System Administration
|
|
|
- Rachel Mathews
- 10 years ago
- Views:
Transcription
1 Performance Monitoring For a server, it is crucial to monitor the health of the machine You need not only real time data collection and presentation but offline statistical analysis as well Characteristics of a computer's health: Load Disk usage Process accounting
2 Load Load average measures the number of processes in the run queue, i.e. the number of processes waiting to use the CPU Ideally, load should be 1 or less Several ways to obtain load averages: uptime, w, ps, top all report load averages cat /proc/load tload, xload present graphical displays of load
3 Performance Monitoring Load Exercise Run xload and start an intensive process # xload update 1 scale 2 & # ooimpress &
4 df [file or file system] System Performance Monitoring Disk Usage Disks do no good if they are full This is especially true for server processes. If a log file cannot be written, some daemons may crash du gives a report of disk usage. It will descend all directories unless the s option is given df gives a report of disk usage and the amount of free space available
5 Process Accounting THE most important thing to monitor is what is running on your computer Processes are tasks being executed by your CPU Each process is allocated space in the process table which tracks information the CPU needs to schedule and swap a task for CPU and memory usage Information for processes currently in the process table can be retrieved with the ps and top commands pstree is also very useful for following the process ownership
6 Process Accounting ps gives a variety of output depending on the options selected. Most useful options A show all processes a show only processes connected with a tty x show only processes disconnected from a tty u display the effective user name o user defined format
7 Process Accounting Example ps output: <lister> ps xua root ? S Jan13 0:04 init edsall pts/8 S 14:03 0:00 sleep 300 edsall pts/10 R 14:07 0:00 ps xua giving the following information Username Process ID (PID) Percent CPU being used Percent memory being used Virtual memory size Resident memory usage Associated TTY Current process status Date/time the process was started System tme used by the process Name of the command
8 State codes First letter: R running S interruptible sleep D uninterruptible sleep T stopped Z zombie Second letter: + foreground process s session leader N low priority ( nice ) < high priority (not nice) l multithreaded
9 Performance Monitoring Process Accounting ps only gives a one time snapshot of the processes in the process table top gives process information which updates at regular intervals. top also allows you to interactively sort the information being displayed top presents other useful system information including the system load average and memory usage
10 Performance Monitoring Process Accounting Example top output: 8:05pm up 8 days, 2:31, 1 user, load average: 0.54, 0.55, processes: 56 sleeping, 1 running, 0 zombie, 0 stopped CPU states: 1.9% user, 2.3% system, 0.0% nice, 95.6% idle Mem: K av, K used, K free, 46804K shrd, K buff Swap: K av, 4124K used, K free K cached PID USER PRI NI SIZE RSS SHARE STAT LIB %CPU %MEM TIME COMMAND root R :00 top nobody M 4492 S :06 httpd nobody M 4532 S :03 httpd nobody M 4512 S :03 httpd nobody M 4500 S :06 httpd nobody M 4532 S :06 httpd nobody M 4496 S :03 httpd nobody M 4504 S :03 httpd root S :00 in.rlogind
11 Performance Monitoring Process Accounting Run ps aux # ps aux Run top # top Exercises
12 /proc File System On Linux systems (and many other operating systems), ps and top actually read their data from the /proc file system /proc is a mirror of the kernel configuration and what is currently memory resident As a result we can not only read the state of the system but modify its configuration in real time Information in /proc is stored in files in a hierarchical manner based on the aspect of the system they describe
13 /proc File System Examples: loadavg file containing System load average meminfo file containing the number of total, used and free bytes of memory and swap area cpuinfo file containing recognized processor parameters net Directory containing descriptions about the network layer(s)
14 /proc File System Information on current processes is stored in directories corresponding to the PID of the process. Example: The init command, corresponding to PID = 1 has the following subdirectories in /proc/1: cmdline cwd environ exe fd maps mem mounts root stat statm status # cat /proc/1/environ HOME=/ TERM=linux
15 Monitoring the health of your computer can be enhanced by collecting data and analyzing later to look for trends. There are many ways to do this: Write your own packages Use an Open Source package Use a commercial package Examples: Tivoli Ecotools Candle
16 Before writing your own package, look to see if someone else has already done the work for you. Many Open Source packages available psacct sysstat Hobbit
17 psacct The psacct package provides simple process accounting and process summary information. Data collection is initiated with the command accton These data can later be analyzed with the commands ac, lastcomm and sa, the most useful of which is sa
18 Performance Analysis sysstat The sysstat package, which comes by default with most recent Red Hat Linux distributions, collects an enormous amount of data on system resources including paging activity interrupts network activity memory
19 Performance Analysis sysstat Several times a day, cron runs the commands in the /etc/cron.d/sysstat crontab to collects the data. The same crontab analyzes the collected data once a day. Results can be found in /var/log/sa/ and reports can be generated with the sar command.
