Mist.io's presentation in the OpenStack Summit in Paris: Using a single UI to manage and monitor your private and public cloud, Docker containers and bare metal servers.
The document discusses standards, open source software, and their relationship. It defines standards and open source, describes some major standards bodies and open source licenses, and gives examples of open source implementations of standards like TCP/IP, DNS, and Java EE. The document concludes that open source can help accelerate standards adoption but that increased cooperation is needed between standards organizations and open source communities to address intellectual property issues.
Matt Oh, Microsoft
We are seeing new technique used everyday by malware. But, it is very hard to find any impressive techniques used in the wild. Recently there was huge buzz about Detrahere malware which used internally known issues with certificate signing in Windows 10 kernel driver. Even though the certificate check bypass technique itself is very interesting, also I found that the tactics used by the malware is more impressive. Even though the malware is mainly focused on Ad-hijacking functionality through Netfilter driver installation, but it also has rootkit ability through file system driver hooking. This feels like old days coming back with various new arsenals. The rootkit detects kernel debugging settings and will destroy the system when it finds one. The unpacking process can be very challenging job, too as it uses kernel driver image hollowing technique (something similar to process hollowing) to deobfuscate itself and run unpacked code. Our patchguard doesn't seem like triggering on this action, because all the sections are pre-allocated with execute permission already.
Through this talk, I want to present various techniques used by this malware focusing on the kernel level obfuscation and anti-analysis tactics. This will give us new insights on how new Windows rootkit malware might look like in the future and how detecting them from security systems and detonation systems can be a challenge.
The document discusses the challenges of implementing security practices at fintech companies that blend aspects of both IT and banking. It notes that while banks have strict regulations and processes, many fintech startups initially neglect security. The document advocates for approaches like identifying and examining systems and traffic, continuous monitoring, and having response plans to balance security and business needs in a rapidly changing environment that combines enterprise and custom technologies.
ModSecurity is an open source web application firewall started in 2002 by Ivan Ristic. It can be embedded into web applications and servers to provide protection without introducing additional network components. As an embeddable WAF, ModSecurity offers low overhead, scalability, and avoids single points of failure. It monitors traffic in real-time, supports logging for auditing, and can help patch vulnerabilities without requiring application changes. ModSecurity works with Apache and other web servers, and a standalone version is in development.
application firewall research proposalPeter Cheung
Peter Cheung proposes developing a software firewall product. He analyzes opportunities in third and fourth generation firewall technologies. A software firewall requires less investment than hardware and has an easier time finding security expertise. It would allow the company to offer a security product and related services. The proposal discusses market information, firewall architectures, potential customers, required team roles, and what the company should do if the project fails.
CSW2017 Weston miller csw17_mitigating_native_remote_code_executionCanSecWest
This document summarizes security features in Microsoft Azure to prevent control-flow hijacking and arbitrary code generation. It describes Control Flow Guard, Arbitrary Code Guard, and Code Integrity Guard which enforce control flow integrity, prevent dynamic code generation and modification, and only allow signed code pages. It also discusses some known limitations and bypasses that Microsoft is working to address through additional security features like Control-flow Enforcement Technology (CET).
Alban Diquet, Data Theorem
Thomas Sileo, Data Theorem
Over the last two years, we've received and analyzed more than three million SSL validation failure reports from more than a thousand of iOS and Android apps available on the Stores, and used all around the world. From mobile banking to music apps, each report was triggered because an unknown or unexpected certificate was being served to the app, preventing it from establishing a secure connection to its server via SSL/TLS.
We've analyzed each of these reports to understand what caused the SSL connection to fail, and then grouped similar failures into various classes of SSL incidents. Throughout this presentation, we will describe the analysis we've made and present our findings.
First, we will provide a high-level overview of where, how, and why SSL incidents are occurring across the world for iOS and Android users, and describe the various classes of incidents we've detected. Some of these types of incidents, such as corporate devices performing traffic inspection, are well-known and understood, although we will provide new insights into how widespread they are.
Then, we will take a closer look at a few notable incidents we detected, which have been caused by unexpected, or even suspicious actors. We will describe our investigations and what we found.
Lastly, we will provide real-world solutions on how to protect apps against traffic interception and attacks, as a mobile developer.
Network Function Virtualization - Security Best Practices AtlSecCon 2015Winston Morton
Network Function Virtualization (NFV) introduces the concepts of control and data planes and allows network functions like routing, firewalls, and VPNs to run as software on commercial off-the-shelf servers. This makes the network more flexible and scalable. NFV is complementary to Software Defined Networking and together they allow scalable cloud applications. The ETSI NFV ISG is working to standardize NFV. Challenges include evolving standards, security risks during initial complex deployments, and ensuring security between control and data planes. Opportunities include rapid provisioning, flexibility, cost savings, and innovation. Traditional network security best practices still apply to NFV.
The document discusses standards, open source software, and their relationship. It defines standards and open source, describes some major standards bodies and open source licenses, and gives examples of open source implementations of standards like TCP/IP, DNS, and Java EE. The document concludes that open source can help accelerate standards adoption but that increased cooperation is needed between standards organizations and open source communities to address intellectual property issues.
Matt Oh, Microsoft
We are seeing new technique used everyday by malware. But, it is very hard to find any impressive techniques used in the wild. Recently there was huge buzz about Detrahere malware which used internally known issues with certificate signing in Windows 10 kernel driver. Even though the certificate check bypass technique itself is very interesting, also I found that the tactics used by the malware is more impressive. Even though the malware is mainly focused on Ad-hijacking functionality through Netfilter driver installation, but it also has rootkit ability through file system driver hooking. This feels like old days coming back with various new arsenals. The rootkit detects kernel debugging settings and will destroy the system when it finds one. The unpacking process can be very challenging job, too as it uses kernel driver image hollowing technique (something similar to process hollowing) to deobfuscate itself and run unpacked code. Our patchguard doesn't seem like triggering on this action, because all the sections are pre-allocated with execute permission already.
Through this talk, I want to present various techniques used by this malware focusing on the kernel level obfuscation and anti-analysis tactics. This will give us new insights on how new Windows rootkit malware might look like in the future and how detecting them from security systems and detonation systems can be a challenge.
The document discusses the challenges of implementing security practices at fintech companies that blend aspects of both IT and banking. It notes that while banks have strict regulations and processes, many fintech startups initially neglect security. The document advocates for approaches like identifying and examining systems and traffic, continuous monitoring, and having response plans to balance security and business needs in a rapidly changing environment that combines enterprise and custom technologies.
