The document discusses the importance of server monitoring and provides an overview of common monitoring tools. It recommends starting with Nagios and Munin to monitor servers, services, applications and network traffic. The document also introduces Puppet as an easy way to automate the installation and configuration of monitoring tools. It provides a code example that uses Puppet to set up Nagios, Munin and an APC dashboard with minimal effort.
SaltConf 2014 keynote - Thomas Jackson, LinkedIn
Safety with Power tools
As infrastructure scales, simple tasks become increasingly difficult. For large infrastructures to be manageable, we use automation. But automation, like any power tool, comes with its own set of risks and challenges. Automation should be handled like production code, and great care should be exercised with power tools. This talk will cover how SaltStack is used at LinkedIn and offer tips and tricks for automating management with SaltStack at massive scale including a look at LinkedIn-inspired Salt features such as blacklist and pre-req states. It will also cover Salt master and minion instrumentation and a compilation of how not to use Salt.
Comedy aims to make audiences laugh through entertaining means like slapstick or situational humor. Common trends include ignorant main characters who break things or act inappropriately, with a moral lesson by the end. Character archetypes include the protagonist who causes unintentional problems, a teenager who helps them, and an antagonist affected by their actions. Comedies often show the consequences of a character's actions to convey a moral message. Visual techniques like long shots, point-of-view shots, and high angles are used to showcase humor through expressions, movements, and power dynamics between characters. Iconography like a protagonist's mannerisms or props are also signature to comedy genres.
The document discusses the evolution of infrastructure tools at Seven Bridges from a manual process to tools like Context, Minion, and Vayu. Originally configurations were kept manually in Git and environments were difficult to configure. Context was created to version and clone configurations. Minion provided a uniform way to manage services and Vayu kept data on development environments and provided a web interface. These tools emerged to address needs rather than being pre-planned, and helped move infrastructure processes into production.
This document contains a list of names and personal details of several individuals. It also includes work details of an individual named Jafril, and biographical information of an individual named Alben Sutisno. Additionally, it shares a reflection on the first day of a BAKTI event, noting it was tiring but the group became like family, and wishes for luck until the end. It closes with mentioning a floor plan/map of the FK UNAND JATI (Faculty of Medicine at Andalas University).
Metis is a Ruby daemon that implements the Nagios NRPE protocol. It provides a simple framework for defining common monitoring checks and leverages Ruby gems. Checks can be configured with attributes and thresholds for warning and critical statuses. Metis also includes test helpers to test check definitions.
Willi Halfter Retirement Presentation by Vance LemmonVance Lemmon
It does not work so great in slide view on SlideShare. I recommend downloading it and running though it in presentation mode so you can read the snarky remarks. It highlights some of the things that make Willi an awesome scientist!
SaltConf 2014 keynote - Thomas Jackson, LinkedIn
Safety with Power tools
As infrastructure scales, simple tasks become increasingly difficult. For large infrastructures to be manageable, we use automation. But automation, like any power tool, comes with its own set of risks and challenges. Automation should be handled like production code, and great care should be exercised with power tools. This talk will cover how SaltStack is used at LinkedIn and offer tips and tricks for automating management with SaltStack at massive scale including a look at LinkedIn-inspired Salt features such as blacklist and pre-req states. It will also cover Salt master and minion instrumentation and a compilation of how not to use Salt.
Comedy aims to make audiences laugh through entertaining means like slapstick or situational humor. Common trends include ignorant main characters who break things or act inappropriately, with a moral lesson by the end. Character archetypes include the protagonist who causes unintentional problems, a teenager who helps them, and an antagonist affected by their actions. Comedies often show the consequences of a character's actions to convey a moral message. Visual techniques like long shots, point-of-view shots, and high angles are used to showcase humor through expressions, movements, and power dynamics between characters. Iconography like a protagonist's mannerisms or props are also signature to comedy genres.
The document discusses the evolution of infrastructure tools at Seven Bridges from a manual process to tools like Context, Minion, and Vayu. Originally configurations were kept manually in Git and environments were difficult to configure. Context was created to version and clone configurations. Minion provided a uniform way to manage services and Vayu kept data on development environments and provided a web interface. These tools emerged to address needs rather than being pre-planned, and helped move infrastructure processes into production.
