|
|
|
- Mervyn Tyler
- 10 years ago
- Views:
Transcription
1 Redundant and Failover Network Monitoring This section describes a few scenarios for implementing redundant monitoring hosts an various types of network layouts. With redundant hosts, you can maintain the ability to monitor your network when the primary host that runs Nagios fails or when portions of your network become unreachable. Note: If you are just learning how to use Nagios, I would suggest not trying to implement redudancy until you have becoming familiar with the prerequisites I've laid out. Redundancy is a relatively complicated issue to understand, and even more difficult to implement properly. Index Prerequisites Sample scripts Scenario 1 - Redundant monitoring Scenario 2 - Failover monitoring Prerequisites Before you can even think about implementing redundancy with Nagios, you need to be familiar with the following... Implementing event handlers for hosts and services Issuing external commands to Nagios via shell scripts Executing plugins on remote hosts using either the nrpe addon or some other method Checking the status of the Nagios process with the check_nagios plugin Sample Scripts All of the sample scripts that I use in this documentation can be found in the eventhandlers/ subdirectory of the Nagios distribution. You'll probably need to modify them to work on your system... Scenario 1 - Redundant Monitoring This is an easy (and naive) method of implementing redundant monitoring hosts on your network and it will only protect against a limited number of failures. More complex setups are necessary in order to provide smarter redundancy, better redundancy across different network segments, etc. Goals The goal of this type of redundancy implementation is simple. Both the "master" and "slave" hosts monitor the same hosts and service on the network. Under normal circumstances only the "master" host will be sending out notifications to contacts about problems. We want the "slave" host running Nagios to take over the job of notifying contacts about problems if: The "master" host that runs Nagios is down or.. The Nagios process on the "master" host stops running for some reason Network Layout Diagram The diagram below shows a very simple network setup. For this scenario I will be assuming that hosts A and E are both running Nagios and are monitoring all the hosts shown. Host A will be considered the "master" host and host E will be considered the "slave" host.
2 Initial Program Settings The slave host (host E) has its initial enable_notifications directive disabled, thereby preventing it from sending out any host or service notifications. You also want to make sure that the slave host has its check_external_commands directive enabled. That was easy enough... Initial Configuration Next we need to consider the differences between the object configuration file(s) on the master and slave hosts... I will assume that you have the master host (host A) setup to monitor services on all hosts shown in the diagram above. The slave host (host E) should be setup to monitor the same services and hosts, with the following additions in the configuration file... The host definition for host A (in the host E configuration file) should have a host event handler defined. Lets say the name of the host event handler is handle-master-host-event. The configuration file on host E should have a service defined to check the status of the Nagios process on host A. Lets assume that you define this service check to run the check_nagios plugin on host A. This can be done by using one of the methods described in this FAQ. The service definition for the Nagios process check on host A should have an event handler defined. Lets say the name of the service event handler is handle-master-proc-event. It is important to note that host A (the master host) has no knowledge of host E (the slave host). In this scenario it simply doesn't need to. Of course you may be monitoring services on host E from host A, but that has nothing to do with the implementation of redundancy... Event Handler Command Definitions We need to stop for a minute and describe what the command definitions for the event handlers on the slave host look like. Here is an example... define command{ command_name handle-master-host-event command_line /usr/local/nagios/libexec/eventhandlers/handle-master-host-event $HOSTSTATE$ $HOSTSTATETYPE$ } define command{ command_name handle-master-proc-event command_line /usr/local/nagios/libexec/eventhandlers/handle-master-proc-event $SERVICESTATE$ $SERVICESTATETYPE$ } This assumes that you have placed the event handler scripts in the /usr/local/nagios/libexec/eventhandlers directory. You may place them anywhere you wish, but you'll need to modify the examples I've given here. Event Handler Scripts Okay, now lets take a look at what the event handler scripts look like...
