Secure Web. Hardware Sizing Guide
|
|
|
- Dwain Skinner
- 10 years ago
- Views:
Transcription
1 Secure Web Hardware Sizing Guide
2 Table of Contents 1. Introduction Sizing Guide CPU Measurement RAM Measurement Harddisk Mesurement of disk activity Troubleshooting Filesystem Measurement Troubleshooting Database Recommendations Contact information A. Contact data A.1. How to contact our sales department A.2. How to contact our support department A.2.1. Getting Support CYAN Networks Software GmbH - ii -
3 List of Figures 2.1. Sizing by Internet bandwidth Sizing by concurrent users Screenshot from Linux "top" Screenshot of Secure Web Cache Settings Screenshot from Linux "top" Screenshot from Linux "atop" Screenshot of Secure Web Cache Settings... 8 A.1. Version information of the Secure Web A.2. Version information of the Reporting System A.3. Support Package CYAN Networks Software GmbH - iii -
4 1. Introduction This document aims to provide guidelines for choosing hardware for Secure Web. It gives the reader an overview about performance critical points when planning the proxy environment in mid- and enterprise level scenarios. After reading this document, the reader should be able to fully understand the key points of performance relevant parts of server infrastructure and plan and design accordingly. It also gives a good understanding of tools needed to measure and monitor performance metrics. The guidelines have been written for hardware appliances, but all recommendations and advices also apply to virtual infrastructure CYAN Networks Software GmbH - 1 -
5 2. Sizing Guide Sizing hardware and virtual appliances for production use of Secure Web is not always a straightforward task. Various factors, like network topology, number of concurrent users and the enabled features of Secure Web must be taken into account to properly determine hardware requirements. The following tables should give a rough overview about the required hardware to operate Secure Web. Anti-Virus scanning, SSL Intercept and Caching are key features regarding performance of an appliance. Please note that the more you get to the limits of a specific platform, the more these features will have an impact on the overall performance. In this case, we strongly suggest to switch to the next higher platform or to think about creating a cluster of Secure Web appliances. We suggest to evaluate both your Internet bandwidth as well as concurrent users and choose the highest platform. For example, in an environment with a 10 MBit/s Internet connection and 250 users we suggest to go with the RS-400 appliance even though the bandwidth can still be covered with the DS-100. The first chart compares the appliances against the available downstream Internet bandwidth. Figure 2.1. Sizing by Internet bandwidth The second chart compares the appliances against the number of concurrent users using the proxy system. Figure 2.2. Sizing by concurrent users 2013 CYAN Networks Software GmbH - 2 -
6 3. CPU Secure Web is designed to take full advantage of todays CPU architecture. Multiple threads of execution are a key point of the proxy engines, which makes sure that the available CPU power is utilized as good as possible. For good performance characteristics of the Secure Web proxy engine, CPU power is not the main characteristic though. As a rule of thumb, the higher the number of parallel connections is to be expected, the more CPU cores can be used by the proxy engines, because the connection count can be fully distributed across all cores. CPU power is mainly important for: Anti virus scanning Deep archive inspection SSL interception For both anti virus scanning and deep archive inspection, CPU power is needed to decompress archives and analyse file contents. SSL interception, thus de- and encrypting SSL traffic on the fly, is a CPU heavy operation because of the complex mathematics used by the encryption algorithms Measurement CPU utilization can easily be monitored on a Linux machine with use of commands like vmstat or top. The important processes to look for are sweb for the HTTP and FTP proxy engines as well as smail for the relevant proxies. Figure 3.1. Screenshot from Linux "top" Be carefull with judging of CPU performance using the load average values from eg top. The load average contains a lot of performance metrics, including harddisk I/O, and should only be used to get an overview about the system status as a whole. High values do not necessarely indicate a performance problem. Comparing the load average value to other systems should also be avoided, because the numbers can not be carried over to another system CYAN Networks Software GmbH - 3 -
7 CPU Thread counts can be queried with help of ps or by using netstat to look for open connections to the proxies. $ ps -efl grep bin/sweb wc -l 12 In the examples above, 12 threads for the Secure Web process sweb, which provides the HTTP and FTP proxy functionality, is the initial thread count that is used for internal processing. Every connection that is accepted by the proxy engine is assigned to an additional thread. $ netstat -nlat grep 8080 tcp : :* LISTEN tcp : :55336 ESTABLISHED tcp : :55337 ESTABLISHED There is a limit in the Linux kernel of around parallel TCP connections that can be made on one IP address of the proxy machine. In this example, there are two active connections to the HTTP proxy CYAN Networks Software GmbH - 4 -