ModSecurity is an open source web application firewall started in 2002 by Ivan Ristic. It can be embedded into web applications and servers to provide protection without introducing additional network components. As an embeddable WAF, ModSecurity offers low overhead, scalability, and avoids single points of failure. It monitors traffic in real-time, supports logging for auditing, and can help patch vulnerabilities without requiring application changes. ModSecurity works with Apache and other web servers, and a standalone version is in development.
application firewall research proposalPeter Cheung
Peter Cheung proposes developing a software firewall product. He analyzes opportunities in third and fourth generation firewall technologies. A software firewall requires less investment than hardware and has an easier time finding security expertise. It would allow the company to offer a security product and related services. The proposal discusses market information, firewall architectures, potential customers, required team roles, and what the company should do if the project fails.
CSW2017 Weston miller csw17_mitigating_native_remote_code_executionCanSecWest
This document summarizes security features in Microsoft Azure to prevent control-flow hijacking and arbitrary code generation. It describes Control Flow Guard, Arbitrary Code Guard, and Code Integrity Guard which enforce control flow integrity, prevent dynamic code generation and modification, and only allow signed code pages. It also discusses some known limitations and bypasses that Microsoft is working to address through additional security features like Control-flow Enforcement Technology (CET).
Alban Diquet, Data Theorem
Thomas Sileo, Data Theorem
Over the last two years, we've received and analyzed more than three million SSL validation failure reports from more than a thousand of iOS and Android apps available on the Stores, and used all around the world. From mobile banking to music apps, each report was triggered because an unknown or unexpected certificate was being served to the app, preventing it from establishing a secure connection to its server via SSL/TLS.
We've analyzed each of these reports to understand what caused the SSL connection to fail, and then grouped similar failures into various classes of SSL incidents. Throughout this presentation, we will describe the analysis we've made and present our findings.
First, we will provide a high-level overview of where, how, and why SSL incidents are occurring across the world for iOS and Android users, and describe the various classes of incidents we've detected. Some of these types of incidents, such as corporate devices performing traffic inspection, are well-known and understood, although we will provide new insights into how widespread they are.
Then, we will take a closer look at a few notable incidents we detected, which have been caused by unexpected, or even suspicious actors. We will describe our investigations and what we found.
Lastly, we will provide real-world solutions on how to protect apps against traffic interception and attacks, as a mobile developer.
Network Function Virtualization - Security Best Practices AtlSecCon 2015Winston Morton
Network Function Virtualization (NFV) introduces the concepts of control and data planes and allows network functions like routing, firewalls, and VPNs to run as software on commercial off-the-shelf servers. This makes the network more flexible and scalable. NFV is complementary to Software Defined Networking and together they allow scalable cloud applications. The ETSI NFV ISG is working to standardize NFV. Challenges include evolving standards, security risks during initial complex deployments, and ensuring security between control and data planes. Opportunities include rapid provisioning, flexibility, cost savings, and innovation. Traditional network security best practices still apply to NFV.
This document provides an agenda and instructions for a lesson on implementing server hardening. It discusses using tools like IPSec, BitLocker, locating inactive users, NTLM authentication, defining security options, removing storage access, configuring multiple password policies, and Sysinternals tools. It also includes links to videos and documentation on specific tasks like configuring NTLM authentication, defining security options, and removing storage access. It asks how to configure different password policies for groups like Admin and Staff and provides a link to documentation on the Sysinternals troubleshooting suite of tools.
Slides from webinar by Mirantis about how to build a basic edge cloud using surveillance cameras. Watch the webinar recording at: https://bit.ly/mirantis-edge-cloud
This 5-day course teaches reverse engineering and malware analysis skills. It covers analyzing Windows and Linux binaries to understand program flow and perform static and dynamic analysis. Topics include disassembly, decompilation, debugging, instrumentation, and patching code. The course is intended for reverse engineers, malware analysts, security engineers, incident responders, and security professionals who need to analyze and modify binaries to securely defend against evolving threats.
Play with Micro-controller(Embedded Development)Knoldus Inc.
Nitin Saxena presented on using the gyroscope sensor on the STM32F3-Discovery board with Rust. The presentation covered an introduction to embedded systems and why Rust is suitable for them due to its safety and performance. It described the components of the STM32F3-Discovery board including sensors like the gyroscope. It concluded with a demo of getting gyroscope readings from the board using Rust code.
This document provides a summary of the skills and experience of Michael Jones, including over 20 years of experience in IT and cyber security with extensive expertise in networking, systems administration, security engineering, penetration testing, and compliance with standards like NIST, FISMA, and DIACAP. He has held senior security roles and led teams for organizations like the FDA, Architect of the Capitol, and IBM.
Unified malware protection for business desktops, laptops and server operating systems that provides unified protection, simplified administration and visibility and control. Key features include real-time virus protection, advanced malware protection, one policy to manage client agent protection across systems, customized alerts and security assessments. The document discusses security features for Server 2008 such as BitLocker drive encryption, user account control, read-only domain controllers, network access protection and cryptography next generation.
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...MarketingArrowECS_CZ
This document discusses how Check Point vSEC and VMware NSX can be used together to secure software-defined datacenters. The key points are:
1. Check Point vSEC can be automatically deployed on each ESXi host via NSX to provide security visibility and control for east-west traffic inside the datacenter.
2. NSX micro-segmentation capabilities and Check Point security policies allow fine-grained security control between virtual machines segmented into different security groups.
3. The integration provides consistent security for both north-south and east-west traffic inside software-defined datacenters through automation of virtual network and security provisioning.
The document discusses the path of cyber security and how to become a hacker or security professional. It outlines the typical steps of penetration testing: reconnaissance and analysis, vulnerability mapping, gaining access, privilege escalation, maintaining access, and covering tracks. It recommends starting with networking and programming skills, focusing on an area of expertise like web security, participating in competitions and creating a practice lab to learn. The presenter gives demonstrations on vulnerable VMs and recommends courses, CTF competitions, and building your own lab to advance your skills in security research, tool development, and operations.
Cisco and Pxosys teamed up for this Webinar, we will walk you through the Threat Landscape and recent DNS Ransomware cases, and explain why DNS Security is important in your Security Stack within your Organization. We are going to look on a Cisco Umbrella Live Demo and see the potential of the platform from the easy deployment, reporting, and blocking & mitigate Threats from day Zero. A Q&A is going to end the event to clarify any questions that arise during the demo event. Attendees will receive a Cisco Umbrella Free Trial (30 days) at the end of the event.
Visit www.pxosys.com to know more about us.
