computer, but also can monitor service information. Second, it can provide visual management interface. Third, it can provide effective alarm mechanism. Fourth, adopting an open software architecture, it is convenient to integrate third party logs and reports. It includes: On the Agent, it can automatically collect the data on physical or virtual machine, which includes resource usage or the service run on platform and usage of the service. After the installation of Agent, it it is the first time to monitor, it can automatically find the function by Server, register target resource to Server and add it to the monitor list. When the Server displays the collected data and its change in the form of graphics and lists, it can provide basis for resources scheduling. It can remotely monitor the performance of the target host computer on Server, set time interval of collecting host computer information and alarm rules and it can

4 Sripirakas et al / Computer&Radioengineering (2014) modify and delete according to operational conditions. Establish information center. Through that, keep and display all the alarm rules and information. Be able to divide the monitoring target host computers in the form of cluster, but all the clusters are not fixed, it can be adjusted according to the running condition, which is shown in figure 2. Fig.2 Two functions: monitor platform host computer and service 3. The Design of Implementation of Key Modules 3.1The Design of Host Computer Monitoring Cloud platform connects other host computers in order to show the resources. But the basic information, system configuration and its resource of each host computer directly determine the running effect and service that it can provide. Monitoring platform use third party plug in SIGAR to collect host computer information on Agent. API is a cross platform, cross languages and open source system information collector. It can support and collect more than 25 kinds of CPU, memory, network interfaces, routing, file systems, system services, load information on operational system, which include random access memory,cpu, swap partition, average load, boot and login time, system process, status, environment and file usage, detection and quantization of file system, discovery, configuration and quantization information of network interface, TCP and UDP connection table, network routing table and so on. And also it can be easily invoked in Java program. The information collection of Agent host computer is mainly through SIGAR s cross platform features, which collects system data from various system platforms and process information. We invoke the corresponding operating system API to acquire related system data through local method, such as SIGAR.jar under windows, which depends on sigar-amd 64-winnt.dll or sigar-x86-winnt.dll.but Linux depends on libsigar-amd 64-linux.so or

5 22 Sripirakas et al / Computer&Radioengineering (2014)18-26 libsigar-x86-linux.so. The main tasks of Agent host computer monitoring include: first, collect physical information of host computer; second, send the host computer s physical information to Server and register; third, send Agent running information (heartbeat) to Server at regular intervals. The collection implementation process of host computer information is shown in figure 3 Agent SIGAR interface 1:collect host information instruction Target service host 2:collec host information Server 4:back to host information 3:back to host information 5:register host information to Server 6:send heartbeat to Server at regular intervals Fig 3 the Agent acquisition sequence of host information The main tasks of Server include: first, display the physical information of the current monitoring target host computer (machine name, IP address, domain name, CPU or memory); second, display the service list of the current monitoring target host computer (database services, Tomat service, Memcache service, NTP service or IIS service, etc); third,set alarm rules for current target host computers ( when the utilization rate of CPU is bigger than 100%, then it will alarm); fourth, display the alarm information of current host computer; fifth, classify the target host computers. Server can show the monitored host computer s resource usage condition to users in the form of graphs and lists through host computer monitoring page, so as to let users have a better understanding of resource usage of CPU, memory, swap partition and the running condition of service (run or stop). The manager makes reasonable control and adjustment of cloud resources according to this, so the utilization of platform resource can achieve the best effect. Monitoring platform designs a series of modular interface in order to realize the control of Server to host computer. In includes: find platform by ID, find platforms, find Server by platform, create platform, find platform type by ID, remove platform and update platform. 3.2The Design of Service Monitoring Integration Platform of Knowledge Discovery and Resource Acquisition

6 Sripirakas et al / Computer&Radioengineering (2014) Integration platform of knowledge discovery and resource acquisition consists of allied member s resources, shared resources outside the alliances and international open resources through members current resources outside library alliance. (1)resources of the library alliance members The followings are the main types of library alliance members, such as university library, public library and research institution library. This platform resource is made of each member s document resources, including printed literature resource, multimedia resources, electronic journals, electronic books, self built special database resource, mirror database resources and network literature resource. This is an integrated platform of internal resource in library alliance. Through the platform of cloud computing, it can realize these resources value and then to better serve for users. (2)shared resources outside library alliance Shared resources outside library alliance include: resources shared by China and the United States, China Academic Library and Information System, Academic Social Science and Humanities Library, national science and technology library and national library. (4)international open resources On the basis of current resources, we look for international open resources through other members like open access to storage at home and abroad, journals and other free resources Cloud Service Platform of Digital Asset Cloud service platform of digital asset management provides digital data for library alliances, including the service of video, audio, image, text and multimedia data. Each members submit their digital assets to the platform directly, in such way, they can achieve integrated management, without independently building self digital asset management and equipping corresponding equipments and personnel in order to save the spending, and improve efficiency and security of information Cloud Service Platform of Book Management Cloud service platform of book management provides integrated management services of printing data for alliance members. Each members use this platform to directly complete acquisition, cataloging, circulation management of the printed data. In such way, it can improve the efficiency of managing journals, without independently building self digital asset management and equipping corresponding equipments and personnel in order to save the spending, and improve efficiency and security of information. The main purpose of designing this module is to monitor the resources usage and the running status of every service in the service implementation process, which users can directly get involved in cloud computing and acquire service list and resource using data. The monitoring platform uses third party service plug in on Agent to collect information. The collection of service information on Agent is helped by service plug in, while

