CSE 265: System and Network Administration



Similar documents
Syslog & xinetd. Stephen Pilon

Topics. CIT 470: Advanced Network and System Administration. Logging Policies. System Logs. Throwing Away. How to choose a logging policy?

CSE/ISE 311: Systems Administra5on Logging

Linux System Administration. System Administration Tasks

System Administration

syslog - centralized logging

How To Analyze Logs On Aloha On A Pcode On A Linux Server On A Microsoft Powerbook (For Acedo) On A Macbook Or Ipad (For An Ubuntu) On An Ubode (For Macrocess

CS 392/CS Computer Security. Module 17 Auditing

Configuring System Message Logging

Red Condor Syslog Server Configurations

BF2CC Daemon Linux Installation Guide

An Introduction to Event Modeling and Correlation. Stephen Rondeau Institute of Technology

UNISOL SysAdmin. SysAdmin helps systems administrators manage their UNIX systems and networks more effectively.

EMC VNX Version 8.1 Configuring and Using the Audit Tool on VNX for File P/N Rev 01 August, 2013

Linux logging and logfiles monitoring with swatch

Using an Open Source Framework to Catch the Bad Guy. Norman Mark St. Laurent Senior Solutions Architect, Red Hat

NTP and Syslog in Linux. Kevin Breit

Presented by Henry Ng

System Message Logging

Chapter 8 Monitoring and Logging

Reliable log data transfer

CYAN SECURE WEB APPLIANCE. User interface manual

Red Hat Linux Administration II Installation, Configuration, Software and Troubleshooting

Device Integration: Cisco Wireless LAN Controller (WLC)

Setting Up the Site Licenses

Security Correlation Server Quick Installation Guide

Runtime Monitoring & Issue Tracking

Kiwi SyslogGen. A Freeware Syslog message generator for Windows. by SolarWinds, Inc.

Fred Hantelmann LINUX. Start-up Guide. A self-contained introduction. With 57 Figures. Springer

CSE 265: System and Network Administration. CSE 265: System and Network Administration

Log Management with Open-Source Tools. Risto Vaarandi rvaarandi 4T Y4H00 D0T C0M

Security Correlation Server Quick Installation Guide

CSE 265: System and Network Administration. CSE 265: System and Network Administration

ESM s management across multi-platforms eliminates the need for various account managers.

Fifty Critical Alerts for Monitoring Windows Servers Best practices

MapGuide Open Source Repository Management Back up, restore, and recover your resource repository.

Linux System Administration on Red Hat

Linux Syslog Messages in IBM Director

HP-UX System and Network Administration for Experienced UNIX System Administrators Course Summary

Computer Security DD2395

Using Likewise Enterprise to Boost Compliance with Sarbanes-Oxley

Linux Audit Quick Start SUSE Linux Enterprise 10 SP1

Device Integration: Citrix NetScaler

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline CIS INTRODUCTION TO UNIX

Workflow Templates Library

SSL Tunnels. Introduction

Cisco Setting Up PIX Syslog

Log Management with Open-Source Tools. Risto Vaarandi SEB Estonia

Configuring System Message Logging

Globalnest SAP Technical Services

MySQL Backups: From strategy to Implementation

IVUE System Administration

System i and System p. Customer service, support, and troubleshooting

Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p.

NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL.

Data Stored on a Windows Computer Connected to a Network

Topics. CIT 470: Advanced Network and System Administration. Why Monitoring? Why Monitoring? Historical Monitoring Processes. Historical Monitoring

RES ONE Automation 2015 Task Overview

A Universal Logging System for LHCb Online

Configuring System Message Logging

Multiprogramming. IT 3123 Hardware and Software Concepts. Program Dispatching. Multiprogramming. Program Dispatching. Program Dispatching