3 Host Event Handler (handle-master-host-event): #!/bin/sh # Only take action on hard host states... case "$2" in HARD) case "$1" in DOWN) # The master host has gone down! # We should now become the master host and take # over the responsibilities of monitoring the # network, so enable notifications... /usr/local/nagios/libexec/eventhandlers/enable_notifications UP) # The master host has recovered! # We should go back to being the slave host and # let the master host do the monitoring, so # disable notifications... /usr/local/nagios/libexec/eventhandlers/disable_notifications exit 0 Service Event Handler (handle-master-proc-event): #!/bin/sh # Only take action on hard service states... case "$2" in HARD) case "$1" in CRITICAL) # The master Nagios process is not running! # We should now become the master host and # take over the responsibility of monitoring # the network, so enable notifications... /usr/local/nagios/libexec/eventhandlers/enable_notifications WARNING) UNKNOWN) # The master Nagios process may or may not # be running.. We won't do anything here, but # to be on the safe side you may decide you # want the slave host to become the master in # these situations... OK) # The master Nagios process running again! # We should go back to being the slave host, # so disable notifications... /usr/local/nagios/libexec/eventhandlers/disable_notifications exit 0 What This Does For Us The slave host (host E) initially has notifications disabled, so it won't send out any host or service notifications while the Nagios process on the master host (host A) is still running. The Nagios process on the slave host (host E) becomes the master host when...
4 The master host (host A) goes down and the handle-master-host-event host event handler is executed. The Nagios process on the master host (host A) stops running and the handle-master-proc-event service event handler is executed. When the Nagios process on the slave host (host E) has notifications enabled, it will be able to send out notifications about any service or host problems or recoveries. At this point host E has effectively taken over the responsibility of notifying contacts of host and service problems! The Nagios process on host E returns to being the slave host when... Host A recovers and the handle-master-host-event host event handler is executed. The Nagios process on host A recovers and the handle-master-proc-event service event handler is executed. When the Nagios process on host E has notifications disabled, it will not send out notifications about any service or host problems or recoveries. At this point host E has handed over the responsibilities of notifying contacts of problems to the Nagios process on host A. Everything is now as it was when we first started! Time Lags Redundancy in Nagios is by no means perfect. One of the more obvious problems is the lag time between the master host failing and the slave host taking over. This is affected by the following... The time between a failure of the master host and the first time the slave host detects a problem The time needed to verify that the master host really does have a problem (using service or host check retries on the slave host) The time between the execution of the event handler and the next time that Nagios checks for external commands You can minimize this lag by... Ensuring that the Nagios process on host E (re)checks one or more services at a high frequency. This is done by using the check_interval and retry_interval arguments in each service definition. Ensuring that the number of host rechecks for host A (on host E) allow for fast detection of host problems. This is done by using the max_check_attempts argument in the host definition. Increase the frequency of external command checks on host E. This is done by modifying the command_check_interval option in the main configuration file. When Nagios recovers on the host A, there is also some lag time before host E returns to being a slave host. This is affected by the following... The time between a recovery of host A and the time the Nagios process on host E detects the recovery The time between the execution of the event handler on host B and the next time the Nagios process on host E checks for external commands The exact lag times between the transfer of monitoring responsibilities will vary depending on how many services you have defined, the interval at which services are checked, and a lot of pure chance. At any rate, its definitely better than nothing. Special Cases Here is one thing you should be aware of... If host A goes down, host E will have notifications enabled and take over the responsibilities of notifying contacts of problems. When host A recovers, host E will have notifications disabled. If - when host A recovers - the Nagios process on host A does not start up properly, there will be a period of time when neither host is notifying contacts of problems! Fortunately, the service check logic in Nagios accounts for this. The next time the Nagios process on host E checks the status of the Nagios process on host A, it will find that it is not running. Host E will then have notifications enabled again and take over all responsibilities of notifying contacts of problems. The exact amount of time that neither host is monitoring the network is hard to determine. Obviously, this period can be minimized by increasing the frequency of service checks (on host E) of the Nagios process on host A. The rest is up to pure chance, but the total "blackout" time shouldn't be too bad. Scenario 2 - Failover Monitoring Failover monitoring is similiar to, but slightly different than redundant monitoring (as discussed above in scenario 1). Goals The basic goal of failover monitoring is to have the Nagios process on the slave host sit idle while the Nagios process on the master host is running. If the process on the master host stops running (or if the host goes down), the Nagios process on the slave host starts monitoring everything. While the method described in scenario 1 will allow you to continue receive notifications if the master monitoring hosts goes down, it does have some pitfalls. The biggest problem is that the slave host is monitoring the same hosts and servers as the master at the same time as the master! This can cause problems with excessive traffic and load on the machines being monitored if you have a lot of services defined. Here's how you can get around that problem... Initial Program Settings