8 4. RAM RAM is important if a high number of parallel connections is to be expected or if memory caching is to be used in the HTTP and FTP proxy engines. All RAM that is not used by processes is used for in-kernel buffers and caching of eg file system relevant data, so it is a good idea not to assign all memory to Secure Web processes. Initially, the Secure Web HTTP and FTP proxy engine sweb allocates approximately 100 MB of RAM for the URL database. Each connection that is handled by the Secure Web proxy engines takes 128 Kbyte of RAM. During processing, buffers and data structures of about 64 Kbytes add up to at least 192 Kbyte of RAM used per active connection. Each parallel anti virus scan operation needs 2 MB of RAM. If caching for HTTP and FTP protocols should be enabled, it s a good advice to dedicate a good amount of free RAM to the memory cache. The settings therefor can be found in the administrative interface of Secure Web under -Proxy Settings_ Web Proxy Cache. Figure 4.1. Screenshot of Secure Web Cache Settings This example shows the default configuration of memory and disk cache after installing Secure Web. It only dedicates 8 MB of RAM and only consideres files of up to 8192 bytes size (8 Kbyte) to be put in the memory cache. On a machine with 8 GB of RAM, which is commonly found in todays IT infrastructure, an administrator can easily dedicate 1 GB or more of RAM for memory caching and raise the maximum object size to up to 1 MB of data. The data structures needed for the disk cache can easily take up to 1 GB of RAM, depending on the size of the disk cache, and is tied to the amount of file objects. A typical cache of 60 GB contains up to files on disk and takes almost 350 Mbyte of RAM for the cache index. 1 cached file on disk is about 1 KByte of data needed in the cache index in memory. The amount of files can be reduced by raising the minimum object size. There is no dedicated setting for this, as all files that are not put into the memory cache are stored in the disk cache instead. So raising the maximum object size of the memory cache also defines a higher minimum objects size of the disk cache CYAN Networks Software GmbH - 5 -
9 RAM 4.1. Measurement RAM usage can easily be checked by tools like top. The %MEM column of the relevant process, sweb for the HTTP/FTP proxy engine and smail for the proxies, will tell you the memory consumption based on the total amount of memory available on the system. RES contains the memory that is wired and used actively by the process. Figure 4.2. Screenshot from Linux "top" Please note that on 32-bit systems, only up to 3 GB of memory can be used by the user mode processes. 1 GB is reserved for the kernel address space if a kernel without PAE (physical address extension) is used. PAE brings a performance penalty though and should be avoided. A 64-bit installation should be considered if high amount of memory usage is an issue CYAN Networks Software GmbH - 6 -
10 5. Harddisk Harddisk performance is a cruical point when designing the hardware infrastructure for the Secure Web environment. On the operating system side, do not expect much disk I/O. Beside writing log files, the operating system will not have to much disk access. When it comes to disk caching and anti virus scanning though, disk I/O is the main performance characteristic to take care of. The more parallel connections are to be expected to the HTTP and FTP proxy, the more disk I/O is needed to store and deliver from the disk cache. When choosing a harddisk for caching, take the following characteristics into account: SATA 7k, avg. 60 MB/sec, avg. 9.5 ms average latency, about 100 IOPS SAS 15k, up to 200 MB/sec, avg. 3.5 ms average latency, about 300 IOPS SSD, up to 400 MB/sec read/write performance, almost no latency, up to IOPS For a high performance cache system, a SSD is certainly a good choice to be used for the sole purpose of caching. A SAS 15k disk of 147 GB of size is usually a good tradeoff between speed and costs though. Do not share the cache disk with anything else but dedicate a single disk for caching. Please note that RAID may be good providing fault tolerance for the operating system and Secure Web installation, but must be avoided for the cache disk. RAID controllers can not keep up with IOPS needed for cache operations and fault tolerancy is certainly not needed for this kind of data Mesurement of disk activity Disk I/O can be checked and monitored with tools like atop (press D to show disk statistics after launching atop). Please note that per-process disk I/O accounting is only provided by Linux kernels and higher. Figure 5.1. Screenshot from Linux "atop" 2013 CYAN Networks Software GmbH - 7 -
11 Harddisk In the CPU line, the time percentage wasted by the CPU waiting for I/O operations to complete are shown in the wait column. The higher the value, the more CPU time is lost because the underlying storage system can t keep up feeding data. The DSK line on top show I/O summaries of all disks found on the system. It displays the read and write operations on the given harddisk in the monitored time interval as well as the average I/O time and a busy percentage. A busy percentage of 70% or higher is considered critical and will have a noticeable impact on the machines performance. The block on the bottom shows a list of processes, ordered by disk consumption from top to bottom, and the amound of Kbytes transfered to and from the disk. Disk performance can be tested with hdparm, which measures the raw read rate of the selected hard disk: $ hdparm -t /dev/sda /dev/sda: Timing buffered disk reads: 380 MB in 3.01 seconds = MB/sec 5.2. Troubleshooting If disk I/O is too high and causes performance problems, check your cache settings and set the disk cache to only save files of a certain minimum size. This can be achieved by raising the maximum object size for caching in memory to a higher value. Files that are not cached in memory are cached on disk instead. Figure 5.2. Screenshot of Secure Web Cache Settings Disk garbage collector interval can also be raised to be run in longer intervals, to reduce the stress on the harddisk and leave more I/O operations for the proxy cache engine to store and deliver data. If other processes on the proxy machine take up too much disk I/O, like periodic tasks compressing log files or creating backups, consider moving these jobs to times where proxy usage is low CYAN Networks Software GmbH - 8 -