Unix Sampler. PEOPLE whoami id who

The Ins and Outs of System Logging Using Syslog

The syslog-ng Premium Edition 5F2

The syslog-ng Premium Edition 5LTS

Linux Crontab: 15 Awesome Cron Job Examples

Using Network Attached Storage with Linux. by Andy Pepperdine

A candidate following a programme of learning leading to this unit will be able to:

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

VMware vcenter Log Insight Security Guide

CS197U: A Hands on Introduction to Unix

Alert Logic Log Manager

Security Best Practice

This is when a server versus a workstation is desirable because it has the capability to have:

Syslog (Centralized Logging and Analysis) Jason Healy, Director of Networks and Systems

CS 3530 Operating Systems. L02 OS Intro Part 1 Dr. Ken Hoganson

Event Center (rev b) EVENT CENTER. VPI 160 Camino Ruiz, Camarillo, CA (Voice) (Fax)

PCI DSS Best Practices with Snare Enterprise Agents PCI DSS Best Practices with Snare Enterprise Agents

High Availability and Disaster Recovery Solutions for Perforce

Instrumentation for Linux Event Log Analysis

ipta iptables Log Analyzer Anders Sikvall ichimusai.org

Data Stored on a Windows Server Connected to a Network

Example of Standard API

General DBA Best Practices

Rsync: The Best Backup System Ever

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

Network Monitoring & Management Log Management

See all, manage all is the new mantra at the corporate workplace today.

LOCKSS on LINUX. Network Data Transition 02/17/2011

Fundamentals of Linux Platform Security. Fundamentals of Linux Platform Security. Roadmap. Security Training Course. Module 5 Logging Infrastructures

F Cross-system event-driven scheduling. F Central console for managing your enterprise. F Automation for UNIX, Linux, and Windows servers

Linux Security on HP Servers: Security Enhanced Linux. Abstract. Intended Audience. Technical introduction

Installing F-Secure Anti-Virus (FSAV) Table of Contents. FSAV 8.x and FSLS 7.x End of Life. FSAV 9.x and FSLS 9.x End of Life

Review Quiz 1. What is the stateful firewall that is built into Mac OS X and Mac OS X Server?

Job Scheduler Daemon Configuration Guide

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

Network Monitoring & Management Log Management

Commodity DataServer. Best Practices Guide

Transcription:

CSE 265: System and Network Administration If you aren't measuring it, you aren't managing it. Service Monitoring Syslog and Log files Historical data Real-time monitoring Alerting Active monitoring systems End-to-end tests Application response time monitoring Logging policies what do you do with logs? Linux log files Logrotate: Manage log files Syslog: system event logger Condensing log files

Motivation for monitoring

Motivation for monitoring Rapidly detect and fix problems Identify the source of problems Predict and avoid future problems Provide data on SA's achievements

Historical data Historical availability record long-term uptime statistics show improvements (99.99% uptime vs 99.9%) Utilization data useful for capacity planning Process Poll systems at regular intervals Collected, often graphed Example: network status https://spot.cc.lehigh.edu/public/mrtg/internett.html

Real-time monitoring Alert SA immediately about a failure Want to notice outage before customer does maintain reputation minimize downtime Two components Monitoring (polling) systems to check status, watching error messages, checking subsystems Alerting recognize problems and notify SAs

Monitoring Want to monitor everything that can indicate a problem Availability monitoring Host/network/application failures Capacity monitoring Approaching or past overload

Alerting Monitoring useless without alerting system Should not depend on system being monitored e.g., don't depend on e-mail if network is down Who gets alerts? What if failure persists? Need to test alerting system I'm hot! I'm wet!

Active monitoring Don't just monitor and alert, do something! Respond quickly/automatically Temporary solutions Still need a permanent fix Can be a security risk (often requires privileges)

End-to-end tests Test entire transactions as a simulated customer Send email through a server Log in, select an item, check-out, get receipt Find problems before customers Find systemic problems, even when individual components are working

Application response time monitoring Even when everything works, if it is too slow, it is a failure Loss of productivity Loss of sales Resentment Use historical monitoring, too

Summary Two types of monitoring: Historical data gathering Trends for capacity planning Recognition of long-term improvements Real-time monitoring and alerting Detect problems faster React before failure (e.g., before swap gets full)

Logging policies Log files grow and grow What do you do with log files? Some options: Throw away all data immediately Reset log files periodically Rotate log files, keeping data for a fixed time Compress and archive files to tape or other media Throwing away log files Not recommended! Need evidence of security problems Alert for hardware and software problems Ideally, keep for a month may take that long to notice a problem! Resetting when disk is full isn't good either

Rotating log files Keep a fixed set of previous log files Rotate current file into set on a regular basis (daily, weekly, etc.) Example: #!/bin/sh cd /var/log mv logfile.2 logfile.3 mv logfile.1 logfile.2 mv logfile logfile.1 touch logfile chmod 600 logfile May want to add compression, reset server

Archiving log files May need to archive all accounting data and log files for policy, potential audits, etc. First rotate on disk fast access to recent data Then write to tape or other media Log files should be part of backup sequence Hackers tend to delete them!

Linux log files Most log files are recorded in /var/log /var/adm may also contain some (distro dependent) Most programs send entries to syslog daemon /etc/rsyslog.conf usually puts them in /var/log Sample log files: messages main system log file maillog record of sendmail activity boot.log output of system startup scripts

Other log files /var/log/wtmp Record of users' logins and logouts Binary format use last to read Still truncated and rotated /var/log/lastlog Record of time of last log in Binary format (is used to say when you last logged in) Constant size no need to rotate /var/log/dmesg Dump of kernel message buffer at end of boot

Logrotate Excellent utility to manage log files Specifies groups of log files to be managed # Example log rotation rotate 5 weekly /var/log/messages { postrotate /bin/kill -HUP `cat /var/run/syslogd.pid` endscript } /var/log/samba/*.log { notifempty copytruncate postrotate /bin/kill -HUP `cat /var/lock/samba/*.pid` endscript }

Syslog Comprehensive logging system Frees programmers from needing to write their own Allows sysadmins to control logging Flexible Can sort by source or severity level Output to variety of destinations files, terminals, other machines Can centralize logging to a well-controlled machine RHEL/CentOS 6 uses rsyslog (improved)

Syslog (continued) Three parts syslogd logging daemon (uses /etc/rsyslog.conf) openlog library routines logger shell command to submit log entries Apps use library to write to /dev/log UNIX domain socket Syslogd reads messages from /dev/log Outputs message depending on /etc/rsyslog.conf

Sample syslog.conf # Emergencies: tell everyone who is logged in *.emerg;user.none * *.warning;daemon,auth.info,user.none /var/log/messages # Forward important messages to the central logger *.warning;daemon,auth.info @netloghost # printer errors lpr.debug /var/log/lpd-errs

Sample syslog output Feb 22 04:04:21 wume1 named[2826]: lame server resolving '211.68.246.64.in-addr.arpa' (in '68.246.64.in-addr.arpa'?): 160.79.6.130#53 Feb 22 13:22:41 wume1 sshd(pam_unix)[16776]: session opened for user brian by (uid=0) Feb 22 13:22:44 wume1 su(pam_unix)[16802]: session opened for user root by brian (uid=501) Feb 25 20:31:57 wume1 sshd(pam_unix)[28375]: check pass; user unknown Feb 25 20:32:00 wume1 sshd(pam_unix)[28375]: 1 more authentication failure; logname= uid=0 euid=0 tty=nodevssh ruser= rhost=dyn032098.cc.lehigh.edu

Condensing log files Syslog (as well as any other monitoring and logging facility) generates lots of log files Need utilities to scan log files and find important entries security-related entries messages about disks full messages repeated many times

Summary It is imperative to monitor systems and generate logs For warnings, job performance, trends, etc. Logs cannot be permitted to impact proper system operation