CONSUL AS A MONITORING SERVICE
|
|
|
- Baldric Williams
- 10 years ago
- Views:
Transcription
1 CONSUL AS A MONITORING SERVICE
2 SETH
3
4 SERVICE ORIENTED ARCHITECTURE
5 SOA PRIMER Autonomous Limited Scope Loose Coupling
6 ORDER PROCESSING ORDER WEB APP HISTORY FORECASTING
7 ORDER PROCESSING WEB APP DISCOVERY Which nodes are part of "order processing"?
8 ORDER PROCESSING NODE 1 WEB APP NODE 2 NODE N LOAD BALANCING How to ensure request leveling across providers?
9 ORDER PROCESSING NODE 1 WEB APP NODE 2 LOAD BALANCER NODE N ANTI- PATTERN Load Balancer is a Single Point of Failure (SPOF)
10 ORDER PROCESSING NODE 1 WEB APP NODE 2 LOAD BALANCER NODE 3 HEALTH CHECKING How to avoid routing to unhealthy hosts?
11 maintenance: false feature_a: true role: "web" WEB 1 WEB APP WEB 2 WEB N CONFIGURATION How to efficiently push dynamic configuration?
12 4 BASIC PROBLEMS SERVICE LOAD HEALTH KEY- VALUE DISCOVERY BALANCING CHECKING CONFIGURATION
13 EXISTING "SOLUTIONS" ZOOKEEPER ETCD SENSU SMART STACK
14 CONSUL
15 Service Discovery HTTP + DNS
16 demo master dig web-frontend.service.consul
17 demo master dig web-frontend.service.consul ; <<>> DiG P1 <<>> web-frontend.service.consul. ANY ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 0 ;; QUESTION SECTION: ;web-frontend.service.consul. IN ANY ;; ANSWER SECTION: web-frontend.service.consul. 0 IN A web-frontend.service.consul. 0 IN A
18 Datacenter Aware
19 CLIENT CLIENT CLIENT CLIENT CLIENT CLIENT RPC LAN GOSSIP RPC SERVER SERVER SERVER REPLICATION REPLICATION
20 CLIENT CLIENT CLIENT CLIENT CLIENT CLIENT RPC LAN GOSSIP RPC SERVER SERVER SERVER REPLICATION REPLICATION SERVER REPLICATION SERVER REPLICATION SERVER
21 CLIENT CLIENT CLIENT CLIENT CLIENT CLIENT RPC LAN GOSSIP RPC SERVER SERVER SERVER REPLICATION REPLICATION WAN GOSSIP SERVER REPLICATION SERVER REPLICATION SERVER
22 Host & Service Level Health Checks
23 demo master consul-template -template="example.ctmpl" -dry > listen http-in bind *:8000 server web :80 server web :80 server web :80 demo master
24 demo master consul-template -template="example.ctmpl" -dry > listen http-in bind *:8000 server web :80 server web :80 server web :80 demo master sudo stop webserver
25 demo master consul-template -template="example.ctmpl" -dry > listen http-in bind *:8000 server web :80 server web :80 demo master sudo stop webserver
26 demo master consul-template -template="example.ctmpl" -dry > listen http-in bind *:8000 server web :80 server web :80 server web :80 demo master sudo start webserver
27 K/V Store HTTP API
28 demo master curl -X PUT -d 'bar' true
29 demo master curl -X PUT -d 'bar' true demo master curl [ ] { } "CreateIndex": 100, "ModifyIndex": 200, "Key": "foo", "Flags": 0, "Value": "YmFy"
30 TRUSTED BY
31 HEALTH CHECKS
32 WHAT IS A CHECK? Any command that returns an exit code
33 WHAT IS A CHECK? Any command that returns an exit code 0 1 PASSING WARNING FAILING
34 WHAT IS A CHECK? Output is captured as a "note" for inspection $ curl curl: (7) Failed to connect to port 4455: Connection refused
35 CREATING A CHECK Use a custom script { } "check": { "id": "mem-util", "name": "Memory utilization", "script": "/usr/local/bin/check_mem.py", "interval": "10s" }
36 CREATING A CHECK Use a built-in check type { } "check": { "id": "api", "name": "HTTP API on port 4455", "http": " "interval": "10s", "timeout": "1s" }
37 RESPONSIVE
38
39
40 WEB 1 MONITORING WEB 2 SERVICE WEB N TRADITIONAL MONITORING Pushes information into a silo
41 WEB 1 MONITORING WEB 2 SERVICE WEB N TRADITIONAL MONITORING Pushes information into a silo