12 6. Filesystem The choice of file system is very important for disk caching and anti virus scanning. A filesystem must be capable of efficiently handling a large amount of files in the disk cache. Numbers of up to files are common in caches with 60 GB to 100 GB of size. CYAN Networks recommends the usage of ext3 for caching because of its good performance and stability. We suggest to use the following options for the file system for best performance: dir_index: directory indexes speed up access of directories with large amounts of files journal_data_writeback: only use the journal for metadata data=writeback: only use the journal for metadata noatime: deactivates the last access timestamp on files nodiratime: deactivates the last access timestamp on directories Disabling the journal for data runs the risk of data corruption after crashes, but greatly boosts the performance of the filesystem. Since cache data is considered non-critical, this should be considered when looking for performance enhancements. During tests we saw bad performance and strange behaviours from JBD (Journaling Block Device) when used with the ext4 filesystem. Because of this, we can not recommend the usage of ext4 for production use yet. Filesystems like btrfs, reiserfs4, xfs and jfs have not been thoroughly tested by CYAN Networks and may bring similar results or even better performance when tuned accordingly. Xfs and jfs is known to have very good performance Measurement File system performance can be tested with a tool like bonnie++, which is also used for stress testing file systems to detect bugs in high load environments Troubleshooting Ext3 file system options can be queried with tune2fs: $ tune2fs -l /dev/sda1 tune2fs (14-Mar-2010) Filesystem volume name: <none> Last mounted on: <not available> Filesystem UUID: e5f4854b-e bb15-eea1aec11e0c Filesystem magic number: 0xEF53 Filesystem revision #: 1 (dynamic) Filesystem features: dir_index filetype sparse_super Default mount options: journal_data_writeback If the file system feature dir_index is not present, it can be enabled with tune2fs -O dir_index / dev/sda1. journal_data_writeback can be enabled with help of tune2fs -o journal_data_writeback /dev/sda1. Please choose the appropiate harddisk for the above commands and back up your data before changing any filesystem parameter, as it may render your parition useless if used incorrectly. The mount options for the paritions can be found in /etc/fstab: 2013 CYAN Networks Software GmbH - 9 -
13 Filesystem /dev/sda1 /cache ext3 noatime,nodiratime,data=writeback 0 noatime and nodiratime can be set without fear of risking your data. data=writeback needs to above described filesystem option journal_data_writeback to work correctly CYAN Networks Software GmbH
14 7. Database The database system is solely used for the reporting subsystem (CRS) and as such must be designed to take a huge amount of data for reporting. For test and evaluation environments, CYAN Networks ships packages which set up a local database using PostgreSQL and configure the reporting system automatically to use the database. For production environments, a local database on the Secure Web machine must not be used for running the reporting database. Disk I/O during report data feeding and generation as well as database maintenance tasks like vacuum is too high to allow a coexistence with Secure Web. As a rule of thumb, a single user performs request per day on average, which means that every user adds rows into the database per day. A single row in the database comes down to 500 bytes of storage needed to store the actual data. The final database partition should leave a fair amount of disk space left free for database maintenance jobs, like vacuum on PostgreSQL databases Recommendations CYAN networks recommends PostgreSQL to be used as the database system for reporting if free and open source software (OSS) is favored. PostgreSQL should be configured to use as much memory as possible for sort operations, to speed up ORDER and GROUP queries. Whenever possible and supported by expert IT staff, an enterprise database like Microsoft SQL, Oracle or IBM DB2 (Oracle and DB2 support with Secure Web 2.1) should be considered. With database aggregation enabled in CRS, the size of the database can be reduced by roughly 80%, with the tradeoff that all data is aggregated on an hourly basis and URL path information is lost in this process. Disk space usage can be reduced and report generation times enhanced considerabely. The reporting database is delivered without indexes created. Because of the high number of different reports, creating indexes for all possible combinations would significantly grow the database in size and slow down the INSERT performance considerabely. Please consult the database administrators to tune the database accordingly and create indexes where necessary CYAN Networks Software GmbH
15 8. Contact information Please contact me for any questions or comments you have: Markus Cserna +43 (1) CYAN Networks Software GmbH
16 Appendix A. Contact data A.1. How to contact our sales department Tel.: +43 (1) A.2. How to contact our support department Tel.: +43 (1) A.2.1. Getting Support In case you should have any technical problems, or questions and would like to get support from our team, we kindly ask you to provide us with the following information: Description of your question or problem The version information of the product: The version information of Secure Web can be found after logging into the Web Admin Interface in the top part of the screen: Figure A.1. Version information of the Secure Web The version information of the Reporting System can be found after login in the top part of the screen of the Web Admin Interface: Figure A.2. Version information of the Reporting System All the information contained in the screen found in menu Services / Services / Overview In the case authentication is activated, provide us with the method in place (via Windows Agent, via Linux Agent, etc.) The deployment method of the Appliance (Out-of-line, In-Line, DMZ) The operation mode of the Appliance (dedicated mode, transparent mode) 2013 CYAN Networks Software GmbH
17 Contact data Information about the environment (proxy cascades that are used, firewalls and gateways involved in the infrastructure that are of relevance to the Appliance) The appliance interface provides the possibility to create a support package that includes the configuration and log files of the system. This package can help us to track down the issue easier and faster. Please attach this package to your . In order to create a support pack, navigate to menu Appliances / Maintenance / Support and click on the Download button. You may select the files you want to provide to our support team and then download a package, which we kindly ask you to send to our support address. Figure A.3. Support Package Further documentation about the product as well as technical white papers that describe certain use cases can be found in our documentation repository on our homepage: CYAN Networks Software GmbH
Secure Web Appliance. SSL Intercept
Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...
