Linux Kernel Namespaces (an intro to soft-virtualization) kargig [at] GPG: 79B B8F6 803B EC C E02C
|
|
|
- Junior Horn
- 10 years ago
- Views:
Transcription
1 Linux Kernel Namespaces (an intro to soft-virtualization) kargig [at] GPG: 79B B8F6 803B EC C E02C
2 whoami System & services GRNET Messing with Linux, Security, Privacy, IPv6
3 Namespaces Present different view of the system to different processes Isolation NOT a new idea Plan9 (1992)
4 Types of Linux Kernel Namespaces Currently 6+3 different types Significant changes: User namespaces ( ~ 2008) Unprivileged process can create a new namespace in which it has full (root) privileges (3.8)
5 The 9 types Mount UTS IPC PID Network User Syslog Audit Cgroup
6 Mount Introduced: Purpose: Different processes have different views of the mount points next-gen chroots Short name: mnt # propagation between host & namespaces mount --make-(r)shared / (2-way sharing) mount --make-(r)private / (no sharing) mount --make-(r)slave / (1-way sharing) (*) systemd uses shared flag by default
7 UTS Introduced: Purpose: each namespace can have different hostname + domainname Short name: uts (*) UTS = Unix Timesharing System
8 IPC Introduced: Purpose: IPC Isolation POSIX msg queue isolation in ( ) Short name: ipc
9 PID Introduced: Purpose: processes in different namespaces can have the same pid pid inside ns!= pid outside ns Each container (*) can have its own init (pid 1) Multiple ns create multiple nested process trees Migrate containers (*) across hosts keeping the same internal pids Short name: pid
10 Network Introduced: Purpose: different network devices, IP addresses, routing tables,etc per namespace Containers w/ network capabilities Short name: net
11 User Introduced: (~3.8) Purpose: isolate {u,g}id space. Different uid inside and outside a namespace 3.8+ unprivileged users can create user namespaces (and have root inside) Short name: user
12 Syslog Introduced: 3.9 Purpose: different kernel messages per namespace
13 Audit Introduced: 3.9 Purpose: different audit subsystem messages per namespace
14 Cgroups Introduced: 3.9 Purpose: different cgroup hierarchy per namespace
15 Kernel API clone() Create a child process, like fork() with CLONE_NEW(*) flags setns() Add process to a namespace unshare() Like clone() but for the calling process() (*) CLONE_NEWIPC, CLONE_NEWNS, CLONE_NEWNET, CLONE_NEWPID, CLONE_NEWUSER, CLONE_NEWUTS
16 Namespace info /proc/pid/ns/ One file (symlink) for each namespace type Way to discover if two processes are in the same namespace # ls -Fla /proc/2957/ns/ lrwxrwxrwx 1 root root 0 Nov 7 16:57 ipc -> ipc:[ ] lrwxrwxrwx 1 root root 0 Nov 7 16:57 mnt -> mnt:[ ] lrwxrwxrwx 1 root root 0 Nov 7 14:24 net -> net:[ ] lrwxrwxrwx 1 root root 0 Nov 7 16:57 pid -> pid:[ ] lrwxrwxrwx 1 root root 0 Nov 7 16:57 user -> user:[ ] lrwxrwxrwx 1 root root 0 Nov 7 16:57 uts -> uts:[ ]
17 Demo! Create a new Networking namespace and run a shell (outside)# unshare --net /bin/sh (inside )# ip link
18 Demo! Create a new User namespace and run a shell (outside)# unshare --user /bin/sh (inside ) $ ps auxww If you want to run it as user and not as root in Debian: # cat /proc/sys/kernel/unprivileged_userns_clone 0 # echo 1 >/proc/sys/kernel/unprivileged_userns_clone (outside)$ unshare --user /bin/sh (inside) $ ps auxww
19 Demo! Create a new User+PID namespace and run a shell (outside)# unshare --pid --fork --user /bin/sh (inside ) $ ps auxww
20 Demo! Create a new User+PID namespace w/ different /proc and run a shell (outside)# unshare --pid --fork --user --mount-proc /bin/sh (inside ) $ ps auxww (*) Actually that's a User+PID+Mount namespace due to /proc private mount
21 Demo! Create a Mount namespace with a private mount point (outside)# unshare -m /bin/bash (inside) # mount --make-rprivate / (inside) # mydir=`mktemp -d --tmpdir=/tmp` (inside) # mount -o size=1m -t tmpfs tmpfs $mydir (inside) # mount (outside)# mount
