Scalable Logging Solutions on Cloud

Size: px
Start display at page:

Download "Scalable Logging Solutions on Cloud"

Transcription

1 Scalable Logging Solutions on Cloud Saurabh Phaltane*, Anand Nahar** & Nikhil Garge*** *Amazon and Linux Admin, Cloud, e-zest Solutions, Pune, Maharashtra, INDIA. saurabh.phaltane{atgmail{dotcom **Subject Matter Expert, Amdocs, Pune, Maharashtra, INDIA, andy9391{atgmail{dotcom ***Software Engineer, e-zest Solutions, Pune, Maharashtra, INDIA. nikhilgarge007{atgmail{dotcom Abstract Centralized Logging from Scalable Servers on Cloud to estimate, analyze and predict the performances on Cloud is a need of the day for the system administrators where aggregating the logs and advanced analytics in real-time serves a major tool for system administrators to track and debug various critical issues in environments. The scope of the paper revolves around the challenges and different approaches to address the issue and experiences of implementing the logging solutions in Amazon Cloud VPC environments, applicable in general cloud environments. The paper discusses different approaches that can used to aggregate the logs in Cloud environments and present the overview of designing architectures for the same. The paper also presents a case study for configuring and optimizing graylog2 on cloud under high logging conditions. Keywords Analytics; AWS; Centralized Logging; Cloud Computing; ElasticSearch; Graylog; Logstash; Optimization; Rsyslog; VPC. Abbreviations Amazon Web Services (AWS); Transmission Control Protocol (TCP); Virtual Private Cloud (VPC). I. INTRODUCTION T HE Era of Cloud and Cloud computing has put forth new metrics of Agility and scalability in place. The targeted efforts and energy investments of the sys admins have significantly taken new direction where the developers/administrators have adopted new approaches for management and monitoring the Applications on cloud. The Scalability and Elasticity renders new set of challenges to be addressed and log analytics for the purpose of breaking the actual event and determining the root cause of Application performance debugging still maintains its monopoly. Logging in logs from different scalable environments to a centralized location was far more an ancient traditional point of concern and sys admins expects cleaner, faster and easier modules for analytics over the collected logs to predict analyze and enhance the performance of the Applications. According to Rajiv Bhandari & Nitin Mishra (2011), Cloud computing is most probability of collection such as service oriented topic. In storage total growth is 54% of Explosion of information. Large scientific calculation such as medicine, forecast, and healthcare is most energetic and faster processing capacity II. SCOPE The scope of paper revolves around the different challenges and approaches to collect, analyze the logs in scalable cloud environment where agility and reliability are the major points. The paper puts forth the different approaches to centralize the logs and puts forward these cases of graylog and test results obtained after optimizing logging solution in high logging environment. III. UNDERSTANDING THE DIFFERENT LOG This list below tries to highlight the different logs in Linux environments with different understanding the different logs provide as highlighted by Ramesh Natarajan (2014). 1. /var/log/messages This contain the general system messages that are generated right from the system boot that may include kern, auth, mail etc. 2. /var/log/dmesg information about the hardware devices that the kernel detects during boot process 3. /var/log/auth.log contains user authorization and access level permission logs 4. /var/log/boot.log Contains information that are logged when the system boots 5. /var/log/daemon.log The daemons running in background logs these logs to 6. /var/log/dpkg.log The dpkg are the package installer logs generated during packages updates and installation and removal. 7. /var/log/kern.log The kernel level logs are the crucial piece of logs useful in debugging kernel level issues. 8. /var/log/lastlog Displays the recent login information for all the users. ISSN: Published by The Standard International Journals (The SIJ) 208

2 9. /var/log/maillog The mail logs provide us the logs that help in debugging the sendmail, mail relay, mailqueue logs 10. /var/log/user.log Contains information about all user level logs 11. /var/log/xorg.x.log Log messages from the X 12. /var/log/alternatives.log Information by the updatealternatives are logged into this log file. 13. /var/log/btmp The file logs the information about the about failed login attempts. 14. /var/log/cups The printer and print server logs are generated here. 15. /var/log/anaconda.log The installation level logs are stored in anaonda.log 16. /var/log/yum.log The packages and patch level logs are generated and stored in the yum logs. 17. /var/log/cron The system setlogs are stored in cron logs and useful in debugging the cron set by the servers. 18. /var/log/secure The secure is the most important piece to track when a need to debug the security issues,intrusion attack etc are detected. 19. /var/log/wtmp Contains login records. With wtmp we can find who has logged in the system. IV. MORE LOGS Apart from the above stated logs the system performance determined by the application level logs that might arise out of: Webservers; o Access Logs o Error logs Performance Logs and metrics Application logs Program Exceptions (e.g. Java Exceptions) o Application general Exceptions Application custom generated set exceptions. According to Jan Waldamn, providers of web content were the first one who lack more detailed and sophisticated reports based on server logs. They require to detect behavioral patterns, paths, trends etc. Simple statistical methods do not satisfy these needs so an advanced approach must be used. The events and logs are many, however collecting logs to centralized location and alert generation and smart way of analytics over this collected data and point in time triggers in any application that convey certain and fruitful information are all necessary to analyze, debug and predict the performance of applications on cloud. The above stated logs are the wide domains of logs, the system whose entire health is determined by the output of the logs and predicting and determining the performance of the application becomes a major concern in cloud environments where machines are remotely located and created /destructed dynamically on scale up and scale down. According to Wolfgang Ley & Uwe Ellerman, one approach is to have a human expert define a set of message patterns to find, along with desired actions to be taken when encountering them. The effort invested in writing and maintaining these rules is proportional to the number of message types and the rate at which they change. Another approach according to Vaarandi (2002), for log analysis focuses on visualizing the log data in a useful way. According to Osmar R. Zaane et al., (1988), there are over 30 commercially available applications for web log analysis and many more free available on the Internet. Regardless of their price, they are disliked by their user and considered too slow, inflexible and difficult to maintain. Effective measure to centralize the logs in real time and logs processing to generate the real time alerts in scalable and dynamic environments is really point of concern for the Applications on cloud and can be addressed in various methods of log aggregation and I would like to highlight the approaches of log aggregation and method by which we achieved the logging in the big environment of 200+ Linux environment. V. LOGGING SOLUTIONS AND DISTRIBUTED LOGGING According to Distributed syslog architectures with syslog-ng Premium (2013), when implementing a distributed system logging infrastructure, you must ensure that the following requirements are fulfilled: The messages sent by the end systems arrive to the server (reliable transfer). No messages are lost when the network or the server is temporarily down (disk buffer). Communication to the central server is encrypted, so third parties cannot gain access to sensitive data (SSL/TLS support). o 5.1. Rsyslog The identity of the end systems is verified, so it is not possible to inject fake log messages into the central logs Rsyslog Log stash Graylog According to Peter Matulis (2008), most widely used logging solution and most preferably on Linux/Unix systems is log aggregator for major system logs. The rsyslog [ 2014] provide various facilities to send the logs to remote locations over TCP or UDP layers. Full Track and logging control in environments advanced filtering capabilities. Collect, transform and transfer or centralize the logs this tool certainly deserves the praise from administrators as the Swiss knife. ISSN: Published by The Standard International Journals (The SIJ) 209