Alexander Chistyakov, Kaspersky Lab
While more and more security vendors are starting to use Machine Learning (ML) models for malware detection, the basic pipeline for the construction of these detectors usually looks the same: collect a dataset of benign and malicious samples, train a binary classifier to predict the correct label, use a positive prediction of the model to detect new malware. However, this approach does not take into account one important and natural property: no malicious code could become clean after the injection of any new functionality. As a result, an intruder can often avoid detection, simply by adding some obfuscated or clean-looking payload into the malware sample. In this talk we will show how to construct a ML detection model, that is provably secure against such attacks even, after the full reverse engineering. Using the real-time malicious activity detection problem as an example, we will review the classical step-by-step pipeline for designing, training and utilizing the ML classifier, and explain how to adapt it to the specifics of the malware detection problem. We will explain how to transform almost any applicable ML architecture (Deep NN, tree-based ensembles, kernel SVM, etc.) to make your static or dynamic malware detection model more secure; how to update the model’s decision border without complete re-training; and how to explore the causes of the detection alert using the transformed architecture.
Zenoss
• Zenoss is an open source platform released under the GNU General Public License (GPL) version 2.
• It provides an easy-to-use Web UI to monitor performance, events, configuration, and inventory.
• Zenoss is one of the best for unified monitoring since it is cloud agnostic and is open source.
• Zenoss provides powerful plug-ins named Zenpacks, which support monitoring on hypervisors (ESX, KVM, Xen and HyperV), private cloud platforms (CloudStack, OpenStack and vCloud/vSphere), and public cloud (AWS).
This presentation is talking about Kali Linux and how we can use KALI LINUX. Kali Linux is an advanced Penetration Testing and Security Auditing Linux distribution (distro). It was designed to replace the BackTrack Linux distro. Linux is itself based off the UNIX kernel. Everyone was using it because its for free and its secure development environment.
Sandboxing creates confined execution environments for running untrusted programs. It works by restricting programs' access to system files and resources to minimize risks if the program misbehaves. Examples include sandboxing web pages in browsers, PDFs in Adobe Reader, and mobile apps. Sandboxes can detect unknown viruses with low false alarms and allow testing malware safely. Virtual machines and tools like Sandboxie provide sandboxing for any program. Without sandboxing, hostile programs would have unlimited access to users' computers.
NodeJS Microservices, Built it Now, Scale it Later!Lalit Shandilya
Seneca is a Node.js toolkit for building microservices. It allows developers to start with a monolithic codebase and then break it into smaller, independent services (microservices) that communicate via messages as needs for scale increase. Seneca provides plugins that handle common functions like data storage, user management, caching, and logging so developers can focus on their core business logic. The benefits of the microservices approach include scalability, simplicity, and independence of implementation languages.
Nguyen Duc Thinh - Docker security in Dev Ops environment 2.0Security Bootcamp
This document discusses Docker security in a DevOps environment. It begins with an introduction to DevOps and Docker containers. It then outlines several Docker security practices, including hardening the Docker host, using TLS with Docker, content trust for images, network segmentation, image vulnerability scanning, and security assessment tools. The document provides an overview of how Docker and containers are used in DevOps and some key strategies for securing Docker deployments.
Small discussion on Echo's Hack In The Zoo (HITZ) 2017
Ragunan Zoo Jakarta
Jakarta, 2017-09-09
Frida? It's a Dynamic Binary Instrumentation. DBI.
Let's see what frida can do for us, reverse engineer.
Panda Endpoint Protection Plus is a simple, light security solution that provides protection for computers and maximizes productivity. It is a cloud-based solution that allows centralized management of security across all computers on a network without requiring additional servers or infrastructure. Key features include cross-platform security for Windows, Linux, Mac and Android devices, easy management through a web browser with no maintenance needed on the customer's network, and maximizing productivity by monitoring web traffic and filtering spam and malware from email.
This document discusses Site24x7, an all-in-one monitoring solution from ZohoCorp. It introduces Rex Peter and Daniel Paul from Site24x7 customer support and technical support. The document then covers several key features of Site24x7, including website uptime monitoring, performance monitoring, application performance monitoring, infrastructure monitoring, and network monitoring. Site24x7 allows monitoring of websites, applications, servers, virtual infrastructure, containers, cloud infrastructure, and more from a global perspective with real user experience analytics. Pricing plans start for startups and go up to support large enterprises.
The community will no longer send paper flyers to residents if over 75% of residents have email addresses. Residents will instead receive email communications without attachments. The digital flyer folder will be updated regularly and organized for easy viewing. Residents and teams can ask questions about exceptions or notifying residents of the upcoming April change from paper flyers to digital communications.
Presenting the 17 Indicators of the Common Good Balance Sheet - for companies living values and ecological & social Responsablity
http://economia-del-bien-comun.org/en/content/creating-common-good-balance-sheet
This document provides an agenda and instructions for a lesson on implementing server hardening. It discusses using tools like IPSec, BitLocker, locating inactive users, NTLM authentication, defining security options, removing storage access, configuring multiple password policies, and Sysinternals tools. It also includes links to videos and documentation on specific tasks like configuring NTLM authentication, defining security options, and removing storage access. It asks how to configure different password policies for groups like Admin and Staff and provides a link to documentation on the Sysinternals troubleshooting suite of tools.
Slides from webinar by Mirantis about how to build a basic edge cloud using surveillance cameras. Watch the webinar recording at: https://bit.ly/mirantis-edge-cloud
This 5-day course teaches reverse engineering and malware analysis skills. It covers analyzing Windows and Linux binaries to understand program flow and perform static and dynamic analysis. Topics include disassembly, decompilation, debugging, instrumentation, and patching code. The course is intended for reverse engineers, malware analysts, security engineers, incident responders, and security professionals who need to analyze and modify binaries to securely defend against evolving threats.
Play with Micro-controller(Embedded Development)Knoldus Inc.
Nitin Saxena presented on using the gyroscope sensor on the STM32F3-Discovery board with Rust. The presentation covered an introduction to embedded systems and why Rust is suitable for them due to its safety and performance. It described the components of the STM32F3-Discovery board including sensors like the gyroscope. It concluded with a demo of getting gyroscope readings from the board using Rust code.
This document provides a summary of the skills and experience of Michael Jones, including over 20 years of experience in IT and cyber security with extensive expertise in networking, systems administration, security engineering, penetration testing, and compliance with standards like NIST, FISMA, and DIACAP. He has held senior security roles and led teams for organizations like the FDA, Architect of the Capitol, and IBM.