22 Demo! Create a Network namespace # ip netns add myns # ip link add name veth0 type veth peer name veth1 netns myns # ip netns exec myns ip link # ip netns exec myns ip link set dev lo up # ip netns exec myns ip a add /24 dev veth1 # ip netns exec myns ip link set veth1 up # ip a add /24 dev veth0 # ip link set dev veth0 up # ip netns exec myns ip a # ip netns exec myns ping
23 Using namespaces Firejail Description: SUID sandbox [ ] using Linux namespaces, seccomp-bpf and Linux capabilities Create ad-hoc sandboxes, eg for browsers, mail clients or to test new daemons Has a GUI to view/edit sandboxes
24 systemd-nspawn Systemd-nspawn (pid,mount,ipc,uts namespaces) spawn a container (way better than chroot/schroot) # systemd-nspawn -D /usr/src/sid/ boot into a container # systemd-nspawn -b -D /usr/src/stretch/
25 Moar systemd Haters gonna hate Systemd.exec ReadWriteDirectories=/var/www/ ReadOnlyDirectories=/var/www/mywebsite InaccessibleDirectories=/srv/private PrivateTmp=(Bool) mount ns PrivateDev=(Bool) mount ns PrivateNetwork=(Bool) network ns ProtectSystem=Bool or 'full' mount ns (ro /usr /boot + /etc)
26 Container For you hipster people Docker, LXC, Kubernetes, Mesos, CoreOS, whatever_else_came_out_just_this_morningos Yes, they use Linux Kernel Namespaces... RancherVM: KVM inside Docker... really...yes REALLY...
27 Hard to soft isolation Physical machines Virtual machines Containers Namespaces chroot no isolation A container is a collection of namespaces A namespace is a specific resource type that can be split up and partitioned
28 Security... Important CVEs CVE user escalation to root CVE escape bind mount, possibly gaining root Multiple other vulnerabilities leading to DOS/crashes Not all fixes in Linux kernel get CVEs, multiple fixes are about kernel namespaces components...live with it...
29 Ideas Shared hosting w/ nginx + php-fpm + different user,pid,ipc,mount ns per website Isolate + auto-torify network clients w/ different user,pid,ipc,mount,net ns
30 Resources pages pdf
31 Outro Thank you! Questions? kargig [at] GPG: 79B B8F6 803B EC C E02C
Lightweight Virtualization. LXC containers & AUFS
Lightweight Virtualization LXC containers & AUFS SCALE11x February 2013, Los Angeles Those slides are available at: http://goo.gl/bfhsh Outline Intro: who, what, why? LXC containers Namespaces Cgroups
Lightweight Virtualization with Linux Containers (LXC)
Lightweight Virtualization with Linux Containers (LXC) The 5th China Cloud Computing Conference June 7th, 2013 China National Convention Center, Beijing Outline Introduction : who, what, why? Linux Containers
Managing Linux Resources with cgroups
Managing Linux Resources with cgroups Thursday, August 13, 2015: 01:45 PM - 02:45 PM, Dolphin, Americas Seminar Richard Young Executive I.T. Specialist IBM Systems Lab Services Agenda Control groups overview
Do Containers fully 'contain' security issues? A closer look at Docker and Warden. By Farshad Abasi, 2015-09-16
Do Containers fully 'contain' security issues? A closer look at Docker and Warden. By Farshad Abasi, 2015-09-16 Overview What are Containers? Containers and The Cloud Containerization vs. H/W Virtualization
Cloud Security with Stackato
Cloud Security with Stackato 1 Survey after survey identifies security as the primary concern potential users have with respect to cloud computing. Use of an external computing environment raises issues
Network Virtualization Tools in Linux PRESENTED BY: QUAMAR NIYAZ & AHMAD JAVAID
Network Virtualization Tools in Linux PRESENTED BY: QUAMAR NIYAZ & AHMAD JAVAID Contents Introduction Types of Virtualization Network Virtualization OS Virtualization OS Level Virtualization Some Virtualization
Docker : devops, shared registries, HPC and emerging use cases. François Moreews & Olivier Sallou
Docker : devops, shared registries, HPC and emerging use cases François Moreews & Olivier Sallou Presentation Docker is an open-source engine to easily create lightweight, portable, self-sufficient containers
SLURM Resources isolation through cgroups. Yiannis Georgiou email: [email protected] Matthieu Hautreux email: matthieu.hautreux@cea.
