Andrew Moore Amsterdam 2015
|
|
- Julius Foster
- 8 years ago
- Views:
Transcription
1 Andrew Moore Amsterdam 2015
2 Agenda Why log How to log Audit plugins Log analysis Demos
3 Logs [timestamp]: [some useful data]
4 Why log? Error Log Binary Log Slow Log General Log
5 Why log?
6 Why log?
7 Why log?
8 How [not] to audit log General log Slow log Binary log Sniff network In schema init_connect
9 MySQL Pluggable Audit Interface Available since Audit interface notifies plugin of General log messages Error log messages Query results sent to client *
10 MySQL Pluggable Audit Interface Custom plugin Most popular open source plugins McAfee Percona MariaDB
11 CLI: Installing Plugins INSTALL PLUGIN plugin_name SONAME='shared_lib_name.so' my.cnf: (RECOMMENDED) plugin-load=plugin_name=shared_lib_name.so Startup: mysqld plugin-load='plugin_name'='shared_lib_name.so'
12 Force: Installing Plugins plugin_name=force_plus_permanent Configuration Options: (vary from plugin to plugin) Filtering Sync/performance Output
13 Available for 5.1+ Binary hooking McAfee Audit Plugin Great community support Most filtering options JSON output format Socket and file options
14 McAfee Audit Plugin Install may require generation of offsets (requires GDB)./offset-extract.sh \ /path/to/mysqld \ /path/to/mysqld.debug
15 Filtering McAfee Audit Plugin audit_record_cmds audit_record_objects audit_whitelist_users audit_whitelist_cmds
16 McAfee Audit Plugin {"msg-type":"activity", "date":" ", "thread-id":"2", "query-id":"17", "user":"root", "priv_user":"root", "host":"localhost", "ip":"", "cmd":"select", "objects":[{"db":"test","name":"people","obj_type":"table"}], "query":"select * from people"}
17 McAfee Audit Plugin {"msg-type":"activity", {"msg-type":"activity", "date":" ", "date":" ", "thread-id":"3", "thread-id":"2", "query-id":"29", "query-id":"17", "user":"root", "user":"root", "priv_user":"root", "priv_user":"root", "host":"localhost", "host":"localhost", "ip":"", "ip":"", "cmd":"select", "cmd":"select", "objects": "objects":[{"db":"test","name":"people","obj_type":"table"}], [{"db":"test","name":"people_vw","obj_type":"view"}, "query":"select {"db":"test","name":"people","obj_type":"table"}], * from people"} "query":"select * from people_vw"}
18 Percona Audit Plugin Available for Ships with Percona Server Drop in replacement for Oracle's plugin Limited filtering JSON, XML, CSV output
19 Percona Audit Plugin audit_log_strategy ASYNCHRONOUS PERFORMANCE SEMISYNCHRONOUS SYNCHRONOUS
20 Percona Audit Plugin Support for syslog audit_log_handler = FILE SYSLOG
21 Percona Audit Plugin <AUDIT_RECORD NAME="Query" RECORD="20_ T06:49:49" TIMESTAMP=" T06:53:55 UTC" COMMAND_CLASS="select" CONNECTION_ID="3" STATUS="0" SQLTEXT="select * from people" localhost []" HOST="localhost" OS_USER="" IP="" />
22 Percona Audit Plugin <AUDIT_RECORD NAME="Query" RECORD="32_ T06:49:49" TIMESTAMP=" T06:55:35 UTC" COMMAND_CLASS="select" CONNECTION_ID="4" STATUS="0" SQLTEXT="select * from people_vw" localhost []" HOST="localhost" OS_USER="" IP="" />
23 MariaDB Audit Plugin Available for 5.5+ Expanded Audit API Included by default
24 MariaDB Audit Plugin Table level events CSV output Syslog Plain text passwords Fixed (1.2.0)
25 MariaDB Audit Plugin Filtering server_audit_events server_audit_excl_users server_audit_incl_users
26 MariaDB Audit Plugin :07:25,localhost.localdomain,root,localhost,3,10,QUERY,test,' select * from people',0
27 MariaDB Audit Plugin :11:18,localhost.localdomain,root,localhost,3,9,READ,test,pe ople, :11:18,localhost.localdomain,root,localhost,3,9,QUERY,test,'s elect * from people_vw',0
28 Percona and MariaDB Replication McAfee Slaves log replication events by default *Whitelist blank user {} to prevent
29 Best practices Secure data OS level not logged Utilize log rotation
