CONSUL AS A MONITORING SERVICE

Size: px
Start display at page:

Download "CONSUL AS A MONITORING SERVICE"

Transcription

1 CONSUL AS A MONITORING SERVICE

2 SETH

3

4 SERVICE ORIENTED ARCHITECTURE

5 SOA PRIMER Autonomous Limited Scope Loose Coupling

6 ORDER PROCESSING ORDER WEB APP HISTORY FORECASTING

7 ORDER PROCESSING WEB APP DISCOVERY Which nodes are part of "order processing"?

8 ORDER PROCESSING NODE 1 WEB APP NODE 2 NODE N LOAD BALANCING How to ensure request leveling across providers?

9 ORDER PROCESSING NODE 1 WEB APP NODE 2 LOAD BALANCER NODE N ANTI- PATTERN Load Balancer is a Single Point of Failure (SPOF)

10 ORDER PROCESSING NODE 1 WEB APP NODE 2 LOAD BALANCER NODE 3 HEALTH CHECKING How to avoid routing to unhealthy hosts?

11 maintenance: false feature_a: true role: "web" WEB 1 WEB APP WEB 2 WEB N CONFIGURATION How to efficiently push dynamic configuration?

12 4 BASIC PROBLEMS SERVICE LOAD HEALTH KEY- VALUE DISCOVERY BALANCING CHECKING CONFIGURATION

13 EXISTING "SOLUTIONS" ZOOKEEPER ETCD SENSU SMART STACK

14 CONSUL

15 Service Discovery HTTP + DNS

16 demo master dig web-frontend.service.consul

17 demo master dig web-frontend.service.consul ; <<>> DiG P1 <<>> web-frontend.service.consul. ANY ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 0 ;; QUESTION SECTION: ;web-frontend.service.consul. IN ANY ;; ANSWER SECTION: web-frontend.service.consul. 0 IN A web-frontend.service.consul. 0 IN A

18 Datacenter Aware

19 CLIENT CLIENT CLIENT CLIENT CLIENT CLIENT RPC LAN GOSSIP RPC SERVER SERVER SERVER REPLICATION REPLICATION

20 CLIENT CLIENT CLIENT CLIENT CLIENT CLIENT RPC LAN GOSSIP RPC SERVER SERVER SERVER REPLICATION REPLICATION SERVER REPLICATION SERVER REPLICATION SERVER

21 CLIENT CLIENT CLIENT CLIENT CLIENT CLIENT RPC LAN GOSSIP RPC SERVER SERVER SERVER REPLICATION REPLICATION WAN GOSSIP SERVER REPLICATION SERVER REPLICATION SERVER

22 Host & Service Level Health Checks

23 demo master consul-template -template="example.ctmpl" -dry > listen http-in bind *:8000 server web :80 server web :80 server web :80 demo master

24 demo master consul-template -template="example.ctmpl" -dry > listen http-in bind *:8000 server web :80 server web :80 server web :80 demo master sudo stop webserver

25 demo master consul-template -template="example.ctmpl" -dry > listen http-in bind *:8000 server web :80 server web :80 demo master sudo stop webserver

26 demo master consul-template -template="example.ctmpl" -dry > listen http-in bind *:8000 server web :80 server web :80 server web :80 demo master sudo start webserver

27 K/V Store HTTP API

28 demo master curl -X PUT -d 'bar' true

29 demo master curl -X PUT -d 'bar' true demo master curl [ ] { } "CreateIndex": 100, "ModifyIndex": 200, "Key": "foo", "Flags": 0, "Value": "YmFy"

30 TRUSTED BY

31 HEALTH CHECKS

32 WHAT IS A CHECK? Any command that returns an exit code

33 WHAT IS A CHECK? Any command that returns an exit code 0 1 PASSING WARNING FAILING

34 WHAT IS A CHECK? Output is captured as a "note" for inspection $ curl curl: (7) Failed to connect to port 4455: Connection refused

35 CREATING A CHECK Use a custom script { } "check": { "id": "mem-util", "name": "Memory utilization", "script": "/usr/local/bin/check_mem.py", "interval": "10s" }

36 CREATING A CHECK Use a built-in check type { } "check": { "id": "api", "name": "HTTP API on port 4455", "http": " "interval": "10s", "timeout": "1s" }

37 RESPONSIVE

38

39

40 WEB 1 MONITORING WEB 2 SERVICE WEB N TRADITIONAL MONITORING Pushes information into a silo

41 WEB 1 MONITORING WEB 2 SERVICE WEB N TRADITIONAL MONITORING Pushes information into a silo

42 WEB 1 MONITORING SERVICE WEB 2 WEB N TRADITIONAL MONITORING Pushes information into a silo

43 WEB 1 MONITORING SERVICE WEB 2 WEB N TRADITIONAL MONITORING Pushes information into a silo

44 U WEB 1 MONITORING SERVICE WEB 2 WEB N TRADITIONAL MONITORING Pushes information into a silo

45 U F WEB 1 MONITORING SERVICE WEB 2 WEB N TRADITIONAL MONITORING Pushes information into a silo

46 U F WEB 1 MONITORING SERVICE WEB 2 WEB N TRADITIONAL MONITORING Pushes information into a silo

47 WEB 1 CONSUL WEB 2 WEB N CONSUL MONITORING Removes unhealthy nodes from service discovery layer

48 WEB 1 CONSUL WEB 2 WEB N CONSUL MONITORING Removes unhealthy nodes from service discovery layer

49 dig web.service.consul WEB 1 CONSUL WEB 2 WEB N CONSUL MONITORING Removes unhealthy nodes from service discovery layer