20 Performance Analysis sysstat Exercise Look at the contents of /var/log/sa # ls l /var/log/sa Run the sar command to get a report # /usr/bin/sar A more
21 Hobbit Hobbit is an open source pacakge available to most non profit groups for free. Hobbit not only generates history graphs, it also, and most prominently, is used as a real time performance monitor IT Services uses Hobbit: More information can be found at
22 Log Files Many processes running on the system generate log files Linux stores all of its system log files in a special directory /var Log files can quickly fill the partition on which they are stored Tip create a separate partition for /var
23 Log Files One important system logging process syslogd. Many processes make a syslog call to write information to the system log void openlog(char *ident, int option, int facility); void syslog(int priority, char *format,...); void closelog(void); The processes are always writing. Whether you wish to see it depends on how you configure syslogd
24 Log Files syslogd is configured with the file /etc/syslog.conf Each line consists of a selector and an action for that selector # Log anything (except mail) of level info or higher. # Don't log private authentication messages! *.info;mail.none;cron.none /var/log/messages
25 Log Files # Log anything (except mail) of level info or higher. # Don't log private authentication messages! *.info;mail.none;cron.none /var/log/messages The selector identifies the facility which may request logging and the priority level at which it may want logging. See the correlation? void openlog(char *ident, int option, int facility); void syslog(int priority, char *format,...); For each selector an action is specified. In most cases, the action is the name of a file to which the messages will be logged
26 Remote Log Files syslogd can log its information to a remote server: In this case, syslogd will send everything to the syslog daemon on the remote servers remotelog1 and remotelog2 If the bad guys tamper with log files on your server, you have a pristine copy elsewhere that might show their break in
27 Monitoring Your Log Files logwatch Daily analysis of logfiles can be e mailed to you Global and local configuration Can analyze on a per service basis In /etc/log.d: Scripts for services and filters they use Config files for services
28 Monitoring Your Log Files logwatch ######## LogWatch (02/18/03)######## Processing Initiated: Mon Mar 26 11:33: Date Range Processed: yesterday Detail Level of Output: 0 Logfiles for Host: webmail 1.iastate.edu ####################################### Connections (secure log) Begin Connections: Service shell: : 4 Time(s) Connections (secure log) End
29 Reining in Your Log Files logrotate Wouldn't it be nice if we could delete old log files or move them elsewhere? Otherwise, our disks may fill. logrotate can: Back up Compress Mail logfiles subject to a variety of constraints you specify
30 Reining in Your Log Files logrotate logrotate is configured via a set of configuration files Generally one main config file (/etc/logrotate.conf) is used to include other config files in /etc/logrotate.d The config files contain the name of the file to be acted on and directives which specify the actions to be taken, how often to take these actions, etc
31 Reining in Your Log Files logrotate # Logrotate file for psacct RPM /var/account/pacct { prerotate /usr/sbin/accton endscript compress notifempty daily rotate 31 create 0600 root root postrotate /usr/sbin/accton /var/account/pacct endscript }
Linux System Administration. System Administration Tasks
System Administration Tasks User and Management useradd - Adds a new user account userdel - Deletes an existing account usermod - Modifies an existing account /etc/passwd contains user name, user ID #,
Facultat d'informàtica de Barcelona Univ. Politècnica de Catalunya. Administració de Sistemes Operatius. System monitoring
Facultat d'informàtica de Barcelona Univ. Politècnica de Catalunya Administració de Sistemes Operatius System monitoring Topics 1. Introduction to OS administration 2. Installation of the OS 3. Users management
Syslog & xinetd. Stephen Pilon
Syslog & xinetd Stephen Pilon What create log files? Logging Policies Throw away all data immediately Reset log files at periodic intervals Rotate log files, keeping data for a fixed time Compress and
