Download presentation
Presentation is loading. Please wait.
Published byTracy Higgins Modified over 8 years ago
1
Integrated Technology Delivery SSO Americas IBM & Client Confidential © 2008 IBM Corporation 1 IBM Toolset Overview June 12, 2009
2
Integrated Technology Delivery SSO Americas IBM & Client Confidential © 2008 IBM Corporation 2 Tools Reviewed Tivoli Fusion and DCA RemotelyAnywhere Parity SRM Node UP/Down Ping SUDO OpenSSH
3
Integrated Technology Delivery SSO Americas IBM & Client Confidential © 2008 IBM Corporation 3 Tivoli 3 © 2005 IBM Corporation
4
Integrated Technology Delivery SSO Americas IBM & Client Confidential © 2008 IBM Corporation 4 Tivoli Agents IBM Tivoli Monitoring Agents (ITM 6.2) ITMs monitors servers and forwards alerts to the Tivoli Enterprise console (TEC) at Operations. It monitors base server function (e.g., disk capacity) with additional specialty modules (e.g., AD or Exchange) as required by contract. Unix & Intel Transition team install the base agents, the Tivoli team pushes the monitors Tivoli Configuration Management Agent (TCM/LCFD) LCFD is the Tivoli framework agent that provides a base for software distribution and inventory functions to be performed on a server Unix & Intel Transition team installs base agents, the Tivoli and Asset Management teams schedule hardware and software scans
5
Integrated Technology Delivery SSO Americas IBM & Client Confidential © 2008 IBM Corporation 5 IBM Tivoli Manager (ITM) ITM V6 TEPS Client or Browser – Java based client or browser for viewing and monitoring the enterprise TEPS – enables retrieval, manipulation and analysis of data from the agents. Repository for user and workspace data HUB TEMS – Main Monitoring Server. Connects to multiple remote TEMS. Collection & control point from agents. Receives & correlates event data. Forwards event to Tivoli TEC. Repository for short-term historical performance data R-TEMS - Serves as a gateway between agents & HUB-TEMS. Gathers data from local Agents and report back to the main "hub" TEMS TEMA/Agents (Tivoli Enterprise Monitoring Agent) collects information about attributes of a managed system
6
Integrated Technology Delivery SSO Americas IBM & Client Confidential © 2008 IBM Corporation 6 TEC is the repository for all events, including those from the TEMS The TEC console is the basis for event viewing and interaction Tivoli Enterprise Console (TEC)
7
Integrated Technology Delivery SSO Americas IBM & Client Confidential © 2008 IBM Corporation Fusion and DCA Overview 7 © 2005 IBM Corporation
8
Integrated Technology Delivery SSO Americas IBM & Client Confidential © 2008 IBM Corporation 8 Fusion – Fusion is an internal IBM security compliance tool that has been developed to help maintain security compliance and audit readiness. – Fusion functions include: OS Security Patch Management including Patch Installation (Windows & Some Unix) Antivirus Status Checking (Windows Only) Security Log Management Compliance Checking Systematic Attack Detection Server Information DCA – Delivery Compliance Administrator is the support team that uses Fusion, as well as other tools to ensure efficient server security audit compliance based on the contracted security policy, as well as security OS APAR management Fusion and DCA
9
Integrated Technology Delivery SSO Americas IBM & Client Confidential © 2008 IBM Corporation 9 Leveraging Tools to Optimize Service Delivery 9/28/2016 9 RemotelyAnywhere Remote Connectivity & Management for Windows-based Systems SSH protocol for Windows servers
10
Integrated Technology Delivery SSO Americas IBM & Client Confidential © 2008 IBM Corporation 10 Leveraging Tools to Optimize Service Delivery9/28/2016 RemotelyAnywhere Fusion Fusion is an internal IBM security compliance tool that has been developed to help maintain security compliance and audit readiness. Fusion functions include: – OS Security Patch Management including Patch Installation (Windows Only) – Antivirus Status Checking (Windows Only) – Security Log Management – Compliance Checking – Systematic Attack Detection – Server Information DCA Delivery Compliance Administrator is the support team that uses Fusion, as well as other tools to ensure efficient server security audit compliance based on the contracted security policy, as well as security OS APAR management Provides secure remote control and administration for Windows-based systems Architecture – Client-less, no client code required - the web browser is the client Server Management – Options to restart service as well as reboot the system under normal, scheduled, emergency or hard reboot options – Monitor and manage users, events, services, processes and registry entries – Centralized & built-in event logging – Remote Control Whiteboard – provides for an interactive facility on the host system – File Management - transfers files between local and host system – Port Forwarding – forward one or more TCP or UDP ports on one computer to another Security – Tightly integrated with Windows authentication model – Secure Shell capability – Secure remote control Automated Enterprise Deployment – Network Console installation tool option is available Flexibility – Coexists with existing remote control tools on a server
11
Integrated Technology Delivery SSO Americas IBM & Client Confidential © 2008 IBM Corporation 11 Leveraging Tools to Optimize Service Delivery9/28/2016 System Dashboard Real-time diagnostic view of host system information
12
Integrated Technology Delivery SSO Americas IBM & Client Confidential © 2008 IBM Corporation 12 Drag and drop computers on your network into the Network Console interface and monitor them You can push specific configuration settings to multiple machines across your network Distribute a fine-tuned configuration to a selected group of computers Network Console Centralized access to windows systems Can detect, control and deploy RemotelyAnywhere
13
Integrated Technology Delivery SSO Americas IBM & Client Confidential © 2008 IBM Corporation Parity 13 © 2005 IBM Corporation
14
Integrated Technology Delivery SSO Americas IBM & Client Confidential © 2008 IBM Corporation 14 Parity Comprised of agents that run on the client and a Centralized Infrastructure that collects, manages, and presents the information to users. Parity is a client-server based technology that learns about all relationships of a server in a distributed environment, allowing a comprehensive mapping of an application’s dependencies in that distributed environment. With this information Parity can either provide a recommended course of action, take action, or simply provide the System Administrator with a report of the requested information.