3 LogStash provides a wide support for easy to use parsers that are more user friendly over the perl based parsing syntaxes. The three blocks with relevant filters makes log processing a great go. LogStash provides a real-time log processing on the go and certainly serves a best tool available for analyzing and making more out of our data. For a Free and open source, scalable logging solutions with advanced analytical capabilities then Graylog tops as a perfect logging solution. Grok based filters can be specified: GET /index.html The pattern for this could be: %{IP: client %{WORD: method %{URIPATHPARAM: request %{NUMBER: bytes %{NUMBER: duration Figure 1: Rsyslog Centralized Logging Schematic View According to Peter Matulis (2008), Rsyslog helps achieve: Event analysis Event reporting Event remediation Event viewer Event logging architecture Efficient Architecture design is an important consideration while designing the architecture for centralized logging with rsyslog LogStash Figure 2: Sys-Logger Architecture According to [ 2014] is the next solution that is available in both open source and proprietary version gives the power to dig into your logs, roll and dice your logs and certainly determine the mines of your data. The easy configurable script of log stash with advanced support to with wide availability of diverse plug-in the tool greatly integrates with many input and output solutions. More interesting fact about logstash comes from the fact about its advanced support for drool based logs mangling and advanced functionality to crop the wide raw log data into parse able and more manageable, meaningful data for analysis. The mere syntactical format gives a great relief in configuration: input { filter { Output{ 5.3. Graylog2 According to [ 2014] the Graylog2 App is the core component of the Graylog installation that acts as a centralized logger. The Graylog App logs the incoming logs on the UDP/TCP port into the appropriate elastic search database. Written in Java with advanced analytical capabilities, the core logic is to efficiently use the REST API call of ElasticSearch that lies with the Graylog App. We employed a combo of the above technologies and achieved a scalable logging solution on cloud. According to Peter Matulis (2008), the rsyslog agent running at individual nodes that aggregated the data and pushed the logs over to the centralized logger. /etc/rsyslog.conf Graylog: The minimal configuration in our rsyslog configuration was able to deliver the logs to a centralized logging repository on cloud. The application level logs can be polled and piped by using the imfile module of the rsyslogger that effectively greps you from major tasks of configuring the logs to a central location. $ModLoadimfile # needs to be done just once # File 1 $InputFileName /path/to/file1 $InputFileTag File-tag1: ISSN: Published by The Standard International Journals (The SIJ) 210

4 $InputFileStateFilestat_pointer $InputFileSeverityseverity_of_log $InputFileFacility local6 $InputRunFileMonitor The solution provided a classis solution to serialized Webserver log of Apache, ngnix, etc. Messages that was generated the extension added in value by logging in logs very easily all the single liner logs. The major concern for Application logs where the logs are not serialized those generated by Tomcat applications really makes it use the advanced logging techniques like GELF [ 2014] format for graylog is one of the useful format for logging the nonserialized messages. As per Anton Yakimov (2013), the configuration looks like given below: # Define the graylog2 destination log4j.appender.graylog2=org.graylog2.log.gelfappender log4j.appender.graylog2.grayloghost=graylog2.example. com log4j.appender.graylog2.originhost=my.machine.exampl e.com log4j.appender.graylog2.facility=gelf-java log4j.appender.graylog2.layout=org.apache.log4j.pattern Layout log4j.appender.graylog2.extractstacktrace=true log4j.appender.graylog2.addextendedinformation=true log4j.appender.graylog2.additionalfields={'environment' : 'DEV', 'application': 'MyAPP' # Send all INFO logs to graylog2 log4j.rootlogger=info, graylog2 After the logs are concentrated at single location to the graylog centralized logger all its need to index the logs and do the real analytics on the logs generating the true analytics on the logs. The Graylog provides and similar even LogStash provide the high end capabilities to log in the messages of the logs. The core of graylog logger is the Apache lucence based framework called ElasticSearch, which is the one that plays the entire magic of logging the logs. By passing the graylog and developing a custom logger to this indexer is all way possible. But the scalable capability the Graylog provides is really remarkable: Flexibility to pre-parse the logs with Grook based regexz filters Ability to index logs with tags and filter Almost real-time filtering and index management in the ElasticSearch nodes. Figure 3: Graylog2 Architecture The setup depicted below provides a more robust configuration that can be configured in AWS environments. Each and every log hitting the Graylog can be evaluated against the drools regex to log the message in the most effective and useable format. According to [ /documentation/general/rewriting] the Drools functionality comes with in-built support by enabling the Graylog.drl the drool rules files in the Graylog configuration. The set of rules in the Graylog.drl can be customized to parse the relevant log and extract the important files in the message. Along with parsing the messages of Graylog itself, the GELF Loggers supported in diverse languages including per, python, java,.net etc. play it easy to log application level logs to Graylog. The GELF Format can be pre-parsed and sent in JSON String or zipped format over UDP to the Graylog server. Graylog logger App server can be scaled up to multiple instances logging into same ElasticSearch bucked in events of high Message logging. Optimization of Graylog Server for High Load Conditions For High Load environments where the number of messages per second exceed 200 messages per second we observed the Graylog server needs some performance tunings and we worked around the configurations and we find that the above configuration in the graylog can be tuned for High Load environments: We observed the use case under a load of 500 messages and we configured and optimized the configuration and found it optimal. The batch size of the number of messages that are delivered to the ElasticSearch and we found the default 5000 as working great. output_batch_size = 5000 ISSN: Published by The Standard International Journals (The SIJ) 211