Secure Web Appliance. Reverse Proxy
Secure Web Appliance Reverse Proxy Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About Reverse Proxy... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...
CYAN SECURE WEB APPLIANCE. User interface manual
CYAN SECURE WEB APPLIANCE User interface manual Jun. 13, 2008 Applies to: CYAN Secure Web 1.4 and above Contents 1 Log in...3 2 Status...3 2.1 Status / System...3 2.2 Status / Network...4 Status / Network
Sawmill Log Analyzer Best Practices!! Page 1 of 6. Sawmill Log Analyzer Best Practices
Sawmill Log Analyzer Best Practices!! Page 1 of 6 Sawmill Log Analyzer Best Practices! Sawmill Log Analyzer Best Practices!! Page 2 of 6 This document describes best practices for the Sawmill universal
REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.1.0.XXX Requirements and Implementation Guide (Rev 4-10209) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis Training Series
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This
AIX NFS Client Performance Improvements for Databases on NAS
AIX NFS Client Performance Improvements for Databases on NAS October 20, 2005 Sanjay Gulabani Sr. Performance Engineer Network Appliance, Inc. [email protected] Diane Flemming Advisory Software Engineer
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
Preparing a SQL Server for EmpowerID installation
Preparing a SQL Server for EmpowerID installation By: Jamis Eichenauer Last Updated: October 7, 2014 Contents Hardware preparation... 3 Software preparation... 3 SQL Server preparation... 4 Full-Text Search
Agenda. Enterprise Application Performance Factors. Current form of Enterprise Applications. Factors to Application Performance.
Agenda Enterprise Performance Factors Overall Enterprise Performance Factors Best Practice for generic Enterprise Best Practice for 3-tiers Enterprise Hardware Load Balancer Basic Unix Tuning Performance
McAfee Web Gateway 7.4.1
Release Notes Revision B McAfee Web Gateway 7.4.1 Contents About this release New features and enhancements Resolved issues Installation instructions Known issues Find product documentation About this
NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis
VMware vcenter Log Insight Getting Started Guide
VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
Cognos Performance Troubleshooting
Cognos Performance Troubleshooting Presenters James Salmon Marketing Manager [email protected] Andy Ellis Senior BI Consultant [email protected] Want to ask a question?