5 Disable active service checks and notifications on the slave host using the execute_service_checks and enable_notifications directives. This will prevent the slave host from monitoring hosts and services and sending out notifications while the Nagios process on the master host is still up and running. Make sure you also have the check_external_commands directive enabled on the slave host. Master Process Check Set up a cron job on the slave host that periodically (say every minute) runs a script that checks the staus of the Nagios process on the master host (using the check_nrpe plugin on the slave host and the nrpe daemon and check_nagios plugin on the master host). The script should check the return code of the check_nrpe plugin. If it returns a non-ok state, the script should send the appropriate commands to the external command file to enable both notifications and active service checks. If the plugin returns an OK state, the script should send commands to the external command file to disable both notifications and active checks. By doing this you end up with only one process monitoring hosts and services at a time, which is much more efficient that monitoring everything twice. Also of note, you don't need to define host and service handlers as mentioned in scenario 1 because things are handled differently. Additional Issues At this point, you have implemented a very basic failover monitoring setup. However, there is one more thing you should consider doing to make things work smoother. The big problem with the way things have been setup thus far is the fact that the slave host doesn't have the current status of any services or hosts at the time it takes over the job of monitoring. One way to solve this problem is to enable the ocsp command on the master host and have it send all service check results to the slave host using the nsca addon. The slave host will then have up-to-date status information for all services at the time it takes over the job of monitoring things. Since active service checks are not enabled on the slave host, it will not actively run any service checks. However, it will execute host checks if necessary. This means that both the master and slave hosts will be executing host checks as needed, which is not really a big deal since the majority of monitoring deals with service checks. That's pretty much it as far as setup goes.
Nagios in High Availability Environments
Nagios in High Availability Environments Introduction Nagios is a versatile and functional network management tool with a GUI (graphic user interface) comparable to other commercial tools. It s free software,
NRPE Documentation CONTENTS. 1. Introduction... a) Purpose... b) Design Overview... 2. Example Uses... a) Direct Checks... b) Indirect Checks...
Copyright (c) 1999-2007 Ethan Galstad Last Updated: May 1, 2007 CONTENTS Section 1. Introduction... a) Purpose... b) Design Overview... 2. Example Uses... a) Direct Checks... b) Indirect Checks... 3. Installation...
DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP LTM with the Nagios Open Source Network Monitoring System
DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP LTM with the Nagios Open Source Network Monitoring System Deploying F5 with Nagios Open Source Network Monitoring System Welcome to the F5 and Nagios deployment
Website Disaster Recovery
Website Disaster Recovery Contents Overview... 2 Disaster Preparedness for the Internet Age... 2 Some Fundamental Questions... 2 Planning Your Recovery... 3 Start with a Backup Plan... 4 Backup Commandments...
Exchange Server 2010 backup and recovery tips and tricks
Exchange Server backup and recovery tips and tricks Exchange Server backup and recovery Exchange Server A big part of your job as an Exchange Server administrator involves preparing for and recovering
An Introduction to Monitoring with Nagios
An to Monitoring with Nagios Laurent Andrey Rémi Badonnel LORIA - INRIA Grand Est ISSNSM 2008, Zurich Laurent Andrey, Rémi Badonnel An to Monitoring with Nagios 1/32 Local checks Remote checks Conclusions
How To Monitor Your Computer With Nagiostee.Org (Nagios)
Host and Service Monitoring at SLAC Alf Wachsmann Stanford Linear Accelerator Center [email protected] DESY Zeuthen, May 17, 2005 Monitoring at SLAC Alf Wachsmann 1 Monitoring at SLAC: Does not really
Tk20 Network Infrastructure
Tk20 Network Infrastructure Tk20 Network Infrastructure Table of Contents Overview... 4 Physical Layout... 4 Air Conditioning:... 4 Backup Power:... 4 Personnel Security:... 4 Fire Prevention and Suppression:...
Introduction to system monitoring with Nagios, Check_MK and Open Monitoring Distribution (OMD)
to system monitoring with, and Open Monitoring Distribution () Mensa Centro de Física de Materiales (CSIC-UPV/EHU) HPCK 14 Barcelona, 13-14th January 2014 Why monitoring? What to monitor? How to monitor?
Protecting SQL Server Databases. 1997-2008 Software Pursuits, Inc.