5 The number of default running processors can be optimized here and can be increased, however we find increasing the number of parallel processing reflected in high CPU so we find the configuration optimal for the above messages. Raise this number if your buffers are filling up is recommended but we recommend not increasing the value. processbuffer_processors = 5 outputbuffer_processors = 5 The processor wait strategy Blocking is best suited when the throughput required is high, however when chances on compromising performance to CPU load the strategy to utilize the yielding worked for us. processor_wait_strategy = yielding For Optimal performance tuning the ring size comes very handy and useful when the very high logging is expected. As per the cache space available we arrived to a ring size of for the above scenario. ring_size = 2048 These are few of the parameters that we have to optimize in order to have optimal performance under High load conditions and there is no specific formula to calculate the values but the above benchmarked values work great. Apart from the above configurations the ElasticSearch needs configurations and Optimizations and we find the optimal allocation of heap can certainly help sort out many issues. The Allocation heap size of about 70% of your available RAM for a dedicated Machine can effectively help you decrease the load and optimize the garbage collector run cycles. Also the Java Heap Xmx and Xms are recommended to be equal (Xmx = Xms) for optimal performance of ElasticSearch node. Running multiples nodes of ElasticSearch help you achieve High availability and disaster recovery in High Logging environments and zenautodiscovery is the preferred method that we observed. VI. CONCLUSION Log Aggregation on environments on cloud where the environments are scalable sets where machines are dynamically created and destructed new set of challenges to be addressed and implementation of efficient architectural design with right Tools and Technologies robust logging aggregator becomes a need to predict, analyze and debug critical issues and plan proactive actions as necessary. The solutions provided in this tutorial highlight few of the solutions that can address the issue of centralized logging and case study of graylog provides an overview of our experimentation and results achieved in the High logging Amazon VPC environment with about 200+ servers logging on average 500+ messages per second. Analyzing Security, performance and predicting failure detection is large environments where security of data and logs are too important the above stated solutions can help achieve the required results to a considerable extent. REFERENCES [1] Rsyslog. [2] [3] Wolfgang Ley & Uwe Ellerman. Logsurfer. [4] Rajiv R. Bhandari & Nitin Mishra (2011), Encrypted IT Auditing and Log Management on Cloud Computing, IJCSI, [5] Jan Waldamn, Log File Analysis Technical Report. [6] Peter Matulis (2008), Centralised Logging with Rsyslog. [7] Osmar R. Zaane, Man Xin & Jiawei Han (1998), Discovering web Access Patterns and Trends by Applying OLAP and Data Mining Technology on Web Logs, Proc. Advances in Digital Libraries ADL 98, Santa Barbara, CA, USA, Pp ,. [8] BalaBit IT Security Ltd., Whitepaper Distributed Syslog Architectures with syslog-ng Premium Edition, [9] Ramesh Natarajan (2014),Thegeekstuff.com [10] R. Vaarandi (2002), Sec - A Lightweight Event Correlation Tool, IEEE IPOM 02 Proceedings. [11] Anton Yakimov (2008), Saurabh Phaltane. Saurabh is working at e- Zest Solutions Ltd in Cloud Computing Domain as Linux and AWS Administrator. AWS Certified solutions architect has completed his graduation from Maharashtra Institute of Technology, Pune (Pune University). Profound experience on configuring and managing virtual environments, he has published research work on Apache Web Server Monitoring in IJSER international journal. Learning and discovering new opportunities and leading an entrepreneurial life with profound technopreneural skills motivates him. Anand Nahar. Anand Nahar is a Subject Matter Expert (SME) at Amdocs (since 5 th Aug till present day) and works in Software Development and Implementation (SD&I) of Amdocs. He has completed his undergraduate education (B.E.) from Maharashtra Institute of Technology, Pune (Pune University). He has worked on Real Time Physics Simulation Engine on heterogeneous platform using OpenCL and OpenGL as a part of his final year project. Not only does he cherish taking part in various technical events but also is a part of many cultural and extracurricular events. Amazon Cloud. Nikhil Garge is working at e-zest Solutions Ltd in Cloud Computing Domain as Software Engineer. He has Completed his graduation from Pune university and earns a degree in bachelors in Information Technology.Profound experience on configuring and managing virtual environments Nikhil has interests in configuring and developing Applications on ISSN: Published by The Standard International Journals (The SIJ) 212

Log Management with Open-Source Tools. Risto Vaarandi SEB Estonia

Log Management with Open-Source Tools. Risto Vaarandi SEB Estonia Log Management with Open-Source Tools Risto Vaarandi SEB Estonia Outline Why use open source tools for log management? Widely used logging protocols and recently introduced new standards Open-source syslog

More information

Log Management with Open-Source Tools. Risto Vaarandi rvaarandi 4T Y4H00 D0T C0M

Log Management with Open-Source Tools. Risto Vaarandi rvaarandi 4T Y4H00 D0T C0M Log Management with Open-Source Tools Risto Vaarandi rvaarandi 4T Y4H00 D0T C0M Outline Why do we need log collection and management? Why use open source tools? Widely used logging protocols and recently