30 Best practices Sequential IO keep away from random access IO (data files) Use FS with journal to be crash safe(r), EXT4 Synchronizing writes kills performance
31 Performance
32 Audit off Audit on
33 Performance Audit off Audit on
34 Audit off Audit on
35 Log File Storage Secure storage (encryption) Sign logs to ensure not altered Set permissions Store offsite (encrypted of course) Store on read only media
36 Log Aggregation Commercial Oracle Audit Vault McAfee DAM Splunk Open source ELK Stack??? Oracle Audit grep tool
37
38 ELK
39 Elasticsearch Full text and analytics Apache Lucene RESTful web interface 'Schema-free' JSON documents
40 Elasticsearch Index = database Type = table Document = row
41 Logstash Extract [input] Read files, syslog, socket Transform [filter] Filter, mutate, add & drop Load [output] Write to a destination
42 Logstash Output plugins available Nagios and Nagios_nsca XMPP (hipchat, slack, etc.) Pager duty
43 logstash.conf input { file { path => "/var/log/mysql/audit.log" type => "mysql-audit" }
44 logstash.conf filter { if type == audit_log { grok { source => {%GREEDYDATA} target => new_field } } }
45 logstash.conf output { elasticsearch { cluster => "logstash" host => elasticsearch1 } }
46 Kibana Javascript & node.js browser based dashboards Real-time search and analytics Seamless integration with Elasticsearch No auth, use something else!
47 Typical ELK pipeline
48 Alerts Output workflow for Pager duty nagios_nsca hipchat
49 Fin! Useful links The definitive guide to elasticsearch The logstash book
Who did what, when, where and how MySQL Audit Logging. Jeremy Glick & Andrew Moore 20/10/14
Who did what, when, where and how MySQL Audit Logging Jeremy Glick & Andrew Moore 20/10/14 Intro 2 Hello! Intro 3 Jeremy Glick MySQL DBA Head honcho of Chicago MySQL meetup 13 years industry experience
More informationACHIEVING REGULATORY COMPLIANCE WITH MYSQL AUDIT PLUGINS. Jeremy Glick. Andrew Moore. April 2014
ACHIEVING REGULATORY COMPLIANCE WITH MYSQL AUDIT PLUGINS Jeremy Glick Andrew Moore April 2014 Your Speakers Jeremy Glick Lead DBA @ icrossing 13 years working with MySQL Chicago MySQL Meetup Jeremy d glick
More informationUsing Logstash and Elasticsearch analytics capabilities as a BI tool
Using Logstash and Elasticsearch analytics capabilities as a BI tool Pashalis Korosoglou, Pavlos Daoglou, Stefanos Laskaridis, Dimitris Daskopoulos Aristotle University of Thessaloniki, IT Center Outline
More informationMobile Analytics. mit Elasticsearch und Kibana. Dominik Helleberg
Mobile Analytics mit Elasticsearch und Kibana Dominik Helleberg Speaker Dominik Helleberg Mobile Development Android / Embedded Tools http://dominik-helleberg.de/+ Mobile Analytics Warum? Server Software
More informationPowering Monitoring Analytics with ELK stack
Powering Monitoring Analytics with ELK stack Abdelkader Lahmadi, Frédéric Beck INRIA Nancy Grand Est, University of Lorraine, France 2015 (compiled on: June 23, 2015) References online Tutorials Elasticsearch
More informationLog management with Logstash and Elasticsearch. Matteo Dessalvi
Log management with Logstash and Elasticsearch Matteo Dessalvi HEPiX 2013 Outline Centralized logging. Logstash: what you can do with it. Logstash + Redis + Elasticsearch. Grok filtering. Elasticsearch
More informationReal-time Data Analytics mit Elasticsearch. Bernhard Pflugfelder inovex GmbH
Real-time Data Analytics mit Elasticsearch Bernhard Pflugfelder inovex GmbH Bernhard Pflugfelder Big Data Engineer @ inovex Fields of interest: search analytics big data bi Working with: Lucene Solr Elasticsearch
More informationLog Analysis with the ELK Stack (Elasticsearch, Logstash and Kibana) Gary Smith, Pacific Northwest National Laboratory
Log Analysis with the ELK Stack (Elasticsearch, Logstash and Kibana) Gary Smith, Pacific Northwest National Laboratory A Little Context! The Five Golden Principles of Security! Know your system! Principle
