SUSE Linux Enterprise Server High Availability Extension provides a range of modules that can be assembled in multiple ways to build high availability clusters to host your critical business services. This session will examine some of the most common solutions and discuss best practices for setting up a new cluster.
More in detail, this session will discuss in a second step how to prepare a cluster with the SUSE Linux Enterprise High Availability Extension to make an SAP application highly available as certified by Novell and SAP. This scenario is not only from interest for companies looking into making their SAP environment highly available, but also for those that want to migrate from Unix to the SUSE Linux Enterprise platform.
Building a Two Node SLES 11 SP2 Linux Cluster with VMwaregeekswing
Linux clustering is one of the most cost-effective way to have redundant servers serving your applications. In this document we show you how to build a two node cluster using SUSE Linux Enterprise Server (SLES) utilizing a virtual environment (ESXi 4) as your testing ground. You can check for more info at our website:
http://geekswing.com/geek/building-a-two-node-sles11-sp2-linux-cluster-on-vmware/
A computer cluster consists of connected computers that work together as a single system. High availability (HA) systems are designed to avoid loss of service by managing failures and minimizing downtime. Key components of an HA cluster with openSUSE Leap include the Corosync messaging system, the Pacemaker resource manager, fencing devices to resolve split-brain situations, and shared storage solutions like DRBD. Setting up such a cluster involves installing openSUSE Leap on multiple VMs, configuring Corosync and Pacemaker for resource management and failover, implementing storage replication with DRBD, and testing the HA functionality of services like Nginx.
Corosync and Pacemaker
A computer cluster consists of a set of loosely connected or tightly connected computers that work together so that in many respects they can be viewed as a single system.
The components of a cluster are usually connected to each other through fast local area networks ("LAN"), with each node (computer used as a server) running its own instance of an operating system. Computer clusters emerged as a result of convergence of a number of computing trends including the availability of low cost microprocessors, high speed networks, and software for high performance distributed computing.
Clusters are usually deployed to improve performance and availability over that of a single computer, while typically being much more cost-effective than single computers of comparable speed or availability.
Computer clusters have a wide range of applicability and deployment, ranging from small business clusters with a handful of nodes to some of the fastest supercomputers in the world such as IBM's Sequoia
Red Hat GFS (Global File System) is a cluster file system that allows nodes in a cluster to simultaneously access a shared block storage device. It employs distributed metadata and multiple journals to operate optimally in a cluster. GFS uses a lock manager to coordinate I/O and maintain file system integrity. It provides benefits like simplified data infrastructure management, maximized storage resource use, seamless cluster scaling, and high performance access to data. GFS can be deployed with different configurations to suit various needs for performance, scalability, and cost. It provides data sharing, a consistent namespace, and features required for enterprise environments.
This document provides an overview of how XenServer manages storage supplied to virtual machines. It describes how Linux views physical disks and partitions, as well as logical volume management and network file systems. The key concepts covered include storage repositories, virtual disk images, storage attributes, and different storage types like local, NFS, Fibre Channel, and appliance-based storage. The target audience is IT specialists who need to understand XenServer's storage concepts and terminology for planning virtualized infrastructures.
Control groups (cgroups) allow administrators to allocate CPU, memory, storage, and other system resources to groups of processes running on the system. The document describes testing done using cgroups on a Red Hat Enterprise Linux 6 system with four Oracle database instances running an OLTP workload. It demonstrates how cgroups can be used for application consolidation, performance optimization, dynamic resource management, and application isolation.
Lightweight locks (LWLocks) in PostgreSQL provide mutually exclusive access to shared memory structures. They support both shared and exclusive locking modes. The LWLocks framework uses wait queues, semaphores, and spinlocks to efficiently manage acquiring and releasing locks. Dynamic monitoring of LWLock events is possible through special builds that incorporate statistics collection.
Building a Two Node SLES 11 SP2 Linux Cluster with VMwaregeekswing
Linux clustering is one of the most cost-effective way to have redundant servers serving your applications. In this document we show you how to build a two node cluster using SUSE Linux Enterprise Server (SLES) utilizing a virtual environment (ESXi 4) as your testing ground. You can check for more info at our website:
http://geekswing.com/geek/building-a-two-node-sles11-sp2-linux-cluster-on-vmware/
A computer cluster consists of connected computers that work together as a single system. High availability (HA) systems are designed to avoid loss of service by managing failures and minimizing downtime. Key components of an HA cluster with openSUSE Leap include the Corosync messaging system, the Pacemaker resource manager, fencing devices to resolve split-brain situations, and shared storage solutions like DRBD. Setting up such a cluster involves installing openSUSE Leap on multiple VMs, configuring Corosync and Pacemaker for resource management and failover, implementing storage replication with DRBD, and testing the HA functionality of services like Nginx.
Corosync and Pacemaker
A computer cluster consists of a set of loosely connected or tightly connected computers that work together so that in many respects they can be viewed as a single system.
The components of a cluster are usually connected to each other through fast local area networks ("LAN"), with each node (computer used as a server) running its own instance of an operating system. Computer clusters emerged as a result of convergence of a number of computing trends including the availability of low cost microprocessors, high speed networks, and software for high performance distributed computing.
