C LIENT R EGISTRY OpenEMPI: Operations Support Training SYSNET International, Inc.

Slides:



Advertisements
Similar presentations
ITEC474 INTRODUCTION.
Advertisements

Module 13: Performance Tuning. Overview Performance tuning methodologies Instance level Database level Application level Overview of tools and techniques.
Chapter 20 Oracle Secure Backup.
Module 1: Installing Windows XP Professional
Lesson 17: Configuring Security Policies
Oracle 10g Database Administrator: Implementation and Administration
Database Administration ISQA 436 Fall 2006 Mark Freeman
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Thirteen Performing Network.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Chapter 12 File Management Systems
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
A Guide to Oracle9i1 Introduction to Oracle9i Database Administration Chapter 11.
Linux Operations and Administration
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Ch 11 Managing System Reliability and Availability 1.
Windows Server MIS 424 Professor Sandvig. Overview Role of servers Performance Requirements Server Hardware Software Windows Server IIS.
Eucalyptus Virtual Machines Running Maven, Tomcat, and Mysql.
1 Introduction to PostgreSQL. 2 Documents PostgreSQL 8 for Windows (*) Beginning Databases with PostgreSQL From Novice to Professional, Second Edition.
Introduction to Linux Installing Linux User accounts and management Linux’s file system.
Hands-On Microsoft Windows Server 2008 Chapter 5 Configuring, Managing, and Troubleshooting Resource Access.
STRATEGIES INVOLVED IN REMOTE COMPUTATION
Sharing Resources Lesson 6. Objectives Manage NTFS and share permissions Determine effective permissions Configure Windows printing.
1 Guide to Novell NetWare 6.0 Network Administration Chapter 13.
Chapter 9: Novell NetWare
Oracle10g RAC Service Architecture Overview of Real Application Cluster Ready Services, Nodeapps, and User Defined Services.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 7: Domain Name System.
CIS 191 – Lesson 2 System Administration. CIS 191 – Lesson 2 System Architecture Component Architecture –The OS provides the simple components from which.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Managing User Accounts. Module 2 – Creating and Managing Users ♦ Overview ► One should log into a Linux system with a valid user name and password granted.
The Pipeline Processing Framework LSST Applications Meeting IPAC Feb. 19, 2008 Raymond Plante National Center for Supercomputing Applications.
- Darshana Pathak - Dr. Hye-Chung Kum.  Overview  Entity resolution process  About Framework  Configuration file  Class Details  How to …  Future.
Suite zTPFGI Facilities. Suite Focus Three of zTPFGI’s facilities:  zAutomation  zTREX  Logger.
Active Directory Administration Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Creating Users, Computers, and Groups Automate creation.
Guide to Linux Installation and Administration, 2e1 Chapter 10 Managing System Resources.
Oracle 10g Database Administrator: Implementation and Administration Chapter 2 Tools and Architecture.
Introduction to the Adapter Server Rob Mace June, 2008.
Suite zTPFGI Facilities. Suite Focus Three of zTPFGI’s facilities:  zAutomation  zTREX  Logger.
1 Administering Shared Folders Understanding Shared Folders Planning Shared Folders Sharing Folders Combining Shared Folder Permissions and NTFS Permissions.
A Brief Documentation.  Provides basic information about connection, server, and client.
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
Chapter 8: Objectives Explain how to use a server in a home or office network Install a server Set up a server Manage and monitor a server Design a server-based.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
Core 3: Communication Systems. Network software includes the Network Operating Software (NOS) and also network based applications such as those running.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
1 AHM -2-4 Sept 2003 e-Science Centre Running SRB Ananta Manandhar.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Week 2 Lecture 1 Creating an Oracle Instance. Learning Objectives  Learn the steps for creating a database  Understand the prerequisites for creating.
1 Objectives Discuss File Services in Windows Server 2008 Install the Distributed File System in Windows Server 2008 Discuss and create shared file resources.
ASP-2-1 SERVER AND CLIENT SIDE SCRITPING Colorado Technical University IT420 Tim Peterson.
Oracle Applications 11i Concepts II Brian Hitchcock OCP 11i DBA -- OCP 10g DBA Sun Microsystems Brian Hitchcock.
Linux Operations and Administration
4/26/2017 OpenHIE RHEA Project 2012.
Presented by Vishy Grandhi.  Lesson 1: AX Overview  Lesson 2: Role based security  Lesson 3: Monitoring  Troubleshooting.
Web Server Administration Chapter 11 Monitoring and Analyzing the Web Environment.
VMware Certified Professional 6-Data Center Virtualization Beta 2V0-621Exam.
Web Server Administration Chapter 11 Monitoring and Analyzing the Web Environment.
1 Copyright © 2008, Oracle. All rights reserved. Repository Basics.
ALL THINGS IIS TERRI DONAHUE
Linux203Training Module System Mgmt.
Securing the Network Perimeter with ISA 2004
Chapter 2: System Structures
Active Directory Administration
SPS FPDS-NG Integration: System Administration
Oracle Solaris Zones Study Purpose Only
IS3440 Linux Security Unit 4 Securing the Linux Filesystem
Introduction to Teradata
SAP R/3 Installation on WIN NT-ORACLE
ODP node monitoring and maintenance
Presentation transcript:

C LIENT R EGISTRY OpenEMPI: Operations Support Training SYSNET International, Inc.

