Best Practices in Network and System Administration



Similar documents
Our Server Support. Looking after your servers giving you peace of mind. Document Version Revision Date Feb 2015

TELE 301 Network Management

Troubleshooting and Maintaining Cisco IP Networks Volume 1

SAN Conceptual and Design Basics

Cloud Service SLA Declaration

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security

Your Server Support Looking after your servers, giving you peace of mind

MEDIAROOM. Products Hosting Infrastructure Documentation. Introduction. Hosting Facility Overview

Claudio Jeker. RIPE 41 Meeting Amsterdam, 15. January Using BGP topology information for DNS RR sorting

CHOOSING A RACKSPACE HOSTING PLATFORM

What the student will need:

Website Disaster Recovery

MSP Service Matrix. Servers

NetAid Services NETENRICH. Service at a Glance. IT as a Service Offering from NetEnrich. Delivering IT as a Service

Best of Breed of an ITIL based IT Monitoring. The System Management strategy of NetEye

Maintaining Non-Stop Services with Multi Layer Monitoring

How to Make Your IDS Useful. Joel M Snyder Senior Partner Opus One jms@opus1.com

SEC , Cisco Systems, Inc. All rights reserved.

Planning and Maintaining a Microsoft Windows Server Network Infrastructure

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

Missed Recovery Techniques for SQL Server By Rudy Panigas

Improving. Summary. gathered from. research, and. Burnout of. Whitepaper

Building Success on Acquia Cloud:

Interland Dedicated Power Server Support Guidelines

IPv6 Troubleshooting for Helpdesks

Solutions as a Service N.Konstantinidis Technical Director - MNG

Intrusion Detection: Game Theory, Stochastic Processes and Data Mining

Building Reliable, Scalable AR System Solutions. High-Availability. White Paper

data center - why choose a data center facility

Migration Steps to Peak Hosting s AlwaysUp Architecture

Capacity planning with Microsoft System Center

Essential. Guide TESTING YOUR DISASTER RECOVERY ABILITY. The. February By Paul Robichaux

Flash Use Cases Traditional Infrastructure vs Hyperscale

The Vital IT Protection- V.I.P. Network Support Program Overview Vital Voice & Data ext 301

Cisco Wide Area Application Services Software Version 4.1: Consolidate File and Print Servers

Network Resilience. From Concepts to Experimentation. FIRE Research Workshop - May 16 th 2011

Lecture 2 CS An example of a middleware service: DNS Domain Name System

Managing service delivery

by New Media Solutions 37 Walnut Street Wellesley, MA p f Avitage IT Infrastructure Security Document

DATA CENTRE DATA CENTRE MAY 2015

Managing and Maintaining Windows Server 2008 Servers

What Makes The Large Enterprise, Large? A Network Management Perspective

How To Use Mindarray For Business

MCSE Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required)

BGP and Traffic Engineering with Akamai. Caglar Dabanoglu Akamai Technologies AfPIF 2015, Maputo, August 25th

F-Secure Messaging Security Gateway. Deployment Guide

DEFENSE NETWORK FAQS DATA SHEET

Tackling the Challenges of MPLS VPN Testing. Todd Law Product Manager Advanced Networks Division

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Datacenter Rack Switch Redundancy Models Server Access Ethernet Switch Connectivity Options

NetBrain Workstation Professional Edition 2.3 Release notes

Availability and Disaster Recovery: Basic Principles

Studying Black Holes on the Internet with Hubble

THE MASTER LIST OF DNS TERMINOLOGY. First Edition

IT service for life science

10 Tips to Better Manage Your Service Team

Designing Apps for Amazon Web Services

IT6203 Systems & Network Administration. (Optional)

THE MASTER LIST OF DNS TERMINOLOGY. v 2.0

How To Manage A Network

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

Flexible SDN Transport Networks With Optical Circuit Switching

Web Drive Limited TERMS AND CONDITIONS FOR THE SUPPLY OF SERVER HOSTING

SonicWALL WAN Acceleration FAQ Document

Mule Enterprise Service Bus (ESB) Hosting

State of Texas. TEX-AN Next Generation. NNI Plan

Short Case Study: Automation, Risk Reduction, and Fail Over Routing of Imagery Products Using Multiprotocol Label Switching (MPLS) Cloud

Superior Disaster Recovery with Radware s Global Server Load Balancing (GSLB) Solution

Shared Machine Room / Service Opportunities. Bruce Campbell November, 2011

Guardian365. Managed IT Support Services Suite

Virtual Private Servers

Communications and Networking

Presentation Title: When Anti-virus Doesn t Cut it: Catching Malware with SIEM

Disaster Recovery for Ingres. Abstract

27 th March 2015 Istanbul, Turkey. Performance Testing Best Practice

IBM AIX MANAGED SERVICES:

Application Performance Management for Enterprise Applications

Which Backup Option is Best?

Security Threat Risk Assessment: the final key piece of the PIA puzzle

DDoS Threat Report. Chris Beal Chief Security Architect on Twitter

Details. Some details on the core concepts:

Exchange-based . Types of . Why use Exchange for ?

How To Handle A Power Outage On A Server Farm (For A Small Business)

GoGrid Implement.com Configuring a SQL Server 2012 AlwaysOn Cluster

GE Measurement & Control. Cyber Security for NEI 08-09

The State of the Address. Mike Afergan Rob Beverly January 27, 2005

Cisco Application Control Engine in the Virtual Data Center

Investigating the Use of Virtual Servers to Improve the Restoration Process of an Active Directory Forest

LinkProof DNS Quick Start Guide

Database as a Service (DaaS) Version 1.02

Remote Voting Conference

Campus Network Best Practices: Core and Edge Networks

Building Nameserver Clusters with Free Software

#9011 GeoMedia WebMap Performance Analysis and Tuning (a quick guide to improving system performance)

Masterkurs Rechnernetze IN2097

The Trouble with Backups

MCSE Objectives. Exam : TS:Exchange Server 2007, Configuring

IP Telephony Management

California Department of Technology, Office of Technology Services AIX/LINUX PLATFORM GUIDELINE Issued: 6/27/2013 Tech.Ref No

The Internet Delivery Stack

Transcription:

Best Practices in Network and System Administration Dónal Cunningham donal@sage-ie.org http://www.sage-ie.org

Outline Some notes on Infrastructure 10 rules to live by Network Administration System Administration Reading list/training Info

Infrastructure I Space Cabinets? Cages? Shared keys? Power AC only? 220V only? UPS area or in-cab? Testing? UPS death? Air Conditioning Fire supression Should people be here?

Infrastructure II Cable routing Label EVERYTHING (but don t trust labels blindly) Access (diversity see later)

Rule 1 - Be Good Citizens Visibility Ticketing system Updates must propagate outside your group Know your metrics User perception (quick response) CTO perception Partner perception Remember! System administrators and network engineers manage systems and networks on behalf of other people

Rule 2 - Monitor your Systems Status Establish baselines Watch trends Use the right tools for the jobs Use the right tools for your team Start in a known state!

Routers Link traffic Capacity CPU Memory Environmental ACL hits, BGP routes...

Networks Reachability Ping Traceroute Routing loops Latency Directly affects end-user perception

Systems Disk CPU Memory Environment Services

Rule 3 Perform Disaster Recovery Planning Things break. All the time. Quis custodiet ipsos custodes? If your monitoring system breaks, who will notice? Who will care? Timestamps are essential for correlation NTP is your friend NO SINGLE POINTS OF FAILURE

3a - Networks Redundant paths Dynamic routing minimal human intervention Spares (GBICs and cables, too ) Know your S.L.A.

3b - Systems Load-balancing DNS round-robin F5/Cisco Director/Resonate Global Dispatch Redundancy of service MX backups Leaf nodes should cache

3c - Backups No, really. That s it.

3d - Backups USELESS unless you have tested restores!

3e - Backups Remember no single points of failure? This goes for backups, too! Media fails Media devices fail Networks fail Try restoring on a different system

Rule 4 - It s not done until it s documented YOU are the single point of failure! You do want to go on holiday sometime, right? If not, see Rule 9

4a - Change Control Peer review Show others how you think Shows people what s coming Catches typos Revision Control Systems Roll-back. Say it again. Doesn t it sound good?

Rule 5 Establish Procedures Consistency Reproducibility ISO 9001 is all about procedures Helps to implement Rule 4 Peer review

Rule 6 Practise Defence in Depth Not all eggs in one basket Heterogeneity quis custodiet ipsos custodes? (Monitoring systems can fail too) You get time to react between layers Some are more important that others

6a - Defence in Depth Software updates OS and applications All software is buggy. Get over it. Firewall Can give false sense of security Misconfigured? Worse than no firewall. Monitor your network, too (IDS, honeypot) Internal more likely than external

Rule 7 - It s not done until it s tested Software installation is a risk Yes, patches too! Test systems Must the software updates be applied right now? Automate your testing, if possible

Rule 8 - Learn from Others Don t re-invent the wheel Save yourself time Save yourself money Mailing lists SAGE and local groups NANOG Conferences

8a - Other sources Vendors Sometimes they hire smart people FAQs Search engines White papers Books Articles

Rule 9 - Learn to Relax The Big Blue Room The most important metric - your family! DELEGATE! Go for a pint (beer, blackcurrant, whatever) Nothing messier than an exploding sysadmin...

Rule 10 - Non scriptum, non est If it ain t written down, it never happened Acceptable Use Policies Have all users signed them? ALL users? Including the sysadmins? Can t have perception of multi-tier system Sometimes you have to fire technical people, too

Rule 11 Learn how to count to 10 Thank you. Questions?