Unified malware protection for business desktops, laptops and server operating systems that provides unified protection, simplified administration and visibility and control. Key features include real-time virus protection, advanced malware protection, one policy to manage client agent protection across systems, customized alerts and security assessments. The document discusses security features for Server 2008 such as BitLocker drive encryption, user account control, read-only domain controllers, network access protection and cryptography next generation.
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...MarketingArrowECS_CZ
This document discusses how Check Point vSEC and VMware NSX can be used together to secure software-defined datacenters. The key points are:
1. Check Point vSEC can be automatically deployed on each ESXi host via NSX to provide security visibility and control for east-west traffic inside the datacenter.
2. NSX micro-segmentation capabilities and Check Point security policies allow fine-grained security control between virtual machines segmented into different security groups.
3. The integration provides consistent security for both north-south and east-west traffic inside software-defined datacenters through automation of virtual network and security provisioning.
The document discusses the path of cyber security and how to become a hacker or security professional. It outlines the typical steps of penetration testing: reconnaissance and analysis, vulnerability mapping, gaining access, privilege escalation, maintaining access, and covering tracks. It recommends starting with networking and programming skills, focusing on an area of expertise like web security, participating in competitions and creating a practice lab to learn. The presenter gives demonstrations on vulnerable VMs and recommends courses, CTF competitions, and building your own lab to advance your skills in security research, tool development, and operations.
Cisco and Pxosys teamed up for this Webinar, we will walk you through the Threat Landscape and recent DNS Ransomware cases, and explain why DNS Security is important in your Security Stack within your Organization. We are going to look on a Cisco Umbrella Live Demo and see the potential of the platform from the easy deployment, reporting, and blocking & mitigate Threats from day Zero. A Q&A is going to end the event to clarify any questions that arise during the demo event. Attendees will receive a Cisco Umbrella Free Trial (30 days) at the end of the event.
Visit www.pxosys.com to know more about us.
Alexander Chistyakov, Kaspersky Lab
While more and more security vendors are starting to use Machine Learning (ML) models for malware detection, the basic pipeline for the construction of these detectors usually looks the same: collect a dataset of benign and malicious samples, train a binary classifier to predict the correct label, use a positive prediction of the model to detect new malware. However, this approach does not take into account one important and natural property: no malicious code could become clean after the injection of any new functionality. As a result, an intruder can often avoid detection, simply by adding some obfuscated or clean-looking payload into the malware sample. In this talk we will show how to construct a ML detection model, that is provably secure against such attacks even, after the full reverse engineering. Using the real-time malicious activity detection problem as an example, we will review the classical step-by-step pipeline for designing, training and utilizing the ML classifier, and explain how to adapt it to the specifics of the malware detection problem. We will explain how to transform almost any applicable ML architecture (Deep NN, tree-based ensembles, kernel SVM, etc.) to make your static or dynamic malware detection model more secure; how to update the model’s decision border without complete re-training; and how to explore the causes of the detection alert using the transformed architecture.
Zenoss
• Zenoss is an open source platform released under the GNU General Public License (GPL) version 2.
• It provides an easy-to-use Web UI to monitor performance, events, configuration, and inventory.
• Zenoss is one of the best for unified monitoring since it is cloud agnostic and is open source.
• Zenoss provides powerful plug-ins named Zenpacks, which support monitoring on hypervisors (ESX, KVM, Xen and HyperV), private cloud platforms (CloudStack, OpenStack and vCloud/vSphere), and public cloud (AWS).
This presentation is talking about Kali Linux and how we can use KALI LINUX. Kali Linux is an advanced Penetration Testing and Security Auditing Linux distribution (distro). It was designed to replace the BackTrack Linux distro. Linux is itself based off the UNIX kernel. Everyone was using it because its for free and its secure development environment.
Sandboxing creates confined execution environments for running untrusted programs. It works by restricting programs' access to system files and resources to minimize risks if the program misbehaves. Examples include sandboxing web pages in browsers, PDFs in Adobe Reader, and mobile apps. Sandboxes can detect unknown viruses with low false alarms and allow testing malware safely. Virtual machines and tools like Sandboxie provide sandboxing for any program. Without sandboxing, hostile programs would have unlimited access to users' computers.
NodeJS Microservices, Built it Now, Scale it Later!Lalit Shandilya
Seneca is a Node.js toolkit for building microservices. It allows developers to start with a monolithic codebase and then break it into smaller, independent services (microservices) that communicate via messages as needs for scale increase. Seneca provides plugins that handle common functions like data storage, user management, caching, and logging so developers can focus on their core business logic. The benefits of the microservices approach include scalability, simplicity, and independence of implementation languages.
Nguyen Duc Thinh - Docker security in Dev Ops environment 2.0Security Bootcamp
This document discusses Docker security in a DevOps environment. It begins with an introduction to DevOps and Docker containers. It then outlines several Docker security practices, including hardening the Docker host, using TLS with Docker, content trust for images, network segmentation, image vulnerability scanning, and security assessment tools. The document provides an overview of how Docker and containers are used in DevOps and some key strategies for securing Docker deployments.
Small discussion on Echo's Hack In The Zoo (HITZ) 2017
Ragunan Zoo Jakarta
Jakarta, 2017-09-09
Frida? It's a Dynamic Binary Instrumentation. DBI.
Let's see what frida can do for us, reverse engineer.
Panda Endpoint Protection Plus is a simple, light security solution that provides protection for computers and maximizes productivity. It is a cloud-based solution that allows centralized management of security across all computers on a network without requiring additional servers or infrastructure. Key features include cross-platform security for Windows, Linux, Mac and Android devices, easy management through a web browser with no maintenance needed on the customer's network, and maximizing productivity by monitoring web traffic and filtering spam and malware from email.
This document discusses Site24x7, an all-in-one monitoring solution from ZohoCorp. It introduces Rex Peter and Daniel Paul from Site24x7 customer support and technical support. The document then covers several key features of Site24x7, including website uptime monitoring, performance monitoring, application performance monitoring, infrastructure monitoring, and network monitoring. Site24x7 allows monitoring of websites, applications, servers, virtual infrastructure, containers, cloud infrastructure, and more from a global perspective with real user experience analytics. Pricing plans start for startups and go up to support large enterprises.
The community will no longer send paper flyers to residents if over 75% of residents have email addresses. Residents will instead receive email communications without attachments. The digital flyer folder will be updated regularly and organized for easy viewing. Residents and teams can ask questions about exceptions or notifying residents of the upcoming April change from paper flyers to digital communications.
