Team: May15-17 Advisor: Dr. Mitra. Lighthouse Project Plan Client: Workiva Version 2.1
|
|
|
- Kelly Lynch
- 9 years ago
- Views:
Transcription
1 Team: May15-17 Advisor: Dr. Mitra Lighthouse Project Plan Client: Workiva Version 2.1 Caleb Brose, Chris Fogerty, Nick Miller, Rob Sheehy, Zach Taylor November 11, 2014
2 Contents 1 Problem Statement Definitions and Common Abbreviations Deliverables Backend Frontend Documentation Specifications Concept Sketch/Mockup User Interface Description Instances Instance Detail Container Deployment Requirements Use Cases Release Manager Functions IT Administrator Functions Functional Requirements Non-Functional Requirements Work Breakdown Structure Resource Requirements Project Schedule Risks Technical Feasibility Current Environment Appendix A: Table of Figures Appendix B: What is Docker?... 14
3 1 PROBLEM STATEMENT Within the past year, Docker has emerged as an execution and deployment environment for large-scale, distributed applications. In its current state, the tooling surrounding Docker is still rapidly evolving and many systems are immature and not production ready. For organizations hosting many applications across multiple cloud platforms, the manual management of Docker hosts and applications has proved to be challenging and time consuming, especially as the number of hosts to monitor grows. The goal for Lighthouse is to provide an open source application that centralizes the management and monitoring of Docker hosts across a variety of cloud platforms, including the Docker containers executed within them. 2 DEFINITIONS AND COMMON ABBREVIATIONS Term Definition An open source platform used for creating, packaging, and shipping, Docker and running applications. You can read more in Appendix B: What is Docker?. Image A read only file system used by Docker which contains applications and other files. Container Registry GCE Google Compute Engine AWS Amazon Web Service JSON JavaScript Object Notation A running image which is writeable. Containers are primarily used to run the applications that are being developed. An image storage service. A virtual machine (VM) hosting service by Google which may host Docker instances. A virtual machine hosting service by Amazon which may host Docker instances. A data exchange format which is the primary mode of communication between the frontend and backend applications. 3 DELIVERABLES Lighthouse consists of the following modules: Table 1 Common terms and their definitions 3.1 Backend The backend system will be capable of interfacing with an existing instance of Docker. It will communicate with Docker instances via Docker s REST API, and it should be capable of: Routing all valid Docker API calls through itself to the appropriate Docker instance. Authenticating users, using per-instance permissions, and blocking unauthorized requests. Extending Docker s functionality by intercepting requests to Docker and calling internal functions, such as logging and history. 2
4 3.2 Frontend The frontend will be a web application capable of utilizing the backend to manage Docker instances. It will use JavaScript and JavaScript libraries such as Angular, and should be able to: Perform basic container management actions such as Create, Stop, Remove, Update, and Pause View past containers run in the Docker instance. That is, view a history of each application running on the instance Log in and out of the backend application to authenticate frontend users. 3.3 Documentation The backend API will be well documented in order to accommodate users that wish to automate actions, create their own frontend applications, or extend our frontend with new functionality. 4 SPECIFICATIONS Specification Definition Value Verification Method Easy to Setup & Learn We want the server software to be easy to understand and setup. This is supposed to be a tool that not only helps with managing Docker, but can be a tool that helps teach the potential and importance of Docker. This means that we should have a simple/efficient setup process with high quality documentation. med The server shouldn t take more than 10 minutes to set up locally and play around with, given that the user has all the server dependencies preinstalled. Multi-Platform & Docker-izable Our server software should be highly compatible with running inside a Docker container, seeing as our project is all about managing Docker containers. Allowing our project to run inside Docker also should give us the advantage of running across multiple platforms as well. high Our Docker-ized server software should have 99% of the functionality as our standalone server software. We should also support 100% of platforms that support running Docker. Docker Image Efficiency The Docker image to run our server should be extremely efficient and lightweight to store inside any Docker registry. low Our server Docker image should not be any bigger than 700 MBs. Hosted Site Uptime The hosted site must be consistently available to users, such that anyone hosting our site should be able to keep a reasonable uptime with our server software. med Over the span of one month our server software should be up for at least 95% of that time, without any intervention of from system admins. 3
