i-scream The future is bright; the future is blue.



Similar documents
ServerPronto Cloud User Guide

Data Integration through XML/XSLT. Presenter: Xin Gu

Cloud Computing Architecture

PANDORA FMS NETWORK DEVICES MONITORING

Embedding a Data View dynamic report into an existing web-page

PANDORA FMS NETWORK DEVICE MONITORING

Denial of Service Attacks

Filing Systems. Filing Systems

Network performance monitoring. Performance Monitor Usage Guide

EiS Kent Schools Broadband (KPSN) Network Performance Monitor Usage Guide March 2014

Hardware Performance Optimization and Tuning. Presenter: Tom Arakelian Assistant: Guy Ingalls

SECURING APACHE : DOS & DDOS ATTACKS - I

The English translation Of MBA Standard 0301

SystemWatch SM. Remote Network Monitoring

IBM Tivoli Monitoring Version 6.3 Fix Pack 2. Infrastructure Management Dashboards for Servers Reference

Detecting rogue systems

Technical Glossary from Frontier

Chapter 2: Getting Started

Hyper-V R2: What's New?

Denial Of Service. Types of attacks

(Refer Slide Time: 02:17)

Westek Technology Snapshot and HA iscsi Replication Suite

Chapter 3. Internet Applications and Network Programming

FOG Guide. IPBRICK International. July 17, 2013


FileMaker Server 7. Administrator s Guide. For Windows and Mac OS

Protocols. Packets. What's in an IP packet

An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol

Cloud Optimize Your IT

NFS File Sharing. Peter Lo. CP582 Peter Lo

IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Hyper-V Server Agent Version Fix Pack 2.

Introduction Installation firewall analyzer step by step installation Startup Syslog and SNMP setup on firewall side firewall analyzer startup

PARALLELS SERVER 4 BARE METAL README

Best Practices for Controlling Skype within the Enterprise > White Paper

Chapter 8 Monitoring and Logging

LCMON Network Traffic Analysis

Developer Guide to Authentication and Authorisation Web Services Secure and Public

Directions for VMware Ready Testing for Application Software

Also on the Performance tab, you will find a button labeled Resource Monitor. You can invoke Resource Monitor for additional analysis of the system.

Go to CGTech Help Library. Installing CGTech Products

Teldat Router. DNS Client

pc resource monitoring and performance advisor

Making Content Editable. Create re-usable templates with total control over the sections you can (and more importantly can't) change.

StarWind iscsi SAN Software: Using StarWind with MS Cluster on Windows Server 2008

Release Notes OPC-Server V3 Alarm Event for High Availability

CaaS SMB Pricing Guide

Firewalls & Intrusion Detection

Amazon Web Services Primer. William Strickland COP 6938 Fall 2012 University of Central Florida

Best Practices for VMware ESX Server 2

Selling Virtual Private Servers. A guide to positioning and selling VPS to your customers with Heart Internet

(Formerly Double-Take Backup)

Install MS SQL Server 2012 Express Edition

How to Use vsphere to Connect to and Manage an ESXi Hypervisor Installation

IBM Lotus Sametime Media Manager Cluster Deployment Walk-through Part I Overview and Planning IBM Corporation

HADOOP MOCK TEST HADOOP MOCK TEST I

H0/H2/H4 -ECOM100 DHCP & HTML Configuration. H0/H2/H4--ECOM100 DHCP Disabling DHCP and Assigning a Static IP Address Using HTML Configuration

Operating System Monitor Application (OS MON)

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013

CA arcserve Unified Data Protection Agent for Linux

Tk20 Network Infrastructure

The Monitis Monitoring Agent ver. 1.2

Chapter 25 Domain Name System Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

SLURM Resources isolation through cgroups. Yiannis Georgiou Matthieu Hautreux

CLOUD SERVICE SCHEDULE Newcastle

Packet Sniffing and Spoofing Lab

Managing Users and Identity Stores

Abstract. Introduction. Section I. What is Denial of Service Attack?

Network Virtualization and Data Center Networks Data Center Virtualization - Basics. Qin Yin Fall Semester 2013

SAN/iQ Remote Copy Networking Requirements OPEN iscsi SANs 1

WHM & ZAMFOO QUICKSTART!