CSE 265: System and Network Administration
CSE 265: System and Network Administration If you aren't measuring it, you aren't managing it. Service Monitoring Syslog and Log files Historical data Real-time monitoring Alerting Active monitoring systems
Chapter 10: System monitoring and logging. Chapter 10 System monitoring and logging
Chapter 1: System monitoring and logging Chapter 1 System monitoring and logging Last revised: 19/7/24 Chapter 1 Outline In this chapter we will learn how to: Monitor system load Monitor disk usage Monitor
Red Hat Linux Administration II Installation, Configuration, Software and Troubleshooting
Course ID RHL200 Red Hat Linux Administration II Installation, Configuration, Software and Troubleshooting Course Description Students will experience added understanding of configuration issues of disks,
Monitoring Linux with native tools
Monitoring Linux with native tools Robert Andresen 30th Annual International Conference of The Computer Measurement Group, Inc. December 5-10, 2004 Las Vegas, Nevada USA Linux is gaining interest as a
System Resources. To keep your system in optimum shape, you need to be CHAPTER 16. System-Monitoring Tools IN THIS CHAPTER. Console-Based Monitoring
CHAPTER 16 IN THIS CHAPTER. System-Monitoring Tools. Reference System-Monitoring Tools To keep your system in optimum shape, you need to be able to monitor it closely. Such monitoring is imperative in
Linux Syslog Messages in IBM Director
Ever want those pesky little Linux syslog messages (/var/log/messages) to forward to IBM Director? Well, it s not built in, but it s pretty easy to setup. You can forward syslog messages from an IBM Director
The System Monitor Handbook. Chris Schlaeger John Tapsell Chris Schlaeger Tobias Koenig
Chris Schlaeger John Tapsell Chris Schlaeger Tobias Koenig 2 Contents 1 Introduction 6 2 Using System Monitor 7 2.1 Getting started........................................ 7 2.2 Process Table.........................................
CSE/ISE 311: Systems Administra5on Logging
Logging Por$ons courtesy Ellen Liu Outline Introduc$on Finding log files Syslog: the system event logger Linux logrotate tool Condensing log files to useful informa$on Logging policies 13-2 Who and Why
Topics. CIT 470: Advanced Network and System Administration. Logging Policies. System Logs. Throwing Away. How to choose a logging policy?
Topics CIT 470: Advanced Network and System Administration Logging 1. System logs 2. Logging policies 3. Finding logs 4. Syslog 5. Syslog servers 6. Log monitoring CIT 470: Advanced Network and System
Red Hat System Administration 1(RH124) is Designed for IT Professionals who are new to Linux.
Red Hat Enterprise Linux 7- RH124 Red Hat System Administration I Red Hat System Administration 1(RH124) is Designed for IT Professionals who are new to Linux. This course will actively engage students
Using SNMP with Content Gateway (not V-Series)
Using SNMP with Content Gateway (not V-Series) Topic 60035 / Updated: 9-May-2011 Applies To: Websense Web Security Gateway 7.6.x Websense Web Security Gateway Anywhere 7.6.x Websense Content Gateway 7.6.x
Linux System Administration on Red Hat
Linux System Administration on Red Hat Kenneth Ingham September 29, 2009 1 Course overview This class is for people who are familiar with Linux or Unix systems as a user (i.e., they know file manipulation,
Using an Open Source Framework to Catch the Bad Guy. Norman Mark St. Laurent Senior Solutions Architect, Red Hat 06.28.12
Using an Open Source Framework to Catch the Bad Guy Norman Mark St. Laurent Senior Solutions Architect, Red Hat 06.28.12 Agenda Audit Log Management Infrastructure Establishing Policies and Procedures
Partitioning. Files on the Hard Drive. Administration of Operating Systems DO2003. Partition = Binder with index. Write file = Insert document
Administration of Operating Systems DO2003 Mounting the file structure Devices Wecksten, Mattias 2008 Partitioning Wecksten, Mattias 2008 Files on the Hard Drive Partition = Binder with index Write file
Distributed Computing under Linux
Distributed Computing under Linux Lars Lindbom and E. Niclas Jonsson Division of Pharmacokinetics and Drug Therapy Department of Pharmaceutical Biosciences Uppsala University Overview What is Distributed
Performance monitoring. in the GNU/Linux environment. Linux is like a wigwam - no Windows, no Gates, Apache inside!