42 WEB 1 MONITORING SERVICE WEB 2 WEB N TRADITIONAL MONITORING Pushes information into a silo
43 WEB 1 MONITORING SERVICE WEB 2 WEB N TRADITIONAL MONITORING Pushes information into a silo
44 U WEB 1 MONITORING SERVICE WEB 2 WEB N TRADITIONAL MONITORING Pushes information into a silo
45 U F WEB 1 MONITORING SERVICE WEB 2 WEB N TRADITIONAL MONITORING Pushes information into a silo
46 U F WEB 1 MONITORING SERVICE WEB 2 WEB N TRADITIONAL MONITORING Pushes information into a silo
47 WEB 1 CONSUL WEB 2 WEB N CONSUL MONITORING Removes unhealthy nodes from service discovery layer
48 WEB 1 CONSUL WEB 2 WEB N CONSUL MONITORING Removes unhealthy nodes from service discovery layer
49 dig web.service.consul WEB 1 CONSUL WEB 2 WEB N CONSUL MONITORING Removes unhealthy nodes from service discovery layer
50 dig web.service.consul WEB 1 CONSUL WEB 2 WEB N CONSUL MONITORING Removes unhealthy nodes from service discovery layer
51 dig web.service.consul WEB 1 CONSUL WEB 2 WEB N CONSUL MONITORING Removes unhealthy nodes from service discovery layer
52 host: web.service.consul dig web.service.consul WEB 1 CONSUL WEB 2 WEB N CONSUL MONITORING Removes unhealthy nodes from service discovery layer
53 host: web.service.consul dig web.service.consul WEB 1 CONSUL WEB 2 WEB N CONSUL MONITORING Removes unhealthy nodes from service discovery layer
54 host: web.service.consul dig web.service.consul WEB 1 CONSUL WEB 2 WEB N CONSUL MONITORING Removes unhealthy nodes from service discovery layer
55 host: web.service.consul dig web.service.consul WEB 1 CONSUL WEB 2 WEB N CONSUL MONITORING Removes unhealthy nodes from service discovery layer
56 host: web.service.consul dig web.service.consul WEB 1 CONSUL WEB 2 WEB N CONSUL MONITORING Removes unhealthy nodes from service discovery layer
57 CONSUL MONITORING Unhealthy nodes are not returned from DNS queries dig web.service.consul web-01, web-02, web-03
58 CONSUL MONITORING Unhealthy nodes are not returned from HTTP API curl /v1/services/web web-01, web-02, web-03
59 LOCKING
60 CONSUL LOCK Allows for a new kind of "HA" demo master consul lock [options] prefix child...
61 VAULT 1 VAULT 2 CONSUL VAULT 3 CONSUL LOCK Making standby HA much simpler
62 VAULT 1 L VAULT 2 CONSUL VAULT 3 L CONSUL LOCK Making standby HA much simpler
63 VAULT 1 L VAULT 2 CONSUL VAULT 3 CONSUL LOCK Making standby HA much simpler
64 VAULT 1 L LEADER ELECTION VAULT 2 CONSUL VAULT 3 CONSUL LOCK Making standby HA much simpler
65 VAULT 1 L VAULT 2 CONSUL GET /secret/foo VAULT 3 REQUEST CONSUL LOCK Making standby HA much simpler
66 VAULT 1 L VAULT 2 CONSUL GET /secret/foo VAULT 3 REQUEST CONSUL LOCK Making standby HA much simpler
67 VAULT 1 L VAULT 2 CONSUL GET /secret/foo VAULT 3 REQUEST CONSUL LOCK Making standby HA much simpler
68 VAULT 1 L VAULT 2 CONSUL VAULT 3 CONSUL LOCK Making standby HA much simpler
69 VAULT 1 l VAULT 2 CONSUL VAULT 3 CONSUL LOCK Making standby HA much simpler
70 VAULT 1 VAULT 2 CONSUL VAULT 3 L CONSUL LOCK Making standby HA much simpler
71 VAULT 1 VAULT 2 CONSUL VAULT 3 L CONSUL LOCK Making standby HA much simpler
72 VAULT 1 VAULT 2 CONSUL GET /secret/foo VAULT 3 L REQUEST CONSUL LOCK Making standby HA much simpler
73 VAULT 1 VAULT 2 CONSUL GET /secret/foo VAULT 3 L REQUEST CONSUL LOCK Making standby HA much simpler
74 CONSUL LOCK Solves the "exactly one of these must always be running" problem
75 CONSUL LOCK Also great as a semaphore - rolling restarts
76 SCALABILITY
77 WEB 1 "I'm healthy" MONITORING WEB 2 SERVICE "Good, thanks for asking!" WEB N TRADITIONAL MONITORING Notifies/polls all statuses