Clusters are usually deployed to improve performance and availability over that of a single computer, while typically being much more cost-effective than single computers of comparable speed or availability.
Computer clusters have a wide range of applicability and deployment, ranging from small business clusters with a handful of nodes to some of the fastest supercomputers in the world such as IBM's Sequoia
Red Hat GFS (Global File System) is a cluster file system that allows nodes in a cluster to simultaneously access a shared block storage device. It employs distributed metadata and multiple journals to operate optimally in a cluster. GFS uses a lock manager to coordinate I/O and maintain file system integrity. It provides benefits like simplified data infrastructure management, maximized storage resource use, seamless cluster scaling, and high performance access to data. GFS can be deployed with different configurations to suit various needs for performance, scalability, and cost. It provides data sharing, a consistent namespace, and features required for enterprise environments.
This document provides an overview of how XenServer manages storage supplied to virtual machines. It describes how Linux views physical disks and partitions, as well as logical volume management and network file systems. The key concepts covered include storage repositories, virtual disk images, storage attributes, and different storage types like local, NFS, Fibre Channel, and appliance-based storage. The target audience is IT specialists who need to understand XenServer's storage concepts and terminology for planning virtualized infrastructures.
Control groups (cgroups) allow administrators to allocate CPU, memory, storage, and other system resources to groups of processes running on the system. The document describes testing done using cgroups on a Red Hat Enterprise Linux 6 system with four Oracle database instances running an OLTP workload. It demonstrates how cgroups can be used for application consolidation, performance optimization, dynamic resource management, and application isolation.
Lightweight locks (LWLocks) in PostgreSQL provide mutually exclusive access to shared memory structures. They support both shared and exclusive locking modes. The LWLocks framework uses wait queues, semaphores, and spinlocks to efficiently manage acquiring and releasing locks. Dynamic monitoring of LWLock events is possible through special builds that incorporate statistics collection.
As time goes on more OSes are getting Dom0 support, so there's a growing need to provide a platform independent set of tools from which to operate Xen. This talk will expose the different mechanisms used on NetBSD that diverge from the Linux approach, and how Xen is improving its userspace tools to provide a more platform independent support.
The talk also touches upon various features that BSD provides or plans to provide with Xen, thus presenting a coherent roadmap view of where we've come from, and what lies ahead.
What's in this talk:
Xen and BSD
Status updates from the world of BSD
Ecosystem/userbase
This is to introduce the related components in SUSE Linux Enterprise High Availability Extension product to build High Available Storage (ha-lvm/drbd/iscsi/nfs, clvm, ocfs2, cluster-raid1).
Simplifying Ceph Management with Virtual Storage Manager (VSM)Ceph Community
VSM (Virtual Storage Manager) is an open source tool developed by Intel to simplify Ceph storage cluster management. It includes a controller that runs on a dedicated server and manages Ceph through agents on each Ceph node. The VSM makes it easier to deploy, maintain, and monitor Ceph clusters, and also integrates with OpenStack for storage orchestration.
The document describes setting up a clustered ONTAP environment. It includes creating a cluster called "netappu" with nodes at locations "NetAppU" and adding various licenses. It also outlines configuring cluster network and management interfaces, setting up a Vserver for administration, enabling storage failover, and completing cluster node setup.
Introduction to failover clustering with sql serverEduardo Castro
In this presentation we review the basic requirements to install a SQL Server Failover Cluster.
Regards,
Eduardo Castro Martinez
http://ecastrom.blogspot.com
http://comunidadwindows.org
Manage Virtual Machines with WebVirtMgr on openSUSEDendy P. Delly
The document discusses WebVirtMgr, an open-source web interface for managing virtual machines. It introduces WebVirtMgr and its features for hosting and managing virtual machines through a web browser. The document also provides instructions for installing WebVirtMgr on openSUSE and covers troubleshooting tips.
This document provides an overview of kernel tuning and customizing for performance on Enterprise Linux. It discusses monitoring tools, basic tuning steps like disabling unused services, memory tuning including hugepages and transparent huge pages, swap/cache tuning. It also covers I/O and filesystem tuning and networking tuning. The goal is to provide concepts and approaches for tuning the major components to optimize performance.
Introduction to PostgreSQL for System AdministratorsJignesh Shah
This document provides an introduction and overview of PostgreSQL for system administrators. It covers why to use open source databases like PostgreSQL, a quick start guide to installing and configuring PostgreSQL, PostgreSQL internals like file system layout and processes, and monitoring PostgreSQL performance using tools like iostat and top. The presentation is aimed at helping system administrators get started with managing PostgreSQL databases.
XenServer uses a control domain/Dom0 to manage virtual machines running on DomUs. It utilizes a Linux kernel with Intel-VT or AMD-V virtualization extensions. The hypervisor allows virtual machines to access physical resources like CPU, memory, network and storage. Networking and storage are virtualized using technologies like bonding, LVM, NFS and iSCSI. Performance analysis tools like iperf and hdparm can help optimize network and storage I/O.
Integrating Novell Teaming within Your Existing InfrastructureNovell
So you've decided to implement Novell Teaming, but how do you use it to leverage your existing environment to the fullest extent? Using product demonstrations, this session will how you how to configure authentication against existing LDAP directories; how to integrate with Novell GroupWise, Exchange or other e-mail systems; and how to expose existing document stores so they can be searched and accessed through the Novell Teaming interface.
