Probably every Zabbix user has a story of a Zabbix agent suddenly failing to work. Computers and networks are complex and diverse, and so are the causes of these problems.
This talk introduces a structured approach to debugging configuration problems, connectivity problems and problems in the execution of the agent. It will spotlight common problems, but also some rather obscure ones I met in the wild.
Zabbix Conference 2015
Rihards Olups - Encrypting Daemon Traffic With Zabbix 3.0Zabbix
Are you paranoid? Even if you are not, it might be a good idea to encrypt your email. Important documents. Communication. While monitoring data is not secret in many cases, transmitting it in plaintext over Internet does make some people nervous. And now, with Zabbix 3.0, there's a built-in way to encrypt communication between components, including Zabbix server, proxy, agent, get and sender. Yes, them all. In this short talk we'll learn about the available modes, supported libraries and how to configure it all to still make sense a few years later.
Zabbix Conference 2015
Aaron Mildenstein - Using Logstash with ZabbixZabbix
Logstash is a terrific tool for capturing, filtering, parsing and enriching data from a number of sources—including logs, of course. But Logstash is also able to capture from many other sources, including social media streams, databases, and many more. Data streams like these are a potential gold mine for Zabbix trending and alerting of all kinds.
In this talk Aaron Mildensten will provide an overview of how to configure and integrate Logstash with Zabbix to:
* capture data
* parse data events into key/value pairs
* associate an event with the time-stamp provided by the data
* generate metrics from the data
* output these values to Zabbix, with the associated time-stamp
Zabbix Conference 2015
Jean-Baptiste Favre - How to Monitor Bilions of Miles Shared by 20 Million Us...Zabbix
This talk will cover a case study at BlaBlaCar, a transport network community with more than 20 milion members in 19 countires. The presentation will overview using a low-powered virtual machine to monitor the whole environment, concentrating on LLD and trapper items. Also projects like python-protobix, jmx-zabbix and python-zabbix will be covered.
Zabbix Conference 2015
Raymond Kuiper - Working the API like a Unix ProZabbix
Communicating with the Zabbix API can be quite cumbersome, especially if you don't have a background as a programmer. For a sysadmin, it would be very nice if one could just run some CLI commands to control Zabbix behavior.
Wouldn't it be wonderful if you could fetch a list of active triggers and parse it with grep or sed to find the specific triggers you are looking for? Or perhaps you need a list of historic values that you can parse in a custom script? How about a cronjob that downloads and emails all the graphs in the system matching a certain regex?
In this presentation Raymond Kuiper will talk about some of these possibilities and show you how he achieved these things in his Zabbix setup.
Zabbix Conference 2015
Monitoring a billion kilometers of monthly ride sharing at BlaBlaCar - Zabbix...Jean Baptiste Favre
How BlaBlaCar designed and operates a Zabbix based monitoring platform, optimizing Zabbix configuration, developping & using python-protobix & jmx-zabbix for more scalability
Rihards Olups - Encrypting Daemon Traffic With Zabbix 3.0Zabbix
Are you paranoid? Even if you are not, it might be a good idea to encrypt your email. Important documents. Communication. While monitoring data is not secret in many cases, transmitting it in plaintext over Internet does make some people nervous. And now, with Zabbix 3.0, there's a built-in way to encrypt communication between components, including Zabbix server, proxy, agent, get and sender. Yes, them all. In this short talk we'll learn about the available modes, supported libraries and how to configure it all to still make sense a few years later.
Zabbix Conference 2015
Aaron Mildenstein - Using Logstash with ZabbixZabbix
Logstash is a terrific tool for capturing, filtering, parsing and enriching data from a number of sources—including logs, of course. But Logstash is also able to capture from many other sources, including social media streams, databases, and many more. Data streams like these are a potential gold mine for Zabbix trending and alerting of all kinds.
In this talk Aaron Mildensten will provide an overview of how to configure and integrate Logstash with Zabbix to:
* capture data
* parse data events into key/value pairs
* associate an event with the time-stamp provided by the data
* generate metrics from the data
* output these values to Zabbix, with the associated time-stamp
Zabbix Conference 2015
Jean-Baptiste Favre - How to Monitor Bilions of Miles Shared by 20 Million Us...Zabbix
This talk will cover a case study at BlaBlaCar, a transport network community with more than 20 milion members in 19 countires. The presentation will overview using a low-powered virtual machine to monitor the whole environment, concentrating on LLD and trapper items. Also projects like python-protobix, jmx-zabbix and python-zabbix will be covered.
Zabbix Conference 2015
Raymond Kuiper - Working the API like a Unix ProZabbix
Communicating with the Zabbix API can be quite cumbersome, especially if you don't have a background as a programmer. For a sysadmin, it would be very nice if one could just run some CLI commands to control Zabbix behavior.
Wouldn't it be wonderful if you could fetch a list of active triggers and parse it with grep or sed to find the specific triggers you are looking for? Or perhaps you need a list of historic values that you can parse in a custom script? How about a cronjob that downloads and emails all the graphs in the system matching a certain regex?
In this presentation Raymond Kuiper will talk about some of these possibilities and show you how he achieved these things in his Zabbix setup.