Protecting SQL Server Databases 1997-2008 Table of Contents Introduction... 2 Overview of the Backup Process... 2 Configuring SQL Server to Perform Scheduled Backups... 3 Configuring SureSync Relation
Network Monitoring with Nagios. Matt Gracie, Information Security Administrator Canisius College, Buffalo, NY
Network Monitoring with Nagios Matt Gracie, Information Security Administrator Canisius College, Buffalo, NY Canisius College is one of 28 Jesuit colleges in the nation and the premier private college
Availability Management Nagios overview. TEIN2 training Bangkok September 2005
1 Availability Management Nagios overview Agenda 2 Introduction Objectives Functionalities Requirement. Architecture & Operation Operation Description WEB portal Plugins and extensions Plugins description
Deploying Microsoft Operations Manager with the BIG-IP system and icontrol
Deployment Guide Deploying Microsoft Operations Manager with the BIG-IP system and icontrol Deploying Microsoft Operations Manager with the BIG-IP system and icontrol Welcome to the BIG-IP LTM system -
Nagios. cooler than it looks. Wednesday, 31 October 2007
Nagios cooler than it looks 1 Outline sysadmin 101 Nagios Overview Installing nagios NRPE / NSCA Other Stuff Questions 2 Sysadmin 101 Every sysadmin needs a decent toolkit... 3 Sysadmin 101 Every sysadmin
Monitoring a Linux Mail Server
Monitoring a Linux Mail Server Mike Weber [email protected]] Various Methods to Monitor Mail Server Public Ports SMTP on Port 25 POPS on Port 995 IMAPS on Port 993 SNMP Amavis on Port 10024 Reinjection
Netwatch Installation For Windows
Netwatch Installation For Windows Netwatch is a program designed to monitor a Powerware UPS unit using the ConnectUPS-Web or Bestlink-Web interfaces and MGE UPS unit using the Network Management Card over
Perforce Backup Strategy & Disaster Recovery at National Instruments
Perforce Backup Strategy & Disaster Recovery at National Instruments Steven Lysohir National Instruments Perforce User Conference April 2005-1 - Contents 1. Introduction 2. Development Environment 3. Architecture
Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008
Course 50400A: Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008 Length: 5 Days Language(s): English Audience(s): IT Professionals Level: 300 Technology:
Nagios XI Mass Deploy NSClient++
The Industry Standard in IT Infrastructure Monitoring Purpose This document describes how to mass deploy the NSClient++ agent. To accomplish this goal, we'll show how Microsoft's SCCM 2007 can be used
Vulnerability in Magento's implementation of PayPal
NBS System: Advisory on the Magento / PayPal vulnerability 19/04/2012 by Antonin le Faucheux & Philippe Humeau Affected versions: EE pre 1.10.1 & CE pre 1.5, on sites offering PayPal checkout http://www.nbs
Enterprise Application Monitoring with
Enterprise Application Monitoring with 11/10/2007 Presented by James Peel [email protected] / www.altinity.com 1 Who am I? James Peel - [email protected] Job: Managing Director of Altinity
MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008
MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008 Table of Contents Introduction Audience At Completion Prerequisites Microsoft Certified Professional Exams Student Materials
Firewall Port Handling in TENA Applications
Firewall Port Handling in TENA Applications The purpose of this report is to describe the manner in which TENA applications handle communications using TCP. This report will also present some insight for
How To Configure Virtual Host with Load Balancing and Health Checking
How To Configure Virtual Host with Load How To Configure Virtual Host with Load Balancing and Health Checking Balancing and Health Checking Applicable Version: 10.02.0 Build 473 onwards Overview This article
September 21 st, 2006. Ethan Galstad. [email protected]
Version 3.0 and Beyond September 21 st, 2006 [email protected] Where Things Currently Stand Nagios 3.x Daemon: Coding 90% completed Lots of internal improvements Documentation needs to be written CVS code
Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.
CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files
Linux Syslog Messages in IBM Director
Ever want those pesky little Linux syslog messages (/var/log/messages) to forward to IBM Director? Well, it s not built in, but it s pretty easy to setup. You can forward syslog messages from an IBM Director
Introduction. What is Unbound and what is DNSSEC. Installation. Manual for Unbound on Windows. W.C.A. Wijngaards, NLnet Labs, October 2010
Manual for Unbound on Windows W.C.A. Wijngaards, NLnet Labs, October 2010 Introduction This manual aims to provide information about the Unbound server on the Windows platform. Included is installation,
EVALUATION ONLY. WA2088 WebSphere Application Server 8.5 Administration on Windows. Student Labs. Web Age Solutions Inc.