This document contains a list of names and personal details of several individuals. It also includes work details of an individual named Jafril, and biographical information of an individual named Alben Sutisno. Additionally, it shares a reflection on the first day of a BAKTI event, noting it was tiring but the group became like family, and wishes for luck until the end. It closes with mentioning a floor plan/map of the FK UNAND JATI (Faculty of Medicine at Andalas University).
Metis is a Ruby daemon that implements the Nagios NRPE protocol. It provides a simple framework for defining common monitoring checks and leverages Ruby gems. Checks can be configured with attributes and thresholds for warning and critical statuses. Metis also includes test helpers to test check definitions.
Willi Halfter Retirement Presentation by Vance LemmonVance Lemmon
It does not work so great in slide view on SlideShare. I recommend downloading it and running though it in presentation mode so you can read the snarky remarks. It highlights some of the things that make Willi an awesome scientist!
This document provides an introduction and overview of Salesforce Lightning, including:
1. What is Lightning and its main components like Lightning Components, App Builder, and Schema Builder.
2. Instructions for getting started with Lightning including creating a developer org and enabling Lightning Components.
3. An overview of key aspects of building Lightning apps and components like App and Component structure, Controllers, Helpers, and Design files.
Using and Customizing the Android Framework / part 4 of Embedded Android Work...Opersys inc.
1) The document provides an overview of using and customizing the Android framework, covering topics like kickstarting the framework, utilities and commands, system services internals, and creating custom services.
2) It describes the core building blocks of the framework, like services, Dalvik, and the boot process. It also covers utilities like am, pm, and dumpsys.
3) The document discusses native daemons like servicemanager and installd. It explains how to observe the system server and interact with services programmatically.
Hello Testers,
Welcome to the special edition of Vietnam QA meet up.
We have three speakers from Carousell on this special occasion.
1. Demystifying selenium grid - Syam Sasi, Senior Software Engineer , Carousell
2. The testing culture at Carousell - Ngan Do, Software Engineer , Carousell
3. The weekly release cycle for mobile apps - Long Ly, Senior Software Engineer , Carousell
Date : Thursday, May 30th, 2019
Time: 6:00 PM to 9:00 PM
Location: 23rd floor, E. Town Central, 11 Doan Van Bo, Ward 12, District 4 Ho Chi Minh City
Register link: https://www.eventbrite.sg/e/vietnam-qa-meetup-tickets-61865212516
The event is free and drinks with snacks will be served.
Please note that the event will be conducted in mainly English.
Detail Schedule:
6PM - 6:30PM - Pizzas, Fruits and networking
6:30 - 7:10 PM - Demystifying the selenium grid
7:10 - 7:15 - Q&A
7:15 - 7:45 - Testing culture at Carousell
7:45- 7:50 - Q&A
7:55 - 8:40 - Weekly release cycle for mobile apps
8:40 - 8:45 - Q&A
8:45 - 09:00 - Kahoot
On-Demand Image Resizing Extended - External Meet-upJonathan Lee
From part of the monolith to containerized micro-service.
Slides from my presentation at DockerCon 2017 on our migration from an in-house image resizing solution in PHP / Imagemagick to leveraging Docker and an open source third party solution.
http://thumbor.org/
https://www.docker.com/
https://docs.docker.com/engine/swarm/
PyCon AU 2012 - Debugging Live Python Web ApplicationsGraham Dumpleton
Monitoring tools record the result of what happened to your web application when a problem arises, but for some classes of problems, monitoring systems are only a starting point. Sometimes it is necessary to take more intrusive steps to plan for the unexpected by embedding mechanisms that will allow you to interact with a live deployed web application and extract even more detailed information.
This document summarizes a presentation about advanced deployment strategies including canary releases, deployment rings, and dark launches. The presentation covers:
- How canary releases work by deploying a new version to a subset of infrastructure initially before gradually routing more users to it while monitoring for issues
- Key considerations for canary releases like ensuring a consistent user experience and having a rollback path
- How deployment rings limit impact on users by gradually deploying and validating changes in production rings
- Dark launches where new code is executed silently before a full launch to test infrastructure changes before high traffic
From part of the monolith to containerized micro-service.
Slides from my presentation at DockerCon 2017 on our migration from an in-house image resizing solution in PHP / Imagemagick to leveraging Docker and an open source third party solution.
http://thumbor.org/
https://www.docker.com/
https://docs.docker.com/engine/swarm/
This document discusses using TurboGears web application frameworks on both Python 2 and Python 3. It describes setting up separate Python 2 and Python 3 environments to develop TurboGears apps, installing TurboGears on both, and creating a basic app that renders templates. It also covers TurboGears features like object dispatch routing, template engines, database access using SQLAlchemy/Ming, and authentication.
