An Overview to System Management <ul><ul><li>WorldVistA Community Meeting </li></ul></ul><ul><ul><li>June 14-17, 2007 </li...
Context - Premise The computer system is a tool that must be maintained in an IT “sterile field”
The Context: Support Providers   Giving Patient Care <ul><li>Support providers with patient care </li></ul><ul><li>Reliabl...
Reliable – always  available <ul><li>It “just works” </li></ul><ul><li>Configuration of redundant systems allows for unint...
Secure – no undetected crackers <ul><li>Establish an IT “sterile field” </li></ul><ul><li>Computers used to access the sys...
Recoverable – when things break <ul><li>Reduce down-time </li></ul><ul><li>Quickly re-establish service  </li></ul>
Maintainable – as repair is needed
<ul><li>Remote Access/Network </li></ul><ul><li>Adequate power and conditioning </li></ul><ul><li>Adequate cooling </li></...
Building <ul><li>VPN for remote access </li></ul><ul><li>Recommend adoption of a tough policy to maintain an IT “sterile f...
Building – 2 <ul><li>Uninterruptable Power Supply for servers sufficient to guarantee an orderly shutdown </li></ul><ul><l...
Building – 3 <ul><li>Enable journaling on database </li></ul><ul><li>Build database with selected replication strategy </l...
Maintaining <ul><li>Checkpoint changes to configuration </li></ul><ul><li>Checkpoint (commit) changes to routines </li></u...
Monitoring <ul><li>Backups </li></ul><ul><ul><li>Complete environment </li></ul></ul><ul><ul><li>Push to “off-site” media ...
Expanding / Extending <ul><li>Having two (or more) host systems allows for uninterrupted operation of business while  </li...
Recovering <ul><li>Regular and complete backups containing: </li></ul><ul><ul><li>All of the application routines </li></u...
Conclusion <ul><li>The Context </li></ul><ul><li>Planning </li></ul><ul><li>Building </li></ul><ul><li>Maintaining </li></...
Upcoming SlideShare
Loading in …5
×

Landis - System Administration

503 views
443 views

Published on

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
503
On SlideShare
0
From Embeds
0
Number of Embeds
33
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Landis - System Administration

  1. 1. An Overview to System Management <ul><ul><li>WorldVistA Community Meeting </li></ul></ul><ul><ul><li>June 14-17, 2007 </li></ul></ul><ul><ul><li>Seattle, WA </li></ul></ul>
  2. 2. Context - Premise The computer system is a tool that must be maintained in an IT “sterile field”
  3. 3. The Context: Support Providers Giving Patient Care <ul><li>Support providers with patient care </li></ul><ul><li>Reliable – always available </li></ul><ul><li>Secure – no undetected crackers </li></ul><ul><li>Recoverable – when things do break </li></ul><ul><li>Maintainable – when things need repair </li></ul>
  4. 4. Reliable – always available <ul><li>It “just works” </li></ul><ul><li>Configuration of redundant systems allows for uninterrupted service during hardware and software maintenance / enhancement </li></ul>
  5. 5. Secure – no undetected crackers <ul><li>Establish an IT “sterile field” </li></ul><ul><li>Computers used to access the system must be considered tools, not toys </li></ul><ul><li>Use a VPN (Virtual Private Network) </li></ul><ul><li>Monitor access attempts (Intrusion detection) </li></ul>
  6. 6. Recoverable – when things break <ul><li>Reduce down-time </li></ul><ul><li>Quickly re-establish service </li></ul>
  7. 7. Maintainable – as repair is needed
  8. 8. <ul><li>Remote Access/Network </li></ul><ul><li>Adequate power and conditioning </li></ul><ul><li>Adequate cooling </li></ul><ul><li>Plan for multiple hosts </li></ul><ul><li>Consider multiple locations (even if only placing on opposite sides of the room) </li></ul><ul><li>Select replication strategy </li></ul><ul><li>Journal files </li></ul>Planning
  9. 9. Building <ul><li>VPN for remote access </li></ul><ul><li>Recommend adoption of a tough policy to maintain an IT “sterile field” </li></ul><ul><ul><li>All connected computers are tools not toys </li></ul></ul><ul><ul><li>If using an insecure system (e.g. Microsoft OS), no “local administrator”, lock down </li></ul></ul><ul><ul><li>Consider giving workers for whom the above is too “harsh” a second computer that CANNOT be used to access the system. </li></ul></ul>
  10. 10. Building – 2 <ul><li>Uninterruptable Power Supply for servers sufficient to guarantee an orderly shutdown </li></ul><ul><li>Adequate space and cooling capacity to keep the system from “running hot” </li></ul><ul><li>Install systems (at least two) </li></ul><ul><li>With sufficient physical separation so that events like a fire do not cause a complete outage </li></ul>
  11. 11. Building – 3 <ul><li>Enable journaling on database </li></ul><ul><li>Build database with selected replication strategy </li></ul><ul><li>Sufficient storage for a complete backup of the database and journals, etc </li></ul>
  12. 12. Maintaining <ul><li>Checkpoint changes to configuration </li></ul><ul><li>Checkpoint (commit) changes to routines </li></ul><ul><li>Regular review of automation scripts </li></ul><ul><li>Review resource utilization (nmon) </li></ul>
  13. 13. Monitoring <ul><li>Backups </li></ul><ul><ul><li>Complete environment </li></ul></ul><ul><ul><li>Push to “off-site” media </li></ul></ul><ul><li>Automate processes to monitor: </li></ul><ul><ul><li>Free disk space in file systems </li></ul></ul><ul><ul><li>Free disk space in database files </li></ul></ul><ul><ul><li>Replication processes </li></ul></ul><ul><ul><li>Performance monitoring tools (nmon) </li></ul></ul><ul><ul><li>Integrity checks </li></ul></ul>
  14. 14. Expanding / Extending <ul><li>Having two (or more) host systems allows for uninterrupted operation of business while </li></ul><ul><ul><li>Increasing storage capacity </li></ul></ul><ul><ul><li>Adding memory </li></ul></ul><ul><ul><li>Replacing/upgrading host </li></ul></ul>
  15. 15. Recovering <ul><li>Regular and complete backups containing: </li></ul><ul><ul><li>All of the application routines </li></ul></ul><ul><ul><li>Properly backed up data </li></ul></ul><ul><ul><li>All support scripts </li></ul></ul><ul><ul><li>All configuration files (xinetd, httpd) </li></ul></ul><ul><li>Alternate host available </li></ul><ul><ul><li>Pre-built 'blank' environment </li></ul></ul><ul><ul><li>Consistent structure to allow load+go </li></ul></ul>
  16. 16. Conclusion <ul><li>The Context </li></ul><ul><li>Planning </li></ul><ul><li>Building </li></ul><ul><li>Maintaining </li></ul><ul><li>Monitoring </li></ul><ul><li>Expanding </li></ul><ul><li>Extending </li></ul><ul><li>Recovering </li></ul>

×