The document discusses OnApp's distributed block storage platform built on Xen. It aims to provide affordable enterprise-level storage for cloud providers using commodity hardware. The platform utilizes integrated storage drives within hypervisors managed by storage VMs. Content is replicated across drives and servers for high performance and resilience without a single point of failure. The distributed design allows for scaling of IOPS and capacity without the high costs of traditional SANs.
This document discusses tuning DB2 in a Solaris environment. It provides background on the presenters, Tom Bauch from IBM and Jignesh Shah from Sun Microsystems. The agenda covers general considerations, memory usage and bottlenecks, disk I/O considerations and bottlenecks, and tuning DB2 V8.1 specifically in Solaris 9. It discusses supported Solaris versions, kernel settings, required patches, installation methods, and the configuration wizard. Specific topics covered in more depth include the Data Partitioning Feature, DB2 Enterprise Server Edition, and analyzing and addressing potential memory bottlenecks.
Linus Torvalds created Linux in 1991 as a hobby. It was inspired by MINIX and initially resembled it, using the same file system layout. Torvalds ported tools like Bash and GCC to Linux. In 1992, he posted to a newsgroup asking for feedback to improve his new operating system. This helped launch Linux development. Linux later combined with the GNU operating system and tools to become a full fledged open source alternative to proprietary operating systems.
The document is a slide presentation about running Linux on IBM Power systems. It discusses why Linux is widely used, best practices for installing and configuring Linux on Power systems, and options for deploying Linux workloads including the Integrated Facility for Linux (IFL). The IFL allows customers to activate unused cores and memory on Power 770, 780, and 795 systems running only Linux at a lower cost than other hardware platforms.
This document provides an overview of NetApp's general product direction and upcoming features for clustered Data ONTAP. However, it does not constitute a commitment by NetApp and the details may change without notice. NetApp makes no guarantees about future functionality, timelines or products. The development and release of any mentioned features is at NetApp's sole discretion.
The document summarizes recent developments in the Linux 2.6 kernel series, including changes to the development model, source code management, new features like kobject events and inotify, and new system calls. It also discusses changes and improvements to filesystems, allocators, clustering, timers, namespaces, paravirtualization, and the introduction of ext4.
This document provides an overview of a distributed systems course taught in French. It includes the following key points:
- The course objectives are to understand challenges in distributed systems, implement distributed systems, discover distributed algorithms, study examples of distributed systems, and explore distributed systems research.
- The course consists of 8 sessions over 4 hours each that include lectures, tutorials, labs, presentations, and an exam.
- Distributed systems are defined as independent computers that appear as a single coherent system to users. Key characteristics include concurrency, lack of global state, potential node and message failures, unsynchronized clocks, and heterogeneity.
The document discusses high availability and fault tolerance using Novell Cluster Services. It defines key concepts like availability, mean time between failures, and mean time to repair. It then covers best practices for deploying Novell Cluster Services, including hardware and software setup, connectivity rules, naming and addressing, and testing the cluster. It also discusses which types of resources can be clustered, like file sharing, iPrint, iFolder, and DHCP.
An introduction to Linux Container, Namespace & Cgroup.
Virtual Machine, Linux operating principles. Application constraint execution environment. Isolate application working environment.
IBM is investing $1B in Linux on Power. How can your organization save money, increase utilization of available resources and gain benefits from SUSE Linux Enterprise Server on IBM Power
As time goes on more OSes are getting Dom0 support, so there's a growing need to provide a platform independent set of tools from which to operate Xen. This talk will expose the different mechanisms used on NetBSD that diverge from the Linux approach, and how Xen is improving its userspace tools to provide a more platform independent support.
The talk also touches upon various features that BSD provides or plans to provide with Xen, thus presenting a coherent roadmap view of where we've come from, and what lies ahead.
What's in this talk:
Xen and BSD
Status updates from the world of BSD
Ecosystem/userbase
This is to introduce the related components in SUSE Linux Enterprise High Availability Extension product to build High Available Storage (ha-lvm/drbd/iscsi/nfs, clvm, ocfs2, cluster-raid1).
Simplifying Ceph Management with Virtual Storage Manager (VSM)Ceph Community
VSM (Virtual Storage Manager) is an open source tool developed by Intel to simplify Ceph storage cluster management. It includes a controller that runs on a dedicated server and manages Ceph through agents on each Ceph node. The VSM makes it easier to deploy, maintain, and monitor Ceph clusters, and also integrates with OpenStack for storage orchestration.
The document describes setting up a clustered ONTAP environment. It includes creating a cluster called "netappu" with nodes at locations "NetAppU" and adding various licenses. It also outlines configuring cluster network and management interfaces, setting up a Vserver for administration, enabling storage failover, and completing cluster node setup.
Introduction to failover clustering with sql serverEduardo Castro
In this presentation we review the basic requirements to install a SQL Server Failover Cluster.
Regards,
Eduardo Castro Martinez
http://ecastrom.blogspot.com
http://comunidadwindows.org
Manage Virtual Machines with WebVirtMgr on openSUSEDendy P. Delly
The document discusses WebVirtMgr, an open-source web interface for managing virtual machines. It introduces WebVirtMgr and its features for hosting and managing virtual machines through a web browser. The document also provides instructions for installing WebVirtMgr on openSUSE and covers troubleshooting tips.