1 Performance monitoring in the GNU/Linux environment Linux is like a wigwam - no Windows, no Gates, Apache inside! 2 1 Post-conditions To be familiar with some performance-tuning options To be able to
VIRTUALIZATION AND CPU WAIT TIMES IN A LINUX GUEST ENVIRONMENT
VIRTUALIZATION AND CPU WAIT TIMES IN A LINUX GUEST ENVIRONMENT James F Brady Capacity Planner for the State Of Nevada [email protected] The virtualization environment presents the opportunity to better
SLURM Resources isolation through cgroups. Yiannis Georgiou email: [email protected] Matthieu Hautreux email: matthieu.hautreux@cea.
SLURM Resources isolation through cgroups Yiannis Georgiou email: [email protected] Matthieu Hautreux email: [email protected] Outline Introduction to cgroups Cgroups implementation upon
Linux logging and logfiles monitoring with swatch
Linux logging and logfiles monitoring with swatch, wire.less.dk edit: November 2009, Pacnog6 http://creativecommons.org/licenses/by-nc-sa/3.0/ 1 Agenda Linux logging The most important logs Swatch and
These sub-systems are all highly dependent on each other. Any one of them with high utilization can easily cause problems in the other.
Abstract: The purpose of this document is to describe how to monitor Linux operating systems for performance. This paper examines how to interpret common Linux performance tool output. After collecting
How To Analyze Logs On Aloha On A Pcode On A Linux Server On A Microsoft Powerbook (For Acedo) On A Macbook Or Ipad (For An Ubuntu) On An Ubode (For Macrocess
Application Note Analyze ALOHA s HAProxy logs with halog Document version: v1.1 Last update: 3rd September 2013 Purpose Being able to analyze logs generated by the ALOHA Load-Balancer stored in a third
syslog - centralized logging
syslog - centralized logging David Morgan A logging system Conforming programs emit categorized messages Messages are candidates for logging syslog handles the logging performed by syslogd per /etc/syslog.conf
CPSC 2800 Linux Hands-on Lab #7 on Linux Utilities. Project 7-1
CPSC 2800 Linux Hands-on Lab #7 on Linux Utilities Project 7-1 In this project you use the df command to determine usage of the file systems on your hard drive. Log into user account for this and the following
Typeset in L A TEX from SGML source using the DocBuilder-0.9.8 Document System.
OS Mon version 2.1 Typeset in L A TEX from SGML source using the DocBuilder-0.9.8 Document System. Contents 1 OS Mon Reference Manual 1 1.1 os mon............................................ 4 1.2 cpu
Linux Security Ideas and Tips
Linux Security Ideas and Tips Hugh Brown Sr. Systems Administrator ITS Enterprise Infrastructure University of Iowa October 8, 2014 Hugh Brown (University of Iowa) Linux Security Ideas and Tips October
CYAN SECURE WEB APPLIANCE. User interface manual
CYAN SECURE WEB APPLIANCE User interface manual Jun. 13, 2008 Applies to: CYAN Secure Web 1.4 and above Contents 1 Log in...3 2 Status...3 2.1 Status / System...3 2.2 Status / Network...4 Status / Network
20 Command Line Tools to Monitor Linux Performance
20 Command Line Tools to Monitor Linux Performance 20 Command Line Tools to Monitor Linux Performance It s really very tough job for every System or Network administrator to monitor and debug Linux System
CIT 470: Advanced Network and System Administration. Topics. Performance Monitoring. Performance Monitoring
CIT 470: Advanced Network and System Administration Performance Monitoring CIT 470: Advanced Network and System Administration Slide #1 Topics 1. Performance monitoring. 2. Performance tuning. 3. CPU 4.