50 dig web.service.consul WEB 1 CONSUL WEB 2 WEB N CONSUL MONITORING Removes unhealthy nodes from service discovery layer

51 dig web.service.consul WEB 1 CONSUL WEB 2 WEB N CONSUL MONITORING Removes unhealthy nodes from service discovery layer

52 host: web.service.consul dig web.service.consul WEB 1 CONSUL WEB 2 WEB N CONSUL MONITORING Removes unhealthy nodes from service discovery layer

53 host: web.service.consul dig web.service.consul WEB 1 CONSUL WEB 2 WEB N CONSUL MONITORING Removes unhealthy nodes from service discovery layer

54 host: web.service.consul dig web.service.consul WEB 1 CONSUL WEB 2 WEB N CONSUL MONITORING Removes unhealthy nodes from service discovery layer

55 host: web.service.consul dig web.service.consul WEB 1 CONSUL WEB 2 WEB N CONSUL MONITORING Removes unhealthy nodes from service discovery layer

56 host: web.service.consul dig web.service.consul WEB 1 CONSUL WEB 2 WEB N CONSUL MONITORING Removes unhealthy nodes from service discovery layer

57 CONSUL MONITORING Unhealthy nodes are not returned from DNS queries dig web.service.consul web-01, web-02, web-03

58 CONSUL MONITORING Unhealthy nodes are not returned from HTTP API curl /v1/services/web web-01, web-02, web-03

59 LOCKING

60 CONSUL LOCK Allows for a new kind of "HA" demo master consul lock [options] prefix child...

61 VAULT 1 VAULT 2 CONSUL VAULT 3 CONSUL LOCK Making standby HA much simpler

62 VAULT 1 L VAULT 2 CONSUL VAULT 3 L CONSUL LOCK Making standby HA much simpler

63 VAULT 1 L VAULT 2 CONSUL VAULT 3 CONSUL LOCK Making standby HA much simpler

64 VAULT 1 L LEADER ELECTION VAULT 2 CONSUL VAULT 3 CONSUL LOCK Making standby HA much simpler

65 VAULT 1 L VAULT 2 CONSUL GET /secret/foo VAULT 3 REQUEST CONSUL LOCK Making standby HA much simpler

66 VAULT 1 L VAULT 2 CONSUL GET /secret/foo VAULT 3 REQUEST CONSUL LOCK Making standby HA much simpler

67 VAULT 1 L VAULT 2 CONSUL GET /secret/foo VAULT 3 REQUEST CONSUL LOCK Making standby HA much simpler

68 VAULT 1 L VAULT 2 CONSUL VAULT 3 CONSUL LOCK Making standby HA much simpler

69 VAULT 1 l VAULT 2 CONSUL VAULT 3 CONSUL LOCK Making standby HA much simpler

70 VAULT 1 VAULT 2 CONSUL VAULT 3 L CONSUL LOCK Making standby HA much simpler

71 VAULT 1 VAULT 2 CONSUL VAULT 3 L CONSUL LOCK Making standby HA much simpler

72 VAULT 1 VAULT 2 CONSUL GET /secret/foo VAULT 3 L REQUEST CONSUL LOCK Making standby HA much simpler

73 VAULT 1 VAULT 2 CONSUL GET /secret/foo VAULT 3 L REQUEST CONSUL LOCK Making standby HA much simpler

74 CONSUL LOCK Solves the "exactly one of these must always be running" problem

75 CONSUL LOCK Also great as a semaphore - rolling restarts

76 SCALABILITY

77 WEB 1 "I'm healthy" MONITORING WEB 2 SERVICE "Good, thanks for asking!" WEB N TRADITIONAL MONITORING Notifies/polls all statuses

78 WEB 1 MONITORING SERVICE 1,000'S OF REQUESTS WEB 2 WEB 1,000 TRADITIONAL MONITORING Notifies/polls all statuses

79 HA WEB 1 MONITORING SERVICE 1,000'S OF REQUESTS WEB 2 WEB 1,000 TRADITIONAL MONITORING Notifies/polls all statuses

80 My status has changed WEB 1 CONSUL WEB 2 WEB N CONSUL MONITORING Notifies on status changes

81 WEB 1 CONSUL 10'S OF REQUESTS WEB 2 WEB 1,000 CONSUL MONITORING Notifies on status changes

82 CONCLUSION

83 SOLVES 4 BASIC PROBLEMS SERVICE LOAD HEALTH KEY- VALUE DISCOVERY BALANCING CHECKING CONFIGURATION

84 SOLVES 4 MORE PROBLEMS G L H 9 LEADER ELECTION SEMAPHORE LOCKING RESPONSIVE SCALABLE

85 SETH QUESTIONS?

Enabling DNS for IPv6 CSD Fall 2011

Enabling DNS for IPv6 CSD Fall 2011 Enabling DNS for IPv6 CSD Fall 2011 Team members: Bowei Dai [email protected] 15 credits Elis Kullberg [email protected] 18 credits Hannes Junnila [email protected] 15 credits Nur Mohammad Rashed [email protected] 15 credits

More information

CSE 127: Computer Security. Network Security. Kirill Levchenko

CSE 127: Computer Security. Network Security. Kirill Levchenko CSE 127: Computer Security Network Security Kirill Levchenko December 4, 2014 Network Security Original TCP/IP design: Trusted network and hosts Hosts and networks administered by mutually trusted parties

More information

Measuring the Web: Part I - - Content Delivery Networks. Prof. Anja Feldmann, Ph.D. Dr. Ramin Khalili Georgios Smaragdakis, PhD