This document provides an overview of kernel tuning and customizing for performance on Enterprise Linux. It discusses monitoring tools, basic tuning steps like disabling unused services, memory tuning including hugepages and transparent huge pages, swap/cache tuning. It also covers I/O and filesystem tuning and networking tuning. The goal is to provide concepts and approaches for tuning the major components to optimize performance.
Introduction to PostgreSQL for System AdministratorsJignesh Shah
This document provides an introduction and overview of PostgreSQL for system administrators. It covers why to use open source databases like PostgreSQL, a quick start guide to installing and configuring PostgreSQL, PostgreSQL internals like file system layout and processes, and monitoring PostgreSQL performance using tools like iostat and top. The presentation is aimed at helping system administrators get started with managing PostgreSQL databases.
XenServer uses a control domain/Dom0 to manage virtual machines running on DomUs. It utilizes a Linux kernel with Intel-VT or AMD-V virtualization extensions. The hypervisor allows virtual machines to access physical resources like CPU, memory, network and storage. Networking and storage are virtualized using technologies like bonding, LVM, NFS and iSCSI. Performance analysis tools like iperf and hdparm can help optimize network and storage I/O.
Integrating Novell Teaming within Your Existing InfrastructureNovell
So you've decided to implement Novell Teaming, but how do you use it to leverage your existing environment to the fullest extent? Using product demonstrations, this session will how you how to configure authentication against existing LDAP directories; how to integrate with Novell GroupWise, Exchange or other e-mail systems; and how to expose existing document stores so they can be searched and accessed through the Novell Teaming interface.
The document discusses OnApp's distributed block storage platform built on Xen. It aims to provide affordable enterprise-level storage for cloud providers using commodity hardware. The platform utilizes integrated storage drives within hypervisors managed by storage VMs. Content is replicated across drives and servers for high performance and resilience without a single point of failure. The distributed design allows for scaling of IOPS and capacity without the high costs of traditional SANs.
This document discusses tuning DB2 in a Solaris environment. It provides background on the presenters, Tom Bauch from IBM and Jignesh Shah from Sun Microsystems. The agenda covers general considerations, memory usage and bottlenecks, disk I/O considerations and bottlenecks, and tuning DB2 V8.1 specifically in Solaris 9. It discusses supported Solaris versions, kernel settings, required patches, installation methods, and the configuration wizard. Specific topics covered in more depth include the Data Partitioning Feature, DB2 Enterprise Server Edition, and analyzing and addressing potential memory bottlenecks.
Linus Torvalds created Linux in 1991 as a hobby. It was inspired by MINIX and initially resembled it, using the same file system layout. Torvalds ported tools like Bash and GCC to Linux. In 1992, he posted to a newsgroup asking for feedback to improve his new operating system. This helped launch Linux development. Linux later combined with the GNU operating system and tools to become a full fledged open source alternative to proprietary operating systems.
The document is a slide presentation about running Linux on IBM Power systems. It discusses why Linux is widely used, best practices for installing and configuring Linux on Power systems, and options for deploying Linux workloads including the Integrated Facility for Linux (IFL). The IFL allows customers to activate unused cores and memory on Power 770, 780, and 795 systems running only Linux at a lower cost than other hardware platforms.
This document provides an overview of NetApp's general product direction and upcoming features for clustered Data ONTAP. However, it does not constitute a commitment by NetApp and the details may change without notice. NetApp makes no guarantees about future functionality, timelines or products. The development and release of any mentioned features is at NetApp's sole discretion.
The document summarizes recent developments in the Linux 2.6 kernel series, including changes to the development model, source code management, new features like kobject events and inotify, and new system calls. It also discusses changes and improvements to filesystems, allocators, clustering, timers, namespaces, paravirtualization, and the introduction of ext4.
This document provides an overview of a distributed systems course taught in French. It includes the following key points:
- The course objectives are to understand challenges in distributed systems, implement distributed systems, discover distributed algorithms, study examples of distributed systems, and explore distributed systems research.
- The course consists of 8 sessions over 4 hours each that include lectures, tutorials, labs, presentations, and an exam.
- Distributed systems are defined as independent computers that appear as a single coherent system to users. Key characteristics include concurrency, lack of global state, potential node and message failures, unsynchronized clocks, and heterogeneity.
The document discusses high availability and fault tolerance using Novell Cluster Services. It defines key concepts like availability, mean time between failures, and mean time to repair. It then covers best practices for deploying Novell Cluster Services, including hardware and software setup, connectivity rules, naming and addressing, and testing the cluster. It also discusses which types of resources can be clustered, like file sharing, iPrint, iFolder, and DHCP.
An introduction to Linux Container, Namespace & Cgroup.
Virtual Machine, Linux operating principles. Application constraint execution environment. Isolate application working environment.
IBM is investing $1B in Linux on Power. How can your organization save money, increase utilization of available resources and gain benefits from SUSE Linux Enterprise Server on IBM Power
SUSE Linux Enterprise High Availability Extension 11: Support and Troubleshoo...Novell
The SUSE Linux Enterprise High Availability Extension provides a solid and well-integrated foundation for deploying highly available services, including Web farms, databases, application servers or virtualization environments.