Take your CI to the next level! Learn how to optimize your pipelines for faster and more efficient builds through parallelization, caching, failing early, and more.
IRJET- Real Time Monitoring of Servers with Prometheus and Grafana for High A...IRJET Journal
This document discusses monitoring servers in real-time using Prometheus and Grafana for high availability. It begins with an abstract discussing the importance of high availability by ensuring content is always accessible through monitoring, redundancy, and failover. The document then discusses using Prometheus for storage and Grafana for visualization of time series monitoring data. It describes issues with prior monitoring using Cloudwatch and defines the problem statement. The system architecture is explained showing how Prometheus scrapes metrics from targets and stores them, while Grafana is used for visualization. Finally, the implementation steps are outlined including creating service users, downloading and configuring Prometheus, and running it.
This document discusses using non-standard command and control (C2) channels to bypass network segmentation. It describes how VMware APIs, printers, RDP mapped drives, and LDAP attributes can be leveraged as C2 channels. Detection opportunities for each technique are also provided, such as monitoring API logs, print server event logs, module loads, and file writes. The document aims to help blue teams challenge network boundaries and red teams evade detection.
Application Diagnosis with Zend Server TracingZendCon
This document discusses Application Diagnosis with Zend Server Tracing. It provides an overview of debugging applications, introduces Zend Server Tracing as a better way to debug than var_dump, and covers how Zend Server Tracing works including code tracing, monitoring modes, and settings. It provides examples of using code tracing to diagnose uncaught exceptions, destructors, prepared statements, and memory usage. The document encourages using Zend Server Tracing in development, testing, staging, and production environments.
On-Demand Image Resizing from Part of the monolith to Containerized Microserv...Docker, Inc.
In this talk I will cover our experience moving CNET, from an in-house monolith image resizing application, to a containerized open source micro-service. I will detail the planning and development phases of the micro-service, which utilizes Thumbor. I will also cover the testing, deployment and monitoring strategies used in the process. Running in Docker Swarm Mode and delivering millions of image requests a day, the service has greatly improved stability and reduced infrastructure needs by 80%.
This document discusses techniques for optimizing TYPO3 performance. It presents a layered "Performance Onion" model with 7 layers for performance optimization: 1) Delivery, 2) Frontend, 3) TYPO3, 4) Extensions, 5) TYPO3 CMS, 6) Services, and 7) Hardware. Specific techniques are provided for each layer, such as caching, using a content delivery network, optimizing PHP and MySQL, and splitting servers. The goal is to provide an overview of performance optimization strategies in TYPO3 from the browser out to hardware infrastructure.
Web / TYPO3 Performance is like an onion: Has several layers and makes you cry. I show you the seven layers of TYPO3 performance and give tipps, tricks and anecdotes how to solve these issues.
The document discusses advanced deployment strategies including canary releases, deployment rings, and dark launching. It defines canary releases as deploying a new version to a subset of infrastructure initially without routing live traffic to it. Benefits include reducing risk and allowing capacity testing in production. The document reviews how to implement canary releases by routing a percentage of users to the new version while monitoring for issues before routing all users. It also discusses using deployment rings to gradually rollout changes and limit impact, as well as dark launching where new code is executed silently before a full launch.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
This document provides an introduction and overview of Salesforce Lightning, including:
1. What is Lightning and its main components like Lightning Components, App Builder, and Schema Builder.
2. Instructions for getting started with Lightning including creating a developer org and enabling Lightning Components.
3. An overview of key aspects of building Lightning apps and components like App and Component structure, Controllers, Helpers, and Design files.
Using and Customizing the Android Framework / part 4 of Embedded Android Work...Opersys inc.
1) The document provides an overview of using and customizing the Android framework, covering topics like kickstarting the framework, utilities and commands, system services internals, and creating custom services.
2) It describes the core building blocks of the framework, like services, Dalvik, and the boot process. It also covers utilities like am, pm, and dumpsys.
3) The document discusses native daemons like servicemanager and installd. It explains how to observe the system server and interact with services programmatically.
Hello Testers,
Welcome to the special edition of Vietnam QA meet up.
We have three speakers from Carousell on this special occasion.