Configuring and Monitoring the Client Desktop Component

How to Install SQL Server 2008

Proposal for Virtual Private Server Provisioning

1. Domain Name System

Authoring Within a Content Management System. The Content Management Story

Parallels Plesk Panel

Mini-Challenge 3. Data Descriptions for Week 1

Sage ERP Accpac Online

Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, Page 1

Gigabit Ethernet Design

Parallels Cloud Server 6.0

Understand Troubleshooting Methodology

Parallels Plesk Panel

13.1 Backup virtual machines running on VMware ESXi / ESX Server

LogLogic Microsoft Domain Name System (DNS) Log Configuration Guide

FIREWALL AND NAT Lecture 7a

Outline: Operating Systems

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

I3: Maximizing Packet Capture Performance. Andrew Brown

Quiz! Database Indexes. Index. Quiz! Disc and main memory. Quiz! How costly is this operation (naive solution)?

Avid Unity MediaNetwork 5 System Maintenance

Building Docker Cloud Services with Virtuozzo

IriScene Remote Manager. Version 4.8 FRACTALIA Software

Outline. Definition. Name spaces Name resolution Example: The Domain Name System Example: X.500, LDAP. Names, Identifiers and Addresses

Transcription:

i-scream The future is bright; the future is blue. Host to Filter protocol (XML) Expected and Recommended data from Hosts This document is intended to provide third parties with the knowledge required to use their own implementation of a piece of host monitoring software. In particular, this document details the data that is to be expected from a Host. This document is additional to the recommended way of storing XML in UDP packets. Revision History 07/03/01 Initial creation pjm2 tdb1 24/03/01 The i-scream Project University of Kent at Canterbury http://www.i-scream.org.uk

Expected and Recommended data from Hosts Introduction...2 Background... 2 Specification... 2 Classification of XML data in the i-scream system... 3 ESSENTIAL... 3 EXPECTED... 3 OTHER... 3 Example of a complete expected XML packet... 4 Flexibility and minimising bandwidth... 6 1

The i-scream Project Introduction This document is intended to provide third parties with the knowledge required to use their own implementation of a piece of host monitoring software. In particular, this document details the data that is to be expected from a Host. This document is additional to the recommended way of storing XML in UDP packets. Background Hosts are expected to periodically send UDP packets to the central monitoring system. Such packets may contain various pieces of information about the host, such as how much free memory is remaining on the host, etc. Some of this data is deemed to be 'essential', some is 'expected' and the rest is not necessary, but shall not be ignored by the central monitoring system server. Specification The UDP packet must contain a complete and well-formed piece of XML mark-up, describing the data that the host is submitting. In the event of a piece of data containing an invalid character, such as a "<", it is the responsibility of the host to format this in a valid manner, for example by replacing all occurrences of "<" with "&lt" before it is sent in a UDP packet to the central monitoring system server. Alternatively, the data may be wrapped up in special CDATA tags. For example, if we wish to send the following text: <>&!" surrounded by <test_chars> tags then we can safely send this by wrapping it up to produce the following XML snippet: <test_chars><![cdata[<>&!"]]></test_chars> The bare minimum that a host should send is the following: - <packet> </packet> Note that every XML tag must also have a matching closing tag. However, such a packet is rather useless when it is received by the server - it does not provide any useful information. As such, a packet will be rejected by the server if it does not specify the machine_name, its I.P. address (ip), a packet sequence number (seq_no) and a date. Note that the date is a long integer representing the number of seconds since the epoch. All of these are expected to be specified as an attribute of the packet tag. If they are not specified here, then the packet will be rejected. Finally, the packet tag must contain an attribute called type, which must have the value of data. Thus, to ensure that a packet has a chance of being acted upon, a host must specify at least five attribute values - machine_name, ip, date, seq_no and type. These must be formed in the style shown below. <packet machine_name="raptor.ukc.ac.uk" ip="aaa.bbb.ccc.ddd" date="93456245245" seq_no="1234567" type= data > </packet> 2

Expected and Recommended data from Hosts Note that the server may run additional 'plugin' tools that are designed to filter/reject packets under certain conditions. Please check with the server administrator if you wish to know about the specific configuration of your central monitoring system. The I.P. address and machine_name could be found from the UDP packet itself, but these remain essential so as to provide resilience from stray packets that do not contain any valid or useful data. Remember that malformed XML data would be rejected by the central monitoring system immediately, without acting upon it. Classification of XML data in the i-scream system ESSENTIAL The following values are essential in each packet. Any packet without these will be rejected. They must be specified as attributes of the root node ("packet"): - ip seq_no date machine_name type EXPECTED The following values are expected in each packet. All packets are recommended to specify these values, as the server is designed to permanently store such data in an easy and quick to access manner. It is not essential to specify such values, but it does limit the usefulness of the central monitoring system if these values are not specified: - os * cpus * load * memory * swap * disk * users (attribute) * - These parameters are specified with tags of the same name. They contain nested XML tags. See later in this document for more details about that! All of the values marked as being attributes above must be specified as an attribute of the root tag ("packet") OTHER Any other arbitrary values may be specified by the host. The only provision here is that they may not share the same name as another tag or attribute within the same hierarchical level. 3