Measuring the Web: Part I - - Content Delivery Networks. Prof. Anja Feldmann, Ph.D. Dr. Ramin Khalili Georgios Smaragdakis, PhD Measuring the Web: Part I - - Content Delivery Networks Prof. Anja Feldmann, Ph.D. Dr. Ramin Khalili Georgios Smaragdakis, PhD Acknowledgement Material presented in these slides is borrowed from presentajons

More information

ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example

ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example Document ID: 113571 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information

More information

IERG 4080 Building Scalable Internet-based Services

IERG 4080 Building Scalable Internet-based Services Department of Information Engineering, CUHK Term 1, 2015/16 IERG 4080 Building Scalable Internet-based Services Lecture 4 Load Balancing Lecturer: Albert C. M. Au Yeung 30 th September, 2015 Web Server

More information

Configuring HAproxy as a SwiftStack Load Balancer

Configuring HAproxy as a SwiftStack Load Balancer Configuring HAproxy as a SwiftStack Load Balancer To illustrate how a SwiftStack cluster can be configured with an external load balancer, such as HAProxy, let s walk through a step-by-step example of

More information

How To Attack Isc.Org.Org With A Dnet On A Network With A Pnet On The Same Day As A Dbus On A Pc Or Ipnet On An Ipnet.Org On A 2.5Th Gen.Net

How To Attack Isc.Org.Org With A Dnet On A Network With A Pnet On The Same Day As A Dbus On A Pc Or Ipnet On An Ipnet.Org On A 2.5Th Gen.Net Surviving a DDoS Attack: What every host needs to know Maria Karaivanova, Business Development David Koston, Platform www.cloudflare.com DDoS Attacks are becoming massive, and easier to initiate!2 Major

More information

DNS Resolving using nslookup

DNS Resolving using nslookup DNS Resolving using nslookup Oliver Hohlfeld & Andre Schröder January 8, 2007 Abstract This report belongs to a talk given at the networking course (Institue Eurecom, France) in January 2007. It is based

More information

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 DEPLOYMENT GUIDE Version 1.1 Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Citrix Presentation Server Prerequisites

More information

Creating a master/slave DNS server combination for your Grid Infrastructure

Creating a master/slave DNS server combination for your Grid Infrastructure Creating a master/slave DNS server combination for your Grid Infrastructure When doing a Grid Infrastructure installation, a DNS server is needed to resolve addresses for the cluster- scan addresses. In

More information

How-to: DNS Enumeration

How-to: DNS Enumeration 25-04-2010 Author: Mohd Izhar Ali Email: [email protected] Website: http://johncrackernet.blogspot.com Table of Contents How-to: DNS Enumeration 1: Introduction... 3 2: DNS Enumeration... 4 3: How-to-DNS

More information

Local DNS Attack Lab. 1 Lab Overview. 2 Lab Environment. SEED Labs Local DNS Attack Lab 1

Local DNS Attack Lab. 1 Lab Overview. 2 Lab Environment. SEED Labs Local DNS Attack Lab 1 SEED Labs Local DNS Attack Lab 1 Local DNS Attack Lab Copyright c 2006 Wenliang Du, Syracuse University. The development of this document was partially funded by the National Science Foundation s Course,

More information

Domain Name System (DNS) Fundamentals

Domain Name System (DNS) Fundamentals Domain Name System (DNS) Fundamentals Mike Jager Network Startup Resource Center [email protected] These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International

More information

Configuring Nex-Gen Web Load Balancer

Configuring Nex-Gen Web Load Balancer Configuring Nex-Gen Web Load Balancer Table of Contents Load Balancing Scenarios & Concepts Creating Load Balancer Node using Administration Service Creating Load Balancer Node using NodeCreator Connecting

More information

Monitoring Drupal with Sensu. John VanDyk Iowa State University DrupalCorn Iowa City August 10, 2013

Monitoring Drupal with Sensu. John VanDyk Iowa State University DrupalCorn Iowa City August 10, 2013 Monitoring Drupal with Sensu John VanDyk Iowa State University DrupalCorn Iowa City August 10, 2013 What is Sensu? Sensu architecture Sensu server Sensu client Drupal and Sensu Q: What is Sensu? A: A monitoring

More information

DNS Amplification Attacks as a DDoS Tool and Mitigation Techniques

DNS Amplification Attacks as a DDoS Tool and Mitigation Techniques DNS Amplification Attacks as a DDoS Tool and Mitigation Techniques Klaus Steding-Jessen [email protected]! Computer Emergency Response Team Brazil - CERT.br Network Information Center Brazil - NIC.br Brazilian

More information

TECHNOLOGY WHITE PAPER Jun 2012

TECHNOLOGY WHITE PAPER Jun 2012 TECHNOLOGY WHITE PAPER Jun 2012 Technology Stack C# Windows Server 2008 PHP Amazon Web Services (AWS) Route 53 Elastic Load Balancing (ELB) Elastic Compute Cloud (EC2) Amazon RDS Amazon S3 Elasticache

More information

Deploying the BIG-IP System with VMware vcenter Site Recovery Manager

Deploying the BIG-IP System with VMware vcenter Site Recovery Manager Deployment Guide Version 1.0 Deploying the BIG-IP System with VMware vcenter Site Recovery Manager Contents 2 Prerequisites and configuration notes 2 Deployment overview 3 Example configuration of BIG-IP

More information

netkit lab dns Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group Version Author(s)

netkit lab dns Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group Version Author(s) Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group netkit lab dns Version Author(s) E-mail Web Description 2.2 G. Di Battista, M. Patrignani, M.