WA2088 WebSphere Application Server 8.5 Administration on Windows Student Labs Web Age Solutions Inc. Copyright 2013 Web Age Solutions Inc. 1 Table of Contents Directory Paths Used in Labs...3 Lab Notes...4
2011 ithemes Media LLC. All rights reserved in all media. May be shared with copyright and credit left intact.!
Meet BackupBuddy. ithemes Media, LLC was founded in 2008 by Cory Miller, a former newspaper journalist and public relations/communication practitioner, turned freelance moonlighting web designer, turned
MATLAB Distributed Computing Server with HPC Cluster in Microsoft Azure
MATLAB Distributed Computing Server with HPC Cluster in Microsoft Azure Introduction This article shows you how to deploy the MATLAB Distributed Computing Server (hereinafter referred to as MDCS) with
Nagios XI - NRPE Troubleshooting and Common Solutions
Purpose The Industry Standard in IT Infrastructure Monitoring This document describes how to troubleshoot NRPE (Nagios Remote Plugin Executor) agent issues in Nagios XI. NRPE is most commonly used to monitor
Introduction to Open Atrium s workflow
Okay welcome everybody! Thanks for attending the webinar today, my name is Mike Potter and we're going to be doing a demonstration today of some really exciting new features in open atrium 2 for handling
LT Auditor+ 2013. Windows Assessment SP1 Installation & Configuration Guide
LT Auditor+ 2013 Windows Assessment SP1 Installation & Configuration Guide Table of Contents CHAPTER 1- OVERVIEW... 3 CHAPTER 2 - INSTALL LT AUDITOR+ WINDOWS ASSESSMENT SP1 COMPONENTS... 4 System Requirements...
3. If your drive is a laptop or notebook drive, please go to section I.II.I. Laptop Drive.
Step by Step: Doing a Data Recovery with GetDataBack Here's how you do everything right when doing a data recovery with GetDataBack: Do not write anything anymore to the drive you want to recover the data
ICINGA2 OPEN SOURCE MONITORING
www.icinga.org ICINGA2 OPEN SOURCE MONITORING backspace 08.12.2015 Blerim Sheqa Systems Engineer Open Source @bobapple ICINGA2 INTRODUCTION Icinga Nagios fork Icinga2 rewrite rethink Server Network Windows
Network Monitoring with Xian Network Manager
Network Monitoring with Xian Network Manager Did you ever got caught by surprise because of a network problem and had downtime as a result? What about monitoring your network? Network downtime or network
Snow Inventory. Installing and Evaluating
Snow Inventory Installing and Evaluating Snow Software AB 2002 Table of Contents Introduction...3 1. Evaluate Requirements...3 2. Download Software...3 3. Obtain License Key...4 4. Install Snow Inventory
Configuring the Server(s)
Introduction Configuring the Server(s) IN THIS CHAPTER. Introduction. Overview of Machine Configuration Options. Installing and Configuring FileMaker Server. Testing Your Installation. Hosting Your File.
FileMaker Server 11. FileMaker Server Help
FileMaker Server 11 FileMaker Server Help 2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc. registered
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/
High Availability for VMware GSX Server
High Availability for GSX Server High Availability for GSX Server Revision 1.1.0 published January 2005, GeoCluster, and NSI are registered trademarks of NSI Software, Inc. Balance is a trademark of NSI
Snapt Redundancy Manual
Snapt Redundancy Manual Version 2.0 p. 1 Contents Chapter 1: Introduction... 3 Installation... 3 Chapter 2: Settings... 4 Chapter 3: Server Management... 6 Chapter 4: Virtual IP Management... 7 Chapter
20417-Upgrading Your Skills to MCSA Windows Server 2012
Course Outline 20417-Upgrading Your Skills to MCSA Windows Server 2012 Duration: 5 day (30 hours) Target Audience: This course is intended for Information Technology (IT) Professionals who are already
NASA Workflow Tool. User Guide. September 29, 2010
NASA Workflow Tool User Guide September 29, 2010 NASA Workflow Tool User Guide 1. Overview 2. Getting Started Preparing the Environment 3. Using the NED Client Common Terminology Workflow Configuration
Backing Up TestTrack Native Project Databases
Backing Up TestTrack Native Project Databases TestTrack projects should be backed up regularly. You can use the TestTrack Native Database Backup Command Line Utility to back up TestTrack 2012 and later
An idea on how to monitor growth of database tables in an system using Bischeck
An idea on how to monitor growth of database tables in an system using Bischeck Introduction Anders Håål [email protected] The background to this solution is a customer that has a need to monitor the
Strengths and Limitations of Nagios as a Network Monitoring Solution
Strengths and Limitations of Nagios as a Network Monitoring Solution By Sophon Mongkolluksamee http://inms.in.th 1 Agenda o Network monitoring software o About Nagios o Limitations of Nagios o Improve
RAID HARDWARE. On board SATA RAID controller. RAID drive caddy (hot swappable) SATA RAID controller card. Anne Watson 1
RAID HARDWARE On board SATA RAID controller SATA RAID controller card RAID drive caddy (hot swappable) Anne Watson 1 RAID The word redundant means an unnecessary repetition. The word array means a lineup.