5 Specification Definition Value Verification Method Modern Project The project should be using the latest and greatest software tools and languages. Our project should include and practice new and growing trends in the software industry that will make our project and software more desirable to emerging startups, but should still catch the attention to larger corporate software companies. low Our project should include at least two new emerging languages or libraries in the software industry. Table 2 Specifications 5 CONCEPT SKETCH/MOCKUP Figure 1 Lighthouse conceptual diagram The overall architecture of Lighthouse is built upon the common client-server pattern. Users interact with the system via a single-page web application written in JavaScript that is loaded once into their browser, with subsequent system requests made via a REST API over HTTPS, utilizing JSON as the data interchange format. Requests received from the web interface are routed through authentication and API control. Our API is implemented as a superset of the standard Docker Remote API, allowing users to send specific Docker requests to their target platform, as well as add new platforms, users, and other infrastructure configuration. 4
6 Host providers manage the actual startup and application runtime, but are controlled via the Lighthouse main controller. Provider interfaces are installed on each provider as part of the Lighthouse application and define a common interface for communication between the host network and Lighthouse. Docker host providers are instructed to pull new images from the registry on application deployment. Note that the Docker registry and associated code repositories are defined and configured by the organization and is outside the scope of the Lighthouse system. The registry defined REST API allows Lighthouse to communicate with it. 6 USER INTERFACE DESCRIPTION The primary user interface will be a front-end JavaScript web application. Users will authenticate to the back-end controller module using this web interface. This will provide an easy way for the user to interact with the Lighthouse service. 6.1 Instances Our goal for the user interface is to allow users to accomplish the success scenarios outlined in the project s requirements. When a user first navigates to the web application, they will immediately be prompted for a login (username and password. Upon successful authentication with the server, the user will be redirected to the instance index page shown below. Figure 2 Listing available Docker instances On this page the user can see a list of the available cloud instances in table format. Relevant data is shown for each individual instance so the user can get an informational overview of their instances. Above the table, there is a list of actions the user can take. Rescan will launch an instance discovery task 5
7 to find cloud instances that are available. Add Provider will take the user to a form where they can add an additional cloud provider to their system. 6.2 Instance Detail Since the user will potentially have hundreds of instances across several cloud platforms, it is important to make this view filterable, allowing the user to find the exact subset of instances they are looking for. Once the user has found the instance they are interested in, they can click on its Hostname field to drill down to that instance. From this view, the user can investigate all information regarding this particular host. Some of the information that may be included on this page would be the status of the host, Docker connectivity, the cloud platform it s running on, unique identification, and possibly several other technical data points. Figure 3 Docker instance detail page In addition to information about the host, this view will include a list of Docker containers that are running on it. Again the user has options above the table to take an action. Rescan will launch a task to refresh the status of Docker on this instance. Deploy Container will present the user with a form to deploy a new container to this instance. 6
8 6.3 Container Deployment Deploying a container to an instance is one of the main use cases for Lighthouse. Since this is such an important feature, we will want this feature to be as easy to digest as possible. Upon clicking on Deploy Container in the above diagram, the user will be prompted with a form to set up their deployment. This view is shown below. Figure 4 Container deployment page The user will select the Docker image that they want to deploy. Then they will build their run command in the form. The Lighthouse UI will automatically build and validate the run command as the user is customizing their options. This provides instant feedback for the user and lets them see exactly what they will be deploying. 7 REQUIREMENTS 7.1 Use Cases For a successful implementation, we ve identified two major actors in the Lighthouse system: release manager and IT admin. 7