SLURM Resources isolation through cgroups Yiannis Georgiou email: [email protected] Matthieu Hautreux email: [email protected] Outline Introduction to cgroups Cgroups implementation upon
Cisco Application-Centric Infrastructure (ACI) and Linux Containers
White Paper Cisco Application-Centric Infrastructure (ACI) and Linux Containers What You Will Learn Linux containers are quickly gaining traction as a new way of building, deploying, and managing applications
Linux Containers and the Future Cloud
Linux Containers and the Future Cloud Rami Rosen [email protected] 1 About me Bio: Rami Rosen, a Linux kernel expert, author of a recently published book, Linux Kernel Networking - Implementation and
Lightweight Virtualization: LXC Best Practices
Lightweight Virtualization: LXC Best Practices Christoph Mitasch LinuxCon Barcelona 2012 Slide 1/28 About Based in Bavaria, Germany Selling server systems in Europe ~100 employees >10.000 customers Slide
The Case for SE Android. Stephen Smalley [email protected] Trust Mechanisms (R2X) National Security Agency
The Case for SE Android Stephen Smalley [email protected] Trust Mechanisms (R2X) National Security Agency 1 Android: What is it? Linux-based software stack for mobile devices. Very divergent from typical
Resource management: Linux kernel Namespaces and cgroups
Resource management: Linux kernel Namespaces and cgroups Rami Rosen [email protected] Haifux, May 2013 www.haifux.org 1/121 TOC Network Namespace PID namespaces UTS namespace Mount namespace user namespaces
Securing Linux Containers
Securing Linux Containers 1 Securing Linux Containers GIAC (GCUX) Gold Certification Author: Advisor: Richard Carbone Accepted: July 26, 2015 This paper is licensed under a Creative Commons Attribution-ShareAlike
Building Docker Cloud Services with Virtuozzo
Building Docker Cloud Services with Virtuozzo Improving security and performance of application containers services in the cloud EXECUTIVE SUMMARY Application containers, and Docker in particular, are
lxc and cgroups in practice sesja linuksowa 2012 wojciech wirkijowski wojciech /at/ wirkijowski /dot/ pl
lxc and cgroups in practice sesja linuksowa 2012 wojciech wirkijowski wojciech /at/ wirkijowski /dot/ pl agenda introducion cgroups lxc examples about me sysadmin at tieto home page: reconlab.com in spare
The Bro Network Security Monitor
The Bro Network Security Monitor Bro Live!: Training for the Future Jon Schipp NCSA [email protected] BroCon14 NCSA, Champaign-Urbana, IL Issues Motivations Users: Too much time is spent passing around,
Building a Kubernetes Cluster with Ansible. Patrick Galbraith, ATG Cloud Computing Expo, NYC, May 2016
Building a Kubernetes Cluster with Ansible Patrick Galbraith, ATG Cloud Computing Expo, NYC, May 2016 HPE ATG HPE's (HP Enterprise) Advanced Technology Group for Open Source and Cloud embraces a vision
Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation
Securing your Virtual Datacenter Part 1: Preventing, Mitigating Privilege Escalation Before We Start... Today's discussion is by no means an exhaustive discussion of the security implications of virtualization
Virtualization analysis
Page 1 of 15 Virtualization analysis CSD Fall 2011 Project owner Björn Pehrson Project Coaches Bruce Zamaere Erik Eliasson HervéNtareme SirajRathore Team members Bowei Dai [email protected] 15 credits Elis Kullberg
Distributed Operating Systems. Cluster Systems
Distributed Operating Systems Cluster Systems Ewa Niewiadomska-Szynkiewicz [email protected] Institute of Control and Computation Engineering Warsaw University of Technology E&IT Department, WUT 1 1. Cluster
systemd Mehr als nur ein neues Init-System Markus Schade
systemd Mehr als nur ein neues Init-System Markus Schade DAS UNTERNEHMEN Hetzner Online ist ein professioneller Webhosting-Dienstleister und erfahrener Rechenzentrenbetreiber. Wir bieten Lösungen an, die
Using Chroot to Bring Linux Applications to Android
Using Chroot to Bring Linux Applications to Android Mike Anderson Chief Scientist The PTR Group, Inc. [email protected] Copyright 2013, The PTR Group, Inc. Why mix Android and Linux? Android under Linux
The sphinx simulator project