PERFORMANCE TUNING ORACLE RAC ON LINUX
PERFORMANCE TUNING ORACLE RAC ON LINUX By: Edward Whalen Performance Tuning Corporation INTRODUCTION Performance tuning is an integral part of the maintenance and administration of the Oracle database
Configuring Apache Derby for Performance and Durability Olav Sandstå
Configuring Apache Derby for Performance and Durability Olav Sandstå Database Technology Group Sun Microsystems Trondheim, Norway Overview Background > Transactions, Failure Classes, Derby Architecture
Geospatial Server Performance Colin Bertram UK User Group Meeting 23-Sep-2014
Geospatial Server Performance Colin Bertram UK User Group Meeting 23-Sep-2014 Topics Auditing a Geospatial Server Solution Web Server Strategies and Configuration Database Server Strategy and Configuration
Microsoft SQL Server Guide. Best Practices and Backup Procedures
Microsoft SQL Server Guide Best Practices and Backup Procedures Constellation HomeBuilder Systems Inc. This document is copyrighted and all rights are reserved. This document may not, in whole or in part,
StreamServe Persuasion SP5 Microsoft SQL Server
StreamServe Persuasion SP5 Microsoft SQL Server Database Guidelines Rev A StreamServe Persuasion SP5 Microsoft SQL Server Database Guidelines Rev A 2001-2011 STREAMSERVE, INC. ALL RIGHTS RESERVED United
Installing GFI MailSecurity
Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install
Virtuoso and Database Scalability
Virtuoso and Database Scalability By Orri Erling Table of Contents Abstract Metrics Results Transaction Throughput Initializing 40 warehouses Serial Read Test Conditions Analysis Working Set Effect of
InterScan Web Security Virtual Appliance
InterScan Web Security Virtual Appliance Sizing Guide for version 6.0 July 2013 TREND MICRO INC. 10101 N. De Anza Blvd. Cupertino, CA 95014 www.trendmicro.com Toll free: +1 800.228.5651 Fax: +1 408.257.2003
Interworks. Interworks Cloud Platform Installation Guide
Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,
F-Secure Internet Gatekeeper Virtual Appliance
F-Secure Internet Gatekeeper Virtual Appliance F-Secure Internet Gatekeeper Virtual Appliance TOC 2 Contents Chapter 1: Welcome to F-Secure Internet Gatekeeper Virtual Appliance.3 Chapter 2: Deployment...4
DELL TM PowerEdge TM T610 500 Mailbox Resiliency Exchange 2010 Storage Solution
DELL TM PowerEdge TM T610 500 Mailbox Resiliency Exchange 2010 Storage Solution Tested with: ESRP Storage Version 3.0 Tested Date: Content DELL TM PowerEdge TM T610... 1 500 Mailbox Resiliency
How To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap (
WHITEPAPER BackupAssist Version 5.1 www.backupassist.com Cortex I.T. Labs 2001-2008 2 Contents Introduction... 3 Hardware Setup Instructions... 3 QNAP TS-409... 3 Netgear ReadyNas NV+... 5 Drobo rev1...
DMS Performance Tuning Guide for SQL Server
DMS Performance Tuning Guide for SQL Server Rev: February 13, 2014 Sitecore CMS 6.5 DMS Performance Tuning Guide for SQL Server A system administrator's guide to optimizing the performance of Sitecore
Ignify ecommerce. Item Requirements Notes
wwwignifycom Tel (888) IGNIFY5 sales@ignifycom Fax (408) 516-9006 Ignify ecommerce Server Configuration 1 Hardware Requirement (Minimum configuration) Item Requirements Notes Operating System Processor
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
Monitoring Databases on VMware
Monitoring Databases on VMware Ensure Optimum Performance with the Correct Metrics By Dean Richards, Manager, Sales Engineering Confio Software 4772 Walnut Street, Suite 100 Boulder, CO 80301 www.confio.com
How To Install An Aneka Cloud On A Windows 7 Computer (For Free)
MANJRASOFT PTY LTD Aneka 3.0 Manjrasoft 5/13/2013 This document describes in detail the steps involved in installing and configuring an Aneka Cloud. It covers the prerequisites for the installation, the
Zmanda Cloud Backup Frequently Asked Questions
Zmanda Cloud Backup Frequently Asked Questions Release 4.1 Zmanda, Inc Table of Contents Terminology... 4 What is Zmanda Cloud Backup?... 4 What is a backup set?... 4 What is amandabackup user?... 4 What
Server 2008 SQL. Administration in Action ROD COLLEDGE MANNING. Greenwich. (74 w. long.)
SQL Server 2008 Administration in Action ROD COLLEDGE 11 MANNING Greenwich (74 w. long.) contents foreword xiv preface xvii acknowledgments xix about this book xx about the cover illustration about the
enicq 5 System Administrator s Guide
Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide
Whitepaper: performance of SqlBulkCopy
We SOLVE COMPLEX PROBLEMS of DATA MODELING and DEVELOP TOOLS and solutions to let business perform best through data analysis Whitepaper: performance of SqlBulkCopy This whitepaper provides an analysis
Novell File Reporter 2.5 Who Has What?
Novell File Reporter 2.5 Who Has What? Richard Cabana Senior Systems Engineer File Access & Mgmt Solution Principal Attachmate Novell North America [email protected] Joe Marton Senior Systems Engineer
Distribution One Server Requirements
Distribution One Server Requirements Introduction Welcome to the Hardware Configuration Guide. The goal of this guide is to provide a practical approach to sizing your Distribution One application and
Installation Guide for contineo
Installation Guide for contineo Sebastian Stein Michael Scholz 2007-02-07, contineo version 2.5 Contents 1 Overview 2 2 Installation 2 2.1 Server and Database....................... 2 2.2 Deployment............................
Dwebs IIS Log Archiver Installation and Configuration Guide for Helm 4
Dwebs IIS Log Archiver Installation and Configuration Guide for Helm 4 Dwebs Ltd http://www.dwebs.ltd.uk January 2009 Doc: Helm 4.1.0.0 Mod Ver: 1.0.0.0 The names of actual companies and products mentioned
Performance and scalability of a large OLTP workload
Performance and scalability of a large OLTP workload ii Performance and scalability of a large OLTP workload Contents Performance and scalability of a large OLTP workload with DB2 9 for System z on Linux..............