Zabbix Conference 2015
Monitoring a billion kilometers of monthly ride sharing at BlaBlaCar - Zabbix...Jean Baptiste Favre
How BlaBlaCar designed and operates a Zabbix based monitoring platform, optimizing Zabbix configuration, developping & using python-protobix & jmx-zabbix for more scalability
Vous n'avez pas pu assister à la journée DevOps by Xebia ? Voici la présentation de Vincent Spiewak (Xebia) à propos d'ElasticSearch, Logstash et Kibana.
Erik Skytthe - Monitoring Mesos, Docker, Containers with Zabbix | ZabConf2016Zabbix
At DBC we are running docker and other container types in a mesos/marathon cluster environment. I will demonstrate how we collect statistics, logs etc. and monitor this environment, showing configuration examples, data flows and templates.
Some of the covered topics:
- Mesos master and agents
- Marathon Framework
- Docker engine
- Containers
- Zookeeper
- Elasticserach/ELK
Devel::NYTProf 2009-07 (OUTDATED, see 201008)Tim Bunce
The slides of my "State-of-the-art Profiling with Devel::NYTProf" talk at OSCON in July 2009.
I'll upload a screencast and give the link in a blog post at http://blog.timbunce.org
ChinaNetCloud - The Zabbix Database - Zabbix Conference 2014ChinaNetCloud
Overview of the Zabbix monitoring system database and how to use or customize it for reporting and integration.
Originally given at Zabbix Global Conference in Riga, Latvia in Sept, 2014
Rihards Olups - Zabbix at Nokia - Case StudyZabbix
We will explore a fairly complicated Zabbix environment at one division in Nokia. Having several different Zabbix versions in use and a lot of custom products monitored, it is a place one can get lost in easily. We'll discuss JMX monitoring, approaches to keep notification configuration simple and notifications useful, different usecases for the Zabbix API and a lot of other topics. The importance of the SSL compliance will be covered along with some of the many ways custom solutions are monitored.
Managing Your Security Logs with ElasticsearchVic Hargrave
The ELK stack (Elasticsearch-Logstash-Kibana) provides a cost effective alternative to commercial SIEMs for ingesting and managing OSSEC alert logs. This presentation will show you how to construct a low cost SIEM based on ELK that rivals the capabilties of commercials SIEMs.
For the Docker users out there, Sematext's DevOps Evangelist, Stefan Thies, goes through a number of different Docker monitoring options, points out their pros and cons, and offers solutions for Docker monitoring. Webinar contains actionable content, diagrams and how-to steps.
Securing Prometheus exporters using HashiCorp VaultBram Vogelaar
Things like Infrastructure as Code, Service Discovery and Config Management can and have helped us to quickly build and rebuild infrastructure but we haven't nearly spend enough time to train our self to review, monitor and respond to outages. Does our platform degrade in a graceful way or what does a high cpu load really mean? What can we learn from level 1 outages to be able to run our platforms more reliably.
This talk will focus on on creating a secure prometheus exporter ecosystem using HashiCorp Vault where we can we be sure that we are not leaking any business metrics from our observability stack. After which we ll investigate how to automatically rotate the certificates we created to do so.
Nomad is popular as an efficient, lightweight container orchestrator. But a truly efficient, lightweight deployment environment can only be built on a minimal Linux that is designed specifically for running containers.
In this talk, we introduce Flatcar Container Linux to the Hashicorp/Nomad community. Already well known and widely deployed by Kubernetes users, Flatcar works just as well – or perhaps even better! – for Nomad.
Flatcar Container Linux is a secure, immutable, auto-updating, lightweight Linux operating system. This makes Flatcar a perfect match for Linux containers running on Nomad: nodes will update automatically and stay secure in a simple way, without the administrator having to do the heavy lifting.
This talk will explain best practices for deploying Nomad on Flatcar and demonstrate a Nomad cluster running on Flatcar.
Go beyond server and application stack monitoring, collect application specific metrics and push the information to interested parties. With the help of syslog, EventMachine and a few lines of Ruby code, you can build a language agnostic system to gather and process custom tailored reporting data.
Vous n'avez pas pu assister à la journée DevOps by Xebia ? Voici la présentation de Vincent Spiewak (Xebia) à propos d'ElasticSearch, Logstash et Kibana.
Erik Skytthe - Monitoring Mesos, Docker, Containers with Zabbix | ZabConf2016Zabbix
At DBC we are running docker and other container types in a mesos/marathon cluster environment. I will demonstrate how we collect statistics, logs etc. and monitor this environment, showing configuration examples, data flows and templates.
Some of the covered topics:
- Mesos master and agents
- Marathon Framework
- Docker engine
- Containers
- Zookeeper
- Elasticserach/ELK
Devel::NYTProf 2009-07 (OUTDATED, see 201008)Tim Bunce
The slides of my "State-of-the-art Profiling with Devel::NYTProf" talk at OSCON in July 2009.
I'll upload a screencast and give the link in a blog post at http://blog.timbunce.org
ChinaNetCloud - The Zabbix Database - Zabbix Conference 2014ChinaNetCloud
Overview of the Zabbix monitoring system database and how to use or customize it for reporting and integration.
Originally given at Zabbix Global Conference in Riga, Latvia in Sept, 2014
Rihards Olups - Zabbix at Nokia - Case StudyZabbix
We will explore a fairly complicated Zabbix environment at one division in Nokia. Having several different Zabbix versions in use and a lot of custom products monitored, it is a place one can get lost in easily. We'll discuss JMX monitoring, approaches to keep notification configuration simple and notifications useful, different usecases for the Zabbix API and a lot of other topics. The importance of the SSL compliance will be covered along with some of the many ways custom solutions are monitored.