78 WEB 1 MONITORING SERVICE 1,000'S OF REQUESTS WEB 2 WEB 1,000 TRADITIONAL MONITORING Notifies/polls all statuses
79 HA WEB 1 MONITORING SERVICE 1,000'S OF REQUESTS WEB 2 WEB 1,000 TRADITIONAL MONITORING Notifies/polls all statuses
80 My status has changed WEB 1 CONSUL WEB 2 WEB N CONSUL MONITORING Notifies on status changes
81 WEB 1 CONSUL 10'S OF REQUESTS WEB 2 WEB 1,000 CONSUL MONITORING Notifies on status changes
82 CONCLUSION
83 SOLVES 4 BASIC PROBLEMS SERVICE LOAD HEALTH KEY- VALUE DISCOVERY BALANCING CHECKING CONFIGURATION
84 SOLVES 4 MORE PROBLEMS G L H 9 LEADER ELECTION SEMAPHORE LOCKING RESPONSIVE SCALABLE
85 SETH QUESTIONS?
Enabling DNS for IPv6 CSD Fall 2011
Enabling DNS for IPv6 CSD Fall 2011 Team members: Bowei Dai [email protected] 15 credits Elis Kullberg [email protected] 18 credits Hannes Junnila [email protected] 15 credits Nur Mohammad Rashed [email protected] 15 credits
CSE 127: Computer Security. Network Security. Kirill Levchenko
CSE 127: Computer Security Network Security Kirill Levchenko December 4, 2014 Network Security Original TCP/IP design: Trusted network and hosts Hosts and networks administered by mutually trusted parties
Measuring the Web: Part I - - Content Delivery Networks. Prof. Anja Feldmann, Ph.D. Dr. Ramin Khalili Georgios Smaragdakis, PhD
Measuring the Web: Part I - - Content Delivery Networks Prof. Anja Feldmann, Ph.D. Dr. Ramin Khalili Georgios Smaragdakis, PhD Acknowledgement Material presented in these slides is borrowed from presentajons
ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example
ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example Document ID: 113571 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information
IERG 4080 Building Scalable Internet-based Services
Department of Information Engineering, CUHK Term 1, 2015/16 IERG 4080 Building Scalable Internet-based Services Lecture 4 Load Balancing Lecturer: Albert C. M. Au Yeung 30 th September, 2015 Web Server
Configuring HAproxy as a SwiftStack Load Balancer
Configuring HAproxy as a SwiftStack Load Balancer To illustrate how a SwiftStack cluster can be configured with an external load balancer, such as HAProxy, let s walk through a step-by-step example of
How To Attack Isc.Org.Org With A Dnet On A Network With A Pnet On The Same Day As A Dbus On A Pc Or Ipnet On An Ipnet.Org On A 2.5Th Gen.Net
Surviving a DDoS Attack: What every host needs to know Maria Karaivanova, Business Development David Koston, Platform www.cloudflare.com DDoS Attacks are becoming massive, and easier to initiate!2 Major
DNS Resolving using nslookup
DNS Resolving using nslookup Oliver Hohlfeld & Andre Schröder January 8, 2007 Abstract This report belongs to a talk given at the networking course (Institue Eurecom, France) in January 2007. It is based
DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5
DEPLOYMENT GUIDE Version 1.1 Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Citrix Presentation Server Prerequisites
Creating a master/slave DNS server combination for your Grid Infrastructure
Creating a master/slave DNS server combination for your Grid Infrastructure When doing a Grid Infrastructure installation, a DNS server is needed to resolve addresses for the cluster- scan addresses. In
How-to: DNS Enumeration
25-04-2010 Author: Mohd Izhar Ali Email: [email protected] Website: http://johncrackernet.blogspot.com Table of Contents How-to: DNS Enumeration 1: Introduction... 3 2: DNS Enumeration... 4 3: How-to-DNS
Local DNS Attack Lab. 1 Lab Overview. 2 Lab Environment. SEED Labs Local DNS Attack Lab 1
SEED Labs Local DNS Attack Lab 1 Local DNS Attack Lab Copyright c 2006 Wenliang Du, Syracuse University. The development of this document was partially funded by the National Science Foundation s Course,
Domain Name System (DNS) Fundamentals
Domain Name System (DNS) Fundamentals Mike Jager Network Startup Resource Center [email protected] These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International
Configuring Nex-Gen Web Load Balancer
Configuring Nex-Gen Web Load Balancer Table of Contents Load Balancing Scenarios & Concepts Creating Load Balancer Node using Administration Service Creating Load Balancer Node using NodeCreator Connecting
Monitoring Drupal with Sensu. John VanDyk Iowa State University DrupalCorn Iowa City August 10, 2013
Monitoring Drupal with Sensu John VanDyk Iowa State University DrupalCorn Iowa City August 10, 2013 What is Sensu? Sensu architecture Sensu server Sensu client Drupal and Sensu Q: What is Sensu? A: A monitoring
DNS Amplification Attacks as a DDoS Tool and Mitigation Techniques
DNS Amplification Attacks as a DDoS Tool and Mitigation Techniques Klaus Steding-Jessen [email protected]! Computer Emergency Response Team Brazil - CERT.br Network Information Center Brazil - NIC.br Brazilian
TECHNOLOGY WHITE PAPER Jun 2012
TECHNOLOGY WHITE PAPER Jun 2012 Technology Stack C# Windows Server 2008 PHP Amazon Web Services (AWS) Route 53 Elastic Load Balancing (ELB) Elastic Compute Cloud (EC2) Amazon RDS Amazon S3 Elasticache
Deploying the BIG-IP System with VMware vcenter Site Recovery Manager
Deployment Guide Version 1.0 Deploying the BIG-IP System with VMware vcenter Site Recovery Manager Contents 2 Prerequisites and configuration notes 2 Deployment overview 3 Example configuration of BIG-IP
netkit lab dns Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group Version Author(s)
Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group netkit lab dns Version Author(s) E-mail Web Description 2.2 G. Di Battista, M. Patrignani, M.
