IST346: Services: Monitoring and Logging

Slides:



Advertisements
Similar presentations
Welcome to Middleware Joseph Amrithraj
Advertisements

1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
IST346: Services. Agenda  Learn the various taxonomies and classifications of computing services.  Familiarize ourselves with popular services  Understand.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Quick Tour of the Web Technologies: The BIG picture LECTURE A bird’s eye view of the different web technologies that we shall explore and study.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
TOPIC 1 – SERVER SIDE APPLICATIONS IFS 234 – SERVER SIDE APPLICATION DEVELOPMENT.
Module 1: Installing Internet Information Services 5.0.
BASIC NETWORK CONCEPTS (PART 6). Network Operating Systems NNow that you have a general idea of the network topologies, cable types, and network architectures,
Network LANscape Servers & Equipment Found In a Typical Local Area Network (LAN) By George Squillace New Horizons of MichiganGeorge Squillace MCT, MCSE,
IST346: Services. Agenda  Learn the various taxonomies and classifications of computing services.  Familiarize ourselves with popular services  Understand.
Web Servers Web server software is a product that works with the operating system The server computer can run more than one software product such as .
Human-Computer Interface Course 5. ISPs and Internet connection.
BOB Tech Demo 2003 G2E – Las Vegas. Agenda  Best of Breed – a layering of standards  Standards, messaging, protocols and why you care  From the bottom.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
1 Apache. 2 Module - Apache ♦ Overview This module focuses on configuring and customizing Apache web server. Apache is a commonly used Hypertext Transfer.
Component 9 – Networking and Health Information Exchange Unit 1-1 ISO Open Systems Interconnection (OSI) This material was developed by Duke University,
1 Version 3.0 Module 11 TCP Application and Transport.
COMP1321 Digital Infrastructure Richard Henson February 2014.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
TCP/IP (Transmission Control Protocol / Internet Protocol)
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 7 Authentication Methods and Requirements.
17 Establishing Dial-up Connection to the Internet Using Windows 9x 1.Install and configure the modem 2.Configure Dial-Up Adapter 3.Configure Dial-Up Networking.
Web Server Administration Chapter 6 Configuring a Web Server.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Application of the Internet 1998/12/09 KEIO University, JAPAN Mikiyo
COMP1321 Digital Infrastructure Richard Henson March 2016.
ArcGIS for Server Security: Advanced
Application Layer Functionality and Protocols Abdul Hadi Alaidi
Application Layer Functionality and Protocols
Application layer tcp/ip
Introduction to Operating Systems
Instructor Materials Chapter 5 Providing Network Services
Apache web server Quick overview.
Software Mr. Singh.
Web Development Web Servers.
Chapter 9 Router Configuration (Ospf, Rip) Webmin, usermin Team viewer
Network Wiring and Reference
Securing the Network Perimeter with ISA 2004
Principles of Network Applications
SUBMITTED BY: NAIMISHYA ATRI(7TH SEM) IT BRANCH
Configuration for Network Security
Lecture 6: TCP/IP Networking By: Adal Alashban
Working at a Small-to-Medium Business or ISP – Chapter 7
Welcome To : Group 1 VC Presentation
Chapter 3: Windows7 Part 4.
File Transfer Olivia Irving and Cameron Foss
Working at a Small-to-Medium Business or ISP – Chapter 7
DHCP, DNS, Client Connection, Assignment 1 1.3
Working at a Small-to-Medium Business or ISP – Chapter 7
Goals Introduce the Windows Server 2003 family of operating systems
Distributed Systems Bina Ramamurthy 11/30/2018 B.Ramamurthy.
Distributed Systems Bina Ramamurthy 12/2/2018 B.Ramamurthy.
Lecture 6: TCP/IP Networking 1nd semester By: Adal ALashban.
HTTP and Abstraction on the Internet / The Need for DNS
IST346: Scalability.
IST346: Services: Application Architecture
IST346: Networking Fundamentals
Applications Layer Functionality & Protocols
IST346: Operating Systems / Command Line Interfaces
Distributed Systems Bina Ramamurthy 4/22/2019 B.Ramamurthy.
PLANNING A SECURE BASELINE INSTALLATION
APACHE WEB SERVER.
Web Servers (IIS and Apache)
Computer Networks Protocols
Introduction To Building a Web Site
Presentation transcript:

IST346: Services: Monitoring and Logging

Agenda Discussion Content Services Monitoring Logging Wrap-Up

Discussion Questions What are the 6 characteristics of providing good service? What aspects of a service should be monitored? What are the two types of monitoring? Why are both important? What are the uses of logs and benefits of logging? What is end-to-end testing? What is SNMP? Where are the Linux system logs located? Give students 1-2 minutes for each question. Its important to provide them with the opportunity to answer the questions based on the reading, labs, and assigned homework.

Recall: Server vs. Service A server is a computer. A service is an offering provided by server(s). HTTP, for example It is software

Services Background process accessible over a network. Typical environments have several services, and services often depend on other services. Some services are simple, and have no interaction’s on the user’s part. (network time, or NTP for example) It is best to think about any given service in terms of its anatomy and interdependencies.