Presenting the 17 Indicators of the Common Good Balance Sheet - for companies living values and ecological & social Responsablity
http://economia-del-bien-comun.org/en/content/creating-common-good-balance-sheet
Grand Theft Auto 5 es un juego de acción y aventura en tercera persona ambientado en la ciudad ficticia de Los Santos. El juego presenta tres personajes jugables con diferentes historias de fondo, Franklin, Trevor y Michael, y ofrece un enorme mapa para explorar. El modo multijugador en línea permite a los jugadores crear sus propios personajes y jugar cooperativamente en una variedad de modos a través de la ciudad. GTA 5 fue uno de los juegos más esperados y vendidos de 2013.
This document provides an overview of various web development topics including: HTML vs CSS, DOM trees, JavaScript, PHP, frameworks, and templates. It discusses how HTML defines content while CSS handles presentation. JavaScript adds interactivity. PHP dynamically generates HTML on the server. Frameworks provide structure and utilities to speed development using patterns like MVC. Templates organize page layout. Frameworks offer benefits like file organization, security, and community support for teamwork. A variety of popular frameworks and template options are presented.
Komputer dapat didefinisikan sebagai peralatan elektronik yang terdiri dari beberapa komponen yang bekerja sama untuk menghasilkan informasi berdasarkan program dan data. ARPANET didirikan pada 1965 untuk menghubungkan empat komputer di universitas-universitas Amerika Serikat, menjadi cikal bakal internet. Topologi bus adalah topologi jaringan yang memanfaatkan kabel tunggal untuk menghubungkan semua komponen.
The document defines and provides examples of area and perimeter. It explains that area is measured in square units and represents the amount of surface space an object has. Perimeter is the distance around the outside edge of a flat object and is measured in linear units. Examples are given of calculating the area of shapes by counting squares and the perimeter by counting sides. The document concludes by comparing the area and perimeter of two sample swimming pools.
Panel discussion-what are indian family offices doing globally? Managing Indi...India inc
This Presentation is from Panel discussion on What are Indian family offices doing globally? Managing Indian Wealth - UK & India Perspectives session at the Global Wealth Management Conclave 2014 organised by India Inc - http://www.indiaincorporated.com- on April 7, 2014
What i have learnt during the progression from the preliminary task to my fin...hanaaluna
1) The student learned that it is important to have a clear layout plan when creating a magazine, as not having one for their final music magazine caused delays.
2) For their preliminary task, they created a layout template for each page, making the magazine easier and quicker to produce.
3) They found using Photoshop for the front cover allowed for better quality images compared to using images as backgrounds in other software.
Ingi Hassan Elazizi has over 15 years of experience in marketing, business analysis, and technical roles in the oil and gas industry in Egypt and the Middle East. He holds a B.Sc. in Chemical Engineering from Cairo University and an MBA from Maastricht School of Management. Currently he is the Marketing & Business Analysis Reporting Manager for GAZPROM NEFT in Egypt, where he manages marketing operations and provides technical support. Previously he held roles with BP, BG Egypt, and ExxonMobil in marketing, sales, business analysis, and technical customer support.
Results Rule: How to Sell Anything to Anyone in Oil & Gas - James Hahn [Energ...Energy Digital Summit
This presentation was written by James Hahn, CEO of Tribe Rocket. James was invited to present as a breakout speaker for the inaugural Energy Digital Summit in June 2014.
Improving notes addressing experience with recent contactsVinayak Tavargeri
Recent Contacts is a feature in IBM Notes that keeps track of users' most frequent contacts to improve email addressing. It analyzes communication patterns and prioritizes recent contacts at the top of typeahead lists. The document discusses improvements to Recent Contacts over releases, how it handles roaming users, and ways to manage unwanted contacts or invalid addresses, such as marking them as "Hide in Typeahead". It provides an overview of how Recent Contacts works and its benefits for addressing accuracy and performance.
Anil Kumar Mullapudi is seeking a challenging role in IT infrastructure management. He has over 3 years of experience as a technical consultant and NOC engineer. His skills include administering Linux, Windows, networks, AWS, monitoring tools like Nagios and Copper Egg. He is Red Hat and Windows Server certified. His experience includes projects with CipherCloud, GSS Infotech, and Euler Hermes involving tasks like installing servers, managing storage, security, monitoring, troubleshooting, documentation.
Thamimul Anssari has over 7 years of experience in IT support with skills in Cisco networking, Microsoft platforms, LAN/WAN implementation, and problem solving. He holds a Bachelor's degree in Computer Science and Cisco CCNA certification. His experience includes roles as a technical support engineer providing services like server administration, network implementation and maintenance, firewall configuration, and user support. He has experience working with technologies such as Windows, Linux, Cisco routers and switches, firewalls, and network monitoring tools.
The document provides details about Thootha Phani's work experience and qualifications. It summarizes his 10+ years of experience in software development and release management. It also lists his technical skills in areas like .NET, Python scripting, version control tools like Perforce, and databases like SQL Server. Several projects are described where he has played roles like Release Engineer, Build Engineer, Automation Engineer and more for companies like Qualcomm and Nvidia.
IANS information security forum 2019 summaryKarun Chennuri
This document summarizes key sessions from the IANS Information Security Forum 2019 in Seattle. Session topics included the cloud security maturity roadmap, hybrid web application penetration testing, container security, and security tools for multi-cloud environments. Vendors also presented on topics like risk-based vulnerability management, network visibility, bot threats, and cyber exposure platforms. The executive summary highlighted presentations from security leaders at The Pokemon Company and Tanium on building successful security programs and responding to ransomware incidents.
This document discusses a webinar about integrating infrastructure as code (IaC) security into the development lifecycle using Checkov. It notes that nearly half of open source Terraform and CloudFormation templates contain security issues. Checkov is introduced as an open source IaC scanning tool that supports multiple frameworks and cloud providers. The benefits of Checkov include lower remediation times, reduced security incidents, and simplifying compliance. Integrations with DevOps tools and the Cloud Native Application Platform Approach (CNAPP) are also discussed. A demo of Checkov is then shown including using it with VS Code and Azure DevOps.
Preethi Nagarajan is a Senior Software Engineer at Cisco Systems with over 5 years of experience in manual and automation testing in networking, video cloud technology, and automotive domains. She has extensive experience in functional, performance, sanity, security, UAT, and regression testing. Her skills include Unix, Linux, Openstack Cloud, Selenium, scripting, and working with teams in an Agile environment.