7 24 Sripirakas et al / Computer&Radioengineering (2014)18-26 the plug in of this platform depends on standard plug in provided by Hyperic HQ to get installation path and operational information. Also use operational interface provided by the monitored service to make remote operations, like restart, shut down and so on. Service plug in is the communication interface of the monitored service and this platform. With the help of service plug in, the monitoring platform can monitor hundreds types of services. At present, the service plug ins installed in monitoring platform include Tomcat, Mysql, JBoss, NTP, Samab, Oracle, IIS, WebLogic and WebService. The process of collection of service information on Agent is shown in figure 5. Agent Service plug in service Server 1:collect service instruction 4:join the service 2:collect service 3:back to service 5:register service 7:control instruction 10:back to result 6:remote control instruction 8:invoke API to control service 9:back to result 11:back to result 12:send heartbeat to Server at regular intervals Fig 5 sequence of service information acquisition The main task of Server include: first, show the physical information of current service, including name, version, description, creation time and the installation path, etc; second, display the detailed service list of current service in host computer; third, set down alarm rules for current service; fourth, display alarm list of this service; fifth, remote control the service. 3.3 The Design of Alarm Module Because cloud computing has abundant resources, lots of service forms and various functions, so the operations of some services may threaten cloud platform and users, also it will damage resources. Therefore, the important function of alarm module is to early alarm, early treat and reduce the damage. The module makes real time monitoring of cloud computing service, captures and analyzes service types and purposes. It will immediately stop its operation when the services are destructive and

8 Sripirakas et al / Computer&Radioengineering (2014) dangerous. Then prompt the users the warning information, users make corresponding repair about the triggered alarm after that. Certainly, it needs to classify services in advance and to determine detailed alarm rules and generation rule database. In such way, when the running status of the monitored target satisfies the alarm rules, the alarm will be triggered automatically and record the alarm information. There are two types of alarm rules. First, host alarm rules. According to the host types(window XP or Linux), it gets corresponding rule information from rule database. Second, service alarm rules. It generates corresponding rule templates according to service types(oracle, JBoss or Tomat), then set down condition value on rule templates(like the usage rate of CPU is bigger than 100%). When platform system monitor host or service resources are overused(trigger alarm rule), then it will generate the corresponding alarm information. The manager will repair it according to this. Moreover, the users can made appropriate adjustment of alert level, scope of warning, warning value, filter and delete,etc. 4. Conclusion and discussion Based on Java technology and the mixed structure of C/S and B/C, with the help of information collection tool of open source system SIGAR and Hyperic HQ, which was provided by the standard host computer and service monitoring plug in, we design and establish a more general resources monitoring platform of library alliance system under cloud computing through the second development. This platform can monitor the health condition of service, which runs on host computer in library alliance system. At the same time, it can complete the setting of warning value for all the host computers and services, so as to realize real time monitoring and management of the library alliance system. Moreover, it is convenient for managers to manage and maintain library alliance system effectively. To some degree,it also can reduce economic lost, even resources destruction, which are caused by mismanagement and not timely maintenance. This monitoring platform achieves the main function of host computer and service s monitoring and alarm, but there are still many aspects that need to be strengthened. First, for a long term, we need to put this platform in a relatively large simulation or real cloud computing environment in order to inspect its working efficiency and accuracy in the dynamic and changeable resource environment. Second, we should further strengthen the function of service monitoring in order to make the area of monitoring into inner service. At present, the projects of service monitoring are mainly focused on the boundary of Web service and database service. The particle size of monitoring subject are big and in the future, we expect that we can monitor the searching, browsing history and database query log of the user s. Last SIGAR has the advantage of cross platform feature and comprehensive monitoring resources, and it can adapt to library alliance under cloud computing system, but its function is relatively single, and it lacks the ability to track problems and forecast and analyze the trend of cloud computing resource operation. Therefore, in the future, we will provide data support for making decisions, including performance optimization and capacity