The sphinx simulator project Nicolas CARRIER April, 6, 2016 The sphinx simulator project 1 / 32 Presentation The problem Overview Features Limitations Architecture Firmwared The firmwares Gazebo Conclusion
ISLET: Jon Schipp, Ohio Linux Fest 2015. [email protected]. An Attempt to Improve Linux-based Software Training
ISLET: An Attempt to Improve Linux-based Software Training Jon Schipp, Ohio Linux Fest 2015 [email protected] Project Contributions The Netsniff-NG Toolkit SecurityOnion Bro Team www.open-nsm.net The
Platform as a Service and Container Clouds
John Rofrano Senior Technical Staff Member, Cloud Automation Services, IBM Research [email protected] or [email protected] Platform as a Service and Container Clouds using IBM Bluemix and Docker for Cloud
Linux Kernel Architecture
Linux Kernel Architecture Amir Hossein Payberah [email protected] Contents What is Kernel? Kernel Architecture Overview User Space Kernel Space Kernel Functional Overview File System Process Management
Virtualization in Linux
Virtualization in Linux Kirill Kolyshkin September 1, 2006 Abstract Three main virtualization approaches emulation, paravirtualization, and operating system-level virtualization are covered,
Safety measures in Linux
S a f e t y m e a s u r e s i n L i n u x Safety measures in Linux Krzysztof Lichota [email protected] A g e n d a Standard Unix security measures: permissions, capabilities, ACLs, chroot Linux kernel
where.com meets.org Open Source events since 1996 Nils Magnus: Docker Security
Nils Magnus, LinuxTag Association Docker Security: Who can we trust, what should we verify? Ubiquitous Containers: Excitement vs. production use 3 53% of decision-makers have concerns about security Source:
Practical Applications of Virtualization. Mike Phillips <[email protected]> IAP 2008 SIPB IAP Series http://stuff.mit.edu/iap/ http://stuff.mit.
Practical Applications of Virtualization Mike Phillips IAP 2008 SIPB IAP Series http://stuff.mit.edu/iap/ http://stuff.mit.edu/sipb/ Some Guy Rambling About Virtualization Stuff He's Read
Configure NFS Staging for ACS 5.x Backup on Windows and Linux
Configure NFS Staging for ACS 5.x Backup on Windows and Linux Document ID: 119030 Contributed by Piotr Borowiec and Aditya Ganjoo, Cisco TAC Engineers. Jul 21, 2015 Contents Introduction Prerequisites
A Network in a Laptop: Rapid Prototyping for So7ware- Defined Networks
A Network in a Laptop: Rapid Prototyping for So7ware- Defined Networks Bob Lantz, Brandon Heller, Nick McKeown Stanford University HotNets 2010, 10/20/10 1 2 Wouldn t it be amazing if systems papers were
IT6204 Systems & Network Administration. (Optional)
Systems & Network Administration (Optional) INTRODUCTION This is one of the Optional courses designed for Semester 6 of the Bachelor of Information Technology Degree program. This course on Systems & Network
LSN 10 Linux Overview
LSN 10 Linux Overview ECT362 Operating Systems Department of Engineering Technology LSN 10 Linux Overview Linux Contemporary open source implementation of UNIX available for free on the Internet Introduced
Red Hat Linux Administration II Installation, Configuration, Software and Troubleshooting
Course ID RHL200 Red Hat Linux Administration II Installation, Configuration, Software and Troubleshooting Course Description Students will experience added understanding of configuration issues of disks,
Pen Test Tips 2. Shell vs. Terminal
Pen Test Tips 2 Shell vs. Terminal Once you have successfully exploited a target machine you may be faced with a common dilemma that many penetration testers have, do I have shell access or terminal access?
Chapter 7: Unix Security. Chapter 7: 1
Chapter 7: Unix Security Chapter 7: 1 Objectives Understand the security features provided by a typical operating system. Introduce the basic Unix security model. See how general security principles are
Intro to Docker and Containers
Contain Yourself Intro to Docker and Containers Nicola Kabar @nicolakabar [email protected] Solutions Architect at Docker Help Customers Design Solutions based on Docker
System administration basics
Embedded Linux Training System administration basics Michael Opdenacker Thomas Petazzoni Free Electrons Copyright 2009, Free Electrons. Creative Commons BY SA 3.0 license Latest update: Dec 20, 2010, Document
Fourteenforty Research Institute, Inc.