Managing Your Security Logs with ElasticsearchVic Hargrave
The ELK stack (Elasticsearch-Logstash-Kibana) provides a cost effective alternative to commercial SIEMs for ingesting and managing OSSEC alert logs. This presentation will show you how to construct a low cost SIEM based on ELK that rivals the capabilties of commercials SIEMs.
For the Docker users out there, Sematext's DevOps Evangelist, Stefan Thies, goes through a number of different Docker monitoring options, points out their pros and cons, and offers solutions for Docker monitoring. Webinar contains actionable content, diagrams and how-to steps.
Securing Prometheus exporters using HashiCorp VaultBram Vogelaar
Things like Infrastructure as Code, Service Discovery and Config Management can and have helped us to quickly build and rebuild infrastructure but we haven't nearly spend enough time to train our self to review, monitor and respond to outages. Does our platform degrade in a graceful way or what does a high cpu load really mean? What can we learn from level 1 outages to be able to run our platforms more reliably.
This talk will focus on on creating a secure prometheus exporter ecosystem using HashiCorp Vault where we can we be sure that we are not leaking any business metrics from our observability stack. After which we ll investigate how to automatically rotate the certificates we created to do so.
Nomad is popular as an efficient, lightweight container orchestrator. But a truly efficient, lightweight deployment environment can only be built on a minimal Linux that is designed specifically for running containers.
In this talk, we introduce Flatcar Container Linux to the Hashicorp/Nomad community. Already well known and widely deployed by Kubernetes users, Flatcar works just as well – or perhaps even better! – for Nomad.
Flatcar Container Linux is a secure, immutable, auto-updating, lightweight Linux operating system. This makes Flatcar a perfect match for Linux containers running on Nomad: nodes will update automatically and stay secure in a simple way, without the administrator having to do the heavy lifting.
This talk will explain best practices for deploying Nomad on Flatcar and demonstrate a Nomad cluster running on Flatcar.
Go beyond server and application stack monitoring, collect application specific metrics and push the information to interested parties. With the help of syslog, EventMachine and a few lines of Ruby code, you can build a language agnostic system to gather and process custom tailored reporting data.
Meet the portfolio of AGS Aerohoses, updated in 2012. Through it, you will give all businesses, products and services offered by the AGS and companies represented.
The S.C. Press Association PALMY Advertising Contest annually honors the best newspaper advertising in South Carolina. Winning ads are listed by category. Judges' comments are included for first place winners.
The Future of Aboriginal Relations: Engaging Saskatchewan’s Fastest Growing P...fuzeconf
Engaging the First Nations and Métis population isn’t just good for business – it’s the right thing to do for the future of Saskatchewan. A lawyer and member of Kawacatoose First Nation, Leanne Bellegarde is dedicated to overcoming decades of misunderstanding and works daily building new relationships with our province’s youngest and fastest growing population. In this talk, Leanne will discuss PotashCorp’s highly successful Aboriginal engagement and community investment initiatives.
http://esemonopublicista.com/post/68326537456/decisiones-linguisticas-el-libro-rojo-de-c-c
Del mismo modo que al cocinar definimos el platillo que cocinaremos, y con ello determinamos los ingredientes, en la escritura (redacción, traducción, corrección) tomamos decisiones que seguramente muchas veces se han contrapuesto con los lineamientos de uno u otro chef. En este caso, de uno que otro profesional de la lengua.
Libro descargado de: http://blog.calamoycran.com/2013/09/27/el-prontuario-de-calamocran/
http://calamoycran.com/concurso/5-libro-rojo-de-c-c-prontuario-de-manuales-de-estilo
Log4Shell - Armageddon or Opportunity.pptxSteve Poole
It’s said that everyone remembers where they were when a momentous event occurs. Where were you on the 10 December 2021 or did the most comprehensively dangerous Java vulnerability pass you by?
Don’t be fooled into thinking it’s all over. Even by mid year the number of vulnerable servers will still be high because organisations still fail assess their vulnerability state correctly.
In this session I’ll cover, in detail, the actual mechanics of the vulnerability and demo a simple attack. I’ll take you through why this vulnerability can be as bad as it gets and explain what the options are to protect you application and how to assess if you’re still at risk.
It’s not all bad news. The Log4Shell wake up call shows us that we’re not paying the right sort of attention to security across the board but we can learn to do better. I’ll end the talk with explaining why security really matters, what developers can do improve their understanding of security principles in general and cover some of the practical next steps that are available.
Log4Shell is changing our world - let’s make sure its for the right reasons. Opportunity is knocking on your door.
Zoe Slattery's slides from PHPNW08:
The ability to store large quantities of local data means that many applications require some form of text search and retrieval facility. From the point of view of the application developer there are a number of choices to make, the first is whether to use a complete packaged solution or whether to use one of the available information libraries to build a custom information retrieval (IR) solution. In this talk I’ll look at the options for PHP programmers who choose to embed IR facilities within their applications.
For Java programmers there is clearly a good range of options for text retrieval libraries, but options for PHP programmers are more limited. At first sight for a PHP programmer wishing to embed indexing and search facilities in their application, the choice seems obvious - the PHP implementation of Lucene (Zend Search Lucene). There is no requirement to support another language, the code is PHP therefore easy for PHP programmers to work with and the license is commercially friendly. However, whilst ease of integration and support are key factors in choice of technology, performance can also be important; the performance of the PHP implementation of Lucene is poor compared to the Java implementation.