9 26 Sripirakas et al / Computer&Radioengineering (2014)18-26 upgrade through establishing a log management module and designing the automatic generation of operational reports. References [1] Ni Yujia. Research on building library alliance service platform based on cloud computing[d]. Northeast Normal University [2] Xiao Hua. The research of regional library information service alliance under network Environment[D]. Nanchang University [3] Li Bing. The research of key techniques of dynamic resource management in cloud computing environment[d]. Bejing University of Posts and Telecommunications [4] Yin Haibo. The design of monitoring platform of the distributed application system in cloud compting environment[d]. Central South University of Forestry and Technology [5] Kang Junfeng. Technologies of storage and efficient management on cloud computing for high resolution remote sensing image[d]. Zhejiang University [6] Yuan Kai. The design and implementation of monitoring system under cloud computing[d]. Huazhong University of Science and Technology [7] Lan Shaohua. Research on library ubiquitous service in cloud computing environment[d]. Fujian Normal University [8] Guo Jinting. Research on the construction of the cloud service model of digital library in the mobile cloud computing environment[d]. Liaoning Normal University

Oracle EXAM - 1Z0-102. Oracle Weblogic Server 11g: System Administration I. Buy Full Product. http://www.examskey.com/1z0-102.html

Oracle EXAM - 1Z0-102. Oracle Weblogic Server 11g: System Administration I. Buy Full Product. http://www.examskey.com/1z0-102.html Oracle EXAM - 1Z0-102 Oracle Weblogic Server 11g: System Administration I Buy Full Product http://www.examskey.com/1z0-102.html Examskey Oracle 1Z0-102 exam demo product is here for you to test the quality

More information

HP OO 10.X - SiteScope Monitoring Templates

HP OO 10.X - SiteScope Monitoring Templates HP OO Community Guides HP OO 10.X - SiteScope Monitoring Templates As with any application continuous automated monitoring is key. Monitoring is important in order to quickly identify potential issues,

More information

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds. ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

Example of Standard API

Example of Standard API 16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface

More information

USING JE THE BE NNIFE FITS Integrated Performance Monitoring Service Availability Fast Problem Troubleshooting Improved Customer Satisfaction

USING JE THE BE NNIFE FITS Integrated Performance Monitoring Service Availability Fast Problem Troubleshooting Improved Customer Satisfaction THE BENEFITS OF USING JENNIFER Integrated Performance Monitoring JENNIFER provides comprehensive and integrated performance monitoring through its many dashboard views, which include Realuser Monitoring

More information

Intellicus Cluster and Load Balancing (Windows) Version: 7.3

Intellicus Cluster and Load Balancing (Windows) Version: 7.3 Intellicus Cluster and Load Balancing (Windows) Version: 7.3 Copyright 2015 Intellicus Technologies This document and its content is copyrighted material of Intellicus Technologies. The content may not

More information

How To Set Up An Intellicus Cluster And Load Balancing On Ubuntu 8.1.2.2 (Windows) With A Cluster And Report Server (Windows And Ubuntu) On A Server (Amd64) On An Ubuntu Server

How To Set Up An Intellicus Cluster And Load Balancing On Ubuntu 8.1.2.2 (Windows) With A Cluster And Report Server (Windows And Ubuntu) On A Server (Amd64) On An Ubuntu Server Intellicus Cluster and Load Balancing (Windows) Intellicus Enterprise Reporting and BI Platform Intellicus Technologies info@intellicus.com www.intellicus.com Copyright 2014 Intellicus Technologies This

More information

Vistara Lifecycle Management

Vistara Lifecycle Management Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

Integrated Performance Monitoring

Integrated Performance Monitoring Integrated Performance Monitoring JENNIFER provides comprehensive and integrated performance monitoring through its many dashboard views, which include Realuser Monitoring and Real-time Topology. USING

More information

Juniper Networks Management Pack Documentation

Juniper Networks Management Pack Documentation Juniper Networks Management Pack Documentation Juniper Networks Data Center Switching Management Pack for VMware vrealize Operations (vrops) Release 2.5 Modified: 2015-10-12 Juniper Networks, Inc. 1133

More information

VMware vsphere: Install, Configure, Manage [V5.0]

VMware vsphere: Install, Configure, Manage [V5.0] VMware vsphere: Install, Configure, Manage [V5.0] Gain hands-on experience using VMware ESXi 5.0 and vcenter Server 5.0. In this hands-on, VMware -authorized course based on ESXi 5.0 and vcenter Server

More information

Lavastorm Resolution Center 2.2 Release Frequently Asked Questions

Lavastorm Resolution Center 2.2 Release Frequently Asked Questions Lavastorm Resolution Center 2.2 Release Frequently Asked Questions Software Description What is Lavastorm Resolution Center 2.2? Lavastorm Resolution Center (LRC) is a flexible business improvement management

More information

SingleServerSafe Product Introduction

SingleServerSafe Product Introduction SingleServerSafe Product Introduction November, 2015 NEC Corporation, Cloud Platform Division, EXPRESSCLUSTER Group Index 1. Requirements for High Availability 2. Product Overview 3. Features in Operation

More information

Software. Quidview 56 CAMS 57. XLog NTAS 58

Software. Quidview 56 CAMS 57. XLog NTAS 58 Software Quidview 56 CAMS 57 XLog NTAS 58 55 Quidview Quidview Network Management System Quidview network management software is a suite of scalable tools for simplifying the network management and maintenance.