More information

syslog - centralized logging

syslog - centralized logging syslog - centralized logging David Morgan A logging system Conforming programs emit categorized messages Messages are candidates for logging syslog handles the logging performed by syslogd per /etc/syslog.conf

More information

Centralized logging system based on WebSockets protocol

Centralized logging system based on WebSockets protocol Centralized logging system based on WebSockets protocol Radomír Sohlich sohlich@fai.utb.cz Jakub Janoštík janostik@fai.utb.cz František Špaček spacek@fai.utb.cz Abstract: The era of distributed systems

More information

The syslog-ng Premium Edition 5F2

The syslog-ng Premium Edition 5F2 The syslog-ng Premium Edition 5F2 PRODUCT DESCRIPTION Copyright 2000-2014 BalaBit IT Security All rights reserved. www.balabit.com Introduction The syslog-ng Premium Edition enables enterprises to collect,

More information

Comparative Analysis of Open-Source Log Management Solutions for Security Monitoring and Network Forensics

Comparative Analysis of Open-Source Log Management Solutions for Security Monitoring and Network Forensics Comparative Analysis of Open-Source Log Management Solutions for Security Monitoring and Network Forensics Risto Vaarandi, Paweł Niziski NATO Cooperative Cyber Defence Centre of Excellence, Tallinn, Estonia

More information

Graylog2 Lennart Koopmann, OSDC 2014. @_lennart / www.graylog2.org

Graylog2 Lennart Koopmann, OSDC 2014. @_lennart / www.graylog2.org Graylog2 Lennart Koopmann, OSDC 2014 @_lennart / www.graylog2.org About me 25 years old Living in Hamburg, Germany @_lennart on Twitter Co-Founder of TORCH - The Graylog2 company. Graylog2 history Started

More information

The syslog-ng Premium Edition 5LTS

The syslog-ng Premium Edition 5LTS The syslog-ng Premium Edition 5LTS PRODUCT DESCRIPTION Copyright 2000-2013 BalaBit IT Security All rights reserved. www.balabit.com Introduction The syslog-ng Premium Edition enables enterprises to collect,

More information

Blackboard Open Source Monitoring

Blackboard Open Source Monitoring Blackboard Open Source Monitoring By Greg Lloyd Submitted to the Faculty of the School of Information Technology in Partial Fulfillment of the Requirements for the Degree of Bachelor of Science in Information

More information

Architecting ColdFusion For Scalability And High Availability. Ryan Stewart Platform Evangelist

Architecting ColdFusion For Scalability And High Availability. Ryan Stewart Platform Evangelist Architecting ColdFusion For Scalability And High Availability Ryan Stewart Platform Evangelist Introduction Architecture & Clustering Options Design an architecture and develop applications that scale

More information

Efficient Management of System Logs using a Cloud Radoslav Bodó, Daniel Kouřil CESNET. ISGC 2013, March 2013

Efficient Management of System Logs using a Cloud Radoslav Bodó, Daniel Kouřil CESNET. ISGC 2013, March 2013 Efficient Management of System Logs using a Cloud Radoslav Bodó, Daniel Kouřil CESNET ISGC 2013, March 2013 Agenda Introduction Collecting logs Log Processing Advanced analysis Resume Introduction Status

More information

Log management with Logstash and Elasticsearch. Matteo Dessalvi

Log management with Logstash and Elasticsearch. Matteo Dessalvi Log management with Logstash and Elasticsearch Matteo Dessalvi HEPiX 2013 Outline Centralized logging. Logstash: what you can do with it. Logstash + Redis + Elasticsearch. Grok filtering. Elasticsearch

More information

Using NXLog with Elasticsearch and Kibana. Using NXLog with Elasticsearch and Kibana

Using NXLog with Elasticsearch and Kibana. Using NXLog with Elasticsearch and Kibana Using NXLog with Elasticsearch and Kibana i Using NXLog with Elasticsearch and Kibana Using NXLog with Elasticsearch and Kibana ii Contents 1 Setting up Elasticsearch and Kibana 1 1.1 Installing Elasticsearch................................................

More information

Why should you look at your logs? Why ELK (Elasticsearch, Logstash, and Kibana)?

Why should you look at your logs? Why ELK (Elasticsearch, Logstash, and Kibana)? Authors Introduction This guide is designed to help developers, DevOps engineers, and operations teams that run and manage applications on top of AWS to effectively analyze their log data to get visibility

More information

Topics. CIT 470: Advanced Network and System Administration. Logging Policies. System Logs. Throwing Away. How to choose a logging policy?

Topics. CIT 470: Advanced Network and System Administration. Logging Policies. System Logs. Throwing Away. How to choose a logging policy? Topics CIT 470: Advanced Network and System Administration Logging 1. System logs 2. Logging policies 3. Finding logs 4. Syslog 5. Syslog servers 6. Log monitoring CIT 470: Advanced Network and System

More information

Windows Quick Start Guide for syslog-ng Premium Edition 5 LTS

Windows Quick Start Guide for syslog-ng Premium Edition 5 LTS Windows Quick Start Guide for syslog-ng Premium Edition 5 LTS November 19, 2015 Copyright 1996-2015 Balabit SA Table of Contents 1. Introduction... 3 1.1. Scope... 3 1.2. Supported platforms... 4 2. Installation...

More information

Analyzing large flow data sets using. visualization tools. modern open-source data search and. FloCon 2014. Max Putas

Analyzing large flow data sets using. visualization tools. modern open-source data search and. FloCon 2014. Max Putas Analyzing large flow data sets using modern open-source data search and visualization tools FloCon 2014 Max Putas About me Operations Engineer - DevOps BS, MS, and CAS in Telecommunications Work/research

More information

Log Analysis with the ELK Stack (Elasticsearch, Logstash and Kibana) Gary Smith, Pacific Northwest National Laboratory

Log Analysis with the ELK Stack (Elasticsearch, Logstash and Kibana) Gary Smith, Pacific Northwest National Laboratory Log Analysis with the ELK Stack (Elasticsearch, Logstash and Kibana) Gary Smith, Pacific Northwest National Laboratory A Little Context! The Five Golden Principles of Security! Know your system! Principle

More information

Monitoring Linux and Windows Logs with Graylog Collector. Bernd Ahlers Graylog, Inc.