More information

XAP 10 Global HTTP Session Sharing

XAP 10 Global HTTP Session Sharing XAP 10 Global HTTP Session Sharing Sep 2014 Shay Hassidim Deputy CTO, Distinguished Engineer 1 Agenda Agenda Web Application Challenges Introduce XAP Global HTTP Session Sharing Application Session Sharing

More information

CI Pipeline with Docker 2015-02-27

CI Pipeline with Docker 2015-02-27 CI Pipeline with Docker 2015-02-27 Juho Mäkinen, Technical Operations, Unity Technologies Finland http://www.juhonkoti.net http://github.com/garo Overview 1. Scale on how we use Docker 2. Overview on the

More information

DNS at NLnet Labs. Matthijs Mekking

DNS at NLnet Labs. Matthijs Mekking DNS at NLnet Labs Matthijs Mekking Topics NLnet Labs DNS DNSSEC Recent events NLnet Internet Provider until 1997 The first internet backbone in Holland Funding research and software projects that aid the

More information

Pertino HA Cluster Deployment: Enabling a Multi- Tier Web Application Using Amazon EC2 and Google CE. A Pertino Deployment Guide

Pertino HA Cluster Deployment: Enabling a Multi- Tier Web Application Using Amazon EC2 and Google CE. A Pertino Deployment Guide Pertino HA Cluster Deployment: Enabling a Multi- Tier Web Application Using Amazon EC2 and Google CE A Pertino Deployment Guide 1 Table of Contents Abstract... 2 Introduction... 3 Before you get Started...

More information

what s in a name? taking a deeper look at the domain name system mike boylan penn state mac admins conference

what s in a name? taking a deeper look at the domain name system mike boylan penn state mac admins conference what s in a name? taking a deeper look at the domain name system mike boylan penn state mac admins conference whoami work for robert morris university, pittsburgh, pa primarily mac and voip admin @mboylan

More information

Domain Name System (DNS) Session-1: Fundamentals. Ayitey Bulley [email protected]

Domain Name System (DNS) Session-1: Fundamentals. Ayitey Bulley abulley@ghana.com Domain Name System (DNS) Session-1: Fundamentals Ayitey Bulley [email protected] Computers use IP addresses. Why do we need names? Names are easier for people to remember Computers may be moved between

More information

PROTECTING DATA IN TRANSIT WITH ENCRYPTION IN M-FILES

PROTECTING DATA IN TRANSIT WITH ENCRYPTION IN M-FILES M-FILES CORPORATION PROTECTING DATA IN TRANSIT WITH ENCRYPTION IN M-FILES VERSION 8 24 SEPTEMBER 2014 Page 1 of 8 CONTENTS 1. Overview... 3 2. Encryption of Data in Transit in M-Files... 4 HTTPS... 4 RPC

More information

Integrating VoltDB with Hadoop

Integrating VoltDB with Hadoop The NewSQL database you ll never outgrow Integrating with Hadoop Hadoop is an open source framework for managing and manipulating massive volumes of data. is an database for handling high velocity data.

More information

HAProxy. Free, Fast High Availability and Load Balancing. Adam Thornton 10 September 2014

HAProxy. Free, Fast High Availability and Load Balancing. Adam Thornton 10 September 2014 HAProxy Free, Fast High Availability and Load Balancing Adam Thornton 10 September 2014 What? HAProxy is a proxy for Layer 4 (TCP) or Layer 7 (HTTP) traffic GPLv2 http://www.haproxy.org Disclaimer: I don't

More information

BITS-Pilani Hyderabad Campus CS C461/IS C461/CS F303/ IS F303 (Computer Networks) Laboratory 3

BITS-Pilani Hyderabad Campus CS C461/IS C461/CS F303/ IS F303 (Computer Networks) Laboratory 3 BITS-Pilani Hyderabad Campus CS C461/IS C461/CS F303/ IS F303 (Computer Networks) Laboratory 3 Aim: To give an introduction to HTTP, SMTP, & DNS, and observe the packets in a LAN network. HTTP (Hypertext

More information

How to Enable Internet for Guest Virtual Machine using Wi-Fi wireless Internet Connection.

How to Enable Internet for Guest Virtual Machine using Wi-Fi wireless Internet Connection. How to Enable Internet for Guest Virtual Machine using Wi-Fi wireless Internet Connection. Table of Contents 1) Host, Guest and VBox version.... 2 2) Check your current Host and Guest Details... 3 3) Now

More information

The role of JANET CSIRT

The role of JANET CSIRT The role of JANET CSIRT Bradley Freeman JANET(UK) CSIRT Member UKNOF 15 21 st January 2010 [email protected] Copyright JNT Association 2009 1 What to expect Overview of how we detect and deal with

More information

SmartTV User Interface Development for SmartTV using Web technology and CEA2014. George Sarosi [email protected]

SmartTV User Interface Development for SmartTV using Web technology and CEA2014. George Sarosi george.sarosi@twcable.com SmartTV User Interface Development for SmartTV using Web technology and CEA2014. George Sarosi [email protected] Abstract Time Warner Cable is the second largest Cable TV operator in North America

More information

Put a Firewall in Your JVM Securing Java Applications!