Anatomy of a service Protocols Components APIs Instructions for transferring data to/from client/server (transport mechanism) Protocols Components APIs Rules for accessing or extending the service beyond the components, it may communicate with other systems. You don’t need all three but most of the time you do have all three of them. Client and Server software part of the application or service interaction

Example: Wordpress Protocols HTTP, HTTPS, WebDAV, SMTP Components Web Browsers Apache Web Server PHP Scripting MySQL Database APIs XML-RPC Atom RSS

Service Interdependencies Application Network Core/Infrastructure Complex interface, several protocols. Services at the application level depend on lower-level services for their operation. Basic interface with underlying protocol. Essential to all other services. Minimal interface.

Service Dependencies: Example HTTP, SMTP DNS, DHCP, LDAP Application Network Core Infrastructure

Services every IT professional should know Core NTP – Network time protocol. Keeps the clocks in sync on several hosts DNS – Domain name system – a method of IP address to host name resolution. DHCP – Dynamic Host configuration Protocol – a method of assigning IP information over the network. LDAP – Lightweight Directory Access Protocol – a hierarchal database of directory information (users, groups, organizations, etc) Kerberos – A network authentication protocol, used for securely evaluating identities over a network 4/6/2019 IST346: Info Tech Management & Administration

Services every IT professional should know Network HTTP – Hypertext transport protocol. The application protocol for the WWW SSL –Secure Sockets Layer – an encrypted channel for HTTP traffic SSH / SCP – Secure Shell, Secure Copy. Unix/Linux remote shell and remote file copy protocols. NFS – Network File System – File sharing for unix-like computers. RDP – Remote Desktop protocol. A proprietary protocol for accessing Windows hosts over a network. SMTP – Simple Mail Transport Service. Mail routing protocol. OAuth2 – for account authentication and authorization. 4/6/2019 IST346: Info Tech Management & Administration

Check Yourself: Understanding Services What are the 3 things which make up the Anatomy of any service? What is a core or infrastructure service? Provide an example. Provide an example of a service which depends on another service. A service like Gmail depends on which other services?

Providing a Service Any service you provide must be: Defined 1 Reliable 2 Scalable 3 Monitored 4 Maintained 5 Supported 6 Any service you provide must be:

Defining your Service Identify your customers Formulate an SLA Defined 1 Identify your customers Formulate an SLA

Service Reliability Keep it simple Reliable 2 Keep it simple Don’t be the only expert – rely on the community for support and best practices Use Open standards

Reliability: Environments Reliable 2 Reliability: Environments Any service should have 3 environments Usually, each environment is on separate hardware Dev Test Prod Where you build out new features for the service / upgrades Primary Environment for the Service Mirror image of prod environment for testing purposes

Scalability Vertical Scalability: Horizontal Scalability: Scalable 3 After Vertical Scalability: Before Load Balancer Vertical Scalability – throw more hardware at the problem Horizontal Scalability – re-engineer the problem Horizontal Scalability: Before After After After

You’ve got more laundry than your current washing machine can handle!! Scaling your Laundry Scalable 3 You’ve got more laundry than your current washing machine can handle!! Traffic Service Vertical Horizontal Laundry is the traffic to your service The washing machine is the service Use more than one washing machine Use a bigger, faster washing machine

Service Monitoring & Logging Monitored 4 You cannot offer good service if you don’t monitor. You cannot measure unless you are logging activity. If you’re not measuring it, you’re not managing it. Monitoring == real-time Logging == historical

How Monitoring and Logging Work Server Log Service Activity Service Network Activity Internal Service Monitor External Service Monitor Event Event

Example: Simple Web Service Monitoring Linux Host: website.com access_log Service Activity Nginx Network Activity ps –aux | grep “httpd” nmap website.com Event: Port unavailable Event: Service stopped

Logging Log files get very large Monitored 4 Log files get very large since they record all activity. Log file rotation – service points to a different log file after a specified interval. Lets you backup log files Keeps the size of the files manageable. Log files are text and they compress nicely. How long do you keep logs? Depends on service, depends on your policy It’s not a decision the SA should make. Ship logs to a Big Data system like Hadoop or Elasticsearch Like an insurance policy. Not very useful until the off chance that you need it... then you’re glad you have it!

Service Maintenance Maintained 5 Yes, there will come a time when you will need to deny service. (Make it unavailable.) Upgrades to hardware / OS / Service itself Plan and advertise your service outages so your users can plan accordingly. Make sure your outage complies with your SLA.

Supporting your service Supported 6 Document Train your Staff Dev / Test / Prod One / Some / Many – Phased Roll Out. Get Buy in. Measure to determine if you need to scale or have issues. Advertise Support! 4/6/2019 IST346: Info Tech Management & Administration

IST346: Info Tech Management & Administration Providing a Service Defined 1 Reliable 2 Scalable 3 Monitored 4 Maintained 5 Supported 6 Any service you provide must be: 4/6/2019 IST346: Info Tech Management & Administration

Group Activity Service Selection

Group Activity: Providing a Service Break up into teams of 3. Think of a service you use every day. It can be the same service from the last group activity. Answer these questions to the best of your ability Define the service How do they maintain reliability? How is it scaled, if at all? How do you think it is monitored? How is it maintained? How is it supported?

Your To-Do List What to work on for next class ALWAYS CONSULT THE SYLLABUS What to work on for next class

Exit Ticket Share one thing you learned today that you didn’t know before class!

Questions?