More informationAnalyzing large flow data sets using. visualization tools. modern open-source data search and. FloCon 2014. Max Putas
Analyzing large flow data sets using modern open-source data search and visualization tools FloCon 2014 Max Putas About me Operations Engineer - DevOps BS, MS, and CAS in Telecommunications Work/research
More informationLog managing at PIC. A. Bruno Rodríguez Rodríguez. Port d informació científica Campus UAB, Bellaterra Barcelona. December 3, 2013
Log managing at PIC A. Bruno Rodríguez Rodríguez Port d informació científica Campus UAB, Bellaterra Barcelona December 3, 2013 Bruno Rodríguez (PIC) Log managing at PIC December 3, 2013 1 / 21 What will
More informationEfficient Management of System Logs using a Cloud Radoslav Bodó, Daniel Kouřil CESNET. ISGC 2013, March 2013
Efficient Management of System Logs using a Cloud Radoslav Bodó, Daniel Kouřil CESNET ISGC 2013, March 2013 Agenda Introduction Collecting logs Log Processing Advanced analysis Resume Introduction Status
More informationData Discovery and Systems Diagnostics with the ELK stack. Rittman Mead - BI Forum 2015, Brighton. Robin Moffatt, Principal Consultant Rittman Mead
Data Discovery and Systems Diagnostics with the ELK stack Rittman Mead - BI Forum 2015, Brighton Robin Moffatt, Principal Consultant Rittman Mead T : +44 (0) 1273 911 268 (UK) About Me Principal Consultant
More informationInformation Retrieval Elasticsearch
Information Retrieval Elasticsearch IR Information retrieval (IR) is the activity of obtaining information resources relevant to an information need from a collection of information resources. Searches
More informationThe MariaDB Audit Plugin
The MariaDB Audit Plugin Introduction mariadb.com MariaDB and MySQL are used in a broad range of environments, but if you needed to record user access to be in compliance with auditing regulations for
More informationDave Stokes MySQL Community Manager
The Proper Care and Feeding of a MySQL Server for Busy Linux Admins Dave Stokes MySQL Community Manager Email: David.Stokes@Oracle.com Twiter: @Stoker Slides: slideshare.net/davidmstokes Safe Harbor Agreement
More informationDeveloping an Application Tracing Utility for Mule ESB Application on EL (Elastic Search, Log stash) Stack Using AOP
Developing an Application Tracing Utility for Mule ESB Application on EL (Elastic Search, Log stash) Stack Using AOP Mohan Bandaru, Amarendra Kothalanka, Vikram Uppala Student, Department of Computer Science
More informationBernd Ahlers Michael Friedrich. Log Monitoring Simplified Get the best out of Graylog2 & Icinga 2
Bernd Ahlers Michael Friedrich Log Monitoring Simplified Get the best out of Graylog2 & Icinga 2 BEFORE WE START Agenda AGENDA Introduction Tools Log History Logs & Monitoring Demo The Future Resources
More informationApril 8th - 10th, 2014 LUG14 LUG14. Lustre Log Analyzer. Kalpak Shah. DataDirect Networks. ddn.com. 2014 DataDirect Networks. All Rights Reserved.
April 8th - 10th, 2014 LUG14 LUG14 Lustre Log Analyzer Kalpak Shah DataDirect Networks Lustre Log Analysis Requirements Need scripts to parse Lustre debug logs Only way to effectively use the logs for
More informationElasticsearch on Cisco Unified Computing System: Optimizing your UCS infrastructure for Elasticsearch s analytics software stack
Elasticsearch on Cisco Unified Computing System: Optimizing your UCS infrastructure for Elasticsearch s analytics software stack HIGHLIGHTS Real-Time Results Elasticsearch on Cisco UCS enables a deeper
More informationUsing NXLog with Elasticsearch and Kibana. Using NXLog with Elasticsearch and Kibana
Using NXLog with Elasticsearch and Kibana i Using NXLog with Elasticsearch and Kibana Using NXLog with Elasticsearch and Kibana ii Contents 1 Setting up Elasticsearch and Kibana 1 1.1 Installing Elasticsearch................................................