Such distributed setups present unique challenges not encountered on a single node. This tutorial will provide a guide to the most common issues encountered during configuration and design, such as fencing, networking, dependencies and many others.
Such distributed setups present unique challenges not encountered on a single node. This tutorial aims to provide a guide to the most common issues during configuration and design: fencing, networking, dependencies, and other aspects.
This document provides an overview of HA clustering on OpenSUSE. It discusses key aspects of HA clusters including eliminating single points of failure, reliable crossovers, failure detection, increased availability, improved performance, and scalability. It also describes the typical architecture of an HA cluster including messaging/infrastructure layers, resource allocation layers, resource agents, and more. Tips are provided around configuration, troubleshooting, and references for further information.
high availability case study fusion middleware cluster1Soroush Ghorbani
This document describes the steps to configure a high availability Oracle Internet Directory (OID) database and Oracle Application Server (OAS) 10g R2 cluster for Oracle Retail. Key steps include:
1. Creating a single-instance 10g R2 OID database.
2. Converting the OID database to a RAC configuration with two instances and configuring shared files, instances, and listeners.
3. Populating the OID metadata schemas using the Repository Creation Assistant (REPCA).
4. Installing and configuring OAS 10g R2 Identity Management in an active-active cluster across two nodes.
5. Upgrading the OAS cluster and OID database
High Availability with Novell Cluster Services for Novell Open Enterprise Ser...Novell
High availability provides a safety net for single points of hardware failure. This session will identify the software and hardware requirements for implementing Novell Cluster Services with Novell Open Enterprise Server. We'll cover concepts related to design, installation and monitoring. We'll also show you real-world clustering examples for Novell GroupWise, Novell Teaming and Novell iFolder.
This document provides an overview of configuring and managing Red Hat Cluster, including installing the software, setting up hardware, and using tools like Conga and system-config-cluster to configure the relationship between cluster nodes, fencing devices, failover domains, and high availability services and resources. It describes the basic steps and components involved in setting up a Red Hat Cluster, as well as an overview of configuration tools available for installing, configuring, and managing Red Hat clusters.
This document provides an in-depth overview of VMware High Availability (HA). It discusses admission control policies, how HA calculates slot sizes based on CPU and memory reservations, and how it determines failover capacity. It also covers datastore heartbeats that HA uses to check host liveness and communicate during network outages, allowing it to determine if a host is failed, isolated, or partitioned. The document emphasizes properly configuring HA and understanding how reservations and runtime information impact its operation.
The document provides a history of high availability clustering technologies, including Heartbeat, OpenAIS/Corosync, Pacemaker, and DRBD. It discusses how these projects have evolved over time, with Heartbeat focusing only on messaging, OpenAIS/Corosync providing improved scalability, Pacemaker controlling resources and supporting multiple stacks, and DRBD enabling shared storage across nodes. It also outlines future directions like Pacemaker Cloud for cloud deployments and stretch clusters for multi-site scalability.
This document discusses high availability (HA) features in SUSE Linux Enterprise Server 12 SP2, including:
- A policy-driven HA cluster with continuous data replication across nodes and simple setup/installation.
- Key HA concepts like resources, constraints, and STONITH (shoot the other node in the head) fencing mechanisms.
- The new Hawk2 web console for managing HA clusters.
- Support for geo-clustering across data centers with concepts like tickets, boothd, and arbitrators.
- Options for maintenance and standby modes, new Cluster-MD software RAID, DRBD replication, OCFS2 and GFS2 cluster filesystems, and easy HA
Maria DB Galera Cluster for High AvailabilityOSSCube
Want to understand how to set high availability solutions for MySQL using MariaDB Galera Cluster? Join this webinar, and learn from experts. During this webinar, you will also get guidance on how to implement MariaDB Galera Cluster.
Metro Cluster High Availability or SRM Disaster Recovery?David Pasek
Presentation explains the difference between multi site high availability (aka metro cluster) and disaster recovery. General concepts are similar for any products but presentation is more tailored for VMware technologies.
KubeCon EU 2016: Secure, Cloud-Native Networking with Project CalicoKubeAcademy
Why does the network matter and why does it need to be simple (the 3am test)? Why should we build networks that scale to the extremes and how can we do that with proven technologies? Finally, how can we secure microservices, why should we bother, and what does this mean for developers and operators?
Sched Link: http://sched.co/6BUR
SaltStack is an open source configuration management and orchestration tool that provides scalability, extensibility, predictability, adaptability, and support for heterogeneity. It has a large community of over 2100 contributors and is widely adopted by companies like Juniper, Nutanix, IBM, and Cisco. SaltStack's key strengths are its ability to easily scale from small to very large infrastructures, extend functionality through modules and plugins, provide predictive orchestration through event-driven automation, and support diverse platforms including Linux, Windows, networking devices, and IoT.
SUSE Linux Enterprise Server for System z SP1 Novell
SUSE Linux Enterprise Server 11 SP 1 provides enhancements to scalability, reliability, systems management, interoperability, security, and support for IBM System z mainframes. New features in SP 1 include support for suspend/resume of instances, automatic IPL after system dumps, improved DS8000 storage support, and exploitation of new System z cryptographic hardware. SUSE remains the leading Linux distribution for IBM mainframes with an estimated 81.9% market share.