XAP 10 Global HTTP Session Sharing
XAP 10 Global HTTP Session Sharing Sep 2014 Shay Hassidim Deputy CTO, Distinguished Engineer 1 Agenda Agenda Web Application Challenges Introduce XAP Global HTTP Session Sharing Application Session Sharing
CI Pipeline with Docker 2015-02-27
CI Pipeline with Docker 2015-02-27 Juho Mäkinen, Technical Operations, Unity Technologies Finland http://www.juhonkoti.net http://github.com/garo Overview 1. Scale on how we use Docker 2. Overview on the
DNS at NLnet Labs. Matthijs Mekking
DNS at NLnet Labs Matthijs Mekking Topics NLnet Labs DNS DNSSEC Recent events NLnet Internet Provider until 1997 The first internet backbone in Holland Funding research and software projects that aid the
Pertino HA Cluster Deployment: Enabling a Multi- Tier Web Application Using Amazon EC2 and Google CE. A Pertino Deployment Guide
Pertino HA Cluster Deployment: Enabling a Multi- Tier Web Application Using Amazon EC2 and Google CE A Pertino Deployment Guide 1 Table of Contents Abstract... 2 Introduction... 3 Before you get Started...
what s in a name? taking a deeper look at the domain name system mike boylan penn state mac admins conference
what s in a name? taking a deeper look at the domain name system mike boylan penn state mac admins conference whoami work for robert morris university, pittsburgh, pa primarily mac and voip admin @mboylan
Domain Name System (DNS) Session-1: Fundamentals. Ayitey Bulley [email protected]
Domain Name System (DNS) Session-1: Fundamentals Ayitey Bulley [email protected] Computers use IP addresses. Why do we need names? Names are easier for people to remember Computers may be moved between
PROTECTING DATA IN TRANSIT WITH ENCRYPTION IN M-FILES
M-FILES CORPORATION PROTECTING DATA IN TRANSIT WITH ENCRYPTION IN M-FILES VERSION 8 24 SEPTEMBER 2014 Page 1 of 8 CONTENTS 1. Overview... 3 2. Encryption of Data in Transit in M-Files... 4 HTTPS... 4 RPC
Integrating VoltDB with Hadoop
The NewSQL database you ll never outgrow Integrating with Hadoop Hadoop is an open source framework for managing and manipulating massive volumes of data. is an database for handling high velocity data.
HAProxy. Free, Fast High Availability and Load Balancing. Adam Thornton 10 September 2014
HAProxy Free, Fast High Availability and Load Balancing Adam Thornton 10 September 2014 What? HAProxy is a proxy for Layer 4 (TCP) or Layer 7 (HTTP) traffic GPLv2 http://www.haproxy.org Disclaimer: I don't
BITS-Pilani Hyderabad Campus CS C461/IS C461/CS F303/ IS F303 (Computer Networks) Laboratory 3
BITS-Pilani Hyderabad Campus CS C461/IS C461/CS F303/ IS F303 (Computer Networks) Laboratory 3 Aim: To give an introduction to HTTP, SMTP, & DNS, and observe the packets in a LAN network. HTTP (Hypertext
How to Enable Internet for Guest Virtual Machine using Wi-Fi wireless Internet Connection.