More informationLogging on a Shoestring Budget
UNIVERSITY OF NEBRASKA AT OMAHA Logging on a Shoestring Budget James Harr jharr@unomaha.edu Agenda The Tools ElasticSearch Logstash Kibana redis Composing a Log System Q&A, Conclusions, Lessons Learned
More informationReliable log data transfer
OWASP Switzerland Chapter December 2015 Reliable log data transfer About (r)syslog, logstash, and log data signing A field report pascal.buchbinder@adnovum.ch Agenda Why we need log data transfer Syslog
More informationLog Management with Open-Source Tools. Risto Vaarandi SEB Estonia
Log Management with Open-Source Tools Risto Vaarandi SEB Estonia Outline Why use open source tools for log management? Widely used logging protocols and recently introduced new standards Open-source syslog
More informationBlackboard Open Source Monitoring
Blackboard Open Source Monitoring By Greg Lloyd Submitted to the Faculty of the School of Information Technology in Partial Fulfillment of the Requirements for the Degree of Bachelor of Science in Information
More informationMonitoring Galera with MONyog
Monitoring Galera with MONyog Abstract This white paper introduces the drawbacks of traditional MySQL High Availability set ups and suggests a modern, best- in- class High Availability solution utilising
More informationUsing MySQL for Big Data Advantage Integrate for Insight Sastry Vedantam sastry.vedantam@oracle.com
Using MySQL for Big Data Advantage Integrate for Insight Sastry Vedantam sastry.vedantam@oracle.com Agenda The rise of Big Data & Hadoop MySQL in the Big Data Lifecycle MySQL Solutions for Big Data Q&A
More informationWHITE PAPER Redefining Monitoring for Today s Modern IT Infrastructures
WHITE PAPER Redefining Monitoring for Today s Modern IT Infrastructures Modern technologies in Zenoss Service Dynamics v5 enable IT organizations to scale out monitoring and scale back costs, avoid service
More informationDatabase Administration with MySQL
Database Administration with MySQL Suitable For: Database administrators and system administrators who need to manage MySQL based services. Prerequisites: Practical knowledge of SQL Some knowledge of relational
More informationAutomated Data Ingestion. Bernhard Disselhoff Enterprise Sales Engineer
Automated Data Ingestion Bernhard Disselhoff Enterprise Sales Engineer Agenda Pentaho Overview Templated dynamic ETL workflows Pentaho Data Integration (PDI) Use Cases Pentaho Overview Overview What we
More informationLog management with Graylog2 Lennart Koopmann, FrOSCon 2012. Mittwoch, 29. August 12
Log management with Graylog2 Lennart Koopmann, FrOSCon 2012 About me 24 years old, Software Engineer at XING AG Hamburg, Germany @_lennart Graylog2 Free and open source log management system Started in
More informationStreamlining Infrastructure Monitoring and Metrics in IT- DB-IMS
Streamlining Infrastructure Monitoring and Metrics in IT- DB-IMS August 2015 Author: Charles Callum Newey Supervisors: Giacomo Tenaglia Artur Wiecek CERN openlab Summer Student Report Project Specification
More informationHigh-availability with Galera Cluster for MySQL
High-availability with Galera Cluster for MySQL LinuxTag 2014 10. Mai 2014, Berlin by oli.sennhauser@fromdual.com 1 / 22 About FromDual GmbH FromDual provides neutral and independent: Consulting for MySQL,
More informationIntroduction. Background
Introduction Bro is an open-source network security monitor which inspects network traffic looking for suspicious activity. The Bro framework provides an extensible scripting language that allows an analysis
More informationFinding the needle in the haystack with ELK
Finding the needle in the haystack with ELK Elasticsearch for Incident Handlers and Forensic Analysts S by Christophe@Vandeplas.com Whoami S Working for the Belgian Government my own company S Incident
More information<Insert Picture Here> MySQL Security In A Cloudy World