Sudha Madhuri has over 9 years of experience as a Software Professional and Scrum Master with expertise in C/C++, Java, and telecom domains including protocols, data handling, and billing. She has led projects for Tata Consultancy Services and Wipro Technologies as Project Leader, Scrum Master, Technical Coordinator, and Team Leader, delivering software for Ericsson in areas like switches, radio access networks, and VOIP gateways. Sudha holds a B.Tech in Electronics and Communications Engineering and is legally authorized to work in Canada.
This resume is for Piyush Agarwal, who has over 6 years of experience working as a Linux Engineer. He has several technical certifications including RHCE and CCNA. The resume lists his work history supporting Linux systems and applications for clients like Tech Mahindra, Vodafone, Airtel, and BSNL. It provides details of his responsibilities maintaining Linux servers and resolving issues to ensure high system availability.
This document is a curriculum vitae for Piyush Agarwal that includes his contact information, certifications, work experience, skills, education, and objectives. Some key details:
- Piyush has over 5 years of experience as a Linux Engineer and is certified in Red Hat and Cisco.
- His most recent roles include Senior Linux Engineer positions with Tech Mahindra supporting clients like Videocon d2h and Vodafone.
- Prior experience includes Linux System Engineer roles with ACL Mobile supporting BSNL and positions with Tech Mahindra supporting clients like Airtel and My Bell Mobile.
- Education includes a Bachelors degree in Computer Science and an MCA in Information Technology.
This document provides a summary of the author's areas of expertise, training, certifications, work history and major achievements in information technology. It lists over 15 IT certifications ranging from Cisco, VMware, Microsoft, along with a Master's degree in Computer Network Administration and Management. Work experience includes over 10 years in design, management and administration of IT infrastructure, including roles in network administration, system configuration, consulting and cloud training. Major achievements include projects implementing virtualization, storage, networking and security solutions for various organizations.
This document contains the resume of Mohammad Wakeel Ahmed from Saudi Arabia. He has over 5 years of experience in IT administration and networking. His technical skills include experience with Windows servers, Active Directory, Exchange Server, firewalls, antivirus software, and backup software. He is seeking a challenging position where he can utilize his technical skills and experience. His previous work includes roles as an IT Administrator and System Administrator where he managed networks, servers, user support, and security.
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)Codit
While working on several Internet of Things projects with different customers in Europe, it became clear that Integration matters more than ever. Building an overall IoT solution requires many different technologies and skills. The Architect role is crucial to combining different services into one solid solution. Integration skills are extremely important in building robust and scalable IoT solutions. Every phase of the IoT value chain requires integration, since IoT solutions are distributed and decoupled by nature. Retro-fitting existing devices? Routing of telemetry data? Or even exposing analytics results through secured APIs? All these challenges require integration skills. Skills that are very familiar to specialists in the Integration business. This presentation will explain why these are great times to be an Integration expert and how we can help tackling current challenges.
Yuval Schwabe has 19 years of experience in the IT industry leading large-scale IT delivery operations and managing vendors globally. He discusses 10 common IT challenges in global organizations, including communication, cultural diversity, improving service desk functions, and ensuring delivery agility and flexibility. Schwabe emphasizes the importance of continual service improvement, customer obsession, and creating value for customers through innovative cloud services and technologies.
- Rajendra Kumar Sahu is seeking a position that allows for continuous learning and professional development.
- He has over 4 years of experience implementing and developing Maximo 7, 7.5, and 7.6 using agile methodologies and DevOps processes.
- His skills include Maximo data migration, loading, integration, customization, automation scripting, and configuration. He is also experienced with databases like Oracle, DB2, and technologies like WebSphere.
Serverless security - how to protect what you don't see?Sqreen
Protecting serverless is a new topic. This presentation aims at showing what new security challenges it brings, and how CISO and security teams should approach it.
The serverless space evolves fast and there is no convergence on best practices yet. The switch to a serverless architecture involves several changes, for instance developers doing much more ops with serverless, deploying 20 times more services than previously...
Michael Dawson is a senior software developer and technical lead at IBM who is involved in many aspects of Node.js development including working groups, releases, build infrastructure, and platform support. IBM is a founding member and platinum sponsor of the Node.js Foundation and has many employees contributing to Node.js as core collaborators and through various working groups. IBM uses Node.js extensively for its own products, services, and platforms.
Implementing Fast IT Deploying Applications at the Pace of Innovation Cisco DevNet
Fast innovation requires Fast IT: the new model for IT that transforms the way we deliver new business application capabilities to our clients.
Cisco IT has created solutions that enable automated provisioning of environments and fast deployment of cloud applications through “Software Development-as-a-Service”.
In this session, we’ll provide a hands-on experience of how application teams use an automated toolset to combine quality and agility, while reducing operational expense. We’ll also provide a view of the key technologies that enable this solution.
Finally, there’s a quick glimpse into what’s next: containerization and IOE Application Enablement.
Ray Ransdell has over 20 years of experience in information technology with expertise in Mac OS, Windows, Linux, networking, security, and productivity software. He has held senior technical roles at Seagate Technology and Invisible IT providing desktop support, security solutions, imaging and deployment, and training. Ransdell has also owned his own IT consulting firm and has extensive experience in project management, system design/integration, and mass deployment of hardware and software.
This document summarizes ABN AMRO's DevSecOps journey and initiatives. It discusses their implementation of continuous integration and delivery pipelines to improve software quality, reduce lead times, and increase developer productivity. It also covers their work to incorporate security practices like open source software management, container security, and credentials management into the development lifecycle through techniques like dependency scanning, security profiling, and a centralized secrets store. The presentation provides status updates on these efforts and outlines next steps to further mature ABN AMRO's DevSecOps capabilities.
AWS Loft Talk: Behind the Scenes with SignalFxSignalFx
Slides from SignalFx CTO Phillip Liu's presentation at the AWS Loft in SF after DockerCon: Behind the Scenes with SignalFx.
Phil discussed how SignalFx deploys, runs, and operates a completely Dockerized microservices architecture for a production SaaS application dealing with large volumes of high resolution customer data.
Similar to Beyond Horizon: Open Source Management On the Go for OpenStack and the Rest of Your Computing Infrastructure (20)
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...APNIC
Adli Wahid, Senior Internet Security Specialist at APNIC, delivered a presentation titled 'Honeypots Unveiled: Proactive Defense Tactics for Cyber Security' at the Phoenix Summit held in Dhaka, Bangladesh from 23 to 24 May 2024.