MONITORING PERFORMANCE IN WINDOWS 7
MONITORING PERFORMANCE IN WINDOWS 7 Performance Monitor In this demo we will take a look at how we can use the Performance Monitor to capture information about our machine performance. We can access Performance
TOP(1) Linux User s Manual TOP(1)
NAME top display top CPU processes SYNOPSIS top [ ] [ddelay] [ppid] [q][c][c][s][s][i][niter] [b] DESCRIPTION top provides an ongoing look at processor activity in real time. It displays a listing of the
Server Management Tools (ASMT)
1 Auspex Server Management Tools (ASMT) Introduction This module presents the Auspex Server Management Tools, or ASMT. This is a graphical interface which allows you to perform most NetServer system administration
RH033 Red Hat Linux Essentials or equivalent experience with Red Hat Linux..
RH131 Red Hat Linux System Administration Course Summary For users of Linux (or UNIX) who want to start building skills in systems administration on Red Hat Linux, to a level where they can attach and
OS Thread Monitoring for DB2 Server
1 OS Thread Monitoring for DB2 Server Minneapolis March 1st, 2011 Mathias Hoffmann ITGAIN GmbH [email protected] 2 Mathias Hoffmann Background Senior DB2 Consultant Product Manager for SPEEDGAIN
Monitoring IBM HMC Server. eg Enterprise v6
Monitoring IBM HMC Server eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced
Using esxtop to Troubleshoot Performance Problems
VMWARE TECHNICAL TROUBLESHOOTING NOTE VMware ESX Server 2 Using esxtop to Troubleshoot Performance Problems The VMware esxtop tool provides a real-time view (updated every five seconds, by default) of
Cisco Networking Academy Program Curriculum Scope & Sequence. Fundamentals of UNIX version 2.0 (July, 2002)
Cisco Networking Academy Program Curriculum Scope & Sequence Fundamentals of UNIX version 2.0 (July, 2002) Course Description: Fundamentals of UNIX teaches you how to use the UNIX operating system and
Extreme Linux Performance Monitoring Part II
I. Introducing IO Monitoring Disk IO subsystems are the slowest part of any Linux system. This is due mainly to their distance from the CPU and the fact that disks require the physics to work (rotation
Topics. CIT 470: Advanced Network and System Administration. Why Monitoring? Why Monitoring? Historical Monitoring Processes. Historical Monitoring
Topics CIT 470: Advanced Network and System Administration System Monitoring 1. Why monitoring? 2. Historical monitoring 3. Real-time monitoring 4. Monitoring techniques 5. Monit 6. Web-based monitoring
Using New Relic to Monitor Your Servers
TUTORIAL Using New Relic to Monitor Your Servers by Alan Skorkin Contents Introduction 3 Why Do I Need a Service to Monitor Boxes at All? 4 It Works in Real Life 4 Installing the New Relic Server Monitoring
IBM Tivoli Monitoring Version 6.3 Fix Pack 2. Infrastructure Management Dashboards for Servers Reference
IBM Tivoli Monitoring Version 6.3 Fix Pack 2 Infrastructure Management Dashboards for Servers Reference IBM Tivoli Monitoring Version 6.3 Fix Pack 2 Infrastructure Management Dashboards for Servers Reference
Cisco Setting Up PIX Syslog
Table of Contents Setting Up PIX Syslog...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 How Syslog Works...2 Logging Facility...2 Levels...2 Configuring
Sawmill Log Analyzer Best Practices!! Page 1 of 6. Sawmill Log Analyzer Best Practices
Sawmill Log Analyzer Best Practices!! Page 1 of 6 Sawmill Log Analyzer Best Practices! Sawmill Log Analyzer Best Practices!! Page 2 of 6 This document describes best practices for the Sawmill universal
UNISOL SysAdmin. SysAdmin helps systems administrators manage their UNIX systems and networks more effectively.