MySQL Security In A Cloudy World Dave Stokes @Stoker David.Stokes @Oracle.com MySQL Community Manager slides: slideshare.net/davidmstokes Safe Harbor Statement The following is intended
More informationMySQL Replication. openark.org
MySQL Replication Solutions & Enhancements Shlomi Noach June 2011 What is MySQL Replication? Replication is a mechanism built into MySQL. It allows a MySQL server (Master) to log changes made to schema
More informationProcessing millions of logs with Logstash
and integrating with Elasticsearch, Hadoop and Cassandra November 21, 2014 About me My name is Valentin Fischer-Mitoiu and I work for the University of Vienna. More specificaly in a group called Domainis
More informationEfficient Management of System Logs using a Cloud
, CESNET z.s.p.o.,zikova 4, 160 00 Praha 6, Czech Republic and University of West Bohemia,Univerzitní 8, 306 14 Pilsen, Czech Republic E-mail: bodik@civ.zcu.cz Daniel Kouřil, CESNET z.s.p.o.,zikova 4,
More informationComparative Analysis of Open-Source Log Management Solutions for Security Monitoring and Network Forensics
Comparative Analysis of Open-Source Log Management Solutions for Security Monitoring and Network Forensics Risto Vaarandi, Paweł Niziski NATO Cooperative Cyber Defence Centre of Excellence, Tallinn, Estonia
More informationTesting Automation for Distributed Applications By Isabel Drost-Fromm, Software Engineer, Elastic
Testing Automation for Distributed Applications By Isabel Drost-Fromm, Software Engineer, Elastic The challenge When building distributed, large-scale applications, quality assurance (QA) gets increasingly
More informationTable of Contents. Open-Xchange Authentication & Session Handling. 1.Introduction...3
Open-Xchange Authentication & Session Handling Table of Contents 1.Introduction...3 2.System overview/implementation...4 2.1.Overview... 4 2.1.1.Access to IMAP back end services...4 2.1.2.Basic Implementation
More informationCloudStack Metering Working with the Usage Data. Tariq Iqbal Senior Consultant tariq.iqbal@shapeblue.com Twitter: @TariqIqbal_ @ShapeBlue
CloudStack Metering Working with the Usage Data Tariq Iqbal Senior Consultant tariq.iqbal@shapeblue.com Twitter: @TariqIqbal_ @ShapeBlue About Me Involved with CloudStack before donation to Apache Built
More informationThe MongoDB Tutorial Introduction for MySQL Users. Stephane Combaudon April 1st, 2014
The MongoDB Tutorial Introduction for MySQL Users Stephane Combaudon April 1st, 2014 Agenda 2 Introduction Install & First Steps CRUD Aggregation Framework Performance Tuning Replication and High Availability
More informationMySQL always-up with Galera Cluster
MySQL always-up with Galera Cluster SLAC 2014 May 14, 2014, Berlin by oli.sennhauser@fromdual.com 1 / 31 About FromDual GmbH FromDual provides neutral and independent: Consulting for MySQL, Galera Cluster,
More informationA New Approach to Network Visibility at UBC. Presented by the Network Management Centre and Wireless Infrastructure Teams
A New Approach to Network Visibility at UBC Presented by the Network Management Centre and Wireless Infrastructure Teams Agenda Business Drivers Technical Overview Network Packet Broker Tool Network Monitoring
More informationmframe Software Development Platform KEY FEATURES
mframe Software Development Platform mframe is a comprehensive software development platform for building modern modular WEB and B2B applications. It consists of basic core modules as well as other delevoped
More informationLog Management with Open-Source Tools. Risto Vaarandi rvaarandi 4T Y4H00 D0T C0M
Log Management with Open-Source Tools Risto Vaarandi rvaarandi 4T Y4H00 D0T C0M Outline Why do we need log collection and management? Why use open source tools? Widely used logging protocols and recently
More informationWelcome to Virtual Developer Day MySQL!