Put a Firewall in Your JVM Securing Java Applications! Put a Firewall in Your JVM Securing Java Applications! Prateep Bandharangshi" Waratek Director of Client Security Solutions" @prateep" Hussein Badakhchani" Deutsche Bank Ag London Vice President" @husseinb"

More information

An Oracle White Paper December, 2012. Enterprise Manager 12c Cloud Control: Configuring OMS Disaster Recovery with F5 BIG-IP Global Traffic Manager

An Oracle White Paper December, 2012. Enterprise Manager 12c Cloud Control: Configuring OMS Disaster Recovery with F5 BIG-IP Global Traffic Manager An Oracle White Paper December, 2012 Enterprise Manager 12c Cloud Control: Configuring OMS Disaster Recovery with F5 BIG-IP Global Traffic Manager Contents Contents... 1 Executive Overview... 2 Disaster

More information

Deploying the BIG-IP System v11 with DNS Servers

Deploying the BIG-IP System v11 with DNS Servers Deployment Guide Document version 1.1 What s inside: 2 What is F5 iapp? 2 Prerequisites and configuration notes 2 Configuration example 3 Preparation Worksheet 4 Configuring the BIG-IP iapp for DNS Servers

More information

CumuLogic Load Balancer Overview Guide. March 2013. CumuLogic Load Balancer Overview Guide 1

CumuLogic Load Balancer Overview Guide. March 2013. CumuLogic Load Balancer Overview Guide 1 CumuLogic Load Balancer Overview Guide March 2013 CumuLogic Load Balancer Overview Guide 1 Table of Contents CumuLogic Load Balancer... 3 Architectural Overview of CumuLogic Load Balancer... 4 How to Use

More information

Open Source High Availability Writing Resource Agents for your own services. Lars Marowsky-Brée Team Lead SUSE Labs [email protected]

Open Source High Availability Writing Resource Agents for your own services. Lars Marowsky-Brée Team Lead SUSE Labs lmb@suse.de Open Source High Availability Writing Resource Agents for your own services Lars Marowsky-Brée Team Lead SUSE Labs [email protected] Agenda Introduction Resource Agents in context Basic Resource Agents (+ code)

More information

High Availability Solutions for the MariaDB and MySQL Database

High Availability Solutions for the MariaDB and MySQL Database High Availability Solutions for the MariaDB and MySQL Database 1 Introduction This paper introduces recommendations and some of the solutions used to create an availability or high availability environment

More information

Table of Contents. Confidential and Proprietary

Table of Contents. Confidential and Proprietary Table of Contents About Toshiba Strata CIX and Broadvox SIP Trunking... 1 Requirements... 2 Purpose, Scope and Audience... 3 What is SIP Trunking?... 4 Business Advantages of SIP Trunking... 4 Technical

More information

Configure ActiveSync with a single Exchange server (Exchange sync for an iphone)

Configure ActiveSync with a single Exchange server (Exchange sync for an iphone) Configure ActiveSync with a single Exchange server (Exchange sync for an iphone) I recently picked up a first-generation iphone from a friend and after playing around with it for a while I decided that

More information

Deploying System Center 2012 R2 Configuration Manager

Deploying System Center 2012 R2 Configuration Manager Deploying System Center 2012 R2 Configuration Manager This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.

More information

Unbound a caching, validating DNSSEC resolver. Do you trust your name server? Configuration. Unbound as a DNS cache (SEC-less)

Unbound a caching, validating DNSSEC resolver. Do you trust your name server? Configuration. Unbound as a DNS cache (SEC-less) Unbound a caching, validating DNSSEC resolver UKUUG Spring 2011 Conference Leeds, UK March 2011 Jan-Piet Mens $ dig 1.1.0.3.3.0.8.1.7.1.9.4.e164.arpa naptr Do you trust your name server? DNS clients typically

More information

Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de

Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Microsoft Forefront TMG Webserver Load Balancing Abstract In this article I will show you how

More information

QMX ios MDM Pre-Requisites and Installation Guide

QMX ios MDM Pre-Requisites and Installation Guide QMX ios MDM Pre-Requisites and Installation Guide QMX System Requirements The following requirements apply to the system that QMX will be installed on. This system will host the QMX MDM Service. These

More information

Domain Name System Security

Domain Name System Security Abstract Domain Name System Security Ladislav Hagara [email protected] Department of Automated Command Systems and Informatics Military Academy in Brno Brno, Czech Republic Domain Name System (DNS) is one of

More information

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP LTM with Apache Tomcat and Apache HTTP Server

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP LTM with Apache Tomcat and Apache HTTP Server DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP LTM with Apache Tomcat and Apache HTTP Server Table of Contents Table of Contents Deploying the BIG-IP LTM with Tomcat application servers and Apache web

More information

Contents Set up Cassandra Cluster using Datastax Community Edition on Amazon EC2 Installing OpsCenter on Amazon AMI References Contact

Contents Set up Cassandra Cluster using Datastax Community Edition on Amazon EC2 Installing OpsCenter on Amazon AMI References Contact Contents Set up Cassandra Cluster using Datastax Community Edition on Amazon EC2... 2 Launce Amazon micro-instances... 2 Install JDK 7... 7 Install Cassandra... 8 Configure cassandra.yaml file... 8 Start

More information

Mobile Devices: Server and Management Lesson 05 Service Discovery

Mobile Devices: Server and Management Lesson 05 Service Discovery Mobile Devices: Server and Management Lesson 05 Service Discovery Oxford University Press 2007. All rights reserved. 1 Service discovery An adaptable middleware in a device (or a mobile computing system)

More information

VAULT MODERN SECRETS MANAGEMENT

VAULT MODERN SECRETS MANAGEMENT VAULT MODERN SECRETS MANAGEMENT CLICK ENGAGE TO RATE RATE 12 SESSIONS AND GET THE SUPERCOOL GOTO PRIZE SETH VARGO @sethvargo SECRET MANAGEMENT WHAT IS "SECRET"? SECRET VS. SENSITIVE SECRET SENSITIVE

More information

Socket = an interface connection between two (dissimilar) pipes. OS provides this API to connect applications to networks. home.comcast.