More information

On Cloud Computing Technology in the Construction of Digital Campus

On Cloud Computing Technology in the Construction of Digital Campus 2012 International Conference on Innovation and Information Management (ICIIM 2012) IPCSIT vol. 36 (2012) (2012) IACSIT Press, Singapore On Cloud Computing Technology in the Construction of Digital Campus

More information

Rally Installation Guide

Rally Installation Guide Rally Installation Guide Rally On-Premises release 2015.1 rallysupport@rallydev.com www.rallydev.com Version 2015.1 Table of Contents Overview... 3 Server requirements... 3 Browser requirements... 3 Access

More information

OnCommand Performance Manager 1.1

OnCommand Performance Manager 1.1 OnCommand Performance Manager 1.1 Installation and Administration Guide For VMware Virtual Appliances NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408)

More information

Monitoring Windows Servers and Applications with GroundWork Monitor Enterprise 6.7. Product Application Guide October 8, 2012

Monitoring Windows Servers and Applications with GroundWork Monitor Enterprise 6.7. Product Application Guide October 8, 2012 Monitoring Windows Servers and Applications with GroundWork Monitor Enterprise 6.7 Product Application Guide October 8, 2012 Table of Contents Introduction...3 Definitions and Abbreviations...3 GroundWork

More information

There are numerous ways to access monitors:

There are numerous ways to access monitors: Remote Monitors REMOTE MONITORS... 1 Overview... 1 Accessing Monitors... 1 Creating Monitors... 2 Monitor Wizard Options... 11 Editing the Monitor Configuration... 14 Status... 15 Location... 17 Alerting...

More information

How To Monitor A Server With Zabbix

How To Monitor A Server With Zabbix & JavaEE Platform Monitoring A Good Match? Company Facts Jesta Digital is a leading global provider of next generation entertainment content and services for the digital consumer. subsidiary of Jesta Group,

More information

How To Install An Aneka Cloud On A Windows 7 Computer (For Free)

How To Install An Aneka Cloud On A Windows 7 Computer (For Free) MANJRASOFT PTY LTD Aneka 3.0 Manjrasoft 5/13/2013 This document describes in detail the steps involved in installing and configuring an Aneka Cloud. It covers the prerequisites for the installation, the

More information

OnCommand Performance Manager 1.1

OnCommand Performance Manager 1.1 OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501

More information

LEARNING SOLUTIONS website milner.com/learning email training@milner.com phone 800 875 5042

LEARNING SOLUTIONS website milner.com/learning email training@milner.com phone 800 875 5042 Course 6451B: Planning, Deploying and Managing Microsoft System Center Configuration Manager 2007 Length: 3 Days Published: June 29, 2012 Language(s): English Audience(s): IT Professionals Level: 300 Technology:

More information

Installing and Using the vnios Trial

Installing and Using the vnios Trial Installing and Using the vnios Trial The vnios Trial is a software package designed for efficient evaluation of the Infoblox vnios appliance platform. Providing the complete suite of DNS, DHCP and IPAM

More information

RiMONITOR. Monitoring Software. for RIEGL VZ-Line Laser Scanners. Ri Software. visit our website www.riegl.com. Preliminary Data Sheet

RiMONITOR. Monitoring Software. for RIEGL VZ-Line Laser Scanners. Ri Software. visit our website www.riegl.com. Preliminary Data Sheet Monitoring Software RiMONITOR for RIEGL VZ-Line Laser Scanners for stand-alone monitoring applications by autonomous operation of all RIEGL VZ-Line Laser Scanners adaptable configuration of data acquisition

More information

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 This document supports the version of each product listed and supports all subsequent versions until the document

More information

HP A-IMC Firewall Manager

HP A-IMC Firewall Manager HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this

More information

Design and Implementation of IaaS platform based on tool migration Wei Ding

Design and Implementation of IaaS platform based on tool migration Wei Ding 4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2015) Design and Implementation of IaaS platform based on tool migration Wei Ding State Key Laboratory

More information

WatchGuard SSL 2.0 New Features

WatchGuard SSL 2.0 New Features WatchGuard SSL 2.0 New Features For Secure Remote Access, Identity Management, and Network Access Control Introduction WatchGuard SSL 2.0 unifies identity and access management capabilities, with features

More information

VMware vcenter Log Insight Security Guide

VMware vcenter Log Insight Security Guide VMware vcenter Log Insight Security Guide vcenter Log Insight 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

1. INTERFACE ENHANCEMENTS 2. REPORTING ENHANCEMENTS

1. INTERFACE ENHANCEMENTS 2. REPORTING ENHANCEMENTS W E L C O M E T O M O N I T O R I N G H E A V E N NEW THINGS ABOUT PANDORA FMS 5.0 A new version of Pandora FMS full of enhancements is about to hit the market. Pandora FMS 5.0 will be released by the