Black Hat Abu Dhabi 2011 Yet Another Android Rootkit Fourteenforty Research Institute, Inc. /protecting/system/is/not/enough/ Research Engineer Tsukasa Oi Fourteenforty Research Institute, Inc. http://www.fourteenforty.jp
IS L06 Protect Servers and Defend Against APTs with Symantec Critical System Protection
IS L06 Protect Servers and Defend Against APTs with Symantec Critical System Protection Description Lab flow At the end of this lab, you should be able to Discover how to harness the power and capabilities
Container Network Solutions Research Project 2
Container Network Solutions Research Project 2 Joris Claassen System and Network Engineering University of Amsterdam Supervisor: Dr. Paola Grosso July 2015 Abstract Linux container virtualization is getting
Using Network Attached Storage with Linux. by Andy Pepperdine
Using Network Attached Storage with Linux by Andy Pepperdine I acquired a WD My Cloud device to act as a demonstration, and decide whether to use it myself later. This paper is my experience of how to
WHITEPAPER INTRODUCTION TO CONTAINER SECURITY. Introduction to Container Security
Introduction to Container Security Table of Contents Executive Summary 3 The Docker Platform 3 Linux Best Practices and Default Docker Security 3 Process Restrictions 4 File & Device Restrictions 4 Application
NCP Server for Linux Administration Guide
www.novell.com/documentation NCP Server for Linux Administration Guide Open Enterprise Server 11 SP2 January 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the
Linux Virtualization. Kir Kolyshkin <[email protected]> OpenVZ project manager
Linux Virtualization Kir Kolyshkin OpenVZ project manager What is virtualization? Virtualization is a technique for deploying technologies. Virtualization creates a level of indirection
Use Cases for Docker in Enterprise Linux Environment CloudOpen North America, 2014 Linda Wang Sr. Software Engineering Manager Red Hat, Inc.
Use Cases for Docker in Enterprise Linux Environment CloudOpen North America, 2014 Linda Wang Sr. Software Engineering Manager Red Hat, Inc. 1 2 Containerize! 3 Use Cases for Docker in the Enterprise Linux
Chapter 14 Virtual Machines
Operating Systems: Internals and Design Principles Chapter 14 Virtual Machines Eighth Edition By William Stallings Virtual Machines (VM) Virtualization technology enables a single PC or server to simultaneously
MontaVista Linux Carrier Grade Edition
MontaVista Linux Carrier Grade Edition WHITE PAPER Beyond Virtualization: The MontaVista Approach to Multi-core SoC Resource Allocation and Control ABSTRACT: MontaVista Linux Carrier Grade Edition (CGE)
Configuring a Highly Available Linux Cluster for SAP Services
Configuring a Highly Available Linux Cluster for SAP Services Clusters of Dell PowerEdge servers using Oracle9i Real Application Clusters (RAC) can provide SAP software environments with a flexible, scalable,
Wolfr am Lightweight Grid M TM anager USER GUIDE
Wolfram Lightweight Grid TM Manager USER GUIDE For use with Wolfram Mathematica 7.0 and later. For the latest updates and corrections to this manual: visit reference.wolfram.com For information on additional
Monitoring Clearswift Gateways with SCOM
Technical Guide Version 01 28/11/2014 Documentation Information File Name Document Author Document Filename Monitoring the gateways with _v1.docx Iván Blesa Monitoring the gateways with _v1.docx Issue
HAProxy. Free, Fast High Availability and Load Balancing. Adam Thornton 10 September 2014
HAProxy Free, Fast High Availability and Load Balancing Adam Thornton 10 September 2014 What? HAProxy is a proxy for Layer 4 (TCP) or Layer 7 (HTTP) traffic GPLv2 http://www.haproxy.org Disclaimer: I don't