1. UNISOL SysAdmin Overview SysAdmin helps systems administrators manage their UNIX systems and networks more effectively. SysAdmin is a comprehensive system administration package which provides a secure
Linux Kernel Architecture
Linux Kernel Architecture Amir Hossein Payberah [email protected] Contents What is Kernel? Kernel Architecture Overview User Space Kernel Space Kernel Functional Overview File System Process Management
System Administration Guide
www.novell.com/documentation System Administration Guide Data Synchronizer 1.2 August 22, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this
Volume SYSLOG JUNCTION. User s Guide. User s Guide
Volume 1 SYSLOG JUNCTION User s Guide User s Guide SYSLOG JUNCTION USER S GUIDE Introduction I n simple terms, Syslog junction is a log viewer with graphing capabilities. It can receive syslog messages
Thirty Useful Unix Commands
Leaflet U5 Thirty Useful Unix Commands Last revised April 1997 This leaflet contains basic information on thirty of the most frequently used Unix Commands. It is intended for Unix beginners who need a
Configuring System Message Logging
CHAPTER 25 This chapter describes how to configure system message logging on the Catalyst 2960 switch. Note For complete syntax and usage information for the commands used in this chapter, see the Cisco
HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 110 - INTRODUCTION TO UNIX
HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 110 - INTRODUCTION TO UNIX Course Description: This is an introductory course designed for users of UNIX. It is taught
This is when a server versus a workstation is desirable because it has the capability to have:
Protecting your Data Protecting your data is a critical necessity of having your DemandBridge Software and data programs loaded on a computer that has the ability to integrate redundant devices such as
W3Perl A free logfile analyzer
W3Perl A free logfile analyzer Features Works on Unix / Windows / Mac View last entries based on Perl scripts Web / FTP / Squid / Email servers Session tracking Others log format can be added easily Detailed
Runtime Monitoring & Issue Tracking
Runtime Monitoring & Issue Tracking http://d3s.mff.cuni.cz Pavel Parízek [email protected] CHARLES UNIVERSITY IN PRAGUE faculty of mathematics and physics Runtime monitoring Nástroje pro vývoj software
Advanced Linux System Administration on Red Hat
Advanced Linux System Administration on Red Hat Kenneth Ingham September 29, 2009 1 Course overview This class is for people who are familiar with basic Linux administration (i.e., they know users, packages,
Operating System Monitor Application (OS MON)
Operating System Monitor Application (OS MON) version 1.3 Joe Armstrong 1997-05-02 Typeset in L A TEX from SGML source using the DOCBUILDER 3.0 Document System. Contents 1 OS MON Reference Manual 1 1.1
Embedded Event Manager Commands
This module describes the commands that are used to set the Embedded Event Manager (EEM) operational attributes and monitor EEM operations. The Cisco IOS XR software EEM functions as the central clearing
Workflow Templates Library
Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security
Security Correlation Server Quick Installation Guide
orrelogtm Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also
Rsync: The Best Backup System Ever
LinuxFocus article number 326 http://linuxfocus.org Rsync: The Best Backup System Ever by Brian Hone About the author: Brian Hone is a system administrator and software developer at
Linux Crontab: 15 Awesome Cron Job Examples
Linux Crontab: 15 Awesome Cron Job Examples < An experienced Linux sysadmin knows the importance of running the routine maintenance jobs in the background automatically. Linux Cron utility is an effective
EMC VNX Version 8.1 Configuring and Using the Audit Tool on VNX for File P/N 300-015-126 Rev 01 August, 2013
EMC VNX Version 8.1 Configuring and Using the Audit Tool on VNX for File P/N 300-015-126 Rev 01 August, 2013 This technical note contains information on these topics: Executive summary... 2 Introduction...
Integrity Checking and Monitoring of Files on the CASTOR Disk Servers
Integrity Checking and Monitoring of Files on the CASTOR Disk Servers Author: Hallgeir Lien CERN openlab 17/8/2011 Contents CONTENTS 1 Introduction 4 1.1 Background...........................................