More information

OnCommand Unified Manager 6.3

OnCommand Unified Manager 6.3 OnCommand Unified Manager 6.3 Installation and Setup Guide For VMware Virtual Appliances NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support

More information

CYCLOPE let s talk productivity

CYCLOPE let s talk productivity Cyclope 6 Installation Guide CYCLOPE let s talk productivity Cyclope Employee Surveillance Solution is provided by Cyclope Series 2003-2014 1 P age Table of Contents 1. Cyclope Employee Surveillance Solution

More information

vcenter Hyperic Configuration Guide

vcenter Hyperic Configuration Guide vcenter Hyperic 5.8 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

The Monitis Monitoring Agent ver. 1.2

The Monitis Monitoring Agent ver. 1.2 The Monitis Monitoring Agent ver. 1.2 General principles, Security and Performance Monitis provides a server and network monitoring agent that can check the health of servers, networks and applications

More information

SingleServerSafe Product Introduction

SingleServerSafe Product Introduction Product Introduction http://www.nec.com/expresscluster/ NEC Corporation System Software Division December, 2012 Index Requirements for high availability Target of EXPRESSCLUSTER X Detectable failure (monitoring

More information

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3. Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System

More information

Traffic Analyzer Based on Data Flow Patterns

Traffic Analyzer Based on Data Flow Patterns AUTOMATYKA 2011 Tom 15 Zeszyt 3 Artur Sierszeñ*, ukasz Sturgulewski* Traffic Analyzer Based on Data Flow Patterns 1. Introduction Nowadays, there are many systems of Network Intrusion Detection System

More information

Proposal for Virtual Private Server Provisioning

Proposal for Virtual Private Server Provisioning Interpole Solutions 1050, Sadguru Darshan, New Prabhadevi Road, Mumbai - 400 025 Tel: 91-22-24364111, 24364112 Email : response@interpole.net Website: www.interpole.net Proposal for Virtual Private Server

More information

NetIQ Identity Manager Setup Guide

NetIQ Identity Manager Setup Guide NetIQ Identity Manager Setup Guide July 2015 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE

More information

Installation and configuration of Real-Time Monitoring Tool (RTMT)

Installation and configuration of Real-Time Monitoring Tool (RTMT) Installation and configuration of Real-Time Monitoring Tool (RTMT) How to install and upgrade RTMT, page 1 Services, servlets, and service parameters on server, page 5 Navigation of RTMT, page 6 Nonconfigurable

More information

Content Distribution Management

Content Distribution Management Digitizing the Olympics was truly one of the most ambitious media projects in history, and we could not have done it without Signiant. We used Signiant CDM to automate 54 different workflows between 11

More information

The syslog-ng Store Box 3 F2

The syslog-ng Store Box 3 F2 The syslog-ng Store Box 3 F2 PRODUCT DESCRIPTION Copyright 2000-2014 BalaBit IT Security All rights reserved. www.balabit.com Introduction The syslog-ng Store Box (SSB) is a high-reliability and high-performance

More information

pc resource monitoring and performance advisor

pc resource monitoring and performance advisor pc resource monitoring and performance advisor application note www.hp.com/go/desktops Overview HP Toptools is a modular web-based device management tool that provides dynamic information about HP hardware

More information

Memory Database Application in the Processing of Huge Amounts of Data Daqiang Xiao 1, Qi Qian 2, Jianhua Yang 3, Guang Chen 4

Memory Database Application in the Processing of Huge Amounts of Data Daqiang Xiao 1, Qi Qian 2, Jianhua Yang 3, Guang Chen 4 5th International Conference on Advanced Materials and Computer Science (ICAMCS 2016) Memory Database Application in the Processing of Huge Amounts of Data Daqiang Xiao 1, Qi Qian 2, Jianhua Yang 3, Guang

More information

vsphere App HA Installation and Configuration Guide

vsphere App HA Installation and Configuration Guide vsphere App HA Installation and Configuration Guide VMware vsphere App HA 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

A Brief. Introduction. of MG-SOFT s SNMP Network Management Products. Document Version 1.3, published in June, 2008

A Brief. Introduction. of MG-SOFT s SNMP Network Management Products. Document Version 1.3, published in June, 2008 A Brief Introduction of MG-SOFT s SNMP Network Management Products Document Version 1.3, published in June, 2008 MG-SOFT s SNMP Products Overview SNMP Management Products MIB Browser Pro. for Windows and

More information

Network Probe User Guide

Network Probe User Guide Network Probe User Guide Network Probe User Guide Table of Contents 1. Introduction...1 2. Installation...2 Windows installation...2 Linux installation...3 Mac installation...4 License key...5 Deployment...5

More information

Cloud n Service Presentation. NTT Communications Corporation Cloud Services

Cloud n Service Presentation. NTT Communications Corporation Cloud Services Cloud n Service Presentation NTT Communications Corporation Cloud Services 1 Overview of Global Public Cloud Services Cloud n offeres datacenters in U.S. and Japan Global standard service architecture