Docker Containers. Marko Ambrož, Žiga Hudolin Ministrstvo za javno upravo DIREKTORAT ZA INFORMATIKO
Docker Containers Marko Ambrož, Žiga Hudolin Ministrstvo za javno upravo DIREKTORAT ZA INFORMATIKO Vendor lock in with DOCKER??? DOCKER CLIENT DOCKER CLIENT HUB DOCKER ENGINE DOCKER REGISTRY DOCKER SWARM
Kerrighed / XtreemOS cluster flavour
Kerrighed / XtreemOS cluster flavour Jean Parpaillon Reisensburg Castle Günzburg, Germany July 5-9, 2010 July 6th, 2010 Kerrighed - XtreemOS cluster flavour 1 Summary Kerlabs Context Kerrighed Project
Linux Syslog Messages in IBM Director
Ever want those pesky little Linux syslog messages (/var/log/messages) to forward to IBM Director? Well, it s not built in, but it s pretty easy to setup. You can forward syslog messages from an IBM Director
Secure File Transfer Installation. Sender Recipient Attached FIles Pages Date. Development Internal/External None 11 6/23/08
Technical Note Secure File Transfer Installation Sender Recipient Attached FIles Pages Date Development Internal/External None 11 6/23/08 Overview This document explains how to install OpenSSH for Secure
How To Set Up A Network Map In Linux On A Ubuntu 2.5 (Amd64) On A Raspberry Mobi) On An Ubuntu 3.5.2 (Amd66) On Ubuntu 4.5 On A Windows Box
CSC-NETLAB Packet filtering with Iptables Group Nr Name1 Name2 Name3 Date Instructor s Signature Table of Contents 1 Goals...2 2 Introduction...3 3 Getting started...3 4 Connecting to the virtual hosts...3
Red Hat System Administration 1(RH124) is Designed for IT Professionals who are new to Linux.
Red Hat Enterprise Linux 7- RH124 Red Hat System Administration I Red Hat System Administration 1(RH124) is Designed for IT Professionals who are new to Linux. This course will actively engage students
Type-C Hypervisors. @DustinKirkland Ubuntu Product & Strategy Canonical Ltd.
Type-C Hypervisors @DustinKirkland Ubuntu Product & Strategy Canonical Ltd. Canonical is the company behind Ubuntu 2004 600+ FOUNDATION EMPLOYEES 30+ COUNTRIES London Beijing Boston Shanghai Taipei What
Networks. Inter-process Communication. Pipes. Inter-process Communication
Networks Mechanism by which two processes exchange information and coordinate activities Inter-process Communication process CS 217 process Network 1 2 Inter-process Communication Sockets o Processes can
Firebird on Linux. Author: Philippe Makowski IBPhoenix Email: [email protected] Licence: Public Documentation License Date: 2011-11-22
Author: Philippe Makowski IBPhoenix Email: [email protected] Licence: Public Documentation License Date: 2011-11-22 How to install Project packages rpm tar.gz Distributions packages Build from sources
PARALLELS SERVER BARE METAL 5.0 README
PARALLELS SERVER BARE METAL 5.0 README 1999-2011 Parallels Holdings, Ltd. and its affiliates. All rights reserved. This document provides the first-priority information on the Parallels Server Bare Metal
ArDroneXT - Ar.Drone 2 extension for swarming and service hosting
ArDroneXT - Ar.Drone 2 extension for swarming and service hosting Vincent Autefage, Serge Chaumette To cite this version: Vincent Autefage, Serge Chaumette. ArDroneXT - Ar.Drone 2 extension for swarming
EXPLORING LINUX KERNEL: THE EASY WAY!
EXPLORING LINUX KERNEL: THE EASY WAY! By: Ahmed Bilal Numan 1 PROBLEM Explore linux kernel TCP/IP stack Solution Try to understand relative kernel code Available text Run kernel in virtualized environment
How To Write A Backup On A Linux Computer (For A Non-Freebie)
Linux LV, WU Wien April 23, 2015 «Copyleft: This Document may be distributed under GNU GFDL or under Creative Commons CC BY-SA 3.0 Table of contents 1 2 3 4 5 : The Problem The Problem tar - the classic
General Overview. Slurm Training15. Alfred Gil & Jordi Blasco (HPCNow!)