Monitoring Linux and Windows Logs with Graylog Collector. Bernd Ahlers Graylog, Inc. Monitoring Linux and Windows Logs with Graylog Collector Bernd Ahlers Graylog, Inc. Structured Logging & Introduction to Graylog Collector Bernd Ahlers Graylog, Inc. Introduction: Graylog Open source log

More information

logstash The Book Log management made easy James Turnbull

logstash The Book Log management made easy James Turnbull The logstash Book Log management made easy James Turnbull The Logstash Book James Turnbull August 2, 2015 Version: v1.5.3 (e8fdab5) Website: The Logstash Book Contents Chapter 1 Shipping Events without

More information

Distributed syslog architectures with syslog-ng Premium Edition

Distributed syslog architectures with syslog-ng Premium Edition Distributed syslog architectures with syslog-ng Premium Edition May 12, 2011 The advantages of using syslog-ng Premium Edition to create distributed system logging architectures. Copyright 1996-2011 BalaBit

More information

Bernd Ahlers Michael Friedrich. Log Monitoring Simplified Get the best out of Graylog2 & Icinga 2

Bernd Ahlers Michael Friedrich. Log Monitoring Simplified Get the best out of Graylog2 & Icinga 2 Bernd Ahlers Michael Friedrich Log Monitoring Simplified Get the best out of Graylog2 & Icinga 2 BEFORE WE START Agenda AGENDA Introduction Tools Log History Logs & Monitoring Demo The Future Resources

More information

Improved metrics collection and correlation for the CERN cloud storage test framework

Improved metrics collection and correlation for the CERN cloud storage test framework Improved metrics collection and correlation for the CERN cloud storage test framework September 2013 Author: Carolina Lindqvist Supervisors: Maitane Zotes Seppo Heikkila CERN openlab Summer Student Report

More information

MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM?

MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM? MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM? Ashutosh Shinde Performance Architect ashutosh_shinde@hotmail.com Validating if the workload generated by the load generating tools is applied

More information

CSE 265: System and Network Administration

CSE 265: System and Network Administration CSE 265: System and Network Administration If you aren't measuring it, you aren't managing it. Service Monitoring Syslog and Log files Historical data Real-time monitoring Alerting Active monitoring systems

More information

Linux logging and logfiles monitoring with swatch

Linux logging and logfiles monitoring with swatch Linux logging and logfiles monitoring with swatch, wire.less.dk edit: November 2009, Pacnog6 http://creativecommons.org/licenses/by-nc-sa/3.0/ 1 Agenda Linux logging The most important logs Swatch and

More information

EUROPEAN ORGANIZATION FOR NUCLEAR RESEARCH CERN ACCELERATORS AND TECHNOLOGY SECTOR A REMOTE TRACING FACILITY FOR DISTRIBUTED SYSTEMS

EUROPEAN ORGANIZATION FOR NUCLEAR RESEARCH CERN ACCELERATORS AND TECHNOLOGY SECTOR A REMOTE TRACING FACILITY FOR DISTRIBUTED SYSTEMS EUROPEAN ORGANIZATION FOR NUCLEAR RESEARCH CERN ACCELERATORS AND TECHNOLOGY SECTOR CERN-ATS-2011-200 A REMOTE TRACING FACILITY FOR DISTRIBUTED SYSTEMS F. Ehm, A. Dworak, CERN, Geneva, Switzerland Abstract

More information

Network Monitoring & Management Log Management

Network Monitoring & Management Log Management Network Monitoring & Management Log Management Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

More information

Syslog & xinetd. Stephen Pilon

Syslog & xinetd. Stephen Pilon Syslog & xinetd Stephen Pilon What create log files? Logging Policies Throw away all data immediately Reset log files at periodic intervals Rotate log files, keeping data for a fixed time Compress and

More information

Developing an Application Tracing Utility for Mule ESB Application on EL (Elastic Search, Log stash) Stack Using AOP

Developing an Application Tracing Utility for Mule ESB Application on EL (Elastic Search, Log stash) Stack Using AOP Developing an Application Tracing Utility for Mule ESB Application on EL (Elastic Search, Log stash) Stack Using AOP Mohan Bandaru, Amarendra Kothalanka, Vikram Uppala Student, Department of Computer Science

More information

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds. ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

Security Correlation Server Quick Installation Guide

Security Correlation Server Quick Installation Guide orrelogtm Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also

More information

Vistara Lifecycle Management

Vistara Lifecycle Management Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not

More information

Reliable log data transfer

Reliable log data transfer OWASP Switzerland Chapter December 2015 Reliable log data transfer About (r)syslog, logstash, and log data signing A field report pascal.buchbinder@adnovum.ch Agenda Why we need log data transfer Syslog

More information

PANDORA FMS NETWORK DEVICE MONITORING

PANDORA FMS NETWORK DEVICE MONITORING NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,

More information

NAS 272 Using Your NAS as a Syslog Server

NAS 272 Using Your NAS as a Syslog Server NAS 272 Using Your NAS as a Syslog Server Enable your NAS as a Syslog Server to centrally manage the logs from all network devices A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this

More information

Network Monitoring & Management Log Management

Network Monitoring & Management Log Management Network Monitoring & Management Log Management Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

More information

Monitor and Manage Your MicroStrategy BI Environment Using Enterprise Manager and Health Center

Monitor and Manage Your MicroStrategy BI Environment Using Enterprise Manager and Health Center Monitor and Manage Your MicroStrategy BI Environment Using Enterprise Manager and Health Center Presented by: Dennis Liao Sales Engineer Zach Rea Sales Engineer January 27 th, 2015 Session 4 This Session

More information

Performance Guideline for syslog-ng Premium Edition 5 LTS

Performance Guideline for syslog-ng Premium Edition 5 LTS Performance Guideline for syslog-ng Premium Edition 5 LTS May 08, 2015 Abstract Performance analysis of syslog-ng Premium Edition Copyright 1996-2015 BalaBit S.a.r.l. Table of Contents 1. Preface... 3

More information

XpoLog Competitive Comparison Sheet

XpoLog Competitive Comparison Sheet XpoLog Competitive Comparison Sheet New frontier in big log data analysis and application intelligence Technical white paper May 2015 XpoLog, a data analysis and management platform for applications' IT

More information

Product Overview. Dream Report. OCEAN DATA SYSTEMS The Art of Industrial Intelligence. User Friendly & Programming Free Reporting.