9 7.1.1 Release Manager Functions 1. Log in/authenticate 2. View currently deployed containers 3. Deploy and start a new container 4. Rollback a container/deploy a previous version IT Administrator Functions 1. Log in/authenticate 2. Initialize provider with authentication credentials 3. Create and delete system users 4. View provider statistics and analytics 7.2 Functional Requirements Docker addresses o Description The IP address that are hosting Docker daemon publicly on port o Users Administrators o Actions add remove edit Docker Images o Description Each Docker daemon has a set of images referenced by name or unique ID. o Users Developers/Administrators o Actions add remove edit Docker Containers o Description Each Docker daemon has a set of running containers referenced by name or unique ID. Containers are spawned from images pre-existing inside a Docker daemon. o Users Developers/Administrators o Actions start Arguments o exposed port 8
10 stop o o command environment variables Docker Analysis o Description Should be able to view running containers in real time. o Users Developers/Administrators o Actions view logs CPU usage memory consumption Authentication o Description Given an and password all users can be denied or granted access to the webapp. o Users Everyone o Actions login logout Arguments o o Password Authentication Accounts o Description Admins should be able to control user accounts. o Users Administrators o Actions add remove edit 7.3 Non-Functional Requirements Security System (should be secure and not allow unauthorized control) Protect against XSS attacks session hijacking unauthenticated requests 9
11 exposure of sensitive container/server data Only use HTTPS to mitigate various communication security exploits. Code Quality (should be easy to maintain and understand) Git Commit comments should be clear and concise, standard commit conventions Style Guides GO style guide effective tips JavaScript style guide Code reviews must include at least 2 other team members to be verified for master merge. 8 WORK BREAKDOWN STRUCTURE Each member has been assigned a role on the team. In addition, individuals have been assigned separate pieces of the project, mainly divided by the project s architectural modules. Team Member Role Role Responsibilities Project Responsibilities Caleb Brose Project Lead Project scheduling Communication with Workiva Communication with advisor Chris Fogerty Communication Lead Document compilation Weekly report generation Nick Miller Web Developer Development of project website Rob Sheehy Key Concept Holder Handling and documentation of project concepts Zach Taylor Key Concept Holder Handling and documentation of project concepts Table 3 Work breakdown by member Development of Lighthouse controller module Development of Lighthouse controller module Development of Lighthouse frontend user interface module Development of Lighthouse hosting provider interface module(s) Development of Lighthouse frontend user interface module 10
12 9 RESOURCE REQUIREMENTS Resource Purpose Means of acquiring Estimated cost Shared Google Cloud Services developer account Amazon Web Services developer account Used to test and deploy our application Used in late development to test multi-provider functionality Provided by Workiva Provided by Workiva Table 4 Resource requirements and cost Approx. $10/month Free for low usage 10 PROJECT SCHEDULE Our goal for the development lifecycle of Lighthouse is to utilize Agile practices as much as possible. Agile development defines a loose set of constraints focused on small iteration cycles. These cycles are split into (in our case) two-week sprints. The beginning of the sprint involves a planning meeting where the team decides on which work tickets in the backlog are highest priority for the upcoming sprint. Tickets should be as small and well-defined as possible and efforts are made to break potentially large tickets down into smaller units of work, with the end goal being feasibility and testability once the work is complete. Figure 5 Sprint ticket board hosted by Trello. During the sprint, tickets are moved across the board as shown above. To Do marks tickets moved from the backlog during the spring planning meeting, Doing marks tickets in progress, Verification marks tickets in the code review/testing process, and Completed marks tickets merged into the master development branch. 11
13 The sprint development cycle is outlined as follows: Figure 6 Sprint development cycle Our intention is to meet with our project stakeholder and client, Workiva, at the end of every two-week sprint cycle to relay the work that has been done and discuss work for the upcoming sprint. The first week of the upcoming semester will focus on re-grouping on a team and outlining the major features left to implement. After that, we will start our two-week sprint cycles, with the last two weeks of the semester wrapping up any work left and preparing for our final demonstration to Workiva and the review committee. 11 RISKS 11.1 Technical Feasibility There should not be any breaking issues with technical feasibility in terms of the base idea of the project. Docker already provides a standard web interface. At its core, the Lighthouse project acts as a dashboard for Docker containers, providing a single interface to interact with many Docker containers. We have run into some issues with clean design, however. Our initial goal was to provide a standard routing API for routing all Docker API calls. This would allow us to provide a no-maintenance tunnel for all Docker API calls right out of the box. Unfortunately, this became more complicated with the addition of some features such as deployment undo and logging Current Environment Docker v1.0 was released a little over a year ago, so it is just now starting to be adopted by large companies. Because of this, there are only a few projects that accomplish what Lighthouse is looking to accomplish. That being said, the two big players right now are Kubernetes and Panamax, and neither does exactly what we re looking to do. Kubernetes applies more to managing a cluster of containers on a few machines, and Panamax is more unwieldy with less features than we re looking to build. The existence of these projects prove that something like Lighthouse is needed. Lighthouse may be a bit behind them in terms of development, but because Kubernetes and Panamax are currently in a rough/beta state, it is possible for Lighthouse to catch up. That is, Lighthouse will not be immediately irrelevant. 12
14 APPENDIX A: TABLE OF FIGURES Figure 1 Lighthouse conceptual diagram... 4 Figure 2 Listing available Docker instances... 5 Figure 3 Docker instance detail page... 6 Figure 4 Container deployment page... 7 Figure 5 Sprint ticket board hosted by Trello Figure 6 Sprint development cycle
15 APPENDIX B: WHAT IS DOCKER? Essentially, Docker supports standardized application installation and execution via containers built from common templates that can run on a variety of host platforms. In the past, the efforts to standardize distributed and scalable applications were focused on the virtual machine, which was replicated across the desired host platforms. Docker removes the overhead of hosting and running the virtual machine, and instead utilizes the native system resources, while maintaining the desired isolation one would like to see between multiple applications running on one system. In practice, the Docker host responsible for running the application container does not need to know of or explicitly install the application dependencies, as the container is built with its own layered file system to store dependencies and executables. Because of this, a Docker container can be built and run on a development machine, a testing server, and a production server with no difference in configuration of that container. A container can access its own file system, unless explicitly given permission otherwise, which maintains isolation between multiple containers on the same host. Docker has achieved near native performance on application startup and shutdown, meaning new applications can be deployed and scaled as quickly as possible. 14
SonicWALL SRA Virtual Appliance Getting Started Guide
COMPREHENSIVE INTERNET SECURITY SonicWALL Secure Remote Access Appliances SonicWALL SRA Virtual Appliance Getting Started Guide SonicWALL SRA Virtual Appliance5.0 Getting Started Guide This Getting Started
Web Sites, Virtual Machines, Service Management Portal and Service Management API Beta Installation Guide
Web Sites, Virtual Machines, Service Management Portal and Service Management API Beta Installation Guide Contents Introduction... 2 Environment Topology... 2 Virtual Machines / System Requirements...
Glassfish Architecture.
Glassfish Architecture. First part Introduction. Over time, GlassFish has evolved into a server platform that is much more than the reference implementation of the Java EE specifcations. It is now a highly
Interworks. Interworks Cloud Platform Installation Guide
Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,
Vidder PrecisionAccess
Vidder PrecisionAccess Security Architecture February 2016 910 E HAMILTON AVENUE. SUITE 410 CAMPBELL, CA 95008 P: 408.418.0440 F: 408.706.5590 WWW.VIDDER.COM Table of Contents I. Overview... 3 II. Components...
Avalanche Site Edition
Avalanche Site Edition Version 4.8 avse ug 48 20090325 Revised 03/20/2009 ii Copyright 2008 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite 335 Midvale,
Managing Your Microsoft Windows Server Fleet with AWS Directory Service. May 2015
Managing Your Microsoft Windows Server Fleet with AWS Directory Service May 2015 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational
System Administration Training Guide. S100 Installation and Site Management
System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5
Product Version 1.0 Document Version 1.0-B
VidyoDashboard Installation Guide Product Version 1.0 Document Version 1.0-B Table of Contents 1. Overview... 3 About This Guide... 3 Prerequisites... 3 2. Installing VidyoDashboard... 5 Installing the
SOA Software API Gateway Appliance 7.1.x Administration Guide
SOA Software API Gateway Appliance 7.1.x Administration Guide Trademarks SOA Software and the SOA Software logo are either trademarks or registered trademarks of SOA Software, Inc. Other product names,
Rally Installation Guide
Rally Installation Guide Rally On-Premises release 2015.1 [email protected] www.rallydev.com Version 2015.1 Table of Contents Overview... 3 Server requirements... 3 Browser requirements... 3 Access
EM Single Sign On 1.2 (1018)
(1018) 2015 VoIP Integration July 27, 2015 Table of Contents Product Overview... 3 Requirements... 3 Application Requirements... 3 Call Manager... 3 Network Connectivity... 3 EM Profile Requirements...