With proven services trusted by organizations all over the world, Novell Open Enterprise Server continues to bring you the innovative capabilities your environment demands. Attend this session to learn more about the architecture that underpins this product and its enterprise-class services. You'll walk away having a greater understanding of Novell Open Enterprise Server on Linux—and how you can leverage it for maximum efficiency and cost savings.
Integrating Apple Macs Using Novell TechnologiesNovell
Apple Macs continue to increase in popularity and make up an increasingly large percentage of enterprise desktops. In this session, we'll explore the various Novell products and technologies that can be used to integrate Macs into your environment. You'll leave with a clear understanding of the issues involved and the options available to support the Mac user community in a Novell environment. You'll also have a chance to discuss suggestions for improving on this support.
Integrating Novell Teaming within Your Existing InfrastructureNovell
So you've decided to implement Novell Teaming, but how do you use it to leverage your existing environment to the fullest extent? Using product demonstrations, this session will how you how to configure authentication against existing LDAP directories; how to integrate with Novell GroupWise, Exchange or other e-mail systems; and how to expose existing document stores so they can be searched and accessed through the Novell Teaming interface.
Relax and Recover (ReaR) is an open source bare metal disaster recovery solution for Linux (http://rear.sf.net). This session will introduce you to advanced Linux disaster recovery concepts and will feature a live demonstration on how to automatically recover a failed system with ReaR. Finally, this session will cover common best practice usage scenarios of ReaR and introduce you to basic setup and configuration for ReaR.
The document provides an agenda and details for the Linux Days 2013 conference in Tampa, FL on May 16, 2013. The agenda includes sessions on SUSE Linux Enterprise updates, SUSE Cloud 101, and SUSE Cloud 202. Additional details are provided on SUSE's product portfolio, ecosystem, and leadership in open source communities. Technical highlights of SUSE Linux Enterprise 11 SP3 include updates to hardware enablement, systems management, virtualization, security, and high availability. Emerging technologies are also presented as technology previews.
The document discusses Linux User Management (LUM) and various file access protocols and proxy user configurations available in Novell Open Enterprise Server 2, including NCP, CIFS, AFP, FTP, and HTTP. It provides an overview of features in OES2 SP2 and SP3, recommendations for deployment and troubleshooting, and how multiple protocols can be deployed for data integrity and performance.
LCNA14: Why Use Xen for Large Scale Enterprise Deployments? - Konrad Rzeszute...The Linux Foundation
For many years, the Xen community has been delivering a solid virtualization platform for the enterprise. In support of the Xen community innovation effort, Oracle has been translating our enterprise experience with mission-critical workloads and large-scale infrastructure deployments into upstream contributions for the Linux and Xen efforts. In this session, you'll hear from a key Oracle expert, and community member, about Oracle contributions that focus on large-scale Xen deployments, networking, PV drivers, new PVH architecture, performance enhancements, dynamic memory usage with ‘tmem', and much more. This is your chance to get an under the hood view and see why the Xen architecture is the ideal choice for the enterprise.
This session provides a schematic overview of the security properties, architecture, tweaks and settings of a SUSE Linux Enterprise 11 installation. It will also deliver a systematic, hands-on experience for analyzing and adjusting these security properties. This session will cover both networked and non-networked security properties, and may be applied to both the desktop and the server use of the system.
GWAVACon 2013: Novell Open Enterprise Server Best PracticesGWAVA
The document provides best practices for configuring Novell Open Enterprise Server. It discusses topics like naming standards, network connectivity, storage configuration, file system design, time synchronization, name resolution, installation, Linux user management, OES services configuration including NCS, iPrint, and more. The goal is to ensure a robust, secure and high performing OES environment.
With compelling new features in SUSE Linux Enterprise Server—and the stellar workgroup services found in Novell Open Enterprise Server 2—the benefits of moving your Novell GroupWise environment to Linux are more readily apparent than ever. This session will cover how you can use available Novell tools to move a GroupWise system to the Linux platform. In addition to tools and utilities, we'll share practical tips, tricks and demonstrations.
BrainShare 2010 SLC - ELS306 Linux Disaster Recovery Made EasySchlomo Schapiro
The document discusses Linux disaster recovery solutions. It begins by describing different disaster recovery strategies for Linux systems, then discusses advantages of Linux for disaster recovery. It introduces the ReaR (Relax and Recover) open source disaster recovery tool, which uses disk imaging and file backups to easily restore a Linux system after a disaster. ReaR works with various backup software and supports creating bootable rescue media to restore a system. A demo of how ReaR performs disaster recovery is also provided.
XPDS16: libvirt and Tools: What's New and What's Next - James Fehlig, SUSEThe Linux Foundation
A year has passed since the last Xen Developer Summit and it is time to announce the quiet progress made on the libvirt libxl driver and related tooling. New features include memory, cpu, block device, and network interface statistics reporting, support for pvUSB, support for migration stream V2, peer-to-peer migration, UEFI for HVM guests via OVMF, and domain capabilities reporting to name a few. There are also many noteworthy improvements such as better conversion of xl.cfg to/from libvirt domXML, allowing users to easily switch between the xl+libxl and libvirt+libxl toolstacks.