Configuring Apache Derby for Performance and Durability Olav Sandstå
Configuring Apache Derby for Performance and Durability Olav Sandstå Sun Microsystems Trondheim, Norway Agenda Apache Derby introduction Performance and durability Performance tips Open source database
Installation and Configuration Guide for Windows and Linux
Installation and Configuration Guide for Windows and Linux vcenter Operations Manager 5.0.3 This document supports the version of each product listed and supports all subsequent versions until the document
AVG 8.5 Anti-Virus Network Edition
AVG 8.5 Anti-Virus Network Edition User Manual Document revision 85.2 (23. 4. 2009) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective
W H I T E P A P E R : T E C H N I C A L. Understanding and Configuring Symantec Endpoint Protection Group Update Providers
W H I T E P A P E R : T E C H N I C A L Understanding and Configuring Symantec Endpoint Protection Group Update Providers Martial Richard, Technical Field Enablement Manager Table of Contents Content Introduction...
Ekran System Help File
Ekran System Help File Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating Ekran to version 4.1... 13 Program Structure... 14 Getting Started... 15 Deployment Process... 15
Table of Contents Introduction and System Requirements 9 Installing VMware Server 35
Table of Contents Introduction and System Requirements 9 VMware Server: Product Overview 10 Features in VMware Server 11 Support for 64-bit Guest Operating Systems 11 Two-Way Virtual SMP (Experimental
Davor Guttierrez [email protected] 3 Gen d.o.o. Optimizing Linux Servers
Davor Guttierrez [email protected] 3 Gen d.o.o. Optimizing Linux Servers What is optimization? Our server is slow We have new very expensive server but... We have new Linux distribution but... What is
ManageEngine IT360. Professional Edition Installation Guide. [[email protected]]
ManageEngine IT360 (Division of ZOHO Corporation) ) www.manageengine.com/it360 ManageEngine IT360 Professional Edition Installation Guide [[email protected]] [This document is a guideline for installing
Konica Minolta s Optimised Print Services (OPS)
Konica Minolta s Optimised Print Services (OPS) Document Collection Agent (DCA) Detailed Installation Guide V1.6 Page 1 of 43 Table of Contents Notes... 4 Requirements... 5 Network requirements... 5 System
IBM Security QRadar SIEM Version 7.2.6. High Availability Guide IBM
IBM Security QRadar SIEM Version 7.2.6 High Availability Guide IBM Note Before using this information and the product that it supports, read the information in Notices on page 35. Product information This
CHAPTER 3 PROBLEM STATEMENT AND RESEARCH METHODOLOGY
51 CHAPTER 3 PROBLEM STATEMENT AND RESEARCH METHODOLOGY Web application operations are a crucial aspect of most organizational operations. Among them business continuity is one of the main concerns. Companies
SecurEnvoy Security Server. SecurMail Solutions Guide
SecurEnvoy Security Server SecurMail Solutions Guide SecurMail Solutions Guide 2009 SecurEnvoy Printed: 2009 in United Kingdom Publisher SecurEnvoy Publishing Managing Editor SecurEnvoy Training Dept Technical
my forecasted needs. The constraint of asymmetrical processing was offset two ways. The first was by configuring the SAN and all hosts to utilize
1) Disk performance When factoring in disk performance, one of the larger impacts on a VM is determined by the type of disk you opt to use for your VMs in Hyper-v manager/scvmm such as fixed vs dynamic.
Windows Server Performance Monitoring
Spot server problems before they are noticed The system s really slow today! How often have you heard that? Finding the solution isn t so easy. The obvious questions to ask are why is it running slowly
ProSystem fx Engagement. Deployment Planning Guide
ProSystem fx Engagement Deployment Planning Guide September 2011 Copyright: 2011, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted
msuite5 & mdesign Installation Prerequisites
CommonTime Limited msuite5 & mdesign Installation Prerequisites Administration considerations prior to installing msuite5 and mdesign. 7/7/2011 Version 2.4 Overview... 1 msuite version... 1 SQL credentials...
Outline. Failure Types
Outline Database Management and Tuning Johann Gamper Free University of Bozen-Bolzano Faculty of Computer Science IDSE Unit 11 1 2 Conclusion Acknowledgements: The slides are provided by Nikolaus Augsten
POSIX and Object Distributed Storage Systems
1 POSIX and Object Distributed Storage Systems Performance Comparison Studies With Real-Life Scenarios in an Experimental Data Taking Context Leveraging OpenStack Swift & Ceph by Michael Poat, Dr. Jerome
Virtual Server and Storage Provisioning Service. Service Description
RAID Virtual Server and Storage Provisioning Service Service Description November 28, 2008 Computer Services Page 1 TABLE OF CONTENTS INTRODUCTION... 4 VIRTUAL SERVER AND STORAGE PROVISIONING SERVICE OVERVIEW...