HijackLoader Evolution: Interactive Process HollowingDonato Onofri
CrowdStrike researchers have identified a HijackLoader (aka IDAT Loader) sample that employs sophisticated evasion techniques to enhance the complexity of the threat. HijackLoader, an increasingly popular tool among adversaries for deploying additional payloads and tooling, continues to evolve as its developers experiment and enhance its capabilities.
In their analysis of a recent HijackLoader sample, CrowdStrike researchers discovered new techniques designed to increase the defense evasion capabilities of the loader. The malware developer used a standard process hollowing technique coupled with an additional trigger that was activated by the parent process writing to a pipe. This new approach, called "Interactive Process Hollowing", has the potential to make defense evasion stealthier.
Securing BGP: Operational Strategies and Best Practices for Network Defenders...APNIC
Md. Zobair Khan,
Network Analyst and Technical Trainer at APNIC, presented 'Securing BGP: Operational Strategies and Best Practices for Network Defenders' at the Phoenix Summit held in Dhaka, Bangladesh from 23 to 24 May 2024.
Discover the benefits of outsourcing SEO to Indiadavidjhones387
"Discover the benefits of outsourcing SEO to India! From cost-effective services and expert professionals to round-the-clock work advantages, learn how your business can achieve digital success with Indian SEO solutions.
Beyond Horizon: Open Source Management On the Go for OpenStack and the Rest of Your Computing Infrastructure
1. Beyond Horizon
open source management for OpenStack
& the rest of your computing infrastructure
2. About us
Dimitris Moraitis
CTO & co-founder
dimo@mist.io
Chris Loukas
SRE & QA
loukasc@mist.io
3. Agenda
1. Computing landscape today
2. Pain points & our story
3. Solution: Outline, architecture & demo
4. Advanced client use cases
a. Robopolling for the US congressional elections
b. Spirent Communications & OpenStack NFV testing for telcos
5. Next steps
6. Q & A
4. Computing landscape today
Public clouds Private clouds Containers Bare metal servers
Management
provisioning, orchestration,
monitoring, alerting, automation
7. Why u no settle with Horizon?
● No monitoring, alerting, automation
● No websockets, limited polling
● No command shell beyond clunky VNC
● One for each OpenStack install
● OpenStack only
● Desktop only
8. The founders
Working together
since 2009
Chris
Psaltis
CEO
Dimitris
Moraitis
CTO
Mike
Muzurakis
Community
manager
Tasos
Nanos
System
operations
Markos
Gogoulos
Backend
engineer
10. Advisors
Allen Wirfs-Brock
Research Fellow, Mozilla
Project editor @
ECMAScript Language
Standard
David Hecht
Entrepreneur,
Marketing & Sales
Founder @ CloudAmp
& GoGrid. Techstars
Cloud Mentor
Geva Perry
Strategy & Marketing
Advisor at Heroku,
Ravello, Totango etc.
Board member Sauce
Labs etc. Techstars
mentor
Andreas Kallis
Business development
& Strategy
Startup and VC
advisor, Former VP of
Biz dev & Strategy
EMEA @ Thomson
Reuters
11. The other team members
George Tsopanoglou
Frontend Engineer
Chris Loukas
QA & SRE
Dimitris Rozakis
Backend Engineer
Stephane
Konstantaropoulos
iOS & Android developer
16. Architecture
...
browser
server
Νative
APIs
EC2
SSH
VM
Ember.js
jQueryMobile
libcloud
RackSpace
VM
...
collectd
email, sms,
graphite-M1 collectd receiver
push notifications bucky
mist.monitor
Websocket
carbon-relay
graphite-M2
OpenStack
mist.android
mist.ansible
mist.client
3rd party tools
REST API
paramiko
mist.alert
Websocket
preprocessor
celery +
rabbitmq
pyramid +
uwsgi
17. Advanced use cases by our clients
● Progressive Change Campaign Committee
o Robopolling for the US congressional elections
● Spirent Communications
o NFV testing for telcos using OpenStack and Mist.io
18. Polling for the US mid-term elections
boldprogressives.org
NGO, co-founded by
Aaron Swartz,
campaigning for
progressive candidates.
> 1million members
● Candidates use pies.pccc.co to run campaigns
● PIES uses Mist.io to orchestrate the deployment of
VM’s on Linode or DigitalOcean
● PCCC monitors the systems while candidates
monitor the polling process with custom metrics
provided by Mist.io
● When poll is complete Mist.io automates the
cleanup process
19. SDN / NFV testing for telcos
Spirent wants
● on-demand, multi-node OpenStack test
environments on bare metal & cloud servers
● configure NFVs (e.g. vEPC) on multiple distros
● integration with in-house build process
20. SDN / NFV testing for telcos
Mist.io provides:
● automated deployment/tearing-down in minutes
● automated network configuration
● health & performance monitoring of host and guests
● live monitoring of test process metrics
● auto-scaling
o on the app level
o on the OpenStack level adding extra compute/network nodes
21. Mist.io sets you free!
● democratizes cloud management
● monitors VMs, containers and bare-metals
● sends actionable alerts
● provides simple automation
o execute commands
o reboot/destroy/launch
24. Thank you!
Let us know about your own
automation stories & desires
info@mist.io
Editor's Notes
Hey all,
it’s really great to be here. This talk is titled Beyond Horizon and we’re going to show you a cool way to manage your OpenStack installations along with the rest of your infrastructure.
A few words about us: I’m Dimitris and this is Chris. We work on mist.io which is SaaS and an open source project. We run an office in Athens, Greece, where we do most of the product development and another one in San Francisco.
So, without further delay, here’s the agenda!
We’ll take a brief look on the ways we do computing today, the pain points that this introduces and our story in coming up with Mist.io: We’ll do a quick overview of the main features, we’ll see what’s under the hood and then go for a bold live demo!
Then, we’ll dive into a couple of more advanced use cases by our clients. The first one is related to the US mid-term elections that took place yesterday and the other one is about SDN & NFV testing, the next big things in networking where OpenStack is destined to play a very important role.
Then we’re going to tell you about our future plans and we’ll make sure to save some time for Q&A!
Here’s how the computing landscape looks like today.
You have a rapidly growing bunch of public clouds with different advantages and pricing policies, a bunch of private cloud platforms, where OpenStack keeps expanding its mind-share.
Containers are becoming increasingly important since the arrival of Docker and other technologies like CoreOS are building on this trend.
Yet we still have these old school bare metal boxes, which make a lot of noise and consume power. Sometimes they’re part of some legacy app, or they may be nodes in our private OpenStack clouds.
The management needs for all these are common, but each platform comes with a different toolset.