Using Windows 8's "hidden" backup to clone and recover your whole PC
Using Windows 8's "hidden" backup to clone and recover your whole PC Ability to create System Images was buried in Windows 8, but not eliminated. by Jon Brodkin - Dec 16 2012 The blue screen of bringing
THE CHALLENGE OF ADMINISTERING WEBSITES OR APPLICATIONS THAT REQUIRE 24/7 ACCESSIBILITY
THE CHALLENGE OF ADMINISTERING WEBSITES OR APPLICATIONS THAT REQUIRE 24/7 ACCESSIBILITY As the constantly growing demands of businesses and organizations operating in a global economy cause an increased
Jazz Source Control Best Practices
Jazz Source Control Best Practices Shashikant Padur RTC SCM Developer Jazz Source Control Mantra The fine print Fast, easy, and a few concepts to support many flexible workflows Give all users access to
Introduction. What is RAID? The Array and RAID Controller Concept. Click here to print this article. Re-Printed From SLCentral
Click here to print this article. Re-Printed From SLCentral RAID: An In-Depth Guide To RAID Technology Author: Tom Solinap Date Posted: January 24th, 2001 URL: http://www.slcentral.com/articles/01/1/raid
Enterprise Architecture Office Resource Document Design Note - Domain Name System (DNS)
Date: 8/27/2012 Enterprise Architecture Office Resource Document Design Note - Domain Name System (DNS) Table of Contents 1 Overview...2 1.1 Other Resources...2 1.1.1 State of Minnesota Standards and Guidelines...2
WordPress File Monitor Plus Plugin Configuration
WordPress File Monitor Plus Plugin Configuration Open Source Varsity To configure the WordPress file monitor plus plugin on your WordPress driven Blog / website, login to WordPress as administrator, by
High Availability Solutions for MySQL. Lenz Grimmer <[email protected]> 2008-08-29 DrupalCon 2008, Szeged, Hungary
High Availability Solutions for MySQL Lenz Grimmer 2008-08-29 DrupalCon 2008, Szeged, Hungary Agenda High Availability in General MySQL Replication MySQL Cluster DRBD Links/Tools Why
PrivateWire Gateway Load Balancing and High Availability using Microsoft SQL Server Replication
PrivateWire Gateway Load Balancing and High Availability using Microsoft SQL Server Replication Introduction The following document describes how to install PrivateWire in high availability mode using
MapGuide Open Source Repository Management Back up, restore, and recover your resource repository.
MapGuide Open Source Repository Management Back up, restore, and recover your resource repository. Page 1 of 5 Table of Contents 1. Introduction...3 2. Supporting Utility...3 3. Backup...4 3.1 Offline
RAID Basics Training Guide
RAID Basics Training Guide Discover a Higher Level of Performance RAID matters. Rely on Intel RAID. Table of Contents 1. What is RAID? 2. RAID Levels RAID 0 RAID 1 RAID 5 RAID 6 RAID 10 RAID 0+1 RAID 1E
Network Security: Workshop. Dr. Anat Bremler-Barr. Assignment #2 Analyze dump files Solution Taken from www.chrissanders.org
1.pcap - File download Network Security: Workshop Dr. Anat Bremler-Barr Assignment #2 Analyze dump files Solution Taken from www.chrissanders.org Downloading a file is a pretty basic function when described
Setting Up a CLucene and PostgreSQL Federation
Federated Desktop and File Server Search with libferris Ben Martin Abstract How to federate CLucene personal document indexes with PostgreSQL/TSearch2. The libferris project has two major goals: mounting
Network Interface Failover using FONA
Network Interface Failover using FONA Created by Adam Kohring Last updated on 2014-10-20 12:30:12 PM EDT Guide Contents Guide Contents Overview Prerequisites Wiring Raspberry Pi to Fona ifacefailover Service
PowerPanel Business Edition USER MANUAL
USER MANUAL Rev. 0.9 2007/10/26 Copyright 2006-2007 Cyber Power Systems, Inc. All rights reserved. PowerPanel Business Edition USER S MANUAL PowerPanel Business Edition provides power management Services.
Monitoring and Scaling My Application
Monitoring and Scaling My Application In the last chapter, we looked at how we could use Amazon's queuing and notification services to add value to our existing application. We looked at how we could use
Transcription. Crashplan vs Backblaze. Which service should you pick the short version
Transcription Crashplan vs Backblaze Hey and welcome to cloudwards.net and another exciting video of two major unlimited online backup services namely Backblaze and CrashPlan or CrashPlan or Backblaze.
Command lines displayed below are intended to be single line commands. Service Command Line Plugin Command Line Extended Info. Name=_Total!6000!
WMI IIS WMI Internet Information services (IIS) Profile This profile monitors IIS services on a Windows server using Windows Management Instrumentation (WMI). Nagios Remote Plugin Executor (NRPE) is used
F Cross-system event-driven scheduling. F Central console for managing your enterprise. F Automation for UNIX, Linux, and Windows servers
F Cross-system event-driven scheduling F Central console for managing your enterprise F Automation for UNIX, Linux, and Windows servers F Built-in notification for Service Level Agreements A Clean Slate
Attix5 Pro Storage Platform
Attix5 Pro Storage Platform V6.0 User Manual Cover for Microsoft Windows Your guide to configuring the Attix5 Pro Storage Platform. SERVER EDITION V6.0 for MICROSOFT WINDOWS Copyright Notice and Proprietary
Managing Remote Access
VMWARE TECHNICAL NOTE VMware ACE Managing Remote Access This technical note explains how to use VMware ACE to manage remote access through VPN to a corporate network. This document contains the following
Rsync: The Best Backup System Ever
LinuxFocus article number 326 http://linuxfocus.org Rsync: The Best Backup System Ever by Brian Hone About the author: Brian Hone is a system administrator and software developer at
Availability Guide for Deploying SQL Server on VMware vsphere. August 2009
Availability Guide for Deploying SQL Server on VMware vsphere August 2009 Contents Introduction...1 SQL Server 2008 with vsphere and VMware HA/DRS...2 Log Shipping Availability Option...4 Database Mirroring...
Cloud Server powered by Mac OS X. Getting Started Guide. Cloud Server. powered by Mac OS X. AKJZNAzsqknsxxkjnsjx Getting Started Guide Page 1
Getting Started Guide Cloud Server powered by Mac OS X Getting Started Guide Page 1 Getting Started Guide: Cloud Server powered by Mac OS X Version 1.0 (02.16.10) Copyright 2010 GoDaddy.com Software, Inc.
A Guide To Evaluating a Bug Tracking System
A Guide To Evaluating a Bug Tracking System White Paper By Stephen Blair, MetaQuest Software Published: October, 2004 Abstract Evaluating a bug tracking system requires that you understand how specific
Hyper-V backup implementation guide
Hyper-V backup implementation guide A best practice guide for Hyper-V backup administrators. www.backup-assist.ca Contents 1. Planning a Hyper-V backup... 2 Hyper-V backup considerations... 2 2. Hyper-V
Deploying System Center 2012 R2 Configuration Manager
Deploying System Center 2012 R2 Configuration Manager This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.