IceWarp to IceWarp Server Migration
IceWarp to IceWarp Server Migration Registered Trademarks iphone, ipad, Mac, OS X are trademarks of Apple Inc., registered in the U.S. and other countries. Microsoft, Windows, Outlook and Windows Phone
HOWTO: Set up a Vyatta device with ThreatSTOP in router mode
HOWTO: Set up a Vyatta device with ThreatSTOP in router mode Overview This document explains how to set up a minimal Vyatta device in a routed configuration and then how to apply ThreatSTOP to it. It is
Backing Up TestTrack Native Project Databases
Backing Up TestTrack Native Project Databases TestTrack projects should be backed up regularly. You can use the TestTrack Native Database Backup Command Line Utility to back up TestTrack 2012 and later
Virtual Private Systems for FreeBSD
Virtual Private Systems for FreeBSD Klaus P. Ohrhallinger 06. June 2010 Abstract Virtual Private Systems for FreeBSD (VPS) is a novel virtualization implementation which is based on the operating system
Red Condor Syslog Server Configurations
Red Condor Syslog Server Configurations May 2008 2 Red Condor Syslog Server Configurations This application note describes the configuration and setup of a syslog server for use with the Red Condor mail
GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III
QWERTYUIOP{ GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III This GL254 course is designed to follow an identical set of topics as the Red Hat RH254, RH255 RHCE exam prep courses with the added
Unit objectives IBM Power Systems
User-level security Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 9.0 Unit objectives After completing this unit, you should be able to: Describe
Chapter 2: Getting Started
Chapter 2: Getting Started Once Partek Flow is installed, Chapter 2 will take the user to the next stage and describes the user interface and, of note, defines a number of terms required to understand
Linux Security on HP Servers: Security Enhanced Linux. Abstract. Intended Audience. Technical introduction
Linux Security on HP Servers: Security Enhanced Linux Technical introduction This white paper -- one in a series of Linux security white papers -- discusses Security Enhanced Linux (SELinux), a mandatory
SSL Tunnels. Introduction
SSL Tunnels Introduction As you probably know, SSL protects data communications by encrypting all data exchanged between a client and a server using cryptographic algorithms. This makes it very difficult,
Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)
Host Hardening (March 21, 2011) Abdou Illia Spring 2011 CERT Report on systems vulnerabilities Source: CERT Report @ http://www.kb.cert.org/vuls/bymetric 2 OS Vulnerability test Source: http://www.omninerd.com/articles/2006_operating_system_vulnerabilit
Improved metrics collection and correlation for the CERN cloud storage test framework
Improved metrics collection and correlation for the CERN cloud storage test framework September 2013 Author: Carolina Lindqvist Supervisors: Maitane Zotes Seppo Heikkila CERN openlab Summer Student Report
ipta iptables Log Analyzer Anders Sikvall ichimusai.org
ipta iptables Log Analyzer Anders Sikvall ichimusai.org May 17, 2015 Version 0.1 Copyright 2015 Anders Sikvall http://ichimusai.org/projects/ipta [email protected] Contents 1 Introduction 5 1.1 Project
HelpSystems Web Server User Guide
HelpSystems Web Server User Guide Copyright Copyright HelpSystems, LLC. Robot is a division of HelpSystems. HelpSystems Web Server, OPAL, OPerator Assistance Language, Robot ALERT, Robot AUTOTUNE, Robot
CIT 470: Advanced Network and System Administration. Topics. Why Monitoring? System Monitoring
CIT 470: Advanced Network and System Administration System Monitoring CIT 470: Advanced Network and System Administration Slide #1 Topics 1. Why monitoring? 2. Historical monitoring 3. Real-time monitoring
Leak Check Version 2.1 for Linux TM
Leak Check Version 2.1 for Linux TM User s Guide Including Leak Analyzer For x86 Servers Document Number DLC20-L-021-1 Copyright 2003-2009 Dynamic Memory Solutions LLC www.dynamic-memory.com Notices Information