Product Overview. Dream Report. OCEAN DATA SYSTEMS The Art of Industrial Intelligence. User Friendly & Programming Free Reporting. Dream Report OCEAN DATA SYSTEMS The Art of Industrial Intelligence User Friendly & Programming Free Reporting. Dream Report for Trihedral s VTScada Dream Report Product Overview Applications Compliance

More information

Figure 1. perfsonar architecture. 1 This work was supported by the EC IST-EMANICS Network of Excellence (#26854).

Figure 1. perfsonar architecture. 1 This work was supported by the EC IST-EMANICS Network of Excellence (#26854). 1 perfsonar tools evaluation 1 The goal of this PSNC activity was to evaluate perfsonar NetFlow tools for flow collection solution and assess its applicability to easily subscribe and request different

More information

An Oracle White Paper July 2011. Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide

An Oracle White Paper July 2011. Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide An Oracle White Paper July 2011 1 Disclaimer The following is intended to outline our general product direction.

More information

VMware vcenter Log Insight Security Guide

VMware vcenter Log Insight Security Guide VMware vcenter Log Insight Security Guide vcenter Log Insight 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

logstash The Book Log management made easy James Turnbull

logstash The Book Log management made easy James Turnbull The logstash Book Log management made easy James Turnbull The Logstash Book James Turnbull May 6, 2016 Version: v2.3.2 (e9c3ebc) Website: The Logstash Book Contents Page Chapter 1 Shipping Events without

More information

Towards Smart and Intelligent SDN Controller

Towards Smart and Intelligent SDN Controller Towards Smart and Intelligent SDN Controller - Through the Generic, Extensible, and Elastic Time Series Data Repository (TSDR) YuLing Chen, Dell Inc. Rajesh Narayanan, Dell Inc. Sharon Aicler, Cisco Systems

More information

Network Monitoring & Management Log Management

Network Monitoring & Management Log Management Network Monitoring & Management Log Management These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Syslog

More information

VMware vcenter Log Insight Security Guide

VMware vcenter Log Insight Security Guide VMware vcenter Log Insight Security Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Unless otherwise noted, all references to STRM refer to STRM, STRM Log Manager, and STRM Network Anomaly Detection.

Unless otherwise noted, all references to STRM refer to STRM, STRM Log Manager, and STRM Network Anomaly Detection. TECHNICAL NOTE FORWARDING LOGS USING TAIL2SYSLOG MARCH 2013 The Tail2Syslog support script provides a method for monitoring and forwarding events to STRM using syslog for real-time correlation. Tail2Syslog

More information

WHAT S NEW IN SAS 9.4

WHAT S NEW IN SAS 9.4 WHAT S NEW IN SAS 9.4 PLATFORM, HPA & SAS GRID COMPUTING MICHAEL GODDARD CHIEF ARCHITECT SAS INSTITUTE, NEW ZEALAND SAS 9.4 WHAT S NEW IN THE PLATFORM Platform update SAS Grid Computing update Hadoop support

More information

TORNADO Solution for Telecom Vertical

TORNADO Solution for Telecom Vertical BIG DATA ANALYTICS & REPORTING TORNADO Solution for Telecom Vertical Overview Last decade has see a rapid growth in wireless and mobile devices such as smart- phones, tablets and netbook is becoming very

More information

A Comparative Study on Vega-HTTP & Popular Open-source Web-servers

A Comparative Study on Vega-HTTP & Popular Open-source Web-servers A Comparative Study on Vega-HTTP & Popular Open-source Web-servers Happiest People. Happiest Customers Contents Abstract... 3 Introduction... 3 Performance Comparison... 4 Architecture... 5 Diagram...

More information

the missing log collector Treasure Data, Inc. Muga Nishizawa

the missing log collector Treasure Data, Inc. Muga Nishizawa the missing log collector Treasure Data, Inc. Muga Nishizawa Muga Nishizawa (@muga_nishizawa) Chief Software Architect, Treasure Data Treasure Data Overview Founded to deliver big data analytics in days

More information

PANDORA FMS NETWORK DEVICES MONITORING

PANDORA FMS NETWORK DEVICES MONITORING NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,

More information

Open Source and Commercial Performance Testing Tools

Open Source and Commercial Performance Testing Tools Open Source and Commercial Performance Testing Tools Palla Vinod Kumar Accenture Delivery Center for Technology in India Accenture, its logo, and High Performance Delivered are trademarks of Accenture.

More information

Processing millions of logs with Logstash

Processing millions of logs with Logstash and integrating with Elasticsearch, Hadoop and Cassandra November 21, 2014 About me My name is Valentin Fischer-Mitoiu and I work for the University of Vienna. More specificaly in a group called Domainis

More information

International Journal of Enterprise Computing and Business Systems ISSN (Online) : 2230-8849

International Journal of Enterprise Computing and Business Systems ISSN (Online) : 2230-8849 WINDOWS-BASED APPLICATION AWARE NETWORK INTERCEPTOR Ms. Shalvi Dave [1], Mr. Jimit Mahadevia [2], Prof. Bhushan Trivedi [3] [1] Asst.Prof., MCA Department, IITE, Ahmedabad, INDIA [2] Chief Architect, Elitecore

More information

Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.

Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com

More information

Application Performance Testing Basics

Application Performance Testing Basics Application Performance Testing Basics ABSTRACT Todays the web is playing a critical role in all the business domains such as entertainment, finance, healthcare etc. It is much important to ensure hassle-free

More information

Management, Logging and Troubleshooting

Management, Logging and Troubleshooting CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network

More information

Presented by Henry Ng

Presented by Henry Ng Log Format Presented by Henry Ng 1 Types of Logs Content information, alerts, warnings, fatal errors Source applications, systems, drivers, libraries Format text, binary 2 Typical information in Logs Date

More information

XpoLog Center Suite Data Sheet

XpoLog Center Suite Data Sheet XpoLog Center Suite Data Sheet General XpoLog is a data analysis and management platform for Applications IT data. Business applications rely on a dynamic heterogeneous applications infrastructure, such

More information

Linux Server Support by Applied Technology Research Center. Proxy Server Configuration

Linux Server Support by Applied Technology Research Center. Proxy Server Configuration Linux Server Support by Applied Technology Research Center Proxy Server Configuration We configure squid for your LAN. Including transparent for HTTP and proxy for HTTPS. We also provide basic training

More information

MEGA Web Application Architecture Overview MEGA 2009 SP4

MEGA Web Application Architecture Overview MEGA 2009 SP4 Revised: September 2, 2010 Created: March 31, 2010 Author: Jérôme Horber CONTENTS Summary This document describes the system requirements and possible deployment architectures for MEGA Web Application.

More information

GoToMyPC Corporate Advanced Firewall Support Features

GoToMyPC Corporate Advanced Firewall Support Features F A C T S H E E T GoToMyPC Corporate Advanced Firewall Support Features Citrix GoToMyPC Corporate features Citrix Online s advanced connectivity technology. We support all of the common firewall and proxy

More information

IBM Security. 2013 IBM Corporation. 2013 IBM Corporation

IBM Security. 2013 IBM Corporation. 2013 IBM Corporation IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure

More information

Maintaining Non-Stop Services with Multi Layer Monitoring

Maintaining Non-Stop Services with Multi Layer Monitoring Maintaining Non-Stop Services with Multi Layer Monitoring Lahav Savir System Architect and CEO of Emind Systems lahavs@emindsys.com www.emindsys.com The approach Non-stop applications can t leave on their

More information

Mark Bennett. Search and the Virtual Machine

Mark Bennett. Search and the Virtual Machine Mark Bennett Search and the Virtual Machine Agenda Intro / Business Drivers What to do with Search + Virtual What Makes Search Fast (or Slow!) Virtual Platforms Test Results Trends / Wrap Up / Q & A Business

More information

How To Use The Dcml Framework

How To Use The Dcml Framework DCML Framework Use Cases Introduction Use Case 1: Monitoring Newly Provisioned Servers Use Case 2: Ensuring Accurate Asset Inventory Across Multiple Management Systems Use Case 3: Providing Standard Application

More information

Security Correlation Server Quick Installation Guide

Security Correlation Server Quick Installation Guide orrelog Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also

More information

A New Approach to Network Visibility at UBC. Presented by the Network Management Centre and Wireless Infrastructure Teams

A New Approach to Network Visibility at UBC. Presented by the Network Management Centre and Wireless Infrastructure Teams A New Approach to Network Visibility at UBC Presented by the Network Management Centre and Wireless Infrastructure Teams Agenda Business Drivers Technical Overview Network Packet Broker Tool Network Monitoring

More information

Contents Introduction... 5 Deployment Considerations... 9 Deployment Architectures... 11

Contents Introduction... 5 Deployment Considerations... 9 Deployment Architectures... 11 Oracle Primavera Contract Management 14.1 Sizing Guide July 2014 Contents Introduction... 5 Contract Management Database Server... 5 Requirements of the Contract Management Web and Application Servers...

More information

April 8th - 10th, 2014 LUG14 LUG14. Lustre Log Analyzer. Kalpak Shah. DataDirect Networks. ddn.com. 2014 DataDirect Networks. All Rights Reserved.

April 8th - 10th, 2014 LUG14 LUG14. Lustre Log Analyzer. Kalpak Shah. DataDirect Networks. ddn.com. 2014 DataDirect Networks. All Rights Reserved. April 8th - 10th, 2014 LUG14 LUG14 Lustre Log Analyzer Kalpak Shah DataDirect Networks Lustre Log Analysis Requirements Need scripts to parse Lustre debug logs Only way to effectively use the logs for

More information

Server & Application Monitor

Server & Application Monitor Server & Application Monitor agentless application & server monitoring SolarWinds Server & Application Monitor provides predictive insight to pinpoint app performance issues. This product contains a rich

More information

Donky Technical Overview

Donky Technical Overview Donky Technical Overview This document will provide the reader with an overview of the features offered and technologies used with the Donky Messaging Network. This document will give a good base level

More information

CSE/ISE 311: Systems Administra5on Logging

CSE/ISE 311: Systems Administra5on Logging Logging Por$ons courtesy Ellen Liu Outline Introduc$on Finding log files Syslog: the system event logger Linux logrotate tool Condensing log files to useful informa$on Logging policies 13-2 Who and Why

More information

A SURVEY ON AUTOMATED SERVER MONITORING

A SURVEY ON AUTOMATED SERVER MONITORING A SURVEY ON AUTOMATED SERVER MONITORING S.Priscilla Florence Persis B.Tech IT III year SNS College of Engineering,Coimbatore. priscillapersis@gmail.com Abstract This paper covers the automatic way of server

More information

GeoCloud Project Report USGS/EROS Spatial Data Warehouse Project

GeoCloud Project Report USGS/EROS Spatial Data Warehouse Project GeoCloud Project Report USGS/EROS Spatial Data Warehouse Project Description of Application The Spatial Data Warehouse project at the USGS/EROS distributes services and data in support of The National

More information

Runtime Monitoring & Issue Tracking

Runtime Monitoring & Issue Tracking Runtime Monitoring & Issue Tracking http://d3s.mff.cuni.cz Pavel Parízek parizek@d3s.mff.cuni.cz CHARLES UNIVERSITY IN PRAGUE faculty of mathematics and physics Runtime monitoring Nástroje pro vývoj software