Socket = an interface connection between two (dissimilar) pipes. OS provides this API to connect applications to networks. home.comcast. Interprocess communication (Part 2) For an application to send something out as a message, it must arrange its OS to receive its input. The OS is then sends it out either as a UDP datagram on the transport

More information

Healthstone Monitoring System

Healthstone Monitoring System Healthstone Monitoring System Patrick Lambert v1.1.0 Healthstone Monitoring System 1 Contents 1 Introduction 2 2 Windows client 2 2.1 Installation.............................................. 2 2.2 Troubleshooting...........................................

More information

Aqua Connect Load Balancer User Manual (Mac)

Aqua Connect Load Balancer User Manual (Mac) Aqua Connect Load Balancer User Manual (Mac) Table of Contents About Aqua Connect Load Balancer... 3 System Requirements... 4 Hardware... 4 Software... 4 Installing the Load Balancer... 5 Configuration...

More information

JoramMQ, a distributed MQTT broker for the Internet of Things

JoramMQ, a distributed MQTT broker for the Internet of Things JoramMQ, a distributed broker for the Internet of Things White paper and performance evaluation v1.2 September 214 mqtt.jorammq.com www.scalagent.com 1 1 Overview Message Queue Telemetry Transport () is

More information

Top Weblogic Tasks You can Automate Now

Top Weblogic Tasks You can Automate Now Top Weblogic Tasks You can Automate Now Session ID#: 10506 Prepared by: Mrityunjay Kant Practice Manager, SOA & Integration Services AST Corporation @MrityunjayKant REMINDER Check in on the COLLABORATE

More information

Filter Avoidance and Anonymous Proxy Guard

Filter Avoidance and Anonymous Proxy Guard March 21, 2011 Author: Audience: SWAT Team Evaluator Product: Cymphonix Network Composer EX Series, XLi OS version 9 Filter Avoidance and Anonymous Proxy Guard Filter Avoidance The award winning XLi technology

More information

HTTP communication between Symantec Enterprise Vault and Clearwell E- Discovery

HTTP communication between Symantec Enterprise Vault and Clearwell E- Discovery Securing HTTP communication between Symantec Enterprise Vault and Clearwell E- Discovery Requesting and Applying an SSL Certificate to secure communication ion from Clearwell E-Discovery to Enterprise

More information

Informix Administration Overview

Informix Administration Overview Informix Administration Overview John F. Miller III August 2008 August 18, 2008 Overview Information Management IDS Architecture Overview OAT Administrators Feature Overview Performance Monitoring Managing

More information

Monitoring IBM WebSphere extreme Scale (WXS) Calls With dynatrace

Monitoring IBM WebSphere extreme Scale (WXS) Calls With dynatrace Monitoring IBM WebSphere extreme Scale (WXS) Calls With dynatrace What is IBM WebSphere extreme Scale (WXS)? From IBM: WebSphere extreme Scale operates as an in-memory grid that dynamically processes,

More information

Centralizing Windows Events with Event Forwarding

Centralizing Windows Events with Event Forwarding 1 Centralizing Windows Events with Event Forwarding 2 Copyright Notice The information contained in this document ( the Material ) is believed to be accurate at the time of printing, but no representation

More information

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP LTM System with VMware View

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP LTM System with VMware View DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP LTM System with VMware View Table of Contents Table of Contents Deploying F5 with VMware View Prerequisites and configuration notes...1-1 Product versions

More information

GlobalSCAPE DMZ Gateway, v1. User Guide

GlobalSCAPE DMZ Gateway, v1. User Guide GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical

More information

deploying meteor with meteor up

deploying meteor with meteor up deploying meteor with meteor up reference http://code.krister.ee/hosting-multiple-instances-of-meteor-on-digitalocean/ https://rtcamp.com/tutorials/nodejs/node-js-npm-install-ubuntu/ https://gentlenode.com/journal/meteor-19-deploying-your-applications-in-asnap-with-meteor-up-mup/41

More information

I/O Considerations in Big Data Analytics

I/O Considerations in Big Data Analytics Library of Congress I/O Considerations in Big Data Analytics 26 September 2011 Marshall Presser Federal Field CTO EMC, Data Computing Division 1 Paradigms in Big Data Structured (relational) data Very

More information

Design for Failure High Availability Architectures using AWS

Design for Failure High Availability Architectures using AWS Design for Failure High Availability Architectures using AWS Harish Ganesan Co founder & CTO 8KMiles www.twitter.com/harish11g http://www.linkedin.com/in/harishganesan Sample Use Case Multi tiered LAMP/LAMJ

More information

A Coordinated. Enterprise Networks Software Defined. and Application Fluent Programmable Networks

A Coordinated. Enterprise Networks Software Defined. and Application Fluent Programmable Networks A Coordinated Virtual Infrastructure for SDN in Enterprise Networks Software Defined Networking (SDN), OpenFlow and Application Fluent Programmable Networks Strategic White Paper Increasing agility and

More information

MarkLogic Server. Database Replication Guide. MarkLogic 8 February, 2015. Copyright 2015 MarkLogic Corporation. All rights reserved.