10 How to Accomplish SaaS
10 How to Accomplish SaaS When a business migrates from a traditional on-premises software application model, to a Software as a Service, software delivery model, there are a few changes that a businesses
Active Directory Recovery: What It Is, and What It Isn t
Active Directory Recovery: What It Is, and What It Isn t Abstract Does your Active Directory recovery plan address all of the most common failure scenarios? This white paper explains how to handle each
Online Backup by Mozy. Common Questions
Online Backup by Mozy Common Questions Document Revision Date: June 29, 2012 Online Backup by Mozy Common Questions 1 What is Online Backup by Mozy? Online Backup by Mozy is a secure online data backup
Load Balancing and Clustering in EPiServer
Load Balancing and Clustering in EPiServer Abstract This white paper describes the main differences between load balancing and clustering, and details EPiServer's possibilities of existing in a clustered
Monitoring Software Services registered with science.canarie.ca
Monitoring Software Services registered with.canarie.ca Introduction The software registry at.canarie.ca monitors each of the contributed services via the API defined in Research Service Support for the
Database Administration
Unified CCE, page 1 Historical Data, page 2 Tool, page 3 Database Sizing Estimator Tool, page 11 Administration & Data Server with Historical Data Server Setup, page 14 Database Size Monitoring, page 15
Cluster to Cluster Failover Using Double-Take
Cluster to Cluster Failover Using Double-Take Cluster to Cluster Failover Using Double-Take Revision 2.2.0 published March 2004 Double-Take, GeoCluster and NSI are registered trademarks of NSI Software,
NETWORK MONITOR. Some high-end network monitoring. Watching your systems with Nagios COVER STORY. What Is Nagios? Installing the Server and Plugins
COVER STORY Nagios Workshop Watching your systems with Nagios NETWORK MONITOR Nagios monitors your network and provides early warning for problems with hosts and services. BY JULIAN HEIN Some high-end
ACS Backup and Restore
Table of Contents Implementing a Backup Plan 3 What Should I Back Up? 4 Storing Data Backups 5 Backup Media 5 Off-Site Storage 5 Strategies for Successful Backups 7 Daily Backup Set A and Daily Backup
Running the Tor client on Mac OS X
Running the Tor client on Mac OS X Note that these are the installation instructions for running a Tor client on Mac OS X. If you want to relay traffic for others to help the network grow (please do),
Upgrading Your Skills to MCSA Windows Server 2012
About this Course Upgrading Your Skills to MCSA Windows Get hands-on instruction and practice configuring and implementing new features and functionality in Windows, including Windows R2, in this five-day
Monitoring Clearswift Gateways with SCOM
Technical Guide Version 01 28/11/2014 Documentation Information File Name Document Author Document Filename Monitoring the gateways with _v1.docx Iván Blesa Monitoring the gateways with _v1.docx Issue
Disaster Recovery Remote off-site Storage for single server environment
. White Paper Disaster Recovery Remote off-site Storage for single server environment When it comes to protecting your data there is no second chance January 1, 200 Prepared by: Bill Schmidley CompassPoint
Maintaining a Microsoft SQL Server 2008 Database
Maintaining a Microsoft SQL Server 2008 Database Course 6231A: Five days; Instructor-Led Introduction Elements of this syllabus are subject to change. This five-day instructor-led course provides students
Configuring the BIG-IP LTM v11 for Oracle Database and RAC
Deployment Guide DOCUMENT VERSION 1.0 What s inside: 2 Prerequisites and configuration notes 2 Configuration example 3 Configuring the BIG- IP LTM for Oracle Database 8 Appendix A: Instance name switching
Introducing the Adafruit Bluefruit LE Sniffer
Introducing the Adafruit Bluefruit LE Sniffer Created by Kevin Townsend Last updated on 2015-06-25 08:40:07 AM EDT Guide Contents Guide Contents Introduction FTDI Driver Requirements Using the Sniffer
Updating Your Network Infrastructure and Active Directory Technology Skills to Windows Server 2008
MOC6416 Updating Your Network Infrastructure and Active Directory Technology Skills to Windows Server 2008 About this Course This five-day instructor-led course provides students with the knowledge and
Chapter 1 - Web Server Management and Cluster Topology
Objectives At the end of this chapter, participants will be able to understand: Web server management options provided by Network Deployment Clustered Application Servers Cluster creation and management
Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca!
Quick Start Guide Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! How to Setup a File Server with Cerberus FTP Server FTP and SSH SFTP are application protocols
Penetration Testing Walkthrough
Penetration Testing Walkthrough Table of Contents Penetration Testing Walkthrough... 3 Practical Walkthrough of Phases 2-5... 4 Chose Tool BackTrack (Armitage)... 5 Choose Target... 6 Phase 2 - Basic Scan...