Oracle Linux 7: System Administration Ed 1 NEW
Oracle University Contact Us: Local: 1800 103 4775 Intl: +91 80 40291196 Oracle Linux 7: System Administration Ed 1 NEW Duration: 5 Days What you will learn The Oracle Linux 7: System Administration training
Sophos Anti-Virus for Linux user manual
Sophos Anti-Virus for Linux user manual Product version: 7 Document date: January 2011 Contents 1 About this manual...3 2 About Sophos Anti-Virus for Linux...4 3 On-access scanning...7 4 On-demand scanning...10
Web Application s Performance Testing
Web Application s Performance Testing B. Election Reddy (07305054) Guided by N. L. Sarda April 13, 2008 1 Contents 1 Introduction 4 2 Objectives 4 3 Performance Indicators 5 4 Types of Performance Testing
The Ins and Outs of System Logging Using Syslog
Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. The
Operating System and Process Monitoring Tools
http://www.cse.wustl.edu/~jain/cse567-06/ftp/os_monitors/index.html 1 of 12 Operating System and Process Monitoring Tools Arik Brooks, [email protected] Abstract: Monitoring the performance of operating systems
Syslog (Centralized Logging and Analysis) Jason Healy, Director of Networks and Systems
Syslog (Centralized Logging and Analysis) Jason Healy, Director of Networks and Systems Last Updated Mar 18, 2008 2 Contents 1 Syslog (Centralized Logging and Analysis) 5 1.1 Introduction..............................
Unix::Statgrab - System Monitoring
Unix::Statgrab - System Monitoring Jens Rehsack 2013 Jens Rehsack () Unix::Statgrab - System Monitoring 2013 1 / 28 Overview Part I Introduction 1 Introduction Jens Rehsack () Unix::Statgrab - System Monitoring
TDA - Thread Dump Analyzer
TDA - Thread Dump Analyzer TDA - Thread Dump Analyzer Published September, 2008 Copyright 2006-2008 Ingo Rockel Table of Contents 1.... 1 1.1. Request Thread Dumps... 2 1.2. Thread
Also on the Performance tab, you will find a button labeled Resource Monitor. You can invoke Resource Monitor for additional analysis of the system.
1348 CHAPTER 33 Logging and Debugging Monitoring Performance The Performance tab enables you to view the CPU and physical memory usage in graphical form. This information is especially useful when you
Incremental Backup Script. Jason Healy, Director of Networks and Systems
Incremental Backup Script Jason Healy, Director of Networks and Systems Last Updated Mar 18, 2008 2 Contents 1 Incremental Backup Script 5 1.1 Introduction.............................. 5 1.2 Design Issues.............................
Multiprogramming. IT 3123 Hardware and Software Concepts. Program Dispatching. Multiprogramming. Program Dispatching. Program Dispatching
IT 3123 Hardware and Software Concepts Operating Systems II October 26 Multiprogramming Two or more application programs in memory. Consider one CPU and more than one program. This can be generalized to
HOWTO: Set up a Vyatta device with ThreatSTOP in bridge mode
HOWTO: Set up a Vyatta device with ThreatSTOP in bridge mode Overview This document explains how to set up a minimal Vyatta device in a transparent bridge configuration and then how to apply ThreatSTOP
Avira AntiVir MailGate 3.2 Release Notes
Release Notes 1. Features 1.1 Assigning recipient addresses to groups either by using Active Directory or a plain text file 1.1.1 Using a Active Directory server MailGate communicates with Active Directory
4PSA Total Backup 3.0.0. User's Guide. for Plesk 10.0.0 and newer versions
4PSA Total Backup 3.0.0 for Plesk 10.0.0 and newer versions User's Guide For more information about 4PSA Total Backup, check: http://www.4psa.com Copyright 2009-2011 4PSA. User's Guide Manual Version 84359.5
SAS Application Performance Monitoring for UNIX
Abstract SAS Application Performance Monitoring for UNIX John Hall, Hewlett Packard In many SAS application environments, a strategy for measuring and monitoring system performance is key to maintaining