Deploy Remote Desktop Gateway on the AWS Cloud
Deploy Remote Desktop Gateway on the AWS Cloud Mike Pfeiffer April 2014 Last updated: May 2015 (revisions) Table of Contents Abstract... 3 Before You Get Started... 3 Three Ways to Use this Guide... 4
About the VM-Series Firewall
About the VM-Series Firewall Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 http://www.paloaltonetworks.com/contact/contact/
Test Case 3 Active Directory Integration
April 12, 2010 Author: Audience: Joe Lowry and SWAT Team Evaluator Test Case 3 Active Directory Integration The following steps will guide you through the process of directory integration. The goal of
Introduction to Mobile Access Gateway Installation
Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
VMware vcenter Log Insight Getting Started Guide
VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
Dell OpenManage Mobile Version 1.4 User s Guide (Android)
Dell OpenManage Mobile Version 1.4 User s Guide (Android) Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION
S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s
S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s During the period between November 2012 and March 2013, Symantec Consulting Services partnered with Bomgar to assess the security
SA-Announce Cloud Services Mobile Notifier User Manual: ios and Android Version 1.0.0
SA-Announce Cloud Services Mobile Notifier User Manual: ios and Android Version 1.0.0 About Syn-Apps Syn-Apps L.L.C. was founded in 2001 as a consulting firm focused on developing software for IP telephony
JReport Server Deployment Scenarios
JReport Server Deployment Scenarios Contents Introduction... 3 JReport Architecture... 4 JReport Server Integrated with a Web Application... 5 Scenario 1: Single Java EE Server with a Single Instance of
IBM Information Server
IBM Information Server Version 8 Release 1 IBM Information Server Administration Guide SC18-9929-01 IBM Information Server Version 8 Release 1 IBM Information Server Administration Guide SC18-9929-01
Onegini Token server / Web API Platform
Onegini Token server / Web API Platform Companies and users interact securely by sharing data between different applications The Onegini Token server is a complete solution for managing your customer s
WHMCS LUXCLOUD MODULE
èè WHMCS LUXCLOUD MODULE Update: 02.02.2015 Version 2.0 This information is only valid for partners who use the WHMCS module (v2.0 and higher). 1.1 General overview 1.2 Installing the plugin Go to your
MALWAREBYTES PLUGIN DOCUMENTATION
Contents Requirements... 2 Installation Scenarios... 2 Malwarebytes 2.xx or 1.75 is already deployed.... 2 Install / Update Malwarebytes Plugin... 3 Configuring Malwarebytes Plugin... 5 About the Screens...
Platform as a Service and Container Clouds
John Rofrano Senior Technical Staff Member, Cloud Automation Services, IBM Research [email protected] or [email protected] Platform as a Service and Container Clouds using IBM Bluemix and Docker for Cloud
Sharp Remote Device Manager (SRDM) Server Software Setup Guide
Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based
Remote PC Guide for Standalone PC Implementation
Remote PC Guide for Standalone PC Implementation Updated: 2007-01-22 The guide covers features available in NETLAB+ version 3.6.1 and later. IMPORTANT Standalone PC implementation is no longer recommended.
Getting Started with Clearlogin A Guide for Administrators V1.01
Getting Started with Clearlogin A Guide for Administrators V1.01 Clearlogin makes secure access to the cloud easy for users, administrators, and developers. The following guide explains the functionality
User Migration Tool. Note. Staging Guide for Cisco Unified ICM/Contact Center Enterprise & Hosted Release 9.0(1) 1
The (UMT): Is a stand-alone Windows command-line application that performs migration in the granularity of a Unified ICM instance. It migrates only Unified ICM AD user accounts (config/setup and supervisors)
RSA SecurID Ready Implementation Guide
RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet
Installation Guide Avi Networks Cloud Application Delivery Platform Integration with Cisco Application Policy Infrastructure
Installation Guide Avi Networks Cloud Application Delivery Platform Integration with Cisco Application Policy Infrastructure August 2015 Table of Contents 1 Introduction... 3 Purpose... 3 Products... 3
SysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
VX 9000E WiNG Express Manager INSTALLATION GUIDE
VX 9000E WiNG Express Manager INSTALLATION GUIDE 2 VX 9000E WiNG Express Manager Service Information If you have a problem with your equipment, contact support for your region. Support and issue resolution
Microsoft Dynamics GP Release
Microsoft Dynamics GP Release Workflow Installation and Upgrade Guide February 17, 2011 Copyright Copyright 2011 Microsoft. All rights reserved. Limitation of liability This document is provided as-is.