Welcome to Virtual Developer Day MySQL! Keynote: Developer and DBA Guide to What s New in MySQL Andrew Morgan - MySQL Product Management @andrewmorgan www.clusterdb.com 1 Program Agenda 1:00 PM Keynote:
More information1Fortinet. 2How Logtrust. Firewall technologies from Fortinet offer integrated, As your business grows and volumes of data increase,
Fortinet 1Fortinet Firewall technologies from Fortinet offer integrated, high-performance protection against today s wide range of threats targeting applications, data and users. Fortinet s firewall technology
More informationsyslog-ng 3.0 Monitoring logs with Nagios
syslog-ng 3.0 Monitoring logs with Nagios Scheidler Balázs balazs.scheidler@balabit.hu Table of Contents Short introduction to syslog The syslog-ng story Changes in the log processing landscape New vision
More informationHow To Use Elasticsearch
Elasticsearch, Logstash, and Kibana (ELK) Dwight Beaver dsbeaver@cert.org Sean Hutchison shutchison@cert.org January 2015 2014 Carnegie Mellon University This material is based upon work funded and supported
More informationPercona Server features for OpenStack and Trove Ops
Percona Server features for OpenStack and Trove Ops George O. Lorch III Software Developer Percona Vipul Sabhaya Lead Software Engineer - HP Overview Discuss Percona Server features that will help operators
More informationOracle E-Business Suite APPS, SYSADMIN, and oracle Securing Generic Privileged Accounts. Stephen Kost Chief Technology Officer Integrigy Corporation
Oracle E-Business Suite APPS, SYSADMIN, and oracle Securing Generic Privileged Accounts May 15, 2014 Mike Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer Integrigy
More informationBuilding a logging pipeline with Open Source tools. Iñigo Ortiz de Urbina Cazenave
Building a logging pipeline with Open Source tools Iñigo Ortiz de Urbina Cazenave NLUUG Utrecht - Netherlands 28 May 2015 whoami; 2 Iñigo Ortiz de Urbina Cazenave Systems Engineer whoami; groups; 3 Iñigo
More informationTushar Joshi Turtle Networks Ltd
MySQL Database for High Availability Web Applications Tushar Joshi Turtle Networks Ltd www.turtle.net Overview What is High Availability? Web/Network Architecture Applications MySQL Replication MySQL Clustering
More informationSisense. Product Highlights. www.sisense.com
Sisense Product Highlights Introduction Sisense is a business intelligence solution that simplifies analytics for complex data by offering an end-to-end platform that lets users easily prepare and analyze
More informationMySQL Administration and Management Essentials
MySQL Administration and Management Essentials Craig Sylvester MySQL Sales Consultant 1 Safe Harbor Statement The following is intended to outline our general product direction. It
More information5 Percona Toolkit tools that could save your day. Stéphane Combaudon FOSDEM February 3rd, 2013
5 Percona Toolkit tools that could save your day Stéphane Combaudon FOSDEM February 3rd, 2013 What is Percona Toolkit Set of cli tools to perform common tasks that are painful to do manually (~30 tools)
More informationGroup Management Server User Guide
Group Management Server User Guide Table of Contents Getting Started... 3 About... 3 Terminology... 3 Group Management Server is Installed what do I do next?... 4 Installing a License... 4 Configuring
More informationIntegration of IT-DB Monitoring tools into IT General Notification Infrastructure
Integration of IT-DB Monitoring tools into IT General Notification Infrastructure August 2014 Author: Binathi Bingi Supervisor: David Collados Polidura CERN openlab Summer Student Report 2014 1 Project
More informationFireEye App for Splunk Enterprise
FireEye App for Splunk Enterprise FireEye App for Splunk Enterprise Documentation Version 1.1 Table of Contents Welcome 3 Supported FireEye Event Formats 3 Original Build Environment 3 Possible Dashboard
More informationHigh Availability Solutions for the MariaDB and MySQL Database
High Availability Solutions for the MariaDB and MySQL Database 1 Introduction This paper introduces recommendations and some of the solutions used to create an availability or high availability environment
More informationLog Analysis as a Service using open source scalable systems. Gurvinder Singh Dahiya, Uninett AS Belgrade Security Workshop, 20.03.
Log Analysis as a Service using open source scalable systems Gurvinder Singh Dahiya, Uninett AS Belgrade Security Workshop, 20.03.2015 Motivation Distributed Systems Centeralized interface to logs Easier
More informationACEYUS REPORTING. Aceyus Intelligence Executive Summary
ACEYUS REPORTING Aceyus Intelligence Executive Summary Aceyus, Inc. June 2015 1 ACEYUS REPORTING ACEYUS INTELLIGENCE EXECUTIVE SUMMARY Aceyus Intelligence is a suite of products for optimizing contact
More informationArchitecture and Mode of Operation
Software- und Organisations-Service Open Source Scheduler Architecture and Mode of Operation Software- und Organisations-Service GmbH www.sos-berlin.com Scheduler worldwide Open Source Users and Commercial
More informationOpen Source Monitoring
Open Source Monitoring Icinga Team Munich Monitoring Workshop 06/13/2012 WWW.ICINGA.ORG Agenda! Introduction! Tools and Platform! Icinga vs. Nagios! Architecture! New in Icinga! Current Development! Live
More informationtibbr Now, the Information Finds You.