Performance And Scalability In Oracle9i And SQL Server 2000
Performance And Scalability In Oracle9i And SQL Server 2000 Presented By : Phathisile Sibanda Supervisor : John Ebden 1 Presentation Overview Project Objectives Motivation -Why performance & Scalability
GRAVITYZONE HERE. Deployment Guide VLE Environment
GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
Upgrade to Webtrends Analytics 8.7: Best Practices
Technical Best Practices 8.7 Software Upgrade Upgrade to Webtrends Analytics 8.7: Best Practices Version 3 Webtrends Analytics is a powerful application that must be installed on a dedicated computer.
DameWare Server. Administrator Guide
DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx
How to Choose your Red Hat Enterprise Linux Filesystem
How to Choose your Red Hat Enterprise Linux Filesystem EXECUTIVE SUMMARY Choosing the Red Hat Enterprise Linux filesystem that is appropriate for your application is often a non-trivial decision due to
Enterprise Manager. Version 6.2. Installation Guide
Enterprise Manager Version 6.2 Installation Guide Enterprise Manager 6.2 Installation Guide Document Number 680-028-014 Revision Date Description A August 2012 Initial release to support version 6.2.1
Preparing for GO!Enterprise MDM On-Demand Service
Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules
Kentico CMS 6.0 Performance Test Report. Kentico CMS 6.0. Performance Test Report February 2012 ANOTHER SUBTITLE
Kentico CMS 6. Performance Test Report Kentico CMS 6. Performance Test Report February 212 ANOTHER SUBTITLE 1 Kentico CMS 6. Performance Test Report Table of Contents Disclaimer... 3 Executive Summary...
Cloud Services ADM. Agent Deployment Guide
Cloud Services ADM Agent Deployment Guide 10/15/2014 CONTENTS System Requirements... 1 Hardware Requirements... 1 Installation... 2 SQL Connection... 4 AD Mgmt Agent... 5 MMC... 7 Service... 8 License
GUARD1 PLUS SE Administrator's Manual
GUARD1 PLUS SE Administrator's Manual Version 4.4 30700 Bainbridge Road Solon, Ohio 44139 Phone 216-595-0890 Fax 216-595-0991 [email protected] www.guard1.com i 2010 TimeKeeping Systems, Inc. GUARD1 PLUS
MONITORING A WEBCENTER CONTENT DEPLOYMENT WITH ENTERPRISE MANAGER
MONITORING A WEBCENTER CONTENT DEPLOYMENT WITH ENTERPRISE MANAGER Andrew Bennett, TEAM Informatics, Inc. Why We Monitor During any software implementation there comes a time where a question is raised
Workflow Templates Library
Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security
Configuring PA Firewalls for a Layer 3 Deployment
Configuring PA Firewalls for a Layer 3 Deployment Configuring PAN Firewalls for a Layer 3 Deployment Configuration Guide January 2009 Introduction The following document provides detailed step-by-step
Performance Test Report KENTICO CMS 5.5. Prepared by Kentico Software in July 2010
KENTICO CMS 5.5 Prepared by Kentico Software in July 21 1 Table of Contents Disclaimer... 3 Executive Summary... 4 Basic Performance and the Impact of Caching... 4 Database Server Performance... 6 Web
v7.8.2 Release Notes for Websense Content Gateway
v7.8.2 Release Notes for Websense Content Gateway Topic 60086 Web Security Gateway and Gateway Anywhere 12-Mar-2014 These Release Notes are an introduction to Websense Content Gateway version 7.8.2. New
DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12
DEPLOYMENT GUIDE Version 1.2 Deploying F5 with Oracle E-Business Suite 12 Table of Contents Table of Contents Introducing the BIG-IP LTM Oracle E-Business Suite 12 configuration Prerequisites and configuration
Scaling out a SharePoint Farm and Configuring Network Load Balancing on the Web Servers. Steve Smith Combined Knowledge MVP SharePoint Server
Scaling out a SharePoint Farm and Configuring Network Load Balancing on the Web Servers Steve Smith Combined Knowledge MVP SharePoint Server Scaling out a SharePoint Farm and Configuring Network Load Balancing
VMware vcenter Log Insight Getting Started Guide
VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
MEGA Web Application Architecture Overview MEGA 2009 SP4
Revised: September 2, 2010 Created: March 31, 2010 Author: Jérôme Horber CONTENTS Summary This document describes the system requirements and possible deployment architectures for MEGA Web Application.
WhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
bbc Adobe LiveCycle Data Services Using the F5 BIG-IP LTM Introduction APPLIES TO CONTENTS
TECHNICAL ARTICLE Adobe LiveCycle Data Services Using the F5 BIG-IP LTM Introduction APPLIES TO Adobe LiveCycle Enterprise Suite CONTENTS Introduction................................. 1 Edge server architecture......................