VMware vcenter Log Insight Getting Started Guide
VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
Google Compute Engine Configuration
Google Compute Engine Configuration GCE Deployment Setup for VNS3 2014 1 Contents Introduction 3 Step 1: GCE VNS3 Image Delivery 9 Step 2: GCE Network Setup 16 Step 3: Launching a VNS3 Manager 19 Instance
Jenkins World Tour 2015 Santa Clara, CA, September 2-3
1 Jenkins World Tour 2015 Santa Clara, CA, September 2-3 Continuous Delivery with Container Ecosystem CAD @ Platform Equinix - Overview CAD Current Industry - Opportunities Monolithic to Micro Service
CenturyLink Cloud Configuration
CenturyLink Cloud Configuration CenturyLink Setup for VNS3:vpn, VNS3:net and VNS3:turret 2015 copyright 2015 1 Table of Contents Introduction 3 CenturyLink Cloud Deployment Setup 9 VNS3 Configuration Document
TIBCO Spotfire Web Player 6.0. Installation and Configuration Manual
TIBCO Spotfire Web Player 6.0 Installation and Configuration Manual Revision date: 12 November 2013 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED
Hybrid for SharePoint Server 2013. Search Reference Architecture
Hybrid for SharePoint Server 2013 Search Reference Architecture 2014 Microsoft Corporation. All rights reserved. This document is provided as-is. Information and views expressed in this document, including
Kaseya Server Instal ation User Guide June 6, 2008
Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's
Security Analytics Virtual Appliance
Security Analytics Virtual Appliance Installation Guide for VMware 19 March 2015 This document is intended to help you use the web interface to configure your Security Analytics Virtual Appliance to perform
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see
Revolution R Enterprise DeployR 7.1 Installation Guide for Windows
Revolution R Enterprise DeployR 7.1 Installation Guide for Windows The correct bibliographic citation for this manual is as follows: Revolution Analytics, Inc. 2014. Revolution R Enterprise DeployR Installation
How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip
Load testing with WAPT: Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. A brief insight is provided
Web Applications Access Control Single Sign On
Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,
User Guide for VMware Adapter for SAP LVM VERSION 1.2
User Guide for VMware Adapter for SAP LVM VERSION 1.2 Table of Contents Introduction to VMware Adapter for SAP LVM... 3 Product Description... 3 Executive Summary... 3 Target Audience... 3 Prerequisites...
Alfresco Enterprise on Azure: Reference Architecture. September 2014
Alfresco Enterprise on Azure: Reference Architecture Page 1 of 14 Abstract Microsoft Azure provides a set of services for deploying critical enterprise workloads on its highly reliable cloud platform.
System Center 2012 R2 SP1 Configuration Manager & Microsoft Intune
2015 System Center 2012 R2 SP1 Configuration Manager & Microsoft Intune DEPLOYING MICROSOFT OFFICE 365 PROFESSIONAL PLUS RONNI PEDERSEN & HANS CHRISTIAN ANDERSEN RONNIPEDERSEN.COM Microsoft MVP: Enterprise
Qlik UKI Consulting Services Catalogue
Qlik UKI Consulting Services Catalogue The key to a successful Qlik project lies in the right people, the right skills, and the right activities in the right order www.qlik.co.uk Table of Contents Introduction
Docker : devops, shared registries, HPC and emerging use cases. François Moreews & Olivier Sallou
Docker : devops, shared registries, HPC and emerging use cases François Moreews & Olivier Sallou Presentation Docker is an open-source engine to easily create lightweight, portable, self-sufficient containers
2X SecureRemoteDesktop. Version 1.1
2X SecureRemoteDesktop Version 1.1 Website: www.2x.com Email: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious
Windows Azure Pack Installation and Initial Configuration
Windows Azure Pack Installation and Initial Configuration Windows Server 2012 R2 Hands-on lab In this lab, you will learn how to install and configure the components of the Windows Azure Pack. To complete
Server Software Installation Guide
Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise
MaaS360 Mobile Enterprise Gateway
MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2013 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software
Deploying System Center 2012 R2 Configuration Manager
Deploying System Center 2012 R2 Configuration Manager This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.