How to Enable Internet for Guest Virtual Machine using Wi-Fi wireless Internet Connection. Table of Contents 1) Host, Guest and VBox version.... 2 2) Check your current Host and Guest Details... 3 3) Now
The role of JANET CSIRT
The role of JANET CSIRT Bradley Freeman JANET(UK) CSIRT Member UKNOF 15 21 st January 2010 [email protected] Copyright JNT Association 2009 1 What to expect Overview of how we detect and deal with
SmartTV User Interface Development for SmartTV using Web technology and CEA2014. George Sarosi [email protected]
SmartTV User Interface Development for SmartTV using Web technology and CEA2014. George Sarosi [email protected] Abstract Time Warner Cable is the second largest Cable TV operator in North America
Put a Firewall in Your JVM Securing Java Applications!
Put a Firewall in Your JVM Securing Java Applications! Prateep Bandharangshi" Waratek Director of Client Security Solutions" @prateep" Hussein Badakhchani" Deutsche Bank Ag London Vice President" @husseinb"
An Oracle White Paper December, 2012. Enterprise Manager 12c Cloud Control: Configuring OMS Disaster Recovery with F5 BIG-IP Global Traffic Manager
An Oracle White Paper December, 2012 Enterprise Manager 12c Cloud Control: Configuring OMS Disaster Recovery with F5 BIG-IP Global Traffic Manager Contents Contents... 1 Executive Overview... 2 Disaster
Deploying the BIG-IP System v11 with DNS Servers
Deployment Guide Document version 1.1 What s inside: 2 What is F5 iapp? 2 Prerequisites and configuration notes 2 Configuration example 3 Preparation Worksheet 4 Configuring the BIG-IP iapp for DNS Servers
CumuLogic Load Balancer Overview Guide. March 2013. CumuLogic Load Balancer Overview Guide 1
CumuLogic Load Balancer Overview Guide March 2013 CumuLogic Load Balancer Overview Guide 1 Table of Contents CumuLogic Load Balancer... 3 Architectural Overview of CumuLogic Load Balancer... 4 How to Use
Open Source High Availability Writing Resource Agents for your own services. Lars Marowsky-Brée Team Lead SUSE Labs [email protected]
Open Source High Availability Writing Resource Agents for your own services Lars Marowsky-Brée Team Lead SUSE Labs [email protected] Agenda Introduction Resource Agents in context Basic Resource Agents (+ code)
High Availability Solutions for the MariaDB and MySQL Database
High Availability Solutions for the MariaDB and MySQL Database 1 Introduction This paper introduces recommendations and some of the solutions used to create an availability or high availability environment
Table of Contents. Confidential and Proprietary
Table of Contents About Toshiba Strata CIX and Broadvox SIP Trunking... 1 Requirements... 2 Purpose, Scope and Audience... 3 What is SIP Trunking?... 4 Business Advantages of SIP Trunking... 4 Technical
Configure ActiveSync with a single Exchange server (Exchange sync for an iphone)
Configure ActiveSync with a single Exchange server (Exchange sync for an iphone) I recently picked up a first-generation iphone from a friend and after playing around with it for a while I decided that
Deploying System Center 2012 R2 Configuration Manager
Deploying System Center 2012 R2 Configuration Manager This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.
Unbound a caching, validating DNSSEC resolver. Do you trust your name server? Configuration. Unbound as a DNS cache (SEC-less)
Unbound a caching, validating DNSSEC resolver UKUUG Spring 2011 Conference Leeds, UK March 2011 Jan-Piet Mens $ dig 1.1.0.3.3.0.8.1.7.1.9.4.e164.arpa naptr Do you trust your name server? DNS clients typically
Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de
Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Microsoft Forefront TMG Webserver Load Balancing Abstract In this article I will show you how
QMX ios MDM Pre-Requisites and Installation Guide
QMX ios MDM Pre-Requisites and Installation Guide QMX System Requirements The following requirements apply to the system that QMX will be installed on. This system will host the QMX MDM Service. These
Domain Name System Security
Abstract Domain Name System Security Ladislav Hagara [email protected] Department of Automated Command Systems and Informatics Military Academy in Brno Brno, Czech Republic Domain Name System (DNS) is one of
DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP LTM with Apache Tomcat and Apache HTTP Server
DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP LTM with Apache Tomcat and Apache HTTP Server Table of Contents Table of Contents Deploying the BIG-IP LTM with Tomcat application servers and Apache web
Contents Set up Cassandra Cluster using Datastax Community Edition on Amazon EC2 Installing OpsCenter on Amazon AMI References Contact
Contents Set up Cassandra Cluster using Datastax Community Edition on Amazon EC2... 2 Launce Amazon micro-instances... 2 Install JDK 7... 7 Install Cassandra... 8 Configure cassandra.yaml file... 8 Start
Mobile Devices: Server and Management Lesson 05 Service Discovery
Mobile Devices: Server and Management Lesson 05 Service Discovery Oxford University Press 2007. All rights reserved. 1 Service discovery An adaptable middleware in a device (or a mobile computing system)
VAULT MODERN SECRETS MANAGEMENT
VAULT MODERN SECRETS MANAGEMENT CLICK ENGAGE TO RATE RATE 12 SESSIONS AND GET THE SUPERCOOL GOTO PRIZE SETH VARGO @sethvargo SECRET MANAGEMENT WHAT IS "SECRET"? SECRET VS. SENSITIVE SECRET SENSITIVE
Socket = an interface connection between two (dissimilar) pipes. OS provides this API to connect applications to networks. home.comcast.