All this power, comes with a price. We get to choose our own set of golden handcuffs. Are you going with a single vendor, using only those tools? If you do that you need to be sure that your vendor will always provide competitive features and pricing to justify living behind its walled garden.
But sometimes you don’t want that, it may not be an option. So you have to use a bunch of different tools that do similar things and this poses practical restrictions of its own.
In the OpenStack world we got Horizon, which provides an administrative dashboard, a way to launch instances, create networks, manage storage, security groups and more. So why would you need something else?
The problem is that you don’t get to monitor your servers, you can’t get alerts or configure automation. You can’t even be sure if your machines are still running if you don’t keep hitting on the refresh button since it doesn’t get live updates through websockets or polling.
Then, it’s limited to OpenStack and you need a different Horizon for each OpenStack deployment.
Last but not least, it’s close to unusable from touchscreens and especially smartphones, so if you’re trying to perform management operations while on the road, well… you’re out of luck.
All these were the problems we were facing along with my cofounders. We’ve been working together since 2009 initially on our own consulting agency.
The idea to build mist.io emerged out of our own needs on server management and monitoring. We’ve been developing and managing information systems from clients from all around the world. The systems were hosted in different clouds and datacenters and we had to make sure they were running and when something went off we had to fix it ASAP.
So, we started scratching our own itch by building a unified dashboard and we wanted to make sure it was accessible from any device in order to make it usable in cases of emergencies when there was noone in front of a laptop or desktop computer.
In late 2012 we had an initial open source product and in 2013 we applied with applied to Mozilla’s accelerator, WebFWD, and got accepted. At that point we decided to focus entirely on mist.io.
We traveled to the States, learned a lot and grew our network, we incorporated there and raised our first money.
We attracted world class advisors
And recruited a kickass team. With used all that help in order to build an awesome product. And that’s how mist.io was built.
But what does it actually do? Mist.io provides a unified interface to manage the most popular public and private clouds, as well as bare metal servers and docker containers
It will keep an eye on your machines at all times and you can easily configure events that trigger alerts, or automated actions. So for example, if Apache is leaking memory mist.io can automatically restart it.
If something goes wrong, you’ll get an alert, but more importantly you can act upon it from anywhere you are. To do that mist.io provides a command shell which is optimized for touchscreens. This way it’s very simple to send a few commands and fix the problem right away.
Lets say for instance I want to create a new machine, that will be on a public network and a new private one. To do that, I need to import the python binding, instanciate etc.
So, before we try out the demo, let’s have a look uder the hood.
On the server side Mist.io is a Python web app, build with Pyramid and served by uWSGI. It implements a RESTful API and a Websocket interface. The end user interacts with the server using either a browser and the HTML5 interface, our command line tools or the native android app which is coming soon. Both the html5 app and the native android app use websockets to stay up to date while the command line tools use the RESTful API.
The mist.io server queries your cloud backends through their native APIs with the help of libcloud, a Python library that provides an abstraction layer. It can also connect through SSH to your VM’s in order to provide the command shell and to install collectd, the monitoring agent. If you don’t want to give ssh access to mist.io you can still have monitoring by installing collectd manually.
Collectd adds very little overhead. It gets all the system metrics and any custom metric you have configured every 5 seconds and sends them to our monitor server. The datapoints are preprocessed there for consistency and are stored in a graphite cluster. We’ve build there some alerting logic and checks if the incoming data match the user’s rules and if they do it triggers the alerts or the automated actions.
This is all really cool and it’s exactly what we needed when we started building mist.io.
But what has really amazed us is the different and totally unexpected ways that our clients have used our set of tools
Yesterday it was election day in the US. And we’re really proud for the role that Mist.io has played. This may have been the first time that a cloud management tool helped promote Net Neutrality!
The progressive change campaign commitee, is a political organization with more than a million members. One of its cofounders was Aaron Swartz. They’re also one of our clients. They’ve built a tool called PIES which they use inhouse and just started providing to select progressive candidates. One of the thing that PIES does is to launch polling campaigns.
Each time a candidate requets a new poll, PIES uses mist.io to spin up a new machine either on Linode or on DigitalOcean. That machine runs the poll with the help of Twilio, providing questions and storing answers. While the poll is running, the candidates can monitor the polling process, while the PCCC technical staff can monitor the machines that run the polls. All the monitoring metrics are provided by Mist.io, for example the number of ongoing calls and the pending ones.
When the poll is complete, Mist.io automatically triggers the cleanup process, which stores the poll data to an S3 bucket and then destroys the VM.
This was build within a few weeks and they switched providers
Another client and also a technology partner of ours is Spirent communications. They’re a company founded in 1936 and their bussiness is telecommunications testing.
Their clients are telcos and the new product that Spirent is offering is automated SDN and NFV testing. SDN stands for Software Defined Networking and NFV for Network Functions Virtualization. As more telcos are looking into a future where their network functions are all virtualized, they need to make sure that they don’t sacrifize anything in terms of reliability, security and performance. So, the goal of the testing environment is to perform:
functional and performance tests
probing for security weaknesses and vulnerabilities.
Spirent performs the tests using OpenStack installations and they need to be able to easily spin up new deployments of multiple openstack distros. The main objectives for Spirent are:
ease and speed of test lab setup
repeatability
cost minimization using commodity hardware
We delivered all that by providing flexible, on-demand OpenStack environments, manageable via a single easy-to-use UI/CLI. These are deployed on top of either cloud or bare metal servers by Nephoscale, a cloud provider in California which is also a technology partner of ours. Nephoscale allows Spirent to provision bare metals through the API which is really handy in terms of automation and scalability.
Mist.io uses the Nephoscale and the Openstack API’s in order to automatically configure the networks for the test procedures, including sophisticated configurations like setting up L2 networks & VXLANs per tenant.
Once the machines are provisioned and OpenStack is deployed, Mist.io takes care of monitoring the host machines, the guest VMs and the test process itself using custom metrics. These are used to provide actionable alerts to Spirent and also to trigger auto-scaling
As we’ve seen, mist.io helps you get free of vendor and platform lock-in
You can monitor containers, bare metals and vms, both in terms of system and application metrics.
It can notify the administrators or the user’s of said systems with actionable alerts
And it makes it really simple to configure automations in terms of executing commands, rebooting, destroying or launching machines
You can use all that to automatically upscale or downscaling on the application level, by adding VM’s that joing your distributed app
And as we’ll see next you can even do autoscaling of your openstack installations by adding additional compute or network nodes where needed, as we’re going to see next
Look how easy it is to …..Can you do that in Horizon?