OpenEMPI Software Stack Database Server: PostgreSQL open source database, version 9.1 Application Server: JBoss version Web Server: Apache HTTP Server, version 2.4

Overview of Operational Support Tasks Starting the Application Server Stopping the Application Server Starting the Database Server Stopping the Database Server Changing database account passwords Managing OpenEMPI user accounts Back-up the application software Back-up the Client Registry data Viewing log files Monitor the server load

Starting the Application Server JBoss Installation Directory /home/sysnet/servers/jboss Setting the environment $ source /home/sysnet/openempi/openempi_env.sh Start the server $ cd /home/sysnet/servers/jboss $ bin/run.sh

Server’s Memory Configuration Will be configured appropriately but if necessary, adjustments can be made over time In bin/run.conf JAVA_OPTS="-Xms128m -Xmx2048m -XX:MaxPermSize=512m … -Xms:Sets the starting heap size -Xmx: Sets the maximum heap size -XX:MaxPermSize:Sets the size of the memory allocated to storing class information

Stopping the Application Server JBoss Installation Directory /home/sysnet/servers/jboss Setting the environment $ source /home/sysnet/openempi/openempi_env.sh Start the server $ cd /home/sysnet/servers/jboss $ bin/shutdown.sh --shutdown

Starting/Stopping the Database Server PostgreSQL 9.1 installed as Unix service Starting the server: $ sudo /etc/init.d/posgresql start Stopping the server: $ sudo /etc/init.d/posgresql stop

Database Accounts Account postgres is privileged; it is created when the software is installed Account openempi is created during installation of OpenEMPI To change the openempi password, first connect to Postgres server with client application psql --username=openempi --host=localhost openempi

Change Database Password Once connected, use the alter user command: ALTER USER openempi WITH PASSWORD ‘xxxxxxxxx'; Note: ‘xxxxxxxxx’ is just a placeholder for the password; so a strong password Must tell OpenEMPI that database password has changed $ cd /home/sysnet/openempi/conf $ vi jdbc.properties jdbc.username=openempi jdbc.password=openempi

Managing OpenEMPI Accounts Use the security tab to manage accounts and privileges

Manage Roles From the Security tab select Manager Roles

Manage Roles Roles have one or more permissions assigned to them.

Backup Database Postgres includes the pg_dump tool for backups pg_dump --username=openempi --password \ --host=localhost openempi gzip \ /home/sysnet/backups/openempi-db-backup-mm-dd-yyyy.sql.gz Software backs up everything within the database A script will be developed to automate this process Backups should be done on a daily basis

Backup Software All the software that needs to be preserved resides under: /home/sysnet Filesystem backups may be performed at the virtual machine level Backup strategy will be refined once the server hosting the client registry is made available to us

Log Files The primary log file for the Client Registry is: /home/sysnet/openempi/openempi.log Stores operational information at a configurable log level /home/sysnet/openempi/conf/log4j.properties log4j.rootCategory=warn, R, O Log level takes the values below (increasing detail): error, warn, info, debug, trace Application server’s log file: /home/sysnet/servers/jboss GA/server/default/log/server.log

System Monitoring It is useful to periodically monitor the performance of the server vmstat 5 (sar is another alternative) procs memory swap io---- -system cpu---- r b swpd free buff cache si so bi bo in cs us sy id wa You want to verify: System has plenty of memory Disk I/O is low CPU Utilization is not too high (consistently in the %90s).

Why do we need an EMPI? Patient visits multiple separate healthcare providers Enterprise MPI Radiology Patient known as John Smythe Hospital Patient known as John Smith Laboratory Patient known as J. M. Smith Patient ID | John Smith | … Three entries merged into single record

Approaching Record Matching

Client Registry Architecture Overview of the software architecture of OpenEMPI

OpenEMPI Architecture Utilizing the idea of a service, interchangeable implementations of services can be plugged into the system transparently

Blocking Algorithms Comparison of records is quadratic in the number of records Two files of 300,000 each generate 90 billion pairs Blocking variables are used for partitioning Multiple passes are used to prevent errors Selecting blocking variables High selectivity factor Preferably uniformly distributed Wide variety of blocking algorithms available Sorted neighborhood Bigram Indexing Canopy Clustering 21

Field Comparison/Distance Algorithms Phonetic Encoding Algorithms Soundex: oldest and most well known algorithm Phonex: aims soundex by pre-processing names Phonix: extension of Phonex with > 100 rules NYSIIS: New York State Identification Intelligence System Metaphone/Double Metaphone Approximate String Matching Levenshtein or Edit Distance Longest Common Substring (LCS) Q-Grams Jaro/Jaro-Winkler Combinations of techniques 22

Matching Algorithms Variety of algorithms available, both deterministic and probabilistic Fellegi-Sunter is the most popular probabilistic algorithm 23