Interprocess communication (Part 2) For an application to send something out as a message, it must arrange its OS to receive its input. The OS is then sends it out either as a UDP datagram on the transport
Healthstone Monitoring System
Healthstone Monitoring System Patrick Lambert v1.1.0 Healthstone Monitoring System 1 Contents 1 Introduction 2 2 Windows client 2 2.1 Installation.............................................. 2 2.2 Troubleshooting...........................................
Aqua Connect Load Balancer User Manual (Mac)
Aqua Connect Load Balancer User Manual (Mac) Table of Contents About Aqua Connect Load Balancer... 3 System Requirements... 4 Hardware... 4 Software... 4 Installing the Load Balancer... 5 Configuration...
JoramMQ, a distributed MQTT broker for the Internet of Things
JoramMQ, a distributed broker for the Internet of Things White paper and performance evaluation v1.2 September 214 mqtt.jorammq.com www.scalagent.com 1 1 Overview Message Queue Telemetry Transport () is
Top Weblogic Tasks You can Automate Now
Top Weblogic Tasks You can Automate Now Session ID#: 10506 Prepared by: Mrityunjay Kant Practice Manager, SOA & Integration Services AST Corporation @MrityunjayKant REMINDER Check in on the COLLABORATE
Filter Avoidance and Anonymous Proxy Guard
March 21, 2011 Author: Audience: SWAT Team Evaluator Product: Cymphonix Network Composer EX Series, XLi OS version 9 Filter Avoidance and Anonymous Proxy Guard Filter Avoidance The award winning XLi technology
HTTP communication between Symantec Enterprise Vault and Clearwell E- Discovery
Securing HTTP communication between Symantec Enterprise Vault and Clearwell E- Discovery Requesting and Applying an SSL Certificate to secure communication ion from Clearwell E-Discovery to Enterprise
Informix Administration Overview
Informix Administration Overview John F. Miller III August 2008 August 18, 2008 Overview Information Management IDS Architecture Overview OAT Administrators Feature Overview Performance Monitoring Managing
Monitoring IBM WebSphere extreme Scale (WXS) Calls With dynatrace
Monitoring IBM WebSphere extreme Scale (WXS) Calls With dynatrace What is IBM WebSphere extreme Scale (WXS)? From IBM: WebSphere extreme Scale operates as an in-memory grid that dynamically processes,
Centralizing Windows Events with Event Forwarding
1 Centralizing Windows Events with Event Forwarding 2 Copyright Notice The information contained in this document ( the Material ) is believed to be accurate at the time of printing, but no representation
DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP LTM System with VMware View
DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP LTM System with VMware View Table of Contents Table of Contents Deploying F5 with VMware View Prerequisites and configuration notes...1-1 Product versions
GlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
deploying meteor with meteor up
deploying meteor with meteor up reference http://code.krister.ee/hosting-multiple-instances-of-meteor-on-digitalocean/ https://rtcamp.com/tutorials/nodejs/node-js-npm-install-ubuntu/ https://gentlenode.com/journal/meteor-19-deploying-your-applications-in-asnap-with-meteor-up-mup/41
I/O Considerations in Big Data Analytics
Library of Congress I/O Considerations in Big Data Analytics 26 September 2011 Marshall Presser Federal Field CTO EMC, Data Computing Division 1 Paradigms in Big Data Structured (relational) data Very
Design for Failure High Availability Architectures using AWS
Design for Failure High Availability Architectures using AWS Harish Ganesan Co founder & CTO 8KMiles www.twitter.com/harish11g http://www.linkedin.com/in/harishganesan Sample Use Case Multi tiered LAMP/LAMJ
A Coordinated. Enterprise Networks Software Defined. and Application Fluent Programmable Networks
A Coordinated Virtual Infrastructure for SDN in Enterprise Networks Software Defined Networking (SDN), OpenFlow and Application Fluent Programmable Networks Strategic White Paper Increasing agility and
MarkLogic Server. Database Replication Guide. MarkLogic 8 February, 2015. Copyright 2015 MarkLogic Corporation. All rights reserved.
Database Replication Guide 1 MarkLogic 8 February, 2015 Last Revised: 8.0-1, February, 2015 Copyright 2015 MarkLogic Corporation. All rights reserved. Table of Contents Table of Contents Database Replication
DNS. Some advanced topics. Karst Koymans. (with Niels Sijm) Informatics Institute University of Amsterdam. (version 2.6, 2013/09/19 10:55:30)
DNS Some advanced topics Karst Koymans (with Niels Sijm) Informatics Institute University of Amsterdam (version 2.6, 2013/09/19 10:55:30) Friday, September 13, 2013 Karst Koymans (with Niels Sijm) (UvA)
Step-by-Step DNSSEC-Tools Operator Guidance Document
Step-by-Step DNSSEC-Tools Operator Guidance Document Using the DNSSEC-Tools v1.0 distribution SPARTA, Inc. Table of Contents 1. Introduction... 1 Organization of this Document... 1 Key Concepts... 2 Zones
Orchestrating Distributed Deployments with Docker and Containers 1 / 30
Orchestrating Distributed Deployments with Docker and Containers 1 / 30 Who am I? Jérôme Petazzoni (@jpetazzo) French software engineer living in California Joined Docker (dotcloud) more than 4 years ago
Deploying the BIG-IP System v10 with Oracle Application Server 10g R2
DEPLOYMENT GUIDE Deploying the BIG-IP System v10 with Oracle Application Server 10g R2 Version 1.1 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Oracle s Application Server 10g
Unlocking data creating knowledge. How to run Nesstar with IIS Socket Pooling
Unlocking data creating knowledge How to run Nesstar with IIS Socket Pooling November 2006 Contents 1 Introduction... 1 1.1 What is Socket Pooling?... 1 1.1.1 How to confirm this is the problem... 1 2
CRESTRON-APP-ANDROID Control App for Android
1 Introduction The app from Crestron provides a Smart Graphics touch screen user interface on Android devices. Fully integrated with Crestron programming software including Crestron Studio, VT Pro-e, and
Building Hyper-Scale Platform-as-a-Service Microservices with Microsoft Azure. Patriek van Dorp and Alex Thissen
Building Hyper-Scale Platform-as-a-Service Microservices with Microsoft Azure Patriek van Dorp and Alex Thissen About me: Patriek van Dorp [email protected] @pvandorp Xpirit http://onwindowsazure.com
Deploying the BIG-IP LTM with. Citrix XenApp. Deployment Guide Version 1.2. What s inside: 2 Prerequisites and configuration notes
Deployment Guide Version 1.2 Deploying the BIG-IP LTM with What s inside: 2 Prerequisites and configuration notes 3 Configuration Worksheet 4 Using the BIG-IP LTM Application Template for 8 Modifying the
How To Understand The History Of The Network And Network (Networking) In A Network (Network) (Netnet) (Network And Network) (Dns) (Wired) (Lannet) And (Network Network)
COMPUTER NETWORKS LECTURES DR.PETER G. GYARMATI Research professor Lectures of P. G. Gyarmati 1. page 1999.-2006. 1999.-2006. This page is intentionally left blank Lectures of P. G. Gyarmati 2. page 1999.-2006.
Hints for Service Oriented Architectures. Marius Eriksen @marius Twitter Inc.
Hints for Service Oriented Architectures Marius Eriksen @marius Twitter Inc. We went from this (circa 2010) LB web web web web queue DB cache workers to this (circa 2015) ROUTING PRESENTATION LOGIC STORAGE
Testing Tools using Visual Studio. Randy Pagels Sr. Developer Technology Specialist Microsoft Corporation
Testing Tools using Visual Studio Randy Pagels Sr. Developer Technology Specialist Microsoft Corporation Plan REQUIREMENTS BACKLOG Monitor + Learn Development Collaboration Production Develop + Test Release
Accelerating SaaS Applications with F5 AAM and SSL Forward Proxy
Deployment Guide Accelerating Applications with F5 AAM and SSL Forward Proxy Welcome to the F5 deployment guide for Software as a Service (). This guide shows administrators how to configure the BIG-IP
5 Key Reasons to Migrate from Cisco ACE to F5 BIG-IP
5 Key Reasons to Migrate from Cisco ACE to F5 BIG-IP With support for Cisco ACE load balancer ending, organizations need to find an alternative. Contents Introduction 3 Advanced Architecture 3 Ease of
KAREL UCAP DNS AND DHCP CONCEPTS MANUAL MADE BY: KAREL ELEKTRONIK SANAYI ve TICARET A.S. Organize Sanayi Gazneliler Caddesi 10
KAREL UCAP DNS AND DHCP CONCEPTS MANUAL MADE BY: KAREL ELEKTRONIK SANAYI ve TICARET A.S. Organize Sanayi Gazneliler Caddesi 10 Sincan 06935 Ankara, Turkey Version Table Manual Version/Date AAA/22.03.2011
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Introduction to IP v6
IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation
Towards Smart and Intelligent SDN Controller
Towards Smart and Intelligent SDN Controller - Through the Generic, Extensible, and Elastic Time Series Data Repository (TSDR) YuLing Chen, Dell Inc. Rajesh Narayanan, Dell Inc. Sharon Aicler, Cisco Systems
DNS zone transfers from FreeIPA to non-freeipa slave servers
FreeIPA Training Series DNS zone transfers from FreeIPA to non-freeipa slave servers FreeIPA 3.0 and bind-dyndb-ldap 2.3 Petr Špaček 01-03-2013 Text file based
DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH CITRIX PRESENTATION SERVER 3.0 AND 4.5
DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH CITRIX PRESENTATION SERVER 3.0 AND 4.5 Deploying F5 BIG-IP Local Traffic Manager with Citrix Presentation Server Welcome to the F5 BIG-IP Deployment
Configuring DNS on Cisco Routers
Configuring DNS on Cisco Routers Document ID: 24182 Contents Introduction Prerequisites Requirements Components Used Conventions Setting Up a Router to Use DNS Lookups Troubleshooting You Can Ping a Web
Configuring Load Balancing
When you use Cisco VXC Manager to manage thin client devices in a very large enterprise environment, a single Cisco VXC Manager Management Server cannot scale up to manage the large number of devices.
Soft Solutions, Inc. 4-Sight FAX 7.5. Getting Started. Soft Solutions, Inc. http://www.4sightfax.com/
4-Sight FAX 7.5 Getting Started Soft Solutions, Inc. http://www.4sightfax.com/ Introduction Thank you for your interest in 4-Sight FAX version 7.5. This guide documents the general configuration for using
Microsoft HPC. V 1.0 José M. Cámara ([email protected])
Microsoft HPC V 1.0 José M. Cámara ([email protected]) Introduction Microsoft High Performance Computing Package addresses computing power from a rather different approach. It is mainly focused on commodity
EView/400i Management Pack for Systems Center Operations Manager (SCOM)
EView/400i Management Pack for Systems Center Operations Manager (SCOM) Concepts Guide Version 6.3 November 2012 Legal Notices Warranty EView Technology makes no warranty of any kind with regard to this
Microsoft Exchange Server
Deployment Guide Document Version: 4.9.2 Deploying the BIG-IP System v10 with Microsoft Welcome to the F5 and Microsoft Exchange 2010 deployment guide. This document contains guidance on configuring the
VMware Infrastructure and IBM WebSphere Software
VMware Infrastructure and IBM WebSphere Software Table of Contents 1. Introduction... 1 2. IBM WebSphere Application Servers... 2 3. IBM WebSphere Virtual Enterprise Overview... 3 4. VMware Infrastructure
DEPLOYMENT GUIDE Version 1.1. Configuring BIG-IP WOM with Oracle Database Data Guard, GoldenGate, Streams, and Recovery Manager
DEPLOYMENT GUIDE Version 1.1 Configuring BIG-IP WOM with Oracle Database Data Guard, GoldenGate, Streams, and Recovery Manager Table of Contents Table of Contents Configuring BIG-IP WOM with Oracle Database
Multiple Public IPs (virtual service IPs) are supported either to cover multiple network segments or to increase network performance.
EliteNAS Cluster Mirroring Option - Introduction Real Time NAS-to-NAS Mirroring & Auto-Failover Cluster Mirroring High-Availability & Data Redundancy Option for Business Continueity Typical Cluster Mirroring
DNS SECURITY TROUBLESHOOTING GUIDE
DNS SECURITY TROUBLESHOOTING GUIDE INTERNET DEPLOYMENT OF DNS SECURITY 27 November 2006 Table of Contents 1. INTRODUCTION...3 2. DNS SECURITY SPECIFIC FAILURE MODES...3 2.1 SIGNATURES...3 2.1.1 Signature
Redis Cluster. a pragmatic approach to distribution
Redis Cluster a pragmatic approach to distribution All nodes are directly connected with a service channel. TCP baseport+4000, example 6379 -> 10379. Node to Node protocol is binary, optimized for bandwidth