More information

How To Install An Aneka Cloud On A Windows 7 Computer (For Free)

How To Install An Aneka Cloud On A Windows 7 Computer (For Free) MANJRASOFT PTY LTD Aneka 3.0 Manjrasoft 5/13/2013 This document describes in detail the steps involved in installing and configuring an Aneka Cloud. It covers the prerequisites for the installation, the

More information

Log managing at PIC. A. Bruno Rodríguez Rodríguez. Port d informació científica Campus UAB, Bellaterra Barcelona. December 3, 2013

Log managing at PIC. A. Bruno Rodríguez Rodríguez. Port d informació científica Campus UAB, Bellaterra Barcelona. December 3, 2013 Log managing at PIC A. Bruno Rodríguez Rodríguez Port d informació científica Campus UAB, Bellaterra Barcelona December 3, 2013 Bruno Rodríguez (PIC) Log managing at PIC December 3, 2013 1 / 21 What will

More information

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based

More information

Configuring System Message Logging

Configuring System Message Logging CHAPTER 25 This chapter describes how to configure system message logging on the Catalyst 2960 switch. Note For complete syntax and usage information for the commands used in this chapter, see the Cisco

More information

Machine Data Analytics with Sumo Logic

Machine Data Analytics with Sumo Logic Machine Data Analytics with Sumo Logic A Sumo Logic White Paper Introduction Today, organizations generate more data in ten minutes than they did during the entire year in 2003. This exponential growth

More information

FioranoMQ 9. High Availability Guide

FioranoMQ 9. High Availability Guide FioranoMQ 9 High Availability Guide Copyright (c) 1999-2008, Fiorano Software Technologies Pvt. Ltd., Copyright (c) 2008-2009, Fiorano Software Pty. Ltd. All rights reserved. This software is the confidential

More information

A Comparative Analysis of Open-Source Log Management Solutions for Security Monitoring and Network Forensics. Risto Vaarandi Paweł Niziński

A Comparative Analysis of Open-Source Log Management Solutions for Security Monitoring and Network Forensics. Risto Vaarandi Paweł Niziński A Comparative Analysis of Open-Source Log Management Solutions for Security Monitoring and Network Forensics Risto Vaarandi Paweł Niziński Tallinn 2013 Disclaimer This publication is a product of the NATO

More information

GigaSpaces Real-Time Analytics for Big Data

GigaSpaces Real-Time Analytics for Big Data GigaSpaces Real-Time Analytics for Big Data GigaSpaces makes it easy to build and deploy large-scale real-time analytics systems Rapidly increasing use of large-scale and location-aware social media and

More information

Management of VMware ESXi. on HP ProLiant Servers

Management of VMware ESXi. on HP ProLiant Servers Management of VMware ESXi on W H I T E P A P E R Table of Contents Introduction................................................................ 3 HP Systems Insight Manager.................................................

More information

XpoLog Center Suite Log Management & Analysis platform

XpoLog Center Suite Log Management & Analysis platform XpoLog Center Suite Log Management & Analysis platform Summary: 1. End to End data management collects and indexes data in any format from any machine / device in the environment. 2. Logs Monitoring -

More information

Centralized Logging in a Decentralized World

Centralized Logging in a Decentralized World Centralized Logging in a Decentralized World JAMES DONN AND TIM HARTMANN James Donn has been working as a Senior Network Management Systems Engineer (NMSE) for the past four years and is responsible for

More information

Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh10/

Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh10/ Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh10/ Fall 2010 Sonja Buchegger buc@kth.se Lecture 13, Dec. 6, 2010 Auditing Security Audit an independent review and examination

More information

Monitoring Remedy with BMC Solutions

Monitoring Remedy with BMC Solutions Monitoring Remedy with BMC Solutions Overview How does BMC Software monitor Remedy with our own solutions? The challenge is many fold with a solution like Remedy and this does not only apply to Remedy,

More information

Managing Latency in IPS Networks

Managing Latency in IPS Networks Application Note Revision B McAfee Network Security Platform Managing Latency in IPS Networks Managing Latency in IPS Networks McAfee Network Security Platform provides you with a set of pre-defined recommended

More information

Sample. WebCenter Sites. Go-Live Checklist

Sample. WebCenter Sites. Go-Live Checklist Sample WebCenter Sites Go-Live Checklist Go-Live Checklist The Check-list given here is only indicative. You must consult your infrastructure & development team to develop a full check-list. 1 Ensure that

More information

Paper 064-2014. Robert Bonham, Gregory A. Smith, SAS Institute Inc., Cary NC

Paper 064-2014. Robert Bonham, Gregory A. Smith, SAS Institute Inc., Cary NC Paper 064-2014 Log entries, Events, Performance Measures, and SLAs: Understanding and Managing your SAS Deployment by Leveraging the SAS Environment Manager Data Mart ABSTRACT Robert Bonham, Gregory A.

More information

Building Success on Acquia Cloud:

Building Success on Acquia Cloud: Building Success on Acquia Cloud: 10 Layers of PaaS TECHNICAL Guide Table of Contents Executive Summary.... 3 Introducing the 10 Layers of PaaS... 4 The Foundation: Five Layers of PaaS Infrastructure...

More information

Building a Continuous Integration Pipeline with Docker

Building a Continuous Integration Pipeline with Docker Building a Continuous Integration Pipeline with Docker August 2015 Table of Contents Overview 3 Architectural Overview and Required Components 3 Architectural Components 3 Workflow 4 Environment Prerequisites

More information

Chapter 7. Using Hadoop Cluster and MapReduce

Chapter 7. Using Hadoop Cluster and MapReduce Chapter 7 Using Hadoop Cluster and MapReduce Modeling and Prototyping of RMS for QoS Oriented Grid Page 152 7. Using Hadoop Cluster and MapReduce for Big Data Problems The size of the databases used in

More information