More information

How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On

How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On Transport and Security Specification 15 July 2015 Version: 5.9 Contents Overview 3 Standard network requirements 3 Source and Destination Ports 3 Configuring the Connection Wizard 4 Private Bloomberg Network

More information

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2)

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Hyper-V Manager Hyper-V Server R1, R2 Intelligent Power Protector Main

More information

OnCommand Performance Manager 2.0

OnCommand Performance Manager 2.0 OnCommand Performance Manager 2.0 Installation and Administration Guide For VMware Virtual Appliances NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408)

More information

Barracuda Link Balancer Administrator s Guide

Barracuda Link Balancer Administrator s Guide Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks

More information

Healthstone Monitoring System

Healthstone Monitoring System Healthstone Monitoring System Patrick Lambert v1.1.0 Healthstone Monitoring System 1 Contents 1 Introduction 2 2 Windows client 2 2.1 Installation.............................................. 2 2.2 Troubleshooting...........................................

More information

IFS-8000 V2.0 INFORMATION FUSION SYSTEM

IFS-8000 V2.0 INFORMATION FUSION SYSTEM IFS-8000 V2.0 INFORMATION FUSION SYSTEM IFS-8000 V2.0 Overview IFS-8000 v2.0 is a flexible, scalable and modular IT system to support the processes of aggregation of information from intercepts to intelligence

More information

LabStats 5 System Requirements

LabStats 5 System Requirements LabStats Tel: 877-299-6241 255 B St, Suite 201 Fax: 208-473-2989 Idaho Falls, ID 83402 LabStats 5 System Requirements Server Component Virtual Servers: There is a limit to the resources available to virtual

More information

FUNCTIONAL OVERVIEW www.amdosoft.com

FUNCTIONAL OVERVIEW www.amdosoft.com Business Process Protectors Business Service Management Active Error Identification Event Driven Automation Error Handling and Escalation Intelligent Notification Process Reporting IT Management Business

More information

RingStor User Manual. Version 2.1 Last Update on September 17th, 2015. RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816.

RingStor User Manual. Version 2.1 Last Update on September 17th, 2015. RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816. RingStor User Manual Version 2.1 Last Update on September 17th, 2015 RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816 Page 1 Table of Contents 1 Overview... 5 1.1 RingStor Data Protection...

More information

SIP-DECT Knowledge Base SIP-DECT System Update

SIP-DECT Knowledge Base SIP-DECT System Update SIP-DECT Knowledge Base SIP-DECT System Update MAI 2015 DEPL-2046 VERSION 1.6 KNOWLEDGE BASE TABLE OF CONTENT 1) Introduction... 2 2) Update (New Service Pack in the same Release)... 3 2.1 OMM HOSTED ON

More information

Put a Firewall in Your JVM Securing Java Applications!

Put a Firewall in Your JVM Securing Java Applications! Put a Firewall in Your JVM Securing Java Applications! Prateep Bandharangshi" Waratek Director of Client Security Solutions" @prateep" Hussein Badakhchani" Deutsche Bank Ag London Vice President" @husseinb"

More information

SyAM Software Management Utilities. Creating Templates

SyAM Software Management Utilities. Creating Templates SyAM Software Management Utilities Creating Templates Step 1: Setting Up Folder Paths The Management Utilities utilize a server share to perform centralized network deployment of applications and patches.

More information

WhatsVirtual for WhatsUp Gold v16.0 User Guide

WhatsVirtual for WhatsUp Gold v16.0 User Guide WhatsVirtual for WhatsUp Gold v16.0 User Guide Contents Welcome Welcome to WhatsVirtual... 1 Using WhatsVirtual Discovering virtual devices... 2 Viewing discovery output... 4 Manage and monitor virtual

More information

AlienVault Unified Security Management (USM) 4.x-5.x. Deployment Planning Guide

AlienVault Unified Security Management (USM) 4.x-5.x. Deployment Planning Guide AlienVault Unified Security Management (USM) 4.x-5.x Deployment Planning Guide USM 4.x-5.x Deployment Planning Guide, rev. 1 Copyright AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,

More information

Mirtrak 6 Powered by Cyclope

Mirtrak 6 Powered by Cyclope Mirtrak 6 Powered by Cyclope Installation Guide Mirtrak Activity Monitoring Solution v6 is powered by Cyclope Series 2003-2013 Info Technology Supply Ltd. 2 Hobbs House, Harrovian Business Village, Bessborough

More information

ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy

ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to

More information

Features Overview Guide About new features in WhatsUp Gold v14

Features Overview Guide About new features in WhatsUp Gold v14 Features Overview Guide About new features in WhatsUp Gold v14 Contents New Features in Ipswitch WhatsUp Gold v14 Welcome to WhatsUp Gold v14!... 1 About the Welcome Center About the Quick Setup Assistant...