1. Demystifying selenium grid - Syam Sasi, Senior Software Engineer , Carousell
2. The testing culture at Carousell - Ngan Do, Software Engineer , Carousell
3. The weekly release cycle for mobile apps - Long Ly, Senior Software Engineer , Carousell
Date : Thursday, May 30th, 2019
Time: 6:00 PM to 9:00 PM
Location: 23rd floor, E. Town Central, 11 Doan Van Bo, Ward 12, District 4 Ho Chi Minh City
Register link: https://www.eventbrite.sg/e/vietnam-qa-meetup-tickets-61865212516
The event is free and drinks with snacks will be served.
Please note that the event will be conducted in mainly English.
Detail Schedule:
6PM - 6:30PM - Pizzas, Fruits and networking
6:30 - 7:10 PM - Demystifying the selenium grid
7:10 - 7:15 - Q&A
7:15 - 7:45 - Testing culture at Carousell
7:45- 7:50 - Q&A
7:55 - 8:40 - Weekly release cycle for mobile apps
8:40 - 8:45 - Q&A
8:45 - 09:00 - Kahoot
On-Demand Image Resizing Extended - External Meet-upJonathan Lee
From part of the monolith to containerized micro-service.
Slides from my presentation at DockerCon 2017 on our migration from an in-house image resizing solution in PHP / Imagemagick to leveraging Docker and an open source third party solution.
http://thumbor.org/
https://www.docker.com/
https://docs.docker.com/engine/swarm/
PyCon AU 2012 - Debugging Live Python Web ApplicationsGraham Dumpleton
Monitoring tools record the result of what happened to your web application when a problem arises, but for some classes of problems, monitoring systems are only a starting point. Sometimes it is necessary to take more intrusive steps to plan for the unexpected by embedding mechanisms that will allow you to interact with a live deployed web application and extract even more detailed information.
This document summarizes a presentation about advanced deployment strategies including canary releases, deployment rings, and dark launches. The presentation covers:
- How canary releases work by deploying a new version to a subset of infrastructure initially before gradually routing more users to it while monitoring for issues
- Key considerations for canary releases like ensuring a consistent user experience and having a rollback path
- How deployment rings limit impact on users by gradually deploying and validating changes in production rings
- Dark launches where new code is executed silently before a full launch to test infrastructure changes before high traffic
From part of the monolith to containerized micro-service.
Slides from my presentation at DockerCon 2017 on our migration from an in-house image resizing solution in PHP / Imagemagick to leveraging Docker and an open source third party solution.
http://thumbor.org/
https://www.docker.com/
https://docs.docker.com/engine/swarm/
This document discusses using TurboGears web application frameworks on both Python 2 and Python 3. It describes setting up separate Python 2 and Python 3 environments to develop TurboGears apps, installing TurboGears on both, and creating a basic app that renders templates. It also covers TurboGears features like object dispatch routing, template engines, database access using SQLAlchemy/Ming, and authentication.
Take your CI to the next level! Learn how to optimize your pipelines for faster and more efficient builds through parallelization, caching, failing early, and more.
IRJET- Real Time Monitoring of Servers with Prometheus and Grafana for High A...IRJET Journal
This document discusses monitoring servers in real-time using Prometheus and Grafana for high availability. It begins with an abstract discussing the importance of high availability by ensuring content is always accessible through monitoring, redundancy, and failover. The document then discusses using Prometheus for storage and Grafana for visualization of time series monitoring data. It describes issues with prior monitoring using Cloudwatch and defines the problem statement. The system architecture is explained showing how Prometheus scrapes metrics from targets and stores them, while Grafana is used for visualization. Finally, the implementation steps are outlined including creating service users, downloading and configuring Prometheus, and running it.
This document discusses using non-standard command and control (C2) channels to bypass network segmentation. It describes how VMware APIs, printers, RDP mapped drives, and LDAP attributes can be leveraged as C2 channels. Detection opportunities for each technique are also provided, such as monitoring API logs, print server event logs, module loads, and file writes. The document aims to help blue teams challenge network boundaries and red teams evade detection.
Application Diagnosis with Zend Server TracingZendCon
This document discusses Application Diagnosis with Zend Server Tracing. It provides an overview of debugging applications, introduces Zend Server Tracing as a better way to debug than var_dump, and covers how Zend Server Tracing works including code tracing, monitoring modes, and settings. It provides examples of using code tracing to diagnose uncaught exceptions, destructors, prepared statements, and memory usage. The document encourages using Zend Server Tracing in development, testing, staging, and production environments.