Google Analytics Playbook. Version 0.92
Version 0.92 2014 CrownPeak Technology, Inc. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording,
MS-55115: Planning, Deploying and Managing Microsoft Project Server 2013
MS-55115: Planning, Deploying and Managing Microsoft Project Server 2013 Description The goal of this three-day instructor-led course is to provide students with the knowledge and skills necessary to effectively
The Virtualization Practice
The Virtualization Practice White Paper: Managing Applications in Docker Containers Bernd Harzog Analyst Virtualization and Cloud Performance Management October 2014 Abstract Docker has captured the attention
IBM Cloud Manager with OpenStack
IBM Cloud Manager with OpenStack Download Trial Guide Cloud Solutions Team: Cloud Solutions Beta [email protected] Page 1 Table of Contents Chapter 1: Introduction...3 Development cycle release scope...3
IBM Security QRadar Vulnerability Manager Version 7.2.6. User Guide IBM
IBM Security QRadar Vulnerability Manager Version 7.2.6 User Guide IBM Note Before using this information and the product that it supports, read the information in Notices on page 91. Product information
Qlik Sense Enabling the New Enterprise
Technical Brief Qlik Sense Enabling the New Enterprise Generations of Business Intelligence The evolution of the BI market can be described as a series of disruptions. Each change occurred when a technology
QualysGuard WAS. Getting Started Guide Version 4.1. April 24, 2015
QualysGuard WAS Getting Started Guide Version 4.1 April 24, 2015 Copyright 2011-2015 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc.
Scyld Cloud Manager User Guide
Scyld Cloud Manager User Guide Preface This guide describes how to use the Scyld Cloud Manager (SCM) web portal application. Contacting Penguin Computing 45800 Northport Loop West Fremont, CA 94538 1-888-PENGUIN
Software Development In the Cloud Cloud management and ALM
Software Development In the Cloud Cloud management and ALM First published in Dr. Dobb's Journal, February 2009: http://www.ddj.com/development-tools/212900736 Nick Gulrajani is a Senior Solutions Architect
efolder BDR for Veeam Cloud Connection Guide
efolder BDR for Veeam Cloud Connection Guide Setup Connect Preload Data uh6 efolder BDR Guide for Veeam Page 1 of 36 INTRODUCTION Thank you for choosing the efolder Cloud for Veeam. Using the efolder Cloud
MaaS360 Mobile Enterprise Gateway
MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2014 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change without notice. The software described
Installation Guide for Pulse on Windows Server 2008R2
MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
How To Set Up A Vns3 Controller On An Ipad Or Ipad (For Ahem) On A Network With A Vlan (For An Ipa) On An Uniden Vns 3 Instance On A Vn3 Instance On
ElasticHosts Configuration ElasticHosts Setup for VNS3 2015 copyright 2015 1 Table of Contents Introduction 3 ElasticHosts Deployment Setup 9 VNS3 Configuration Document Links 20 copyright 2015 2 Requirements
Authentication Methods
Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this
Copyright Pivotal Software Inc, 2013-2015 1 of 10
Table of Contents Table of Contents Getting Started with Pivotal Single Sign-On Adding Users to a Single Sign-On Service Plan Administering Pivotal Single Sign-On Choosing an Application Type 1 2 5 7 10
ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES
CONTENTS About Tools4ever... 3 About Deloitte Risk Services... 3 HelloID... 4 Microsoft Azure... 5 HelloID Security Architecture... 6 Scenarios... 8 SAML Identity Provider (IDP)... 8 Service Provider SAML
Cloudera Manager Training: Hands-On Exercises
201408 Cloudera Manager Training: Hands-On Exercises General Notes... 2 In- Class Preparation: Accessing Your Cluster... 3 Self- Study Preparation: Creating Your Cluster... 4 Hands- On Exercise: Working
An identity management solution. TELUS AD Sync
An identity management solution TELUS AD Sync June 2013 Introduction An important historic challenge faced by small and mid-sized businesses when opting for the TELUS Business E-mail Service is the requirement
Sage Integration Cloud Technology Whitepaper
Sage Integration Cloud Technology Whitepaper Sage Christian Rubach July 21, 2016 Abstract Sage is committed to providing businesses around the world the information, insight and tools they need to succeed.