Running a Workflow on a PowerCenter Grid
Running a Workflow on a PowerCenter Grid 2010-2014 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording or otherwise)
Performance Benchmark for Cloud Block Storage
Performance Benchmark for Cloud Block Storage J.R. Arredondo vjune2013 Contents Fundamentals of performance in block storage Description of the Performance Benchmark test Cost of performance comparison
GFI Product Manual. Getting Started Guide
GFI Product Manual Getting Started Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either express or
How To Test The Bandwidth Meter For Hyperv On Windows V2.4.2.2 (Windows) On A Hyperv Server (Windows V2) On An Uniden V2 (Amd64) Or V2A (Windows 2
BANDWIDTH METER FOR HYPER-V NEW FEATURES OF 2.0 The Bandwidth Meter is an active application now, not just a passive observer. It can send email notifications if some bandwidth threshold reached, run scripts
Best Practices for Monitoring Databases on VMware. Dean Richards Senior DBA, Confio Software
Best Practices for Monitoring Databases on VMware Dean Richards Senior DBA, Confio Software 1 Who Am I? 20+ Years in Oracle & SQL Server DBA and Developer Worked for Oracle Consulting Specialize in Performance
WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group
2 WHITE PAPER: BEST PRACTICES Sizing and Scalability Recommendations for Symantec Rev 2.3 Symantec Enterprise Security Solutions Group White Paper: Symantec Best Practices Contents Introduction... 4 The
Virtual Appliance Setup Guide
The Barracuda SSL VPN Vx Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda SSL VPN hardware appliance. It is designed for easy deployment
Performance Characteristics of VMFS and RDM VMware ESX Server 3.0.1
Performance Study Performance Characteristics of and RDM VMware ESX Server 3.0.1 VMware ESX Server offers three choices for managing disk access in a virtual machine VMware Virtual Machine File System
Parallels Cloud Storage
Parallels Cloud Storage White Paper Best Practices for Configuring a Parallels Cloud Storage Cluster www.parallels.com Table of Contents Introduction... 3 How Parallels Cloud Storage Works... 3 Deploying
1.0 Hardware Requirements:
01 - ServiceDesk Plus - Best Practices We appreciate you choosing ServiceDesk Plus for your organization to deliver world-class IT services. Before installing the product, take a few minutes to go through
Cyan Networks Secure Web vs. Websense Security Gateway Battle card
URL Filtering CYAN Secure Web Database - over 30 million web sites organized into 31 categories updated daily, periodically refreshing the data and removing expired domains Updates of the URL database
ManageEngine EventLog Analyzer. Best Practices Document
ManageEngine EventLog Analyzer Best Practices Document Table of Contents System Requirements... 3 Up to 50 hosts... 3 Up to 100 hosts... 3 Up to 200 hosts... 3 Up to 500 hosts... 3 Above 500 hosts... 4
How To Install Powerpoint 6 On A Windows Server With A Powerpoint 2.5 (Powerpoint) And Powerpoint 3.5.5 On A Microsoft Powerpoint 4.5 Powerpoint (Powerpoints) And A Powerpoints 2
DocAve 6 Service Pack 1 Installation Guide Revision C Issued September 2012 1 Table of Contents About the Installation Guide... 4 Submitting Documentation Feedback to AvePoint... 4 Before You Begin...
DATABASE. Pervasive PSQL Performance. Key Performance Features of Pervasive PSQL. Pervasive PSQL White Paper
DATABASE Pervasive PSQL Performance Key Performance Features of Pervasive PSQL Pervasive PSQL White Paper June 2008 Table of Contents Introduction... 3 Per f o r m a n c e Ba s i c s: Mo r e Me m o r y,
Propalms TSE Deployment Guide
Propalms TSE Deployment Guide Version 7.0 Propalms Ltd. Published October 2013 Overview This guide provides instructions for deploying Propalms TSE in a production environment running Windows Server 2003,
HP Device Manager 4.6
Technical white paper HP Device Manager 4.6 Installation and Update Guide Table of contents Overview... 3 HPDM Server preparation... 3 FTP server configuration... 3 Windows Firewall settings... 3 Firewall
SmartSync Backup Efficient NAS-to-NAS backup
Allion Ingrasys Europe SmartSync Backup Efficient NAS-to-NAS backup 1. Abstract A common approach to back up data stored in a NAS server is to run backup software on a Windows or UNIX systems and back
Web Application s Performance Testing
Web Application s Performance Testing B. Election Reddy (07305054) Guided by N. L. Sarda April 13, 2008 1 Contents 1 Introduction 4 2 Objectives 4 3 Performance Indicators 5 4 Types of Performance Testing
Enterprise Manager Performance Tips
Enterprise Manager Performance Tips + The tips below are related to common situations customers experience when their Enterprise Manager(s) are not performing consistent with performance goals. If you