More information

PANDORA FMS NETWORK DEVICES MONITORING

PANDORA FMS NETWORK DEVICES MONITORING NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,

More information

Optimization of QoS for Cloud-Based Services through Elasticity and Network Awareness

Optimization of QoS for Cloud-Based Services through Elasticity and Network Awareness Master Thesis: Optimization of QoS for Cloud-Based Services through Elasticity and Network Awareness Alexander Fedulov 1 Agenda BonFIRE Project overview Motivation General System Architecture Monitoring

More information

Inside the Digital Commerce Engine. The architecture and deployment of the Elastic Path Digital Commerce Engine

Inside the Digital Commerce Engine. The architecture and deployment of the Elastic Path Digital Commerce Engine Inside the Digital Commerce Engine The architecture and deployment of the Elastic Path Digital Commerce Engine Contents Executive Summary... 3 Introduction... 4 What is the Digital Commerce Engine?...

More information

MONITORING RED HAT GLUSTER SERVER DEPLOYMENTS With the Nagios IT infrastructure monitoring tool

MONITORING RED HAT GLUSTER SERVER DEPLOYMENTS With the Nagios IT infrastructure monitoring tool TECHNOLOGY DETAIL MONITORING RED HAT GLUSTER SERVER DEPLOYMENTS With the Nagios IT infrastructure monitoring tool INTRODUCTION Storage system monitoring is a fundamental task for a storage administrator.

More information

Client Overview. Engagement Situation

Client Overview. Engagement Situation Client Overview Our client is a provider of Operational Analytics and Visualization solutions for cloud/datacenters that enables IT function of an organization to monitor, and plan complex cloud and data

More information

1z0-102 Q&A. DEMO Version

1z0-102 Q&A. DEMO Version Oracle Weblogic Server 11g: System Administration Q&A DEMO Version Copyright (c) 2013 Chinatag LLC. All rights reserved. Important Note Please Read Carefully For demonstration purpose only, this free version

More information

The Key Technology Research of Virtual Laboratory based On Cloud Computing Ling Zhang

The Key Technology Research of Virtual Laboratory based On Cloud Computing Ling Zhang International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) The Key Technology Research of Virtual Laboratory based On Cloud Computing Ling Zhang Nanjing Communications

More information

Upgrading to Websense Web Security v7.6

Upgrading to Websense Web Security v7.6 Upgrading to Websense Web Security v7.6 Webinar April 2011 web security data security email security 2009 Websense, Inc. All rights reserved. Webinar Presenter Greg Didier Title: Support Specialist Accomplishments:

More information

Internet Filtering Appliance. User s Guide VERSION 1.2

Internet Filtering Appliance. User s Guide VERSION 1.2 Internet Filtering Appliance User s Guide VERSION 1.2 User s Guide VERSION 1.2 InternetSafety.com, Inc 3979 South Main Street Suite 230 Acworth, GA 30101 Phone 678 384 5300 Fax 678 384 5299 1 Table of

More information

Basic System Administration ESX Server 3.0.1 and Virtual Center 2.0.1

Basic System Administration ESX Server 3.0.1 and Virtual Center 2.0.1 Basic System Administration ESX Server 3.0.1 and Virtual Center 2.0.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a

More information

McAfee Asset Manager Console

McAfee Asset Manager Console Installation Guide McAfee Asset Manager Console Version 6.5 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

- 1 - SmartStor Cloud Web Admin Manual

- 1 - SmartStor Cloud Web Admin Manual - 1 - SmartStor Cloud Web Admin Manual Administrator Full language manuals are available in product disc or website. The SmartStor Cloud Administrator web site is used to control, setup, monitor, and manage

More information

CA Nimsoft Monitor Snap

CA Nimsoft Monitor Snap CA Nimsoft Monitor Snap Configuration Guide for IIS Server Monitoring iis v1.5 series Legal Notices This online help system (the "System") is for your informational purposes only and is subject to change

More information

Installing and Configuring Websense Content Gateway

Installing and Configuring Websense Content Gateway Installing and Configuring Websense Content Gateway Websense Support Webinar - September 2009 web security data security email security Support Webinars 2009 Websense, Inc. All rights reserved. Webinar

More information

Online Help StruxureWare Data Center Expert

Online Help StruxureWare Data Center Expert Online Help StruxureWare Data Center Expert Version 7.2.1 What's New in StruxureWare Data Center Expert 7.2.x Learn more about the new features available in the StruxureWare Data Center Expert 7.2.x release.