Slurm Training15 Agenda 1 2 3 About Slurm Key Features of Slurm Extending Slurm Resource Management Daemons Job/step allocation 4 5 SMP MPI Parametric Job monitoring Accounting Scheduling Administration
ns-3 development overview ns-3 GENI Eng. Conf., Nov. 2010 1
ns-3 development overview ns-3 GENI Eng. Conf., Nov. 2010 1 ns-3 tutorial agenda 3:00-4:30: ns-3 current capabilities Project overview Walkthrough of basic simulation scenario Parallel simulations and
PARALLELS SERVER 4 BARE METAL README
PARALLELS SERVER 4 BARE METAL README This document provides the first-priority information on Parallels Server 4 Bare Metal and supplements the included documentation. TABLE OF CONTENTS 1 About Parallels
Linux Overview. The Senator Patrick Leahy Center for Digital Investigation. Champlain College. Written by: Josh Lowery
Linux Overview Written by: Josh Lowery The Senator Patrick Leahy Center for Digital Investigation Champlain College October 29, 2012 Disclaimer: This document contains information based on research that
Incremental Backup Script. Jason Healy, Director of Networks and Systems
Incremental Backup Script Jason Healy, Director of Networks and Systems Last Updated Mar 18, 2008 2 Contents 1 Incremental Backup Script 5 1.1 Introduction.............................. 5 1.2 Design Issues.............................
RH033 Red Hat Linux Essentials or equivalent experience with Red Hat Linux..
RH131 Red Hat Linux System Administration Course Summary For users of Linux (or UNIX) who want to start building skills in systems administration on Red Hat Linux, to a level where they can attach and
A candidate following a programme of learning leading to this unit will be able to:
Unit 24: Linux+ Learning Outcomes A candidate following a programme of learning leading to this unit will be able to: Demonstrate knowledge of planning the implementation Show knowledge of how to install
Android Security (and Not) Internals
Android Security (and Not) Internals Yury Zhauniarovich Version 1.01 Android Security (and Not) Internals Limit of Liability/Disclaimer of Warranty: The author does not guarantee the accuracy or completeness
Virtual Private Systems for FreeBSD
Virtual Private Systems for FreeBSD Klaus P. Ohrhallinger 06. June 2010 Abstract Virtual Private Systems for FreeBSD (VPS) is a novel virtualization implementation which is based on the operating system
Open Source Datacenter Conference 2011 System Management with RHN Satellite. Dirk Herrmann, Solution Architect, Red Hat
Open Source Datacenter Conference 2011 System Management with RHN Satellite Bringing the Community, Vendors and Users Together Enterprise Users Hardware vendors Software vendors Open Source Community A
ISE TACACS+ Configuration Guide for Cisco NX-OS Based Network Devices. Secure Access How-to User Series
ISE TACACS+ Configuration Guide for Cisco NX-OS Based Network Devices Secure Access How-to User Series Author: Technical Marketing, Policy and Access, Security Business Group, Cisco Systems Date: January
Red Hat Linux Networking
The information presented should act as a guide to Red Hat Linux networking. It is intended to be accompanied with training and self study. To access most of these items you will need to have root access,
Chapter 10 Case Study 1: LINUX
MODERN OPERATING SYSTEMS Third Edition ANDREW S. TANENBAUM Chapter 10 Case Study 1: LINUX History of UNIX and Linux UNICS PDP-11 UNIX Portable UNIX Berkeley UNIX Standard UNIX MINIX Linux UNIX/Linux Goals
MONIT. UNIX Systems Management
MONIT UNIX Systems Management Introduction monit is a utility for managing and monitoring, processes, files, directories and devices on a Unix system. Monit conducts automatic maintenance and repair and
Implementation of Database as a Service in a Private Cloud using EUCALYPTUS
Volume 2, No. 02, April 2013 ISSN 2278-1080 The International Journal of Computer Science & Applications (TIJCSA) RESEARCH PAPER Available Online at http://www.journalofcomputerscience.com/ Implementation
The Virtualization Practice
The Virtualization Practice White Paper: Managing Applications in Docker Containers Bernd Harzog Analyst Virtualization and Cloud Performance Management October 2014 Abstract Docker has captured the attention
System Administration
Performance Monitoring For a server, it is crucial to monitor the health of the machine You need not only real time data collection and presentation but offline statistical analysis as well Characteristics
Using Vagrant for Magento development. Alexander Turiak, @HexBrain
Using Vagrant for Magento development Alexander Turiak, @HexBrain $ whoami - Magento developer since 2011 - (Tries to be) Active in Magento community - Co-founded HexBrain in 2013 Key points - What is