On-Demand Image Resizing from Part of the monolith to Containerized Microserv...Docker, Inc.
In this talk I will cover our experience moving CNET, from an in-house monolith image resizing application, to a containerized open source micro-service. I will detail the planning and development phases of the micro-service, which utilizes Thumbor. I will also cover the testing, deployment and monitoring strategies used in the process. Running in Docker Swarm Mode and delivering millions of image requests a day, the service has greatly improved stability and reduced infrastructure needs by 80%.
This document discusses techniques for optimizing TYPO3 performance. It presents a layered "Performance Onion" model with 7 layers for performance optimization: 1) Delivery, 2) Frontend, 3) TYPO3, 4) Extensions, 5) TYPO3 CMS, 6) Services, and 7) Hardware. Specific techniques are provided for each layer, such as caching, using a content delivery network, optimizing PHP and MySQL, and splitting servers. The goal is to provide an overview of performance optimization strategies in TYPO3 from the browser out to hardware infrastructure.
Web / TYPO3 Performance is like an onion: Has several layers and makes you cry. I show you the seven layers of TYPO3 performance and give tipps, tricks and anecdotes how to solve these issues.
The document discusses advanced deployment strategies including canary releases, deployment rings, and dark launching. It defines canary releases as deploying a new version to a subset of infrastructure initially without routing live traffic to it. Benefits include reducing risk and allowing capacity testing in production. The document reviews how to implement canary releases by routing a percentage of users to the new version while monitoring for issues before routing all users. It also discusses using deployment rings to gradually rollout changes and limit impact, as well as dark launching where new code is executed silently before a full launch.
Similar to Have you been stalking your servers? (20)
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3Data Hops
Free A4 downloadable and printable Cyber Security, Social Engineering Safety and security Training Posters . Promote security awareness in the home or workplace. Lock them Out From training providers datahops.com
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
2. Have you been stalking
your servers?
Marji Cermak
Sysadmin & DevOps Engineer at Morpht
marji@morpht.com
@cermakm
3. The rule of 3 things
picture: http://www.flickr.com/photos/helenaperezgarcia/5692392667/
4. The rule of 3 things
1. What is monitoring and why do you want to
monitor
2. Some monitoring tools available for you
3. It is easy to start with monitoring.
7. Monitoring
Monitoring is an intermittent (regular or
irregular) series of observations in time,
carried out to show the extent of compliance
with a formulated standard or degree of
deviation from an expected norm.
J. M. Hellawell (1991), modified by A. Brown
(2000), http://jncc.defra.gov.uk/page-2268
nature conservation area
8. Why you need to monitor
● to know about the bad news before your
customers (or your boss)
9. Why you need to monitor
● to know about the bad news before your
customers (or your boss)
● to scale up your server in advance
10. Why you need to monitor
● to know about the bad news before your
customers (or your boss)
● to scale up your server in advance
● to tune up your app
11. Why you need to monitor (cont.)
● to prove your uptime of 99.999 :)
12. The fun of the nines
Source: http://en.wikipedia.org/wiki/High_availability
Nines: http://en.wikipedia.org/wiki/List_of_unusual_units_of_measurement#Nines
13. Why you need to monitor (cont.)
● to prove your uptime of 99.999 :)
● to minimise downtime (expensive)
14. Why you need to monitor (cont.)
● to prove your uptime of 99.999 :)
● to minimise downtime (expensive)
● to capture customer information
15. Why you need to monitor (cont.)
● to have data / metrics to diagnose
33. Meet Nagios, Munin and others
● Nagios
● Munin
● APC dashboard
● related Drupal modules
34.
35. Nagios /ˈnɑːɡiːoʊs/
● system, network and infrastructure
monitoring software application
● monitors and alerts
● many plugins
36. Nagios /ˈnɑːɡiːoʊs/
Name and Pronunciation:
● NetSaint -> "Nagios Ain't Gonna Insist On
Sainthood"
● Agios' a transliteration of the Greek word
άγιος (saint)
37. Nagios /ˈnɑːɡiːoʊs/
● alerts by email/pager/IM...