The summit also provides an opportunity to discuss new proposals such as better control of domain placement on NUMA systems, exposing Xen's cpu pool feature in libvirt, supporting non-volatile memory for UEFI variables, and improved capabilities reporting.
Much of libvirt's value for Xen is in the tools built upon it: virt-manager, virt-viewer, virt-install, virt-builder, kimchi, OpenStack nova, etc. These tools also deserve a quick status update as they relate to Xen.
The audience is encouraged to participate, e.g. by requesting a sorely missing feature, warning of an upcoming Xen change that may affect libvirt, or simply suggesting a change that makes virtualization management life a bit easier.
Virtualization with KVM (Kernel-based Virtual Machine)Novell
As a technical preview, SUSE Linux Enterprise Server 11 contains KVM, which is the next-generation virtualization software delivered with the Linux kernel. In this technical session we will demonstrate how to set up SUSE Linux Enterprise Server 11 for KVM, install some virtual machines and deal with different storage and networking setups.
To demonstrate live migration we will also show a distributed replicated block device (DRBD) setup and a setup based on iSCSI and OCFS2, which are included in SUSE Linux Enterprise Server 11 and SUSE Linux Enterprise 11 High Availability Extension.
File Access in Novell Open Enterprise Server 2 SP2Novell
This session offers a consolidated view of the various file access protocols (NCP, Novell CIFS, AFP, FTP and Samba) supported in Novell Open Enterprise Server 2 Service Pack 2. We'll also cover the ways in which they can be combined and deployed in order to meet different file access needs. You'll learn about the features and capabilities of each protocol, as well as deployment aspects—such as clustering, auditing and performance—common to them all.
This document provides an overview of a seminar presented on Red Hat Linux and NIS servers. It discusses key topics like the history and features of Linux, an overview of the Linux kernel and file system, Linux shells, users and permissions, RAID and LVM concepts, and configurations for common Linux server types including NIS, NFS, DNS, DHCP, FTP, SSH, Telnet, SMTP, Samba, and Apache web servers. Screenshots are also included to demonstrate aspects of the configurations.
Linux Container Brief for IEEE WG P2302Boden Russell
A brief into to Linux Containers presented to IEEE working group P2302 (InterCloud standards and portability). This deck covers:
- Definitions and motivations for containers
- Container technology stack
- Containers vs Hypervisor VMs
- Cgroups
- Namespaces
- Pivot root vs chroot
- Linux Container image basics
- Linux Container security topics
- Overview of Linux Container tooling functionality
- Thoughts on container portability and runtime configuration
- Container tooling in the industry
- Container gaps
- Sample use cases for traditional VMs
Overall, a bulk of this deck is covered in other material I have posted here. However there are a few new slides in this deck, most notability some thoughts on container portability and runtime config.
Similar to Building High Availability Clusters with SUSE Linux Enterprise High Availability Extension (20)
The document discusses different options for providing mobile file access and sharing for employees. Consumer-grade cloud services are easy for users but lack security controls. Enterprise cloud services provide more security but require duplicating management efforts and often have empty data repositories. Hybrid cloud/on-premise solutions have similar issues and still require separate storage and management. The best option is an on-premise, file system integrated solution that leverages existing files, systems, processes and controls rather than requiring new infrastructure and management.
This document summarizes a class on social media tips, tricks, and planning. The class agenda covers tips and tricks, exercises, engagement, and planning. It then discusses social media goals for Novell, including engaging customers, becoming thought leaders, supporting marketing goals, and providing customer support on social media. Finally, it outlines steps for creating a social media plan, including setting goals, identifying channels, assessing content needs, making connections, creating campaigns, and building a timeline.
The document summarizes various social media tools and platforms discussed in a class about social media marketing beyond the major platforms. It covers Novell communities, blogs, technical communities, social bookmarking, and multimedia platforms. For each topic, it provides examples like LinkedIn, Facebook, Twitter, Novell forums, WordPress, Slashdot, Toolbox, Digg, Delicious, Reddit, StumbleUpon, Slideshare, and Flickr.
This document summarizes Class 2 of a social media marketing course. It discusses the "big three" social networks - Facebook, LinkedIn, and Twitter. For each network, it provides background information, member demographics, traffic trends, etiquette guidelines, and strategies for using the networks. It also lists 9 actions companies can take on each network, such as updating statuses, following competitors, sharing content, and connecting with customers. The class ends with assigning homework to engage with one of the social networks.
The document summarizes an introductory class on social media and inbound marketing. It discusses key topics like the principles of Web 2.0, what social media and inbound marketing are, content strategies for social media, and how to engage and connect with audiences on social platforms. The class covered frameworks for social media programs and channels like blogs, videos and social networks that can be used.
This document summarizes Class 2 of a social media marketing course. It discusses the "big three" social networks - Facebook, LinkedIn, and Twitter. For each network, it provides background information, member demographics, traffic trends, etiquette guidelines, and strategies for using the networks. It also lists 9 actions companies can take on each network, such as updating statuses, following competitors, sharing content, and connecting with customers. The class ends with assigning homework to engage with one of the social networks.