More information

Chapter 1 - Web Server Management and Cluster Topology

Chapter 1 - Web Server Management and Cluster Topology Objectives At the end of this chapter, participants will be able to understand: Web server management options provided by Network Deployment Clustered Application Servers Cluster creation and management

More information

Cisco Application Networking Manager Version 2.0

Cisco Application Networking Manager Version 2.0 Cisco Application Networking Manager Version 2.0 Cisco Application Networking Manager (ANM) software enables centralized configuration, operations, and monitoring of Cisco data center networking equipment

More information

StruxureWare Data Center Expert 7.2.4 Release Notes

StruxureWare Data Center Expert 7.2.4 Release Notes StruxureWare Data Center Expert 7.2.4 Release Notes Table of Contents Page # Part Numbers Affected...... 1 Minimum System Requirements... 1 New Features........ 1 Issues Fixed....3 Known Issues...3 Upgrade

More information

Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions

Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas

More information

Networking Best Practices Guide. Version 6.5

Networking Best Practices Guide. Version 6.5 Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form

More information

11A. CORPORATE INFRASTRUCTURE

11A. CORPORATE INFRASTRUCTURE DR.VSRS 11A. CORPORATE INFRASTRUCTURE for 5th GENERATION COMPUTERS DR.VSR.SUBRAMANIAM.MBA.,Ph.D.,D.Litt PUBLISHED IN : INDIAN MANAGEMENT (ISSN : 0019-5812). Journal of the All India Management Association,

More information

Pharos Control User Guide

Pharos Control User Guide Outdoor Wireless Solution Pharos Control User Guide REV1.0.0 1910011083 Contents Contents... I Chapter 1 Quick Start Guide... 1 1.1 Introduction... 1 1.2 Installation... 1 1.3 Before Login... 8 Chapter

More information

System Services. Engagent System Services 2.06

System Services. Engagent System Services 2.06 System Services Engagent System Services 2.06 Overview Engagent System Services constitutes the central module in Engagent Software s product strategy. It is the glue both on an application level and on

More information

HDA Integration Guide. Help Desk Authority 9.0

HDA Integration Guide. Help Desk Authority 9.0 HDA Integration Guide Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic

More information

1. Cloud Data Center... 1. 2. Login to ICT Marketplace Portal... 1. 3. Dashboard... 2. 3. Data center management... 3. 3.1. New data center...

1. Cloud Data Center... 1. 2. Login to ICT Marketplace Portal... 1. 3. Dashboard... 2. 3. Data center management... 3. 3.1. New data center... Contents 1. Cloud Data Center... 1 2. Login to ICT Marketplace Portal... 1 3. Dashboard... 2 3. Data center management... 3 3.1. New data center... 3 4. View Data Centers... 6 5. Remove Data Centers...

More information

Cisco WebEx Node Management System. Administrator s Guide

Cisco WebEx Node Management System. Administrator s Guide Cisco WebEx Node Management System Administrator s Guide Copyright 1997 2011 Cisco and/or its affiliates. All rights reserved. WEBEX, CISCO, Cisco WebEx, the CISCO logo, and the Cisco WebEx logo are trademarks

More information

IBM Security QRadar SIEM Version 7.1.0 MR1. Administration Guide

IBM Security QRadar SIEM Version 7.1.0 MR1. Administration Guide IBM Security QRadar SIEM Version 7..0 MR Administration Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 07. Copyright

More information

PANDORA FMS NETWORK DEVICE MONITORING

PANDORA FMS NETWORK DEVICE MONITORING NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,

More information

Document management and exchange system supporting education process

Document management and exchange system supporting education process Document management and exchange system supporting education process Emil Egredzija, Bozidar Kovacic Information system development department, Information Technology Institute City of Rijeka Korzo 16,

More information

ServerPronto Cloud User Guide

ServerPronto Cloud User Guide ServerPronto Cloud User Guide Virtual machines Virtual machines are based on templates and are deployed on hypervisors. Hypervisors give them access to CPU, disk and network resources. The ServerPronto

More information

Tentative Plan to establish a Database Management System for Small Undersea Feature Names. (Draft by Lin Shaohua)

Tentative Plan to establish a Database Management System for Small Undersea Feature Names. (Draft by Lin Shaohua) SCUFN26-07.2A 26th SCUFN MEETING Tokyo, Japan, 23-27 September 2013 Tentative Plan to establish a Database Management System for Small Undersea Feature Names (Draft by Lin Shaohua) 1. Objective Collecting

More information

HP IMC Firewall Manager

HP IMC Firewall Manager HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this

More information

MYASIA CLOUD SERVER. Defining next generation of global storage grid User Guide AUG 2010, version 1.1

MYASIA CLOUD SERVER. Defining next generation of global storage grid User Guide AUG 2010, version 1.1 MYASIA CLOUD SERVER Defining next generation of global storage grid User Guide AUG 2010, version 1.1 Table of Content 1. Introduction.. 3 2. Getting Started... 4 3. Introduction to Cloud Server Management

More information

The syslog-ng Store Box 3 LTS

The syslog-ng Store Box 3 LTS The syslog-ng Store Box 3 LTS PRODUCT DESCRIPTION Copyright 2000-2012 BalaBit IT Security All rights reserved. www.balabit.com Introduction The syslog-ng Store Box (SSB) is a high-reliability and high-performance

More information