The i-scream Project The server will be able to handle such clashes, however, it cannot be guaranteed which of the duplicate parameters would gain priority. Example of a complete expected XML packet I shall start by showing an example of a complete 'expected' packet. I shall then explain the contents of it. Here is an example of an XML packet, containing all of the essential and expected data: - <packet seq_no="123" machine_name="raptor.ukc.ac.uk" date="93452345454" type="data" ip= 1.2.3.4"> <load> <load1>0.45<load1> <load5>0.23<load5> <load15>0.12</load15> </load> <os> <name>sunos</name> <release>5.8</release> <platform>sun4u</platform> <sysname>raptor</sysname> <version>generic_108528-06</version> <uptime>1657260</uptime> </os> <users> <count>3</count> <list>pjm2 root root</list> </users> <processes> <total>12</total> <sleeping>1</sleeping> <zombie>1</zombie> <stopped>0</stopped> <cpu>10</cpu> </processes> <cpu> <idle>98.2</idle> <user>1.2</user> <kernel>0.0</kernel> <iowait>0.0</iowait> <swap>0.7</swap> </cpu> <memory> <total>4096</total> <free>2934</free> </memory> <swap> <total>3020</total> <free>3020</free> </swap> <disk> <p0> <free>1234</free> <total>1234</total> <mounted>/</mounted> <label>xyz</label> </p0> 4

Expected and Recommended data from Hosts <p1> <free>123</free> <total>123</total> <mount>/tmp</mount> <label>xyz2</label> </p1> </disk> </packet> Note that linefeeds and spaces would normally not be present. These are only shown above for structure clarity. Note that all of the essential attributes have been specified as attributes of the root node. The expected attribute values are also attributes of the root node. The <cpu> tag begins a list of cpu load information. The values here should be expressed as percentages, without the % symbol. The <load> tag begins a list of system load information. The load tag is only expected to contain 3 sub tags, named "load1", "load5" and "load15". These represent the average load 1 minute ago, 5 minutes ago and 15 minutes ago respectively. This is not expected from NT systems. The <users> tag begins a section containing details about the users on the system. There are two recommended sub tags within this section: - <count> - The total number of users on the machine. <list> - The list of user logins. The <memory> tag begins a list of system memory information. This tag is only expected to contain two sub tags, as shown in the example above. These two sub tags specify how much memory the system has free and how much memory the system has in total. These values are in megabytes. The <swap> tag is identical in nature to the <memory> tag. The <processes> tag contains the following fields: - <total> - Total number of processes on the machine <sleeping> - Number of sleeping processes <zombie> - Number of zombie processes <stopped> - Number of stopped processes <cpu> - Number of CPU processes The <disk> tag begins a list of partition information. Each sub tag must be of the form px, where x is the number of the disk partition that is unique for that particular system. Note that the numbering of px is expected to start from zero. Each <px> tag contains the following sub tags: - <free> - the free partition space in bytes. <total> - the total partition size in bytes. <mount> - the mount point, e.g., "/var". <label> - the label of the physical disk. Any other values and attributes may be specified in the packet, providing they are not specified in the same hierarchical level as another attribute or value with the same name. 5

The i-scream Project Flexibility and minimising bandwidth Please note that the following issues still stand: - The means of submitting host data via UDP containing XML mark-up is provided so that future customisation is easily possible. It would be possible to easily tailor a custom piece of host monitoring software to provide exactly what data is desired for adequate monitoring. Some of the XML mark-up demonstrated above contains a lot of redundant features. For example, it is not necessary to lay the contents out neatly (although this certainly helps visualise the contents). The amount of data sent within each UDP packet may be (in some cases, vastly) reduced by using some of the ideas described below: - 1. Remove unnecessary linefeeds and 'white space' 2. If a single piece of data is to be represented, it will usually occupy less space if it is stored as an attribute to a tag, rather than within a pair of tags. 3. Comments within the XML may be useful for testing purposes, however, the server ignores all comments so these can be removed to reduce packet sizes. Taking the above into account, here is an example of some ideally formed XML to be contained within a UDP packet: - <packet machine_name="raptor" ip="aaa.bbb.ccc.ddd" ><freespace><drive1>23677</drive1><drive2>23534</d rive2><drive3>10390</drive3></freespace></packet> Notice how all unnecessary 'white space' and linefeeds have been removed. The comment has also been removed. Values such as "machine_name" and "ip" have both been stored as an attribute of the root node ("packet") as this results in a smaller packet size. 6