In this talk I’ll explain the differences in performance between PHP implementation of Lucene and the Java implementation and examine the other options available to PHP programmers for whom performance is a critical factor.
Open source network forensics and advanced pcap analysisGTKlondike
Speaker: GTKlondike
There is a lot of information freely available out on the internet to get network administrators and security professionals started with network analysis tools such as Wireshark. However, there is a well defined limit on how in depth the topic is covered. This intermediate level talk aims to bridge the gap between a basic understanding of protocol analyzers (I.e. Wireshark and TCPdump), and practical real world usage. Things that will be covered include: network file carving, statistical flow analysis, GeoIP, exfiltration, limitations of Wireshark, and other network based attacks. It is assumed the audience has working knowledge of protocol analysis tools (I.e. Wireshark and TCPdump), OSI and TCP/IP model, and major protocols (I.e. DNS, HTTP(s), TCP, UDP, DHCP, ARP, IP, etc.).
Bio
GTKlondike is a local hacker/independent security researcher who has a passion for network security, both attack and defense. He has several years experience working as an network infrastructure and security consultant mainly dealing with switching, routing, firewalls, and servers. Currently attending graduate school, he is constantly studying and learning new techniques to better defend or bypass network security mechanisms.
InSecure Remote Operations - NullCon 2023 by Yossi SassiYossi Sassi
Every admin tool is an attack tool, yet there are no good or bad shells - that part is up to you. Coming from dozens of engagements consulting various role-based remote operations architectures & Red Team assessments for organizations in 4 continents, with a fresh research hijacking full tokens from network logon-type sessions - we’ll dive into a technical, hands-on set of examples for both Offensive and Defensive teams, of what SUCKS and what ROCKS on the Windows ‘Living off the land’ remote admin operations, Protocols, and APIs. We'll talk about the Pros and Cons of jump server architectures, as well as role-based shells, limiting PowerShell in creative ways. We'll also introduce fresh research to achieve Full Token hijack from network logon-type sessions, without any hash and/or TGT!
[Ruxcon Monthly Sydney 2011] Proprietary Protocols Reverse Engineering : Rese...Moabi.com
This presentation given in 2011 during the first Ruxcon Monthly (Ruxmon) Sydney focuses on proprietary protocols reverse engineering and vulnerability audits.
Fantastic Red Team Attacks and How to Find ThemRoss Wolf
Presented at Black Hat 2019
https://www.blackhat.com/us-19/briefings/schedule/index.html#fantastic-red-team-attacks-and-how-to-find-them-16540
Casey Smith (Red Canary)
Ross Wolf (Endgame)
bit.ly/fantastic19
Abstract:
Red team testing in organizations over the last year has shown a dramatic increase in detections mapped to MITRE ATT&CK™ across Windows, Linux and macOS. However, many organizations continue to miss several key techniques that, unsurprisingly, often blend in with day-to-day user operations. One example includes Trusted Developer Utilities which can be readily available on standard user endpoints, not just developer workstations, and such applications allow for code execution. Also, XSL Script processing can be used as an attack vector as there are a number of trusted utilities that can consume and execute scripts via XSL. And finally, in addition to these techniques, trusted .NET default binaries are known to allow unauthorized execution as well, these include tools like InstallUtil, Regsvcs and AddInProcess. Specific techniques, coupled with procedural difficulties within a team, such as alert fatigue and lack of understanding with environmental norms, make reliable detection of these events near impossible.
This talk summarizes prevalent and ongoing gaps across organizations uncovered by testing their defenses against a broad spectrum of attacks via Atomic Red Team. Many of these adversary behaviors are not atomic, but span multiple events in an event stream that may be arbitrarily and inconsistently separated in time by nuisance events.
Additionally, we introduce and demonstrate the open-sourced Event Query Language for creating high signal-to-noise analytics that close these prevalent behavioral gaps. EQL is event agnostic and can be used to craft analytics that readily link evidence across long sequences of log data. In a live demonstration, we showcase powerful but easy to craft analytics that catch adversarial behavior most commonly missed in organizations today.
Slide deck from my presentation on multi-threading with .NET. The presentation covers from beginner onwards and looks at current technologies (i.e. pre .NET 4.0) specifically.
What makes this extra special is the entire process of how I prepared for it, from finding content to slide deck layout to presentation prep is documented at: http://www.sadev.co.za/content/how-i-build-presentations-series-index
Grâce aux tags Varnish, j'ai switché ma prod sur Raspberry PiJérémy Derussé
Le moyen le plus rapide d'obtenir une réponse d'un Backend est de ne pas l'appeler ;-) Une solution fournie par les "reverse-proxy" me direz-vous, mais pas si simple d'invalider le cache...
Ce talk aborde une fonctionnalité méconnue de Varnish: les tags. Nous verrons comment en tirer partie via les "event listeners" d'une application Symfony standard. Au menu, un cluster de Rasberry Pi, une API, et des données toujours fraîches sous la milliseconde.
Original slides from Ryan Dahl's NodeJs intro talkAarti Parikh
These are the original slides from the nodejs talk. I was surprised not find them on slideshare so adding them. The video link is here https://www.youtube.com/watch?v=ztspvPYybIY
The wireless network monitoring data are abundant, as it seems relevant store information from devices and users connected, especially in an multicampus environment like Unesp. In this sense, the database tends to increase rapidly the number of records, being necessary to optimize the periodic cleaning routine of Zabbix data. Here are our way of improving the functioning of the "housekeeping" native application. Also will demonstrate the massive use of the data type "Zabbix Trapper" for flexible the list of informations of Wi-Fi infrastructure and techniques varied use of "low level discovery" for monitoring of wireless access points.
Zabbix Conference LatAm 2016 - Andre Deo - Zabbix Brazil CommunityZabbix
In 2008 Brazil hadn't any community about Zabbix, and the software was not known to most people. What changed in 8 years? How a community initiated by one single man (like in Japan) made the difference? Currently this community has more than 3.000 members, many lectures at local events, articles in magazines, books, many blogs and member involved in building additional functions for Zabbix and translation of official documentation!
The aim of the lecture is the demonstration of the new Low Level Discovery Resources that emerged in Zabbix 3.0, as well as presentation, operation and demonstration LLD settings of Windows and ODBC Services.
Zabbix Conference LatAm 2016 - Andre Deo - SNMP and ZabbixZabbix
The aim of the lecture is to discuss the main questions people have when using SNMP with Zabbix. Will present an overview of SNMP, MIBs, Net-SNMP and items used in Zabbix templates.
Zabbix Conference LatAm 2016 - Rodrigo Mohr - Challenges on Large Env with Or...Zabbix
Scalability on a large environment can be a challenge on many different aspects involving customization of monitors, performance and reporting. The goal of this presentation is to share the experience we had at Dell, monitoring a big number of servers in an environment with constant changes, lots of custom monitors and new servers configured every week. We will present, from our 3 years of experience with Zabbix and Oracle, which positive/negative aspects we have taken from the configuration parameters we used, involving strong use of User Macros, optimization of Database Queries, Table Partitioning and Automation.
The Lojas Renner has always had a close proximity to the Open Source movement in Brazil. Still in the 90s, all the company's POS solutions have been migrated to Linux and in early 2000, migration started in all the company's systems, including the main components of critical infrastructure. Since then, much has changed. The world scene Open Source has become a worldwide standard for all products and companies, making its adoption not only an innovation but a necessity. Understand how since 2008 Zabbix helps us in monitoring the entire IT infrastructure, remote units and our business processes.
A Unirede atua desde 2008 com projetos de todos os portes envolvendo o Zabbix. Desde então surgem necessidades onde devemos garantir a interação do Zabbix com as mais variadas formas, métodos e ferramentas de mensageria para para notificar os eventos (E-mail, SMS, criação de tickets/chamados,arquivos de log, WhatsApp, VOIP, Telegram, etc). Nessa palestra irei tentar exemplificar como podemos interegir com o Telegram, recebendo e enviando mensagens para o Zabbix e dessa forma tornar mais dinâmica a comunicação de usuários remotos com seus servidores e equipamentos no datacenter.
Zabbix Conference LatAm 2016 - Filipe Paternot - Zbx@Globo Automation+Integra...Zabbix
Zabbix API offers us a lot of power and possibilities. We will talk about automation and integrations at scale, at Globo.com. Automating gives us power to clone instances of Zabbix, perform batch operations, manage MANY networks for discovery and more. We will present our layer of abstraction to API, democratizing API access, offering a nice UI and standards for every new service monitored and few cached responses. Also, we will show how we have integrated with CloudStack, to deliver automated private cloud monitoring into Zabbix.
Zabbix Conference LatAm 2016 - Douglas Esteves - Zabbix at UNICAMPZabbix
Present the Zabbix use case in the Computer Center of UNICAMP, excellent option for monitoring Datacenter Environments and the University Environment. Presentation of the use of the tool at UNICAMP with simple monitoring and case of IT Service Monitoring to measure Server Availability and Database.
Ryan Armstrong - Monitoring More Than 6000 Devices in Zabbix | ZabConf2016Zabbix
Ryan will describe a Skunkworks project executed by Kinetic IT at the Department of Education to deliver an autonomous infrastructure monitoring solution for over 6000 devices distributed across WA. The team were given opportunity to experiment with DevOps practices such as Scrum product development, Infrastructure As Code and Continuous Integration to determine where the value lay and which practices should be adopted at greater scale.
Rafael Martinez Guerrero - Zabbix at the University of Oslo | ZabConf2016Zabbix
A case study showing the problems we have resolved with Zabbix and the challenges we had when we implemented Zabbix as the main monitoring tool at the University of Oslo. The number of challenges is not low in an organization as heterogenous as ours, with many thousands of servers and clients, all kinds of devices connected to our infrastructure, different operating systems, multiple locations and hundreds of IT staff. Full automation and delegation of privileges are the key words in the work we have done during the past year and a half.
Wolfgang Alper - Zabbix Meets OPS Control / Rundeck | ZabConf2016Zabbix
Zabbix is an excellent tool to do network monitoring and to alert if something bad happens. But Zabbix can do more. An underestimated feature of Zabbix is its ability to perform actions in addition to simple notifications. However, this requires to precisly setup those actions within zabbix, which is not always an easy task and might duplicate existing work. So what if Zabbix actually worked in concert with an external taskrunner / jobscheduler that is build to do exactly this: run a task or action against a host and report its outcome? Zabbix would perform the same well defined steps that an ops member would perform in case of certain failures using this kind of tool. A well know example of this kind of software is "Rundeck" which is licensed under the Apache License Version 2.0.
Wolfgang Alper - Zabbix Meets OPS Control / Rundeck | ZabConf2016Zabbix
Zabbix is an excellent tool to do network monitoring and to alert if something bad happens. But Zabbix can do more. An underestimated feature of Zabbix is its ability to perform actions in addition to simple notifications. However, this requires to precisly setup those actions within zabbix, which is not always an easy task and might duplicate existing work. So what if Zabbix actually worked in concert with an external taskrunner / jobscheduler that is build to do exactly this: run a task or action against a host and report its outcome? Zabbix would perform the same well defined steps that an ops member would perform in case of certain failures using this kind of tool. A well know example of this kind of software is "Rundeck" which is licensed under the Apache License Version 2.0.
Sumit Goel - Monitoring Cloud Applications Using Zabbix | ZabConf2016Zabbix
With global shift towards flexibility of cloud there are different demands on monitoring availability and performance of applications provided in the cloud. There are obvious limitations in accessing components of app hosted by third party run outside of internal environment. Same time there are opportunities of using vendor API and status page. In Salesforce, one of the most innovative company in the world by Forbes and one of the biggest cloud service provider, we understand the need of customer to be able to see in real time availability and performance of cloud application. In the following presentation we're going to list and describe multiple ways of monitoring cloud apps. Some of the methods are: building in web monitoring using Curl, web browser automation tools like Selenium, external scripts (reading vendor status dashboard) and API calls to the app.
Raymond Kuiper - Zen and The Art of Zabbix Template Design | ZabConf2016Zabbix
Zabbix monitoring solution can help bring balance to your organisation's IT landscape. However, the success greatly depends on the templates you use to setup your monitoring system. As any Zabbix veteran will tell you, the default templates don't really suffice for any setup other than a proof-of-concept. How then do you set about creating your own templates? Following practical examples, we'll discuss some of the design decisions that need to be made to achieve template perfection.
Dimitri Bellini and Pietro Antonacci - Manage Zabbix Proxies in Remote Networ...Zabbix
Monitoring multiple server farms spread all around the world is not an easy task, many small problems have to be addressed, but using Zabbix it is all a breeze.
We will talk about our experience on setup of Zabbix proxies in very remote networks, problems we encountered and how we worked on fixing them.
Mikhail Serkov - Zabbix for HPC Cluster Support | ZabConf2016Zabbix
For the last two years I've been working in Cambridge (US) in Novartis Institute for Biomedical Research (NIBR) on a project related to a support of HPC cluster infrastructure and users. We're using Zabbix for HPC cluster monitoring (more than 1000 nodes, 10000+ cores, GPU cores, etc). In this presentation we will cover interesting use cases of Zabbix for HPC cluster, as it's not a regular infrastructure monitoring. We will talk about some challenges we have in HPC monitoring, how Zabbix helps us to work with scientists as well as present some solutions, which might be interesting for Zabbix community.
Lukáš Malý - Log management ELISA controlled by Zabbix | ZabConf2016Zabbix
Datasys ELISA log management is robust, powerful, yet inexpensive solution for collection, correlation and analysis of logs. Core system consists of the Elasticsearch “noSQL“ database and the web user interface Kibana, which provides high comfort for analysis of detected security incidents and relevant logs. It is common that the database ElasticSearch is distributed to multiple servers to achieve load balancing and high availability of indexed data. ELISA heavily utilizes ZABBIX for user authentication and role based access control, notifications and self-monitoring. Elasticsearch Indices can be managed right in ZABBIX Frontend. ZABBIX "trapper" items and monitoring templates are used to centrally manage configuration of distributed environment of NXlog agents. Agents are capable to securely auto-register as ZABBIX "hosts".
Konstantin Yakovlev - Event Analysis Toolset | ZabConf2016Zabbix
During outages on 10k+ hosts environment, NOC and Operations teams may face hundreds of alerts in order to perform root cause analysis, remediation or escalation, meanwhile logging resolution progress to Incident Management system for audit purposes.
This presentation will describe RingCentral approach to Incident and Problem Management in large Zabbix monitored cloud.
Co-authors of the presentation: Dmitry Shchemelinin, Ph.D., Sr. Director of Operations, RingCentral, USA.
Adjusting primitives for graph : SHORT REPORT / NOTESSubhajit Sahu
Graph algorithms, like PageRank Compressed Sparse Row (CSR) is an adjacency-list based graph representation that is
Multiply with different modes (map)
1. Performance of sequential execution based vs OpenMP based vector multiply.
2. Comparing various launch configs for CUDA based vector multiply.
Sum with different storage types (reduce)
1. Performance of vector element sum using float vs bfloat16 as the storage type.
Sum with different modes (reduce)
1. Performance of sequential execution based vs OpenMP based vector element sum.
2. Performance of memcpy vs in-place based CUDA based vector element sum.
3. Comparing various launch configs for CUDA based vector element sum (memcpy).
4. Comparing various launch configs for CUDA based vector element sum (in-place).
Sum with in-place strategies of CUDA mode (reduce)
1. Comparing various launch configs for CUDA based vector element sum (in-place).
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...pchutichetpong
M Capital Group (“MCG”) expects to see demand and the changing evolution of supply, facilitated through institutional investment rotation out of offices and into work from home (“WFH”), while the ever-expanding need for data storage as global internet usage expands, with experts predicting 5.3 billion users by 2023. These market factors will be underpinned by technological changes, such as progressing cloud services and edge sites, allowing the industry to see strong expected annual growth of 13% over the next 4 years.
Whilst competitive headwinds remain, represented through the recent second bankruptcy filing of Sungard, which blames “COVID-19 and other macroeconomic trends including delayed customer spending decisions, insourcing and reductions in IT spending, energy inflation and reduction in demand for certain services”, the industry has seen key adjustments, where MCG believes that engineering cost management and technological innovation will be paramount to success.
MCG reports that the more favorable market conditions expected over the next few years, helped by the winding down of pandemic restrictions and a hybrid working environment will be driving market momentum forward. The continuous injection of capital by alternative investment firms, as well as the growing infrastructural investment from cloud service providers and social media companies, whose revenues are expected to grow over 3.6x larger by value in 2026, will likely help propel center provision and innovation. These factors paint a promising picture for the industry players that offset rising input costs and adapt to new technologies.
According to M Capital Group: “Specifically, the long-term cost-saving opportunities available from the rise of remote managing will likely aid value growth for the industry. Through margin optimization and further availability of capital for reinvestment, strong players will maintain their competitive foothold, while weaker players exit the market to balance supply and demand.”
Show drafts
volume_up
Empowering the Data Analytics Ecosystem: A Laser Focus on Value
The data analytics ecosystem thrives when every component functions at its peak, unlocking the true potential of data. Here's a laser focus on key areas for an empowered ecosystem:
1. Democratize Access, Not Data:
Granular Access Controls: Provide users with self-service tools tailored to their specific needs, preventing data overload and misuse.
Data Catalogs: Implement robust data catalogs for easy discovery and understanding of available data sources.
2. Foster Collaboration with Clear Roles:
Data Mesh Architecture: Break down data silos by creating a distributed data ownership model with clear ownership and responsibilities.
Collaborative Workspaces: Utilize interactive platforms where data scientists, analysts, and domain experts can work seamlessly together.
3. Leverage Advanced Analytics Strategically:
AI-powered Automation: Automate repetitive tasks like data cleaning and feature engineering, freeing up data talent for higher-level analysis.
Right-Tool Selection: Strategically choose the most effective advanced analytics techniques (e.g., AI, ML) based on specific business problems.
4. Prioritize Data Quality with Automation:
Automated Data Validation: Implement automated data quality checks to identify and rectify errors at the source, minimizing downstream issues.
Data Lineage Tracking: Track the flow of data throughout the ecosystem, ensuring transparency and facilitating root cause analysis for errors.
5. Cultivate a Data-Driven Mindset:
Metrics-Driven Performance Management: Align KPIs and performance metrics with data-driven insights to ensure actionable decision making.
Data Storytelling Workshops: Equip stakeholders with the skills to translate complex data findings into compelling narratives that drive action.
Benefits of a Precise Ecosystem:
Sharpened Focus: Precise access and clear roles ensure everyone works with the most relevant data, maximizing efficiency.
Actionable Insights: Strategic analytics and automated quality checks lead to more reliable and actionable data insights.
Continuous Improvement: Data-driven performance management fosters a culture of learning and continuous improvement.
Sustainable Growth: Empowered by data, organizations can make informed decisions to drive sustainable growth and innovation.
By focusing on these precise actions, organizations can create an empowered data analytics ecosystem that delivers real value by driving data-driven decisions and maximizing the return on their data investment.
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...John Andrews
SlideShare Description for "Chatty Kathy - UNC Bootcamp Final Project Presentation"
Title: Chatty Kathy: Enhancing Physical Activity Among Older Adults
Description:
Discover how Chatty Kathy, an innovative project developed at the UNC Bootcamp, aims to tackle the challenge of low physical activity among older adults. Our AI-driven solution uses peer interaction to boost and sustain exercise levels, significantly improving health outcomes. This presentation covers our problem statement, the rationale behind Chatty Kathy, synthetic data and persona creation, model performance metrics, a visual demonstration of the project, and potential future developments. Join us for an insightful Q&A session to explore the potential of this groundbreaking project.
Project Team: Jay Requarth, Jana Avery, John Andrews, Dr. Dick Davis II, Nee Buntoum, Nam Yeongjin & Mat Nicholas
Volker Fröhlich - How to Debug Common Agent Issues
1. How to Debug Common Agent Issues
Volker Fröhlich
12 Sep 2015, Zabbix Conference
2. The well-known Helpful tools Devil in the details Examples
Who am I?
Volker Fröhlich (volter)
Geizhals Preisvergleich Internet Services AG
(http://geizhals.at)
Action simulator, Zabbix blog, various frontend patches
Fedora packager, Openstreetmap contributor
3. The well-known Helpful tools Devil in the details Examples
Goals of this talk
Item unsupported, odd values, ...
It is useful to understand the inner workings
How to figure out what’s wrong – efficiently!
4. The well-known Helpful tools Devil in the details Examples
Overview
1 Well-known facts and gotchas
2 Helpful tools
3 The devil is in the details
4 Examples
5. The well-known Helpful tools Devil in the details Examples
Modes & Protocols
Passive agent
Server/proxy connects to
agent (TCP 10050)
Wire protocol
One connection per item
retrieval
Remote commands
Active agent
Agent connects to
server/proxy (TCP 10051)
JSON protocol
Configuration is requested
Auto-registration
Can buffer and submit
multiple values
Some items only work in
this mode
6. The well-known Helpful tools Devil in the details Examples
Modes & Protocols II
Sender/Trapper
Connects to proxy/server
(TCP 10051)
Single value or in bulk
Timestamped data
Processes
1 Main
1 Collector
x Passive workers
1 Active worker
7. The well-known Helpful tools Devil in the details Examples
Configuration files
Server, ServerActive
Hostname, HostnameItem
UserParameter, Modules
Include
8. The well-known Helpful tools Devil in the details Examples
Frontend level gotchas
Configuration cache delay, Discovery rule interval, deactivated
prototypes
Confused something (host/template), non-audited changes
(ZBX-2815, ZBX-4842)
Datatype wrong (delta as speed/s)
Macros
Quoting, escaping, passing arguments
9. The well-known Helpful tools Devil in the details Examples
System level gotchas
Not restarted
Wrong configuration file (symlink, agent/agentd)
Firewall (local or anywhere)
Permissions
SELinux/grsecurity/apparmor
sudo
Proxies
Timeouts Active/Passive
10. The well-known Helpful tools Devil in the details Examples
What if it’s something else?
Have you tried turning it off and on again?
Read error messages and know where to find them
Logging/Syslog
Debug level <= 3 (Information)
IPC issues, worker start, problems hostname/hostnameitem, No active checks on server, can not retrieve
some JSON key (agent protocol), active check x is not supported, Collector issues
Debug level 4 (Debug)
Which Zabbix function is running and when it finishes, exactly what is sent, what is received; Collector
details
Read the source code – src/libs/zbxsysinfo/
Sniff, trace, understand/speak the protocols
11. The well-known Helpful tools Devil in the details Examples
A list of useful tools
zabbix_get
(zabbix_agentd)
ps/pgrep
strace/truss/dtruss
ltrace/dtrace
ausearch
syslog
netstat/ss
ip/route/traceroute
tcpdump/Wireshark
getent/nslookup/dig/host
netcat/socat/telnet
13. The well-known Helpful tools Devil in the details Examples
tcpdump
# tcpdump -i lo -nn port 10050
00:20:34.065579 IP 127.0.0.1.49134 > 127.0.0.1.10050: Flags [S], seq 640796155
00:20:34.065599 IP 127.0.0.1.10050 > 127.0.0.1.49134: Flags [S.], seq 2538515492
00:20:34.065612 IP 127.0.0.1.49134 > 127.0.0.1.10050: Flags [.], ack 1
00:20:34.065636 IP 127.0.0.1.49134 > 127.0.0.1.10050: Flags [P.], seq 1:6
00:20:34.065644 IP 127.0.0.1.10050 > 127.0.0.1.49134: Flags [.], ack 6
00:20:34.065670 IP 127.0.0.1.10050 > 127.0.0.1.49134: Flags [.], ack 14
00:20:34.065687 IP 127.0.0.1.49134 > 127.0.0.1.10050: Flags [P.], seq 14:25, ack 1
...
14. The well-known Helpful tools Devil in the details Examples
DNS
PTR record
res_init(), getaddrinfo()/getnameinfo()
getent ahosts <name or ip_address>
IPv6 (gai.conf)
Empty hosts file (localhost)
dnsmasq, nscd, bind, dnscache, ...
15. The well-known Helpful tools Devil in the details Examples
Other networking-related trouble
Routing (IPv6 again!)
ip route get <target_ip_address>
Latency, efficiency (like old HTTP)
Ephemeral port re-use with Windows hosts
Protocol src_ip:src_port dst_ip:src_port
Lost TCP segments
16. The well-known Helpful tools Devil in the details Examples
Timing/Timeouts
Which timeout applies and how often? Active, passive?
Scalability for active checks (ZBXNEXT-691)
Re-enable unsupported active agent items (ZBXNEXT-2633)
When are active items scheduled
Influence of network latency and lossyness
zabbix_get has a hard-coded timeout! (ZBXNEXT-1468)
Escaping agent timeouts
17. The well-known Helpful tools Devil in the details Examples
Other gotchas
Environment, shell
Testing with zabbix_agentd – No collector
hostnameitem and zabbix_sender (ZBXNEXT-1729)
Debugging zabbix_sender is only possible on the server/proxy
Zabbix doesn’t care about stderr or the exit code, empty
response disables item (ZBXNEXT-2230)
web.page.* does not use a HTTP client library
(ZBXNEXT-1816)
Order matters when submitting timestamped data with
zabbix_sender
LLD items
18. The well-known Helpful tools Devil in the details Examples
"Agent unreachable"
Bottom-up approach
19. The well-known Helpful tools Devil in the details Examples
"Agent is responding with a wrong value"
Poking/bisecting approach
zabbix_get locally –> Value OK
zabbix_get from server –> Value OK
Maybe a problem with name resolution in the server!
Log level 4 or tcpdump –> No incoming request
Ensure general connectivity –> OK
Obviously querying a different host
20. The well-known Helpful tools Devil in the details Examples
Contact information and readings
volter in #zabbix and #zabbix-de on Freenode IRC
volker.froehlich@geizhals.at
Readings
http://blog.zabbix.com/
mysterious-zabbix-problems-how-we-debug-them
http://zabbix.org/wiki/Troubleshooting
http://zabbix.org/wiki/Docs/protocols
Internetworking with TCP/IP, Vol. 1, Douglas E. Comer