The document discusses LinkedIn and provides 15 tips for using the professional social media platform. It begins with an overview of LinkedIn, including its founding, user base, and purpose for professional networking. It then gives demographics of typical LinkedIn users and etiquette guidelines. The bulk of the document lists 15 specific actions users can take on LinkedIn to build their profile, engage with connections, participate in groups, and get involved in answering questions. It concludes with recommendations for tools and resources to help automate and learn more about using LinkedIn.
The document outlines 15 things users can do on Twitter, from beginning to advanced uses. It recommends that beginning users follow Novell, coworkers, and someone fun. Intermediate users are advised to use a Twitter client, set up searches, and retweet others. Advanced uses include creating lists, attending tweetups, and checking influence metrics. The document provides guidance on effective use of Twitter for sharing information.
The document discusses social media and provides guidance for Novell's use of social media. It outlines the explosive growth of social media and defines key concepts like Web 2.0, inbound marketing, and online communities. It then gives Novell's social media mission, guidelines, and 7 things employees can do to get started with social media, such as following Novell accounts, reading blogs, checking competitors, and spreading word about Novell.
Strategies for sharing and commenting in social mediaNovell
The document discusses strategies for participating in social media conversations. It outlines the benefits of social media participation such as meeting people, building personal brands, and learning. It then describes types of social media participants and provides a model for building communities by listening, talking, energizing, supporting and embracing. The document concludes by providing seven ways to join conversations in social media and seven things to consider before posting, with advice about representing your company appropriately and adding value to discussions.
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHNovell
The document discusses challenges around information security, privacy and compliance in the healthcare industry. It notes that traditional approaches are not adequate due to the complexity of healthcare systems and data. It advocates for a new integrated approach that can correlate log and event data across operations, security, compliance and privacy domains. This will help address issues around user identity management and privacy regulations like HIPAA, HITECH and meaningful use requirements.
Intelligent workload management enables organizations to manage computing resources across physical, virtual and cloud environments in a policy-driven, secure and compliant manner to deliver business services to end customers. Intelligent workloads are policy-driven, secure, and compliant and can move across environments while maintaining security controls and understanding compliance requirements. WorkloadIQ provides products and solutions to build, secure, manage and measure workloads across different environments.
The document discusses the importance of identity management in modern computing environments. It argues that identity should serve as the foundation for securing access across devices, applications, and cloud-based services. With identity as the core, enterprises can better balance flexibility, compliance, and security when resources are distributed across different systems. The identity-infused enterprise model allows organizations to leverage existing identity investments to enhance control, visibility, and compliance across hybrid computing environments.
Shining the Enterprise Light on Shades of SocialNovell
2010 has brought an explosion of new social tools to the market, creating a drone of news and conversation that artificially singles out “social” as a stand-alone solution—and for enterprises, a solution to what? When you peel back the category “social,” what capabilities are we really talking about and which ones are missing when it comes to forming a solution that can truly help people in the workplace be more effective?
Learn how to cut through the noise and gain a framework for thinking about the relevance of new tools to their workplace objectives and workplace realities. Attendees will leave this session with a better understanding of use cases and best practices as well as guidance for determining whether a given solution is worth exploring for their enterprise.
This document discusses strategic IT issues for demanding businesses in the 21st century. It addresses topics such as cost reduction, disaster recovery, green IT, compliance, SLAs, and data deduplication. It also covers trends in physical, virtual, and cloud utilization. The document provides information on migrating server workloads to the cloud and consuming cloud services. It discusses intelligent workload management across physical, virtual, and cloud environments to deliver business services.
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Novell
Virtual appliances are the wave of the future, declares IDC, because appliances dramatically simplify application deployment and accelerate the shift to cloud computing. Learn how the landmark strategic partnership between Novell and VMware is delivering innovative appliance versions of VMware products running on SUSE Linux Enterprise Server, and how it can help you move your applications to the cloud. See an exciting demonstration of Novell's award-winning SUSE Studio appliance construction tool, used by software vendors to build appliances in minutes for on-premise and cloud environments, and by enterprises to quickly create optimized Linux image builds. The session will also cover Novell's industry-leading lifecycle management capabilities for appliances. If you're a software vendor, you will leave this session with new ideas on how to simplify delivery of your software, perform appliance lifecycle management and extend your applications to the cloud. If you're an end-user organization, you will learn how to reduce the time spent creating and updating core OS images by 90 percent or more.
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Building High Availability Clusters with SUSE Linux Enterprise High Availability Extension
1. Building High Availability
Clusters with SUSE Linux ®
Enterprise High Availability
Extension 11
Mark Gonnelly Ralph Dehner
Data Center Consultant CEO
Novell, Inc B1 Systems
mgonnelly@novell.com dehner@b1-systems.de
32. Unpublished Work of Novell, Inc. All Rights Reserved.
This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc.
Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope
of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified,
translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc.
Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability.
General Disclaimer
This document is not to be construed as a promise by any participating company to develop, deliver, or market a
product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in
making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents
of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any
particular purpose. The development, release, and timing of features or functionality described for Novell products
remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to
make changes to its content, at any time, without obligation to notify any person or entity of such revisions or
changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc.
in the United States and other countries. All third-party trademarks are the property of their respective owners.