tibbr Now, the Information Finds You. - tibbr Integration 1 tibbr Integration: Get More from Your Existing Enterprise Systems and Improve Business Process tibbr empowers IT to integrate the enterprise
More informationA Year of HTCondor Monitoring. Lincoln Bryant Suchandra Thapa
A Year of HTCondor Monitoring Lincoln Bryant Suchandra Thapa HTCondor Week 2015 May 21, 2015 Analytics vs. Operations Two parallel tracks in mind: o Operations o Analytics Operations needs to: o Observe
More informationHow To Monitor Mysql With Zabbix
MySQL Performance Monitoring with Zabbix An alternative to the MySQL Enterprise Monitor? by Oli Sennhauser oli.sennhauser@fromdual.com http:// 1 How many of you... monitor their database servers? monitor
More informationowncloud Architecture Overview
owncloud Architecture Overview owncloud, Inc. 57 Bedford Street, Suite 102 Lexington, MA 02420 United States phone: +1 (877) 394-2030 www.owncloud.com/contact owncloud GmbH Schloßäckerstraße 26a 90443
More informationPerformance for Site Builders
Performance for Site Builders Erik Webb Erik Webb @erikwebb Senior Technical Consultant Acquia Acquia Agenda Introduction Evaluating Modules What to Look For Types of Caching Configuring Drupal Performance-related
More informationStartup guide for Zimonitor
Page 1 of 5 Startup guide for Zimonitor This is a short introduction to get you started using Zimonitor. Start by logging in to your version of Zimonitor using the URL and username + password sent to you.
More informationVMware vcenter Log Insight Security Guide
VMware vcenter Log Insight Security Guide vcenter Log Insight 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationSCF/FEF Evaluation of Nagios and Zabbix Monitoring Systems. Ed Simmonds and Jason Harrington 7/20/2009
SCF/FEF Evaluation of Nagios and Zabbix Monitoring Systems Ed Simmonds and Jason Harrington 7/20/2009 Introduction For FEF, a monitoring system must be capable of monitoring thousands of servers and tens
More informationMyISAM Default Storage Engine before MySQL 5.5 Table level locking Small footprint on disk Read Only during backups GIS and FTS indexing Copyright 2014, Oracle and/or its affiliates. All rights reserved.
More informationMySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam sastry.vedantam@oracle.com Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
More informationDatabase Security. Principle of Least Privilege. DBMS Security. IT420: Database Management and Organization. Database Security.
Database Security Rights Enforced IT420: Database Management and Organization Database Security Textbook: Ch 9, pg 309-314 PHP and MySQL: Ch 9, pg 217-227 Database security - only authorized users can
More informationUsing elasticsearch, logstash and kibana to create realtime dashboards
Using elasticsearch, logstash and kibana to create realtime dashboards Alexander Reelsen @spinscale alexander.reelsen@elasticsearch.com Agenda The need, complexity and pain of logging Logstash basics Usage
More informationContents. Pentaho Corporation. Version 5.1. Copyright Page. New Features in Pentaho Data Integration 5.1. PDI Version 5.1 Minor Functionality Changes
Contents Pentaho Corporation Version 5.1 Copyright Page New Features in Pentaho Data Integration 5.1 PDI Version 5.1 Minor Functionality Changes Legal Notices https://help.pentaho.com/template:pentaho/controls/pdftocfooter
More informationUser Guide. Version R91. English
AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from
More informationModern Web development and operations practices. Grig Gheorghiu VP Tech Operations Nasty Gal Inc. @griggheo
Modern Web development and operations practices Grig Gheorghiu VP Tech Operations Nasty Gal Inc. @griggheo Modern Web stack Aim for horizontal scalability! Ruby/Python front-end servers (Sinatra/Padrino,
More informationKony Mobile Application Management (MAM)
Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview
More informationAutomatic Workload Characterization Using System Log Analysis
Automatic Workload Characterization Using System Log Analysis Mahmoud Awad Daniel A. Menascé Dept. of Computer Science, MS 4A5 Volgenau School of Engineering George Mason University Fairfax, VA 22030,
More informationOverview of Databases On MacOS. Karl Kuehn Automation Engineer RethinkDB
Overview of Databases On MacOS Karl Kuehn Automation Engineer RethinkDB Session Goals Introduce Database concepts Show example players Not Goals: Cover non-macos systems (Oracle) Teach you SQL Answer what
More informationOpen PostgreSQL Monitoring
Open PostgreSQL Monitoring A brand new & free monitoring suite Jean-Paul Argudo / Julien Rouhaud Dalibo - www.dalibo.org PostgreSQL Conference Europe 2014 - October, 22 1 / 26 Origins Comparison with Oracle
More informationMcAfee Database Activity Monitoring 5.0.0
Product Guide McAfee Database Activity Monitoring 5.0.0 For use with epolicy Orchestrator 4.6.3-5.0.1 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationLog infrastructure & Zabbix. logging tools integration
Log infrastructure & Zabbix logging tools integration About me Me Linux System Architect @ ICTRA from Belgium (...) IT : Linux & SysAdmin work, Security, ICTRA ICT for Rail for Transport Mobility Security
More informationMySQL and Hadoop Big Data Integration
MySQL and Hadoop Big Data Integration Unlocking New Insight A MySQL White Paper December 2012 Table of Contents Introduction... 3 The Lifecycle of Big Data... 4 MySQL in the Big Data Lifecycle... 4 Acquire:
More informationWhy should you look at your logs? Why ELK (Elasticsearch, Logstash, and Kibana)?
