I.III Implementation I. Introduction III. Layers I.II Approach

Slides:



Advertisements
Similar presentations
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
Advertisements

The University of Montana’s Indigenous Women in Science Network (IWSN)
Lesson 5-Accessing Networks. Overview Introduction to Windows XP Professional. Introduction to Novell Client. Introduction to Red Hat Linux workstation.
Chapter 11: Maintaining and Optimizing Windows Vista
A Feature-Based Analysis & Comparison of IT Automation Tools: Comparing Kaseya to Developed By: & Advisor : Dr. S. Masoud Sadjadi School of Computing and.
Recovering Stolen Computers and Laptops Omari Grant Danlil Perelshteyn Advisor : Dr. S. Masoud Sadjadi School of Computing and Information Sciences Florida.
Setting IE Home Page and Starting IE after User Logins Using Kaseya Developed By: Paola Nunez Advisor : Dr. S. Masoud Sadjadi School of Computing and Information.
Test Review. What is the main advantage to using shadow copies?
OnTimeMeasure Integration with Gush Prasad Calyam, Ph.D. (PI) Tony Zhu (Software Programmer) Alex Berryman (REU Student) GEC10 Selected.
Model Driven Development reduces the problem-implementation gap by redefining the role of models and using platforms for translating and realizing the.
Checking Network/Port Connectivity using Kaseya Agent Procedures Developed By: Emmanuel Giboyeaux Advisor : Dr. S. Masoud Sadjadi School of Computing and.
OFC 200 Microsoft Solution Accelerator for Intranets Scott Fynn Microsoft Consulting Services National Practices.
Partnership for International Research and Education A Global Living Laboratory for Cyberinfrastructure Application Enablement A Competitive Analysis of.
Project MLExAI Machine Learning Experiences in AI Ingrid Russell, University.
Step By Step Windows Server 2003 Installation Guide Step By Step Windows Server 2003 Installation Guide.
Access Training Linux/Unix Power Broker Access Custom Schema Database Access Customer Training Date: 25-JAN-2005.
A Feature-Based of IT Automation using Kaseya Developed By: Gregory Hayes Advisor : Dr. S. Masoud Sadjadi School of Computing and Information Sciences.
Computer Emergency Notification System (CENS)
Partnership for International Research and Education A Global Living Laboratory for Cyberinfrastructure Application Enablement A Competitive Analysis of.
© 2008 Quest Software, Inc. ALL RIGHTS RESERVED. Perfmon and Profiler 101.
Hosting an Enterprise Financial Forecasting Application with Terminal Server Published: June 2003.
IDigBio is funded by a grant from the National Science Foundation’s Advancing Digitization of Biodiversity Collections Program (Cooperative Agreement EF ).
Partnership for International Research and Education A Global Living Laboratory for Cyberinfrastructure Application Enablement Enhanced Grid Enabled Weather.
 Database Administration Installing Oracle 11g & Creating Database.
The Global Leader in Professional Networking April Kelly Building a Brand and Professional Networking.
Partnership for International Research and Education A Global Living Laboratory for Cyberinfrastructure Application Enablement II. International Experience.
Thinking in Parallel – Implementing In Code New Mexico Supercomputing Challenge in partnership with Intel Corp. and NM EPSCoR.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Managing and Monitoring the Microsoft Application Platform Damir Bersinic Ruth Morton IT Pro Advisor Microsoft Canada
Module 9 Planning and Implementing Monitoring and Maintenance.
Compuware Corporation Deliver Reliable Applications Faster Dave Kapelanski Automated Testing Manager.
Thinking in Parallel - Introduction New Mexico Supercomputing Challenge in partnership with Intel Corp. and NM EPSCoR.
Numerical Methods Multidimensional Gradient Methods in Optimization- Example
 Computer hardware refers to the physical parts of a computer and related devices. Internal hardware devices include motherboards, hard drives,
SMOOTHWALL FIREWALL By Nitheish Kumarr. INTRODUCTION  Smooth wall Express is a Linux based firewall produced by the Smooth wall Open Source Project Team.
Let's build a VMM service template from A to Z in one hour Damien Caro Technical Evangelist Microsoft Central & Eastern Europe
© 2014 Concentrix Corporation 1 Middleware Application Dashboard [26th-Dec-15 to 1st-Jan-15] IT Application Support Concentrix, INDIA.
Won Huh Product Marketing Manager
Stop Those Prying Eyes Getting to Your Data
Managing, Storing, and Executing DTS Packages
Anti Virus System i-Specific Anti-Virus Product
Azure Infrastructure for SAP®
Shared Services with Spotfire
Partnership for International Research and Education
Securing the Network Perimeter with ISA 2004
<Name of Product>Pilot Closeout Meeting <Customer Name>
Discussion and Conclusion
Parallelized Analysis Using Subdural Interictal EEG
| (269) | Western Michigan University
Get to know SysKit Monitor
“ ” A case study to support testing of dynamic SPL
Foundations of Computer Science
KINAMIN Plugin - Kaseya IN A MINute
Cooperative Takes Control of IT with Barracuda Security Solutions Deployed on Microsoft Azure “Barracuda has provided us with a logical, easy, very intuitive.
KNOCKING OPPORTUNITIES
Working Set: Model and Characterization
Introduction to NetDB2 IST210.
I. Research Overview and Outcome
Title of Poster Site Visit 2017 Introduction Results
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
AIMS Equipment & Automation monitoring solution
Service Template Creation from the Ground Up
Title of Poster Site Visit 2018 Introduction Results
Windows Azure Hybrid Architectures and Patterns
This material is based upon work supported by the National Science Foundation under Grant #XXXXXX. Any opinions, findings, and conclusions or recommendations.
Project Title: I. Research Overview and Outcome
Infokall Enterprise Solutions
Presentation transcript:

I.III Implementation I. Introduction III. Layers I.II Approach Partnership for International Research and Education A Global Living Laboratory for Cyberinfrastructure Application Enablement Meta-Monitoring: Proactive Monitoring of an IT Automation Monitoring Server Student: Alfonso Munive, Undergraduate, FIU FIU Advisor: Dr. Masoud Sadjadi, FIU PIRE International Partner Advisor: Dr. Esteban Clua, UFF PIRE Industrial Partner Advisor: Rob Hendrix, Neal Lauther, Kaseya Corp National Science Foundation I. Research Overview and Outcome Script Pseudocode Specify an agent variable, to point to the correct directory (#agenttemp#) Execute a command (specify sqlcmd.exe command) -S #vMachine# -E -q "EXIT(exec sp_helpdb 'ksubscribers')" -o #agenttemp#\result.txt Get the file onto the Kserver, using the get file script result.txt will display the current size of the Kaseya Database Supporting Application layer SQLServer:Databases – Size Of DB SQLServer:Databases – Log File Size SQLServer:General Connections SQL Server- Transactions/sec Web Service- Current Connections IIS –Anonymous users IIS –TCPv4- Connections established Services : Kserver.exe KWebExec.exe KsrvrChk.exe External Monitoring- External System Checks Hardware Layer Processor - % Processor time Memory- Pages/Sec Memory – Avail MB Logical Disk- Avg. Disk sec/Read Avg. Disk sec/Write Size Available/ All Drives Network – Bytes Sent/sec Bytes Received/sec Total Bandwidth I.III Implementation I. Introduction III. Layers Client Proactive Monitoring This project resulted in the development and deployment of a standard suite of monitored services, process, and conditions for customer Kaseya servers to promote proactive monitoring and remediation by Kaseya’s Support team. Through an understanding of current support practices, procedures, and common support issues, we developed monitoring profiles to provide as much advanced notice of Impending problems as possible. Script Based Monitor Sets Kaseya Meta-Monitoring Server SaaS Hosted Environment Script Library Monitor Sets (a) Script Library Monitor Sets (b) Kaseya IT Services Kaseya Customers Worldwide I.II Approach I.IV Results Kaseya’s Scripting Scripted solutions will fall in both proactive and reactive corrections. Evaluation of potential side effects of scripted corrections and level of intrusiveness will be needed to asses which scripted corrections can be safely executed automatically and which will require customer’s permission. Scripted remediation will service both monitored (proactive) problems and customer initiated reactive problems. Production All the monitor sets and scripts that I created during the research project, were applied on an IT Automation meta-monitoring server, which in turn was used to monitor other types of real-time monitoring servers. The general monitoring can be used in the following Kaseya Services: SaaS Services Noc Services/ IT Services II. International Experience My six weeks abroad in Brazil was one of the best experiences of my life. I enjoyed everything the country had to offer, the people, the climate, the lifestyle, the whole culture in general. Traveling around the country was a great experience as well, the taxi rides and bus rides always brought a fun adventure. The food in Brazil is extraordinary, and the cuisine is as diverse as its regions and climates, with many dishes showing their African roots, which were my favorite. Last but not least the scenery in Brazil is truly breath taking. The beaches at Copacabana, Leblon, and Ipanema are amazing, and the terrain surrounding the country is beautiful. In addition this trip helped me gain the international experience I felt I needed to enhance my career and professional development. It increased my confidence, initiative and independence, and it proved that I can adapt and work well with any team. Overall, Eu Te Amo Brasil!   III. Acknowledgement I would first like to thank NSF for providing this great opportunity for myself and my fellow researchers. In addition I would like to thank all the employees at Kaseya Corporation who helped me with the development and planning of this project. The material presented in this poster is based upon the work supported by the National Science Foundation under Grant No. OISE-0730065. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation.