Ansible is an open source automation engine that automates complex IT tasks such as cloud provisioning, application deployment and a wide variety of system administration tasks. It is a one-to-many agentless mechanism where complex deployment tasks can be controlled and monitored from a central control machine.
Redfish is an open industry-standard specification and schema designed for modern and secure management of platform hardware. On Dell EMC PowerEdge servers the Redfish management APIs are available via the integrated Dell Remote Access Controller (iDRAC), which can be used by IT administrators to easily monitor and manage at scale their entire infrastructure using a wide array of clients on devices such as laptops, tablets and smart phones.
Together, Ansible and Redfish can be used by system administrators to fully automate at large scale server monitoring, provisioning and update tasks from one central location, significantly reducing complexity and helping improve the productivity and efficiency of IT administrators.
Kernel Recipes 2019 - ftrace: Where modifying a running kernel all startedAnne Nicolas
Ftrace’s most powerful feature is the function tracer (and function graph tracer which is built from it). But to have this enabled on production systems, it had to have its overhead be negligible when disabled. As the function tracer uses gcc’s profiling mechanism, which adds a call to “mcount” (or more recently fentry, don’t worry if you don’t know what this is, it will all be explained) at the start of almost all functions, it had to do something about the overhead that causes. The solution was to turn those calls into “nops” (an instruction that the CPU simply ignores). But this was no easy feat. It took a lot to come up with a solution (and also turning a few network cards into bricks). This talk will explain the history of how ftrace came about implementing the function tracer, and brought with it the possibility of static branches and soon static calls!
Steven Rostedt
Build Low-Latency Applications in Rust on ScyllaDBScyllaDB
Join us for a developer workshop where we’ll go hands-on to explore the affinities between Rust, the Tokio framework, and ScyllaDB. You’ll go live with our sample Rust application, built on our new, high performance native Rust client driver.
Kernel Recipes 2019 - ftrace: Where modifying a running kernel all startedAnne Nicolas
Ftrace’s most powerful feature is the function tracer (and function graph tracer which is built from it). But to have this enabled on production systems, it had to have its overhead be negligible when disabled. As the function tracer uses gcc’s profiling mechanism, which adds a call to “mcount” (or more recently fentry, don’t worry if you don’t know what this is, it will all be explained) at the start of almost all functions, it had to do something about the overhead that causes. The solution was to turn those calls into “nops” (an instruction that the CPU simply ignores). But this was no easy feat. It took a lot to come up with a solution (and also turning a few network cards into bricks). This talk will explain the history of how ftrace came about implementing the function tracer, and brought with it the possibility of static branches and soon static calls!
Steven Rostedt
Build Low-Latency Applications in Rust on ScyllaDBScyllaDB
Join us for a developer workshop where we’ll go hands-on to explore the affinities between Rust, the Tokio framework, and ScyllaDB. You’ll go live with our sample Rust application, built on our new, high performance native Rust client driver.
USENIX LISA2021 talk by Brendan Gregg (https://www.youtube.com/watch?v=_5Z2AU7QTH4). This talk is a deep dive that describes how BPF (eBPF) works internally on Linux, and dissects some modern performance observability tools. Details covered include the kernel BPF implementation: the verifier, JIT compilation, and the BPF execution environment; the BPF instruction set; different event sources; and how BPF is used by user space, using bpftrace programs as an example. This includes showing how bpftrace is compiled to LLVM IR and then BPF bytecode, and how per-event data and aggregated map data are fetched from the kernel.
English:
Sometimes java applications are not as fast as we expect. What if our system contains of hundreds JVMs, databases and other components? We try using profiler, however can't find the bottleneck.
In this talk we discuss:
1. How to profile single JVM
- what is profiler and how does it work
- write simple profiler using java agent and byte-code modification
2. How to profile distributed system
- how engineers in Google doing this
- look at commercial and open source solutions: Dynatrace and Zipkin
- connect to demo-system and see live demos
Russian:
Порой наши java-программы работают медленней, чем хотелось бы. Иногда мы даже подключаемся профайлером, чтобы посмотреть, где тормозит.
А что если наша система состоит из десятков/сотен JVM, баз данных и других компонентов?
На этом техтолке мы обсудим:
1. Как профилировать одну JVM
- что такое профайлер и как он работает под капотом
- напишем простой профайлер с помощью java-агента и байт-код модификаций
2. Как профилировать сложную распределённую систему
- разберёмся как это делают инженеры в Google
- посмотрим готовые коммерческие и open-source решения: Dynatrace и Zipkin
- подключимся к демо-системе и увидим всё своими глазами
https://github.com/kslisenko/java-performance
New Ways to Find Latency in Linux Using TracingScyllaDB
Ftrace is the official tracer of the Linux kernel. It originated from the real-time patch (now known as PREEMPT_RT), as developing an operating system for real-time use requires deep insight and transparency of the happenings of the kernel. Not only was tracing useful for debugging, but it was critical for finding areas in the kernel that was causing unbounded latency. It's no wonder why the ftrace infrastructure has a lot of tooling for seeking out latency. Ftrace was introduced into mainline Linux in 2008, and several talks have been done on how to utilize its tracing features. But a lot has happened in the past few years that makes the tooling for finding latency much simpler. Other talks at P99 will discuss the new ftrace tracers "osnoise" and "timerlat", but this talk will focus more on the new flexible and dynamic aspects of ftrace that facilitates finding latency issues which are more specific to your needs. Some of this work may still be in a proof of concept stage, but this talk will give you the advantage of knowing what tools will be available to you in the coming year.
eBPF is one of the key technologies nowadays. There are several existing technologies in network or observability fields but not much in storage space. This presentation tells my research story and tries to define some of the possibilities of the technology.
The U-Boot is an "Universal Bootloader" ("Das U-Boot") is a monitor program that is under GPL. This production quality boot-loader is used as default boot loader by several board vendors. It is easily portable and easy to port and to debug by supporting PPC, ARM, MIPS, x86,m68k, NIOS, Microblaze architectures. Here is a presentation that introduces U-Boot.
Vmlinux: anatomy of bzimage and how x86 64 processor is bootedAdrian Huang
This slide deck describes the Linux booting flow for x86_64 processors.
Note: When you view the the slide deck via web browser, the screenshots may be blurred. You can download and view them offline (Screenshots are clear).
Note: When you view the the slide deck via web browser, the screenshots may be blurred. You can download and view them offline (Screenshots are clear).
Sebastien Thomas, System Architect at Coyote Amerique, gave a presentation on operator frameworks. His talk covered how Operator SDK can be used to create Kubernetes Operators with Go.
USENIX ATC 2017: Visualizing Performance with Flame GraphsBrendan Gregg
Talk by Brendan Gregg for USENIX ATC 2017.
"Flame graphs are a simple stack trace visualization that helps answer an everyday problem: how is software consuming resources, especially CPUs, and how did this change since the last software version? Flame graphs have been adopted by many languages, products, and companies, including Netflix, and have become a standard tool for performance analysis. They were published in "The Flame Graph" article in the June 2016 issue of Communications of the ACM, by their creator, Brendan Gregg.
This talk describes the background for this work, and the challenges encountered when profiling stack traces and resolving symbols for different languages, including for just-in-time compiler runtimes. Instructions will be included generating mixed-mode flame graphs on Linux, and examples from our use at Netflix with Java. Advanced flame graph types will be described, including differential, off-CPU, chain graphs, memory, and TCP events. Finally, future work and unsolved problems in this area will be discussed."
Netronome's half-day tutorial on host data plane acceleration at ACM SIGCOMM 2018 introduced attendees to models for host data plane acceleration and provided an in-depth understanding of SmartNIC deployment models at hyperscale cloud vendors and telecom service providers.
Presenter Bios
Jakub Kicinski is a long term Linux kernel contributor, who has been leading the kernel team at Netronome for the last two years. Jakub’s major contributions include the creation of BPF hardware offload mechanisms in the kernel and bpftool user space utility, as well as work on the Linux kernel side of OVS offload.
David Beckett is a Software Engineer at Netronome with a strong technical background of computer networks including academic research with DDoS. David has expertise in the areas of Linux architecture and computer programming. David has a Masters Degree in Electrical, Electronic Engineering at Queen’s University Belfast and continues as a PhD student studying Emerging Application Layer DDoS threats.
This session shows an overview of the features and architecture of SQL Server on Linux and Containers. It covers install, config, performance, security, HADR, Docker containers, and tools. Find the demos on http://aka.ms/bobwardms
USENIX LISA2021 talk by Brendan Gregg (https://www.youtube.com/watch?v=_5Z2AU7QTH4). This talk is a deep dive that describes how BPF (eBPF) works internally on Linux, and dissects some modern performance observability tools. Details covered include the kernel BPF implementation: the verifier, JIT compilation, and the BPF execution environment; the BPF instruction set; different event sources; and how BPF is used by user space, using bpftrace programs as an example. This includes showing how bpftrace is compiled to LLVM IR and then BPF bytecode, and how per-event data and aggregated map data are fetched from the kernel.
English:
Sometimes java applications are not as fast as we expect. What if our system contains of hundreds JVMs, databases and other components? We try using profiler, however can't find the bottleneck.
In this talk we discuss:
1. How to profile single JVM
- what is profiler and how does it work
- write simple profiler using java agent and byte-code modification
2. How to profile distributed system
- how engineers in Google doing this
- look at commercial and open source solutions: Dynatrace and Zipkin
- connect to demo-system and see live demos
Russian:
Порой наши java-программы работают медленней, чем хотелось бы. Иногда мы даже подключаемся профайлером, чтобы посмотреть, где тормозит.
А что если наша система состоит из десятков/сотен JVM, баз данных и других компонентов?
На этом техтолке мы обсудим:
1. Как профилировать одну JVM
- что такое профайлер и как он работает под капотом
- напишем простой профайлер с помощью java-агента и байт-код модификаций
2. Как профилировать сложную распределённую систему
- разберёмся как это делают инженеры в Google
- посмотрим готовые коммерческие и open-source решения: Dynatrace и Zipkin
- подключимся к демо-системе и увидим всё своими глазами
https://github.com/kslisenko/java-performance
New Ways to Find Latency in Linux Using TracingScyllaDB
Ftrace is the official tracer of the Linux kernel. It originated from the real-time patch (now known as PREEMPT_RT), as developing an operating system for real-time use requires deep insight and transparency of the happenings of the kernel. Not only was tracing useful for debugging, but it was critical for finding areas in the kernel that was causing unbounded latency. It's no wonder why the ftrace infrastructure has a lot of tooling for seeking out latency. Ftrace was introduced into mainline Linux in 2008, and several talks have been done on how to utilize its tracing features. But a lot has happened in the past few years that makes the tooling for finding latency much simpler. Other talks at P99 will discuss the new ftrace tracers "osnoise" and "timerlat", but this talk will focus more on the new flexible and dynamic aspects of ftrace that facilitates finding latency issues which are more specific to your needs. Some of this work may still be in a proof of concept stage, but this talk will give you the advantage of knowing what tools will be available to you in the coming year.
eBPF is one of the key technologies nowadays. There are several existing technologies in network or observability fields but not much in storage space. This presentation tells my research story and tries to define some of the possibilities of the technology.
The U-Boot is an "Universal Bootloader" ("Das U-Boot") is a monitor program that is under GPL. This production quality boot-loader is used as default boot loader by several board vendors. It is easily portable and easy to port and to debug by supporting PPC, ARM, MIPS, x86,m68k, NIOS, Microblaze architectures. Here is a presentation that introduces U-Boot.
Vmlinux: anatomy of bzimage and how x86 64 processor is bootedAdrian Huang
This slide deck describes the Linux booting flow for x86_64 processors.
Note: When you view the the slide deck via web browser, the screenshots may be blurred. You can download and view them offline (Screenshots are clear).
Note: When you view the the slide deck via web browser, the screenshots may be blurred. You can download and view them offline (Screenshots are clear).
Sebastien Thomas, System Architect at Coyote Amerique, gave a presentation on operator frameworks. His talk covered how Operator SDK can be used to create Kubernetes Operators with Go.
USENIX ATC 2017: Visualizing Performance with Flame GraphsBrendan Gregg
Talk by Brendan Gregg for USENIX ATC 2017.
"Flame graphs are a simple stack trace visualization that helps answer an everyday problem: how is software consuming resources, especially CPUs, and how did this change since the last software version? Flame graphs have been adopted by many languages, products, and companies, including Netflix, and have become a standard tool for performance analysis. They were published in "The Flame Graph" article in the June 2016 issue of Communications of the ACM, by their creator, Brendan Gregg.
This talk describes the background for this work, and the challenges encountered when profiling stack traces and resolving symbols for different languages, including for just-in-time compiler runtimes. Instructions will be included generating mixed-mode flame graphs on Linux, and examples from our use at Netflix with Java. Advanced flame graph types will be described, including differential, off-CPU, chain graphs, memory, and TCP events. Finally, future work and unsolved problems in this area will be discussed."
Netronome's half-day tutorial on host data plane acceleration at ACM SIGCOMM 2018 introduced attendees to models for host data plane acceleration and provided an in-depth understanding of SmartNIC deployment models at hyperscale cloud vendors and telecom service providers.
Presenter Bios
Jakub Kicinski is a long term Linux kernel contributor, who has been leading the kernel team at Netronome for the last two years. Jakub’s major contributions include the creation of BPF hardware offload mechanisms in the kernel and bpftool user space utility, as well as work on the Linux kernel side of OVS offload.
David Beckett is a Software Engineer at Netronome with a strong technical background of computer networks including academic research with DDoS. David has expertise in the areas of Linux architecture and computer programming. David has a Masters Degree in Electrical, Electronic Engineering at Queen’s University Belfast and continues as a PhD student studying Emerging Application Layer DDoS threats.
This session shows an overview of the features and architecture of SQL Server on Linux and Containers. It covers install, config, performance, security, HADR, Docker containers, and tools. Find the demos on http://aka.ms/bobwardms
The biggest headine at the 2009 Oracle OpenWorld was when Larry Ellison announced that Oracle was entering the hardware business with a pre-built database machine, engineered by Oracle. Since then businesses around the world have started to use these engineered systems. This beginner/intermediate-level session will take you through my first 100 days of starting to administer an Exadata machine and all the roadblocks and all the success I had along this new path.
Sharing High-Performance Interconnects Across Multiple Virtual Machinesinside-BigData.com
In this deck from the Stanford HPC Conference, Mohan Potheri from VMware presents: Sharing High-Performance Interconnects Across Multiple Virtual Machines.
"Virtualized devices offer maximum flexibility: sharing of hardware between virtual machines, the use of VMware vMotion to handle migration and take snapshots. However, when performance is the most critical requirement there are other options. VMware Direct Path I/O delivers excellent performance, but only for a single virtual machine. Single root I/O virtualization (SR-IOV), on the other hand, offers the performance of pass-through mode while allowing devices to be shared by multiple virtual machines.
This session introduces SR-IOV, explains how it is enabled in VMware vSphere, and provides details of specific use cases that important for machine learning and high-performance computing. It includes performance comparisons that demonstrate the benefits of SR-IOV and information on how to configure and tune these configurations."
Watch the video: https://youtu.be/-iYYmsBw8SU
Learn more: https://www.vmware.com
and
http://hpcadvisorycouncil.com
Sign up for our insideHPC Newsletter: http://insidehpc.com/newsletter
MT135_Simplifying web-scale systems management with the Dell PowerEdge Embedd...Dell EMC World
IT systems management has shifted from a manual 1:1 process to focus on 1:1,000’s automated processes. The adoption of Hybrid cloud technologies is driving the future of systems management automation and forcing a shift in the processes and methods of systems management. This is why Dell is meeting this challenge with Dell PowerEdge Embedded RESTful API and DMTF Redfish standard support. In this session, we will outline the evolving IT landscape and its implications on systems management and present a future vision for automation that helps address emerging market needs driven by hybrid cloud adoption and web-scale operations.
RTP NPUG: Ansible Intro and Integration with ACIJoel W. King
Ansible is one of the newer and more exciting automation toolsets for networking. Ansible (unlike Puppet and Chef) is agentless, which makes it significantly easier to automate existing devices that may not have an agent installed – such as many networking devices.
Networks are evolving from hundreds or thousands of individual devices to the Software-Defined Network paradigm of a single fabric under a central controller. The GUI on top of an SDN controller isn’t sufficient and will still need automation.
This presentation describes how Ansible can add value to configuration management of a Cisco Application Centric Infrastructure (ACI) infrastructure.
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
📕 Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
Enhancing Performance with Globus and the Science DMZ
Automated Out-of-Band management with Ansible and Redfish
1. Automated Out-of-Band management
with Ansible and Redfish
Jose Delarosa – Senior Linux Engineer at Dell EMC
Jake Jackson – Product Field Engineer at Ansible by Red Hat
May 2nd, 2017
2. Who are we
• Jose De la Rosa (@jdelaros1)
– Linux Engineer at Dell EMC.
– Systems engineer, emerging technologies evangelist.
• Jake Jackson (@thedoubl3j)
– Product Field Engineer at Ansible by Red Hat.
– Works with the Getting Started team helping customers with
standing up and getting started with Ansible.
3. Before we start
1. Thank you for coming.
2. Please ask questions at any time.
3. If time runs out, we will be happy to talk to you after the session.
4. Content
1. Out-of-band management with PowerEdge iDRAC
2. Scalable out-of-band management with Redfish
3. Automated out-of-band management with Ansible
6. Integrated Dell Remote Access Controller (iDRAC)
● Embedded chip on a PowerEdge server used to run tasks that
are independent of the host OS and the rest of the server.
– Detects hardware failure
– Manage power: turn off, on, hard reset
– System event and lifecycle logs
● Has its own ethernet port, usually connected to separate
management network.
● Referred to as “out-of-band” management, as opposed to “in-
band” management which is provided by the OS.
14. What is Redfish?
● RESTful API specification defined by the DMTF for hardware management.
● Aims to replace IPMI and vendor-specific interfaces like WSMAN.
● Schema-based but human-readable.
● Clients send URI requests over https to iDRAC, so clients can be any OS or
application on a server, workstation or mobile device.
15. What can Redfish do?
● Monitor server health status
● Alert on server health status changes
● View server hardware inventory and firmware versions
● Reset, reboot, and power control servers
● Access system logs
16. Example: Get system health
$ curl –s https://<idrac_ip>/redfish/v1/Systems/System.Embedded.1 -k -u
root:password | python -m json.tool | jq .Status
{
"Health": "OK",
"HealthRollUp": "OK",
"State": "Enabled"
}
20. What else can Redfish do?
Retrieve Telemetry
- Basic server identification and asset information
- Health state
- Temperature sensors and fans
- Power consumption and thresholds
Discovery
- Service endpoint (network-based discovery)
- System topology (rack, chassis, server, node)
Basic I/O Infrastructure Data
- Host NIC MAC addresses for LOM devices
- Simple hard drive status / fault reporting
Security
- Session-based leveraging HTTPS
Common Management Actions
- Reboot / power cycle
- Change boot order
- Configure BMC network settings
- Manage user accounts
Access and Notification
- Serial console access via SSH
- Alert / event notification
- Event log access
More Coming Soon!
https://www.dmtf.org/standards/redfish
22. Redfish Roadmap
● Version 1 focused on servers. Expand over time to cover rest of IT
infrastructure.
● Will add devices over time to cover new technologies (i.e. NVDIMMs,
Multifunction Adapters)
● SNIA is developing Swordfish, which builds upon Redfish’s local storage
management to address advanced storage devices.
● Open source efforts:
– Client libraries (Python, Java, PowerShell)
– Command line utility redfishtool (similar to ipmitool)
25. What is Ansible?
It’s a simple automation language that
can perfectly describe an IT application
infrastructure in Ansible Playbooks.
It’s an automation engine that runs
Ansible Playbooks.
Ansible Tower is an enterprise
framework for controlling, securing
and managing your Ansible
automation with a UI and restful API.
26. How Ansible works
ANSIBLE’S AUTOMATION ENGINE
ANSIBLE
PLAYBOOK
PUBLIC / PRIVATE
CLOUD
CMDB
USERS
INVENTORY
HOSTS
NETWORKING
PLUGINS
API
MODULES
27. More about Ansible
● Agentless → minimum footprint
● Make repetitive tasks easy
● Defines a desired state, so OK to run playbook more than once
● Easier to use than writing shell scripts
28. Ansible use cases
● Infrastructure Automation
– Networking
– Containers
– Code Deployment
– Server / Bare Metal
● Want more information? Visit www.ansible.com and docs.ansible.com
30. Scalable & Automated Out-of-band management
More than 5 servers
https:/ / <idrac-ip>/ redfish/ v1/ Managers/ iDRAC.Embedded.1/ Logs/ Sel
Management
Network
Server dataDatabase
31. Key Lifecycle Management tasks
• Server Power On/Off; Reboot; Hard Reset
• Install BIOS, Configure BIOS, Reset to Default
• Configure iDRAC (CRUD operations):
– User & Password Management
– Certificate Management (import, export, delete)
– Network Configuration
– NTP and Time Zone settings
– Storage (RAID, Virtual Disk, Physical Disks, PERC)
• System Inventory – H/W, Firmware, Sensor
• OS Deployment – remote file share, vMedia
• Import / Export SCP – remote file share, vMedia
• Backup and Restore
– Server Profiles
• Upgrade using DSU (Dell Server Update)
or DUEC (Dell Update Engine for
Consoles)
– Get list of available and applicable
updates
– Firmware Upgrade
– BIOS Upgrade
– OS Drivers Upgrade
• Job Management
– Check JOB status
– Create JOB
– Delete JOB
– Create JOB Queue
– Delete JOB Queue
• Get Logs
– Export LC logs
– Export System Event Logs
32. Ansible module for iDRAC
● Manage your entire Dell EMC IT infrastructure (servers, routers,
switches, storage) from your Ansible Controller.
● Automated monitoring, provisioning, firmware updates at scale.
● Open source, so you can write your own extensions as needed and
contribute back to the community.
● Working with Red Hat to include as core Ansible module.
34. Server inventory
Server iDRAC IP Model IP address BIOS CPU Type RAM Service Tag Status
webserver-1 192.168.2.10 PowerEdge R630 10.0.1.30 2.3.4 2
Intel(R) Xeon(R) CPU E5-2630 v3 @
2.40GHz
128 5WT4Q47 OK
webserver-2 192.168.2.11 PowerEdge R630 10.0.1.31 2.3.4 2
Intel(R) Xeon(R) CPU E5-2630 v3 @
2.40GHz
128 5XR7Q32 OK
webserver-3 192.168.2.12 PowerEdge R630 10.0.1.33 2.3.2 2
Intel(R) Xeon(R) CPU E5-2630 v3 @
2.40GHz
128 5XR7QYY OK
appserver-1 192.168.2.13 PowerEdge R830 10.0.1.34 2.3.2 4
Intel(R) Xeon(R) CPU E5-2630 v3 @
2.60GHz
512 5XR7QYY OK
dbserver-1 192.168.3.10 PowerEdge R730 10.0.2.30 2.1.2 2
Intel(R) Xeon(R) CPU E5-2630 v3 @
2.33GHz
256 5XR7Q67 OK
dbserver-2 192.168.3.11 PowerEdge R730 10.0.2.31 2.3.4 2
Intel(R) Xeon(R) CPU E5-2630 v3 @
2.33GHz
256 5WT4Q37 OK
dbserver-3 192.168.3.12 PowerEdge R730 10.0.2.32 2.3.4 2
Intel(R) Xeon(R) CPU E5-2630 v3 @
2.33GHz
256 5WR4Q12 OK
dbserver-4 192.168.3.13 PowerEdge R730 10.0.2.33 2.3.4 2
Intel(R) Xeon(R) CPU E5-2630 v3 @
2.33GHz
256 5TT1Q44 OK
Use case: collect inventory data, maintain in spreadsheet or database
35. Source code repository
● https://github.com/dell/idrac-ansible-module
Will continue adding features in coming weeks and months.
Pull requests and contributions are welcome and encouraged!
36. Resources
● iDRAC with Lifecycle Controller: http://dell.to/2qdBd0y
● Redfish API specification: https://www.dmtf.org/standards/redfish
● Dell EMC PowerEdge Redfish API Overview: http://dell.to/2odsH1p
● iDRAC Redfish API Reference Guide: http://dell.to/2oyjMTy
● Getting started with Ansible:
http://docs.ansible.com/ansible/intro_getting_started.html
39. Dell Redfish API URLs Comments
/redfish/v1/Managers
/redfish/v1/Managers/iDRAC.Embedded.1
/redfish/v1/Managers/iDRAC.Embedded.1/Actions/Manager.Reset Used to perform iDRAC reset
/redfish/v1/Managers/iDRAC.Embedded.1/NetworkProtocol
Reports information about iDRAC's network services. Includes Web
server, SNMP,
vMedia, Telnet, SSH, IPMI & KVM.
/redfish/v1/ Managers/iDRAC.Embedded.1/SerialInterfaces iDRAC BMC serial interface
/redfish/v1/ Managers/iDRAC.Embedded.1/SerialInterfaces/<Serial-key>
/redfish/v1/Managers/iDRAC.Embedded.1/LogServices
/redfish/v1/Managers/iDRAC.Embedded.1/LogServices/Sel Access to server System Event Log
/redfish/v1/Managers/iDRAC.Embedded.1/LogServices/Lclog Access to Lifecycle Controller Log
/redfish/v1/Managers/iDRAC.Embedded.1/LogServices/Sel/Actions/LogService.
ClearLog Used to clear LC Log
/redfish/v1/Managers/iDRAC.Embedded.1/VirtualMedia Status of iDRAC virtual media
/redfish/v1/Managers/iDRAC.Embedded.1/VirtualMedia/<media-type>
/redfish/v1/Managers/iDRAC.Embedded.1/EthernetInterfaces iDRAC network interface
/redfish/v1/Managers/iDRAC.Embedded.1/EthernetInterfaces/<FQDD>
/redfish/v1/Managers/iDRAC.Embedded.1/AccountService
/redfish/v1/Managers/iDRAC.Embedded.1/Accounts iDRAC user accounts
/redfish/v1/Managers/iDRAC.Embedded.1/Accounts/<Account-Id>
iDRAC operation APIs
40. Chassis inventory APIs
Dell Redfish API URLs Comments
/redfish/v1/Chassis
/redfish/v1/Chassis/System.Embedded.1 Top-level URI for server chassis
/redfish/v1/Chassis/System.Embedded.1/Thermal
/redfish/v1/Chassis/System.Embedded.1/Sensors/Fans Reports fan status for server and FX2 chassis
/redfish/v1/Chassis/System.Embedded.1/Sensors/Fans/<Fan-FQDD>
/redfish/v1/Chassis/System.Embedded.1/Sensors/Temperatures Reports thermal data for server and FX2 chassis
/redfish/v1/Chassis/System.Embedded.1/Sensors/Temperatures/<Sensor-
FQDD> <Sensor-FQDD> addresses each temperature probe
/redfish/v1/Chassis/System.Embedded.1/Power Power consumption and supply status
/redfish/v1/Chassis/System.Embedded.1/Power/PowerControl
/redfish/v1/Chassis/System.Embedded.1/Sensors/Voltages
/redfish/v1/Chassis/System.Embedded.1/Sensors/Voltages/<Voltage-FQDD> <Voltage-FQDD> addresses each voltage output
/redfish/v1/Chassis/System.Embedded.1/Power/PowerSupplies
/redfish/v1/Chassis/System.Embedded.1/Power/PowerSupplies/<PSU-FQDD> <PSU-FQDD> addresses each power supply
/redfish/v1/Chassis/System.Embedded.1/Power/Redundancy/<PSRedundancy
-FQDD> <PSRedundancy-FQDD> addresses power supply redundancy
41. System status APIs
Dell Redfish API URLs Comments
/redfish/v1 Top-level API access
/redfish/v1/Systems Server inventory and status information access
/redfish/v1/Systems/<ServiceTag+nodeid>
/redfish/v1/Systems/System.Embedded.1/Actions/ComputerSystem.Reset Server reset operation
/redfish/v1/Systems/System.Embedded.1/Processors Details on CPUs
/redfish/v1/Systems/System.Embedded.1/Processors/<Processor-FQDD>
/redfish/v1/Systems/System.Embedded.1/EthernetInterfaces Reports NIC IP address, DHCP and DNS information.
/redfish/v1/Systems/System.Embedded.1/EthernetInterfaces/<EthernetInterface-FQDD>
Example <EthernetInterface-FQDD> = NIC.Embedded.1-
1-1
/redfish/v1/Systems/System.Embedded.1/EthernetInterfaces/<EthernetInterface-
FQDD>/Vlans
/redfish/v1/Systems/System.Embedded.1/EthernetInterfaces/<EthernetInterface-
FQDD>/Vlans/<Vlan-FQDD>
/redfish/v1/Systems/System.Embedded.1/Storage/Controllers
/redfish/v1/Systems/System.Embedded.1/Storage/Controllers/<Controller-FQDD>
Typical <Controller-FQDD>=RAID.Slot.N-1; describes
details of controller, backplane, enclosure, attached
drives
42. Registries, Sessions, Tasks and Event APIs
Dell Redfish API URLs Comments
/redfish/v1/Registries/Messages/En PowerEdge message registry
/redfish/v1/odata Enables OData clients to navigate iDRAC Redfish resources
/redfish/v1/$metadata
Provides a metadata document describing the resources and collections
that are available at the iDRAC Redfish service root URI
/redfish/v1/$metadata#<Collection or a single resource>
/redfish/v1/JSONSchemas Schema descriptions for all supplied data
/redfish/v1/JSONSchemas/<file>
/redfish/v1/SessionService Redfish session management
/redfish/v1/Sessions
/redfish/v1/Sessions/<SessionId>
/redfish/v1/TaskService Redfish internal task management
/redfish/v1/EventService Redfish event management
/redfish/v1/EventService/Actions/EventService.SubmitTestEvent
/redfish/v1/EventSubscriptions
/redfish/v1/EventSubscriptions/<Subscription ID>