MarkLogic Server. Database Replication Guide. MarkLogic 8 February, 2015. Copyright 2015 MarkLogic Corporation. All rights reserved. Database Replication Guide 1 MarkLogic 8 February, 2015 Last Revised: 8.0-1, February, 2015 Copyright 2015 MarkLogic Corporation. All rights reserved. Table of Contents Table of Contents Database Replication

More information

DNS. Some advanced topics. Karst Koymans. (with Niels Sijm) Informatics Institute University of Amsterdam. (version 2.6, 2013/09/19 10:55:30)

DNS. Some advanced topics. Karst Koymans. (with Niels Sijm) Informatics Institute University of Amsterdam. (version 2.6, 2013/09/19 10:55:30) DNS Some advanced topics Karst Koymans (with Niels Sijm) Informatics Institute University of Amsterdam (version 2.6, 2013/09/19 10:55:30) Friday, September 13, 2013 Karst Koymans (with Niels Sijm) (UvA)

More information

Step-by-Step DNSSEC-Tools Operator Guidance Document

Step-by-Step DNSSEC-Tools Operator Guidance Document Step-by-Step DNSSEC-Tools Operator Guidance Document Using the DNSSEC-Tools v1.0 distribution SPARTA, Inc. Table of Contents 1. Introduction... 1 Organization of this Document... 1 Key Concepts... 2 Zones

More information

Orchestrating Distributed Deployments with Docker and Containers 1 / 30

Orchestrating Distributed Deployments with Docker and Containers 1 / 30 Orchestrating Distributed Deployments with Docker and Containers 1 / 30 Who am I? Jérôme Petazzoni (@jpetazzo) French software engineer living in California Joined Docker (dotcloud) more than 4 years ago

More information

Deploying the BIG-IP System v10 with Oracle Application Server 10g R2

Deploying the BIG-IP System v10 with Oracle Application Server 10g R2 DEPLOYMENT GUIDE Deploying the BIG-IP System v10 with Oracle Application Server 10g R2 Version 1.1 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Oracle s Application Server 10g

More information

Unlocking data creating knowledge. How to run Nesstar with IIS Socket Pooling

Unlocking data creating knowledge. How to run Nesstar with IIS Socket Pooling Unlocking data creating knowledge How to run Nesstar with IIS Socket Pooling November 2006 Contents 1 Introduction... 1 1.1 What is Socket Pooling?... 1 1.1.1 How to confirm this is the problem... 1 2

More information

CRESTRON-APP-ANDROID Control App for Android

CRESTRON-APP-ANDROID Control App for Android 1 Introduction The app from Crestron provides a Smart Graphics touch screen user interface on Android devices. Fully integrated with Crestron programming software including Crestron Studio, VT Pro-e, and

More information

Building Hyper-Scale Platform-as-a-Service Microservices with Microsoft Azure. Patriek van Dorp and Alex Thissen

Building Hyper-Scale Platform-as-a-Service Microservices with Microsoft Azure. Patriek van Dorp and Alex Thissen Building Hyper-Scale Platform-as-a-Service Microservices with Microsoft Azure Patriek van Dorp and Alex Thissen About me: Patriek van Dorp [email protected] @pvandorp Xpirit http://onwindowsazure.com

More information

Deploying the BIG-IP LTM with. Citrix XenApp. Deployment Guide Version 1.2. What s inside: 2 Prerequisites and configuration notes

Deploying the BIG-IP LTM with. Citrix XenApp. Deployment Guide Version 1.2. What s inside: 2 Prerequisites and configuration notes Deployment Guide Version 1.2 Deploying the BIG-IP LTM with What s inside: 2 Prerequisites and configuration notes 3 Configuration Worksheet 4 Using the BIG-IP LTM Application Template for 8 Modifying the

More information

How To Understand The History Of The Network And Network (Networking) In A Network (Network) (Netnet) (Network And Network) (Dns) (Wired) (Lannet) And (Network Network)

How To Understand The History Of The Network And Network (Networking) In A Network (Network) (Netnet) (Network And Network) (Dns) (Wired) (Lannet) And (Network Network) COMPUTER NETWORKS LECTURES DR.PETER G. GYARMATI Research professor Lectures of P. G. Gyarmati 1. page 1999.-2006. 1999.-2006. This page is intentionally left blank Lectures of P. G. Gyarmati 2. page 1999.-2006.

More information

Hints for Service Oriented Architectures. Marius Eriksen @marius Twitter Inc.

Hints for Service Oriented Architectures. Marius Eriksen @marius Twitter Inc. Hints for Service Oriented Architectures Marius Eriksen @marius Twitter Inc. We went from this (circa 2010) LB web web web web queue DB cache workers to this (circa 2015) ROUTING PRESENTATION LOGIC STORAGE

More information

Testing Tools using Visual Studio. Randy Pagels Sr. Developer Technology Specialist Microsoft Corporation

Testing Tools using Visual Studio. Randy Pagels Sr. Developer Technology Specialist Microsoft Corporation Testing Tools using Visual Studio Randy Pagels Sr. Developer Technology Specialist Microsoft Corporation Plan REQUIREMENTS BACKLOG Monitor + Learn Development Collaboration Production Develop + Test Release

More information

Accelerating SaaS Applications with F5 AAM and SSL Forward Proxy

Accelerating SaaS Applications with F5 AAM and SSL Forward Proxy Deployment Guide Accelerating Applications with F5 AAM and SSL Forward Proxy Welcome to the F5 deployment guide for Software as a Service (). This guide shows administrators how to configure the BIG-IP

More information

5 Key Reasons to Migrate from Cisco ACE to F5 BIG-IP

5 Key Reasons to Migrate from Cisco ACE to F5 BIG-IP 5 Key Reasons to Migrate from Cisco ACE to F5 BIG-IP With support for Cisco ACE load balancer ending, organizations need to find an alternative. Contents Introduction 3 Advanced Architecture 3 Ease of

More information

KAREL UCAP DNS AND DHCP CONCEPTS MANUAL MADE BY: KAREL ELEKTRONIK SANAYI ve TICARET A.S. Organize Sanayi Gazneliler Caddesi 10