● alerts to different contacts
● notification escalation
● service / host dependencies
● soft / hard states
42. Munin
● master / node architecture
● connects to all nodes at regular intervals
● it uses the RRDtool (round robin database
tool, handles time-series data)
48. ● they complement each other
● nagios normally alerts on one “service”
● munin can be used to correlate different
things
Nagios & Munin
49. APC - what is it?
The Alternative PHP Cache (APC) is a free
and open opcode cache for PHP.
50. APC - what is it?
The Alternative PHP Cache (APC) is a free
and open opcode cache for PHP.
Its goal is to provide a free, open, and robust
framework for caching and optimising PHP
intermediate code.
Inside your webserver (not a webcache)
57. How to install these tools?
Munin
sudo apt-get install munin munin-node
Nagios
sudo apt-get install nagios3
APC dashboard
php.apc script from php-apc package
58. How to configure these?
● It is a bit fiddly
● There are many guides targeting beginners
● You don’t want to do it again and again
59. puppet – a quick way to start
system for automating system administration
tasks
60. puppet – a quick way to start
● a declarative language for expressing
system configuration,
61. puppet – a quick way to start
● a declarative language for expressing
system configuration,
● a client and server for distributing it
62. puppet – a quick way to start
● a declarative language for expressing
system configuration,
● a client and server for distributing it
● and a library for realising the configuration.
63. puppet – a quick way to start
package { 'munin-node': ensure => installed }
service { 'munin-node':
enable => true,
ensure => running,
require => Package['munin-node'],
}
64. puppet – a quick way to start
1. clone the stalk-your-box repo
2. run puppet apply on the code
3. monitor!
65. A quick way to start
$ git clone
git://github.com/morpht/stalk-your-box.git
/tmp/stalk-your-box
Cloning into '/tmp/stalk-your-box'...
remote: Counting objects: 23, done.
remote: Compressing objects: 100% (19/19), done.
remote: Total 23 (delta 1), reused 23 (delta 1)
Receiving objects: 100% (23/23), 11.35 KiB, done.
Resolving deltas: 100% (1/1), done.
66. A quick way to start
$ cd /tmp/stalk-your-box/
$ sudo puppet apply
--modulepath=modules manifest.pp
notice: /Stage[main]/Nagios::Server/Package[nagios3]/ensure: ensure changed 'purged' to 'present'
notice: /Stage[main]/Nagios::Server/File[/etc/nagios3/htpasswd.users]/ensure: created
notice: /Stage[main]/Nagios::Server/Exec[update-nagios-htpasswd]/returns: Adding password for user nagiosadmin
notice: /Stage[main]/Nagios::Server/Exec[update-nagios-htpasswd]/returns: executed successfully
notice: /Stage[main]/Munin::Node/Package[libcache-cache-perl]/ensure: ensure changed 'purged' to 'present'
notice: /Stage[main]/Munin::Node/Package[munin-node]/ensure: ensure changed 'purged' to 'present'
notice: /Stage[main]/Munin::Node/File[munin-node.conf]/content: content changed '{md5}
e486786f866d7d7e025dea401c300e7b' to '{md5}dbf97a87a8da86ef68155815ecae3c1c'
notice: /Stage[main]/Munin::Server/Service[apache2]: Triggered 'refresh' from 1 events
notice: Finished catalog run in 44.26 seconds
70. Manifest.pp
# Execute apt-get update before any package is installed:
exec { 'apt-update':
command => 'apt-get update',
# but don't execute it more than once a day:
unless => 'test $(find /var/cache/apt/pkgcache.bin -mtime 0 | wc -l ) -eq 1',
}
Exec['apt-update'] -> Package <| |>
# Include minimal apache2 installation. Munin server, nagios
# and APC dashboard depend on it.
include 'apache2'
71. Manifest.pp
# Install munin node and munin server:
class { 'munin::node': }
class { 'munin::server':
htuser => 'munin', # Username for basic access auth.
htpass => 'Prague2013' # Password for basic access auth.
}
# Install nagios:
class { 'nagios::server':
contact_email => 'root@localhost', # Email to send alerts to.
htpass => 'Prague2013', # Password for the nagiosadmin username.
}
76. Questions
Here is the get started monitoring repo:
https://github.com/morpht/stalk-your-box
Marji Cermak
Sysadmin & DevOps Engineer at Morpht
marji@morpht.com
@cermakm
78. THANK YOU!
WHAT DID YOU THINK?
Locate this session at the
DrupalCon Prague website:
http://prague2013.drupal.org/schedule
Click the “Take the survey” link