GRAVITYZONE HERE. Deployment Guide VLE Environment
GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
TRIPWIRE PURECLOUD. TRIPWIRE PureCloud USER GUIDE
TRIPWIRE PURECLOUD TRIPWIRE PureCloud USER GUIDE 2001-2015 Tripwire, Inc. All rights reserved. Tripwire and ncircle are registered trademarks of Tripwire, Inc. Other brand or product names may be trademarks
Phone Inventory 1.0 (1000) Installation and Administration Guide
Phone Inventory 1.0 (1000) Installation and Administration Guide 2010 VoIP Integration June 23, 2010 Table of Contents Product Overview... 3 Requirements... 3 Application Requirements... 3 Call Manager...
Virtual Appliance Setup Guide
The Barracuda SSL VPN Vx Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda SSL VPN hardware appliance. It is designed for easy deployment
ThinPoint Quick Start Guide
ThinPoint Quick Start Guide 2 ThinPoint Quick Start Guide Table of Contents Part 1 Introduction 3 Part 2 ThinPoint Windows Host Installation 3 1 Compatibility... list 3 2 Pre-requisites... 3 3 Installation...
OnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
TIBCO Spotfire Statistics Services Installation and Administration Guide. Software Release 5.0 November 2012
TIBCO Spotfire Statistics Services Installation and Administration Guide Software Release 5.0 November 2012 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH
HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION
HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION Version 1.1 / Last updated November 2012 INTRODUCTION The Cloud Link for Windows client software is packaged as an MSI (Microsoft Installer)
<Insert Picture Here> Hudson Security Architecture. Winston Prakash. Click to edit Master subtitle style
Hudson Security Architecture Click to edit Master subtitle style Winston Prakash Hudson Security Architecture Hudson provides a security mechanism which allows Hudson Administrators
Configuring Load Balancing for EMC ViPR SRM
White paper Abstract This white paper describes how to use load balancing in a scaled-out EMC ViPR SRM deployment to avoid performance bottlenecks that could impact data collection and report generation.
User Guide. Cloud Gateway Software Device
User Guide Cloud Gateway Software Device This document is designed to provide information about the first time configuration and administrator use of the Cloud Gateway (web filtering device software).
Installation Guide: Delta Module Manager Launcher
Installation Guide: Delta Module Manager Launcher Overview... 2 Delta Module Manager Launcher... 2 Pre-Installation Considerations... 3 Hardware Requirements... 3 Software Requirements... 3 Virtualisation...
Virtzone Cloud Control User Guide
Virtzone Cloud Control User Guide August 2013 Table of Contents 1. What is Virtzone Cloud Control?... 3 2. What this document covers... 3 This document covers the basic steps required to log on to and
Google Apps Deployment Guide
CENTRIFY DEPLOYMENT GUIDE Google Apps Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of your corporate
Studio 5.0 User s Guide
Studio 5.0 User s Guide wls-ug-administrator-20060728-05 Revised 8/8/06 ii Copyright 2006 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite 335 Midvale,
Virtual Appliance Installation Guide
> In This Chapter Document: : Installing the OpenManage Network Manager Virtual Appliance 2 Virtual Appliance Quick Start 2 Start the Virtual Machine 6 Start the Application 7 The Application is Ready
Pcounter Web Report 3.x Installation Guide - v2014-11-30. Pcounter Web Report Installation Guide Version 3.4
Pcounter Web Report 3.x Installation Guide - v2014-11-30 Pcounter Web Report Installation Guide Version 3.4 Table of Contents Table of Contents... 2 Installation Overview... 3 Installation Prerequisites