KAREL UCAP DNS AND DHCP CONCEPTS MANUAL MADE BY: KAREL ELEKTRONIK SANAYI ve TICARET A.S. Organize Sanayi Gazneliler Caddesi 10 KAREL UCAP DNS AND DHCP CONCEPTS MANUAL MADE BY: KAREL ELEKTRONIK SANAYI ve TICARET A.S. Organize Sanayi Gazneliler Caddesi 10 Sincan 06935 Ankara, Turkey Version Table Manual Version/Date AAA/22.03.2011

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

Introduction to IP v6

Introduction to IP v6 IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation

More information

Towards Smart and Intelligent SDN Controller

Towards Smart and Intelligent SDN Controller Towards Smart and Intelligent SDN Controller - Through the Generic, Extensible, and Elastic Time Series Data Repository (TSDR) YuLing Chen, Dell Inc. Rajesh Narayanan, Dell Inc. Sharon Aicler, Cisco Systems

More information

DNS zone transfers from FreeIPA to non-freeipa slave servers

DNS zone transfers from FreeIPA to non-freeipa slave servers FreeIPA Training Series DNS zone transfers from FreeIPA to non-freeipa slave servers FreeIPA 3.0 and bind-dyndb-ldap 2.3 Petr Špaček 01-03-2013 Text file based

More information

DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH CITRIX PRESENTATION SERVER 3.0 AND 4.5

DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH CITRIX PRESENTATION SERVER 3.0 AND 4.5 DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH CITRIX PRESENTATION SERVER 3.0 AND 4.5 Deploying F5 BIG-IP Local Traffic Manager with Citrix Presentation Server Welcome to the F5 BIG-IP Deployment

More information

Configuring DNS on Cisco Routers

Configuring DNS on Cisco Routers Configuring DNS on Cisco Routers Document ID: 24182 Contents Introduction Prerequisites Requirements Components Used Conventions Setting Up a Router to Use DNS Lookups Troubleshooting You Can Ping a Web

More information

Configuring Load Balancing

Configuring Load Balancing When you use Cisco VXC Manager to manage thin client devices in a very large enterprise environment, a single Cisco VXC Manager Management Server cannot scale up to manage the large number of devices.

More information

Soft Solutions, Inc. 4-Sight FAX 7.5. Getting Started. Soft Solutions, Inc. http://www.4sightfax.com/

Soft Solutions, Inc. 4-Sight FAX 7.5. Getting Started. Soft Solutions, Inc. http://www.4sightfax.com/ 4-Sight FAX 7.5 Getting Started Soft Solutions, Inc. http://www.4sightfax.com/ Introduction Thank you for your interest in 4-Sight FAX version 7.5. This guide documents the general configuration for using

More information

Microsoft HPC. V 1.0 José M. Cámara ([email protected])

Microsoft HPC. V 1.0 José M. Cámara (checam@ubu.es) Microsoft HPC V 1.0 José M. Cámara ([email protected]) Introduction Microsoft High Performance Computing Package addresses computing power from a rather different approach. It is mainly focused on commodity

More information

EView/400i Management Pack for Systems Center Operations Manager (SCOM)

EView/400i Management Pack for Systems Center Operations Manager (SCOM) EView/400i Management Pack for Systems Center Operations Manager (SCOM) Concepts Guide Version 6.3 November 2012 Legal Notices Warranty EView Technology makes no warranty of any kind with regard to this

More information

Microsoft Exchange Server

Microsoft Exchange Server Deployment Guide Document Version: 4.9.2 Deploying the BIG-IP System v10 with Microsoft Welcome to the F5 and Microsoft Exchange 2010 deployment guide. This document contains guidance on configuring the

More information

VMware Infrastructure and IBM WebSphere Software

VMware Infrastructure and IBM WebSphere Software VMware Infrastructure and IBM WebSphere Software Table of Contents 1. Introduction... 1 2. IBM WebSphere Application Servers... 2 3. IBM WebSphere Virtual Enterprise Overview... 3 4. VMware Infrastructure

More information

DEPLOYMENT GUIDE Version 1.1. Configuring BIG-IP WOM with Oracle Database Data Guard, GoldenGate, Streams, and Recovery Manager

DEPLOYMENT GUIDE Version 1.1. Configuring BIG-IP WOM with Oracle Database Data Guard, GoldenGate, Streams, and Recovery Manager DEPLOYMENT GUIDE Version 1.1 Configuring BIG-IP WOM with Oracle Database Data Guard, GoldenGate, Streams, and Recovery Manager Table of Contents Table of Contents Configuring BIG-IP WOM with Oracle Database

More information

Multiple Public IPs (virtual service IPs) are supported either to cover multiple network segments or to increase network performance.

Multiple Public IPs (virtual service IPs) are supported either to cover multiple network segments or to increase network performance. EliteNAS Cluster Mirroring Option - Introduction Real Time NAS-to-NAS Mirroring & Auto-Failover Cluster Mirroring High-Availability & Data Redundancy Option for Business Continueity Typical Cluster Mirroring

More information

DNS SECURITY TROUBLESHOOTING GUIDE

DNS SECURITY TROUBLESHOOTING GUIDE DNS SECURITY TROUBLESHOOTING GUIDE INTERNET DEPLOYMENT OF DNS SECURITY 27 November 2006 Table of Contents 1. INTRODUCTION...3 2. DNS SECURITY SPECIFIC FAILURE MODES...3 2.1 SIGNATURES...3 2.1.1 Signature

More information

Redis Cluster. a pragmatic approach to distribution

Redis Cluster. a pragmatic approach to distribution Redis Cluster a pragmatic approach to distribution All nodes are directly connected with a service channel. TCP baseport+4000, example 6379 -> 10379. Node to Node protocol is binary, optimized for bandwidth

More information