Authors Introduction This guide is designed to help developers, DevOps engineers, and operations teams that run and manage applications on top of AWS to effectively analyze their log data to get visibility
More informationHow Comcast Built An Open Source Content Delivery Network National Engineering & Technical Operations
How Comcast Built An Open Source Content Delivery Network National Engineering & Technical Operations Jan van Doorn Distinguished Engineer VSS CDN Engineering 1 What is a CDN? 2 Content Router get customer
More informationMCNC Webinar Series. Syslog
MCNC Webinar Series Syslog Gonz Guzman Lead Client Network Engineer gonz@mcnc.org Bradley Stevens Sr Client Network Engineer bstevens@mcnc.org Webinar Links: www.mcnc.org/cne-webinars Agenda What is syslog?
More informationMySQL Strategy. Morten Andersen, MySQL Enterprise Sales. Copyright 2014 Oracle and/or its affiliates. All rights reserved.
MySQL Strategy Morten Andersen, MySQL Enterprise Sales Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not
More informationPutting Apache Kafka to Use!
Putting Apache Kafka to Use! Building a Real-time Data Platform for Event Streams! JAY KREPS, CONFLUENT! A Couple of Themes! Theme 1: Rise of Events! Theme 2: Immutability Everywhere! Level! Example! Immutable
More informationXpoLog Competitive Comparison Sheet
XpoLog Competitive Comparison Sheet New frontier in big log data analysis and application intelligence Technical white paper May 2015 XpoLog, a data analysis and management platform for applications' IT
More informationOracle Database Security Solutions
Oracle Database Security Solutions Eric Cheung Senior Manager, Technology Sales Consulting Eric.cheung@oracle.com May 2008 Key Drivers for Data Security Privacy and Compliance Sarbanes-Oxley
More informationThe syslog-ng Premium Edition 5F2
The syslog-ng Premium Edition 5F2 PRODUCT DESCRIPTION Copyright 2000-2014 BalaBit IT Security All rights reserved. www.balabit.com Introduction The syslog-ng Premium Edition enables enterprises to collect,
More informationOracle Database 12c Plug In. Switch On. Get SMART.
Oracle Database 12c Plug In. Switch On. Get SMART. Duncan Harvey Head of Core Technology, Oracle EMEA March 2015 Safe Harbor Statement The following is intended to outline our general product direction.
More informationHayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks
EXTENDING ACCESS WHILE ENHANCING CONTROL FOR YOUR ORGANIZATION S DATA LEVERAGE THE POWER OF F5 AND ORACLE TO DELIVER SECURE ACCESS TO APPLICATIONS AND DATABASES Hayri Tarhan, Sr. Manager, Public Sector
More informationDeveloping a Web Server Platform with SAPI Support for AJAX RPC using JSON
Revista Informatica Economică, nr. 4 (44)/2007 45 Developing a Web Server Platform with SAPI Support for AJAX RPC using JSON Iulian ILIE-NEMEDI, Bucharest, Romania, inemedi@ie.ase.ro Writing a custom web
More informationTable Of Contents. 1. GridGain In-Memory Database
Table Of Contents 1. GridGain In-Memory Database 2. GridGain Installation 2.1 Check GridGain Installation 2.2 Running GridGain Examples 2.3 Configure GridGain Node Discovery 3. Starting Grid Nodes 4. Management
More information