15
Integrated Technology Delivery SSO Americas IBM & Client Confidential © 2008 IBM Corporation 15 PARITY Fully automated – No manual configuration required – Automatically adjusts to changes in the environment Provides detailed problem information for the following areas: – SAN management – Application management – Distributed database management – Distributed Domino database management – Knowledge of support team’s known environment plus one (Parity learns connections and provides status on those connections outside of support teams immediate control)
16
Integrated Technology Delivery SSO Americas IBM & Client Confidential © 2008 IBM Corporation Server Resource Management Quick Overview Managing Performance and Capacity Across the Enterprise
17
Integrated Technology Delivery SSO Americas IBM & Client Confidential © 2008 IBM Corporation 17 SRM Server Resource Management (SRM) is a web application that reports trending data of key server resources, such as processor, memory, and disk. SRM incorporates a series of supplemental programs and techniques to: log local server data, consolidate data for regular processing, load consolidated data into DB2 for retention and enable dynamic server reporting to both IBM Intranet and Internet web sites Serves as a centralized data mart specializing in performance and capacity metrics for both virtualized and non-virtualized server resources. Reports generated from this data are viewable in multiple formats, including table, graph, CSV, XML, and RTF, and all can be automatically sent via e-mail on a user-defined schedule.
18
Integrated Technology Delivery SSO Americas IBM & Client Confidential © 2008 IBM Corporation 18 Data View SRM incorporates a unique enterprise view of customer server trends, whereby a single server or hundreds of servers may be presented in a single view, using a red/yellow/green threshold methodology to identify servers that exceed key resource thresholds. Hot link navigation enables drill-down to the individual server level. The common web interface eliminates the need for expertise on multiple platforms.
19
Integrated Technology Delivery SSO Americas IBM & Client Confidential © 2008 IBM Corporation 19 Enabling Performance and Capacity Management The process of planning and managing day-to-day workloads to achieve response and throughput requirements in a cost-effective manner. The process of planning for sufficient IT processing resources in a cost-effective manner to meet IT client/customer service needs and business objectives. Capacity ManagementPerformance Management Gather business, service, technology, and growth requirements Collect performance and capacity measurement data Evaluate current usage and service and take preventative/corrective actions Evaluate future resource requirements and provide alternative configurations Communicate capacity and performance information via reports
20
Integrated Technology Delivery SSO Americas IBM & Client Confidential © 2008 IBM Corporation 20 © 2005 IBM Corporation Up/Down Ping
21
Integrated Technology Delivery SSO Americas IBM & Client Confidential © 2008 IBM Corporation 21 Up/Down monitoring – A central server will perform an ICMP ping for all in-scope servers – Each device being monitored must be configured to receive and respond to the ping – If the server does not respond to a ping within a specified threshold, then the central server sends an alert to the Tivoli console (TEC) Up/Down Ping
22
Integrated Technology Delivery SSO Americas IBM & Client Confidential © 2008 IBM Corporation 22 © 2005 IBM Corporation SUDO
23
Integrated Technology Delivery SSO Americas IBM & Client Confidential © 2008 IBM Corporation 23 Sudo (su "do") allows a system administrator to give certain users (or groups of users) the ability to run some (or all) commands as root while logging all commands and arguments. Sudo operates on a per-command basis, it is not a replacement for the shell. It's features include: – The ability to restrict what commands a user may run on a per-host basis. – Sudo does copious logging of each command, providing a clear audit trail of who did what. When used in tandem with syslogd, the system log daemon, sudo can log all commands to a central host (as well as on the local host). At CU, all admins use sudo in lieu of a root shell to take advantage of this logging. – Sudo uses timestamp files to implement a "ticketing" system. When a user invokes sudo and enters their password, they are granted a ticket for 5 minutes (this timeout is configurable at compile-time). Each subsequent sudo command updates the ticket for another 5 minutes. This avoids the problem of leaving a root shell where others can physically get to your keyboard. There is also an easy way for a user to remove their ticket file, useful for placing in a.logout file. – Sudo's configuration file, the sudoers file, is setup in such a way that the same sudoers file may be used on many machines. This allows for central administration while keeping the flexibility to define a user's privileges on a per-host basis. Please see the samples sudoers file below for a real-world example. SUDO in a Nutshell
24
Integrated Technology Delivery SSO Americas IBM & Client Confidential © 2008 IBM Corporation 24 © 2005 IBM Corporation OpenSSH Unix Servers Only
25
Integrated Technology Delivery SSO Americas IBM & Client Confidential © 2008 IBM Corporation 25 OpenSSH Threats OpenSSH can counter: – Eavesdropping – Name service and IP spoofing – Connection Hijacking – Man-in-the-Middle Attacks – Insertion Attacks Provides Secure: – Remote login – Remote command execution – TCP/IP port forwarding SSH is not a shell in the “Unix” sense SSH protocols 1 and 2 are supported
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.