SlideShare a Scribd company logo
1 of 47
Download to read offline
Painlessly Discovering and MonitoringPainlessly Discovering and Monitoring
Systems, Services and ComplianceSystems, Services and Compliance
#AssimProj @OSSAlanR
http://assimproj.org/
Alan Robertson <alanr@assimilationsystems.com>
Assimilation Systems Limited
http://assimilationsystems.com
© 2015 Assimilation Systems Limited
2
BiographyBiography
● 35+ years in IT/development – 10 years in
system management (SysAdmin)
● Founded Linux-HA project - led 1998-2007 –
aka “Heartbeat” - now called Pacemaker
● Founded Assimilation Project in 2010
● Founded Assimilation Systems Limited in 2013
● Alumnus of Bell Labs, SuSE, IBM
© 2015 Assimilation Systems Limited
3
Assimilation Project EvolutionAssimilation Project Evolution
● Inspired by 2 million core computer
(cyclops64)
● Concerns for extreme scale
● Topology aware monitoring
● Topology discovery w/out security issues
=►Discovery of everything!
© 2015 Assimilation Systems Limited
4
A 6-dimensional overviewA 6-dimensional overview
1.System Management Suite Overview
2.Basic Technology
3.Best Practice Analyses
4.Demo
5.Current Status
6.What You Need To Do!
© 2015 Assimilation Systems Limited
5
Disturbing Trends...Disturbing Trends...
30% of break-ins come through “lost” systems (Verizon)
90% have had failures of unmonitored services (Turnbull)
80% are unable to stay in compliance (Verizon)
30% only start monitoring only after a problem (Turnbull)
30% of systems doing nothing useful (Koomey)
© 2015 Assimilation Systems Limited
6
More Trends...More Trends...
● Larger sites have trouble scaling monitoring
(Turnbull)
● Larger site admins often don’t know dependencies
● Documentation is incomplete, out of date, expensive
© 2015 Assimilation Systems Limited
7
You can't manage what you can'tYou can't manage what you can't
see...see...
We give you X-Ray vision into your infrastructure
● Provides insight and details through a graph-model CMDB
● Helps you understand and automate your environment
– Reduce Errors
– Speed up problem resolution
● Reduces Manual Documentation
● CMDB-driven configuration => near-zero configuration
● Automates Monitoring
● Enhances Security
● Designed for Extreme Scale
© 2015 Assimilation Systems Limited
8
What's in the Suite?What's in the Suite?
● Graph CMDB
● Exception Monitoring
● Security Discovery
● Network Connections
© 2015 Assimilation Systems Limited
9
Our Unique ValueOur Unique Value
● Security – continuous security compliance
● Scalability – scales like nothing else
● Complexity Management – reduces and
helps you manage complexity
© 2015 Assimilation Systems Limited
10
ComplexityComplexity
“Complexity is the enemy of reliability”
● Complexity likely your single biggest
problem
– Near-zero configuration reduces complexity
– Tight service integration reduces complexity
– Accurate detailed information provides insights
which help manage complexity
© 2015 Assimilation Systems Limited
11
Highly Scalable Discovery-DrivenHighly Scalable Discovery-Driven
AutomationAutomation
Continuous Discovery drives everything
● Continuous extensible discovery (CMDB)
– systems, switches, services, dependencies – zero
network footprint discovery process
● Extensible exception monitoring
– more than 100K systems
● Discovery Drives Best Practice Analyses
– Initially concentrating on security
● All data goes into central graph CMDB
© 2015 Assimilation Systems Limited
12
This all sounds unreasonable...This all sounds unreasonable...
● Huge scalability without complexity?
● Discovery without pings or port scans?
Really?
© 2015 Assimilation Systems Limited
13
SSimple Scalabilityimple Scalability
I can explain how we scale so your
grandmother would understand...
istockphoto
©bowdenimages
© 2015 Assimilation Systems Limited
14
Massive Scalability –Massive Scalability – oror
“I see dead servers in“I see dead servers in OO(1) time”(1) time”
● Adding systems does not increase the monitoring work on any system
● Each server monitors 2 (or 4) neighbors
● Each server monitors and discovers its own services
● Ring repair and alerting is O(n) – but a very small amount of work
Current Implementation
© 2015 Assimilation Systems Limited
15
Minimizing Network FootprintMinimizing Network Footprint
(in our roadmap)(in our roadmap)
● Support diagnosing switch issues
● Minimize network traffic
● Ideal for multi-site arrangements
© 2015 Assimilation Systems Limited
16
Service Monitoring based on HAService Monitoring based on HA
TechnologiesTechnologies
● Well-proven architecture:
– reliable “no news is good news”
● Implements Open Cluster Framework
standard, LSB and Nagios remote agent APIs
● Each system monitors own services
● Can also start, stop, migrate services
© 2015 Assimilation Systems Limited
17
How does discovery work?How does discovery work?
Nanoprobe scripts perform discovery
● Each discovers one kind of information
● Can take arguments from environment
● Output JSON
CMA stores Discovery Information
● JSON stored in Neo4j database
● CMA discovery plugins => graph nodes and relationships
© 2015 Assimilation Systems Limited
18
OS discovery JSON SnippetOS discovery JSON Snippet
{ "nodename": "alanr-1225B",
"operating-system": "GNU/Linux",
"machine": "x86_64",
"processor": "x86_64",
"hardware-platform": "x86_64",
"kernel-name": "Linux",
"kernel-release": "3.8.0-31-generic",
"kernel-version": "#46-Ubuntu SMP ...",
"Distributor ID": "Ubuntu",
"Description": "Ubuntu 13.04",
"Release": "13.04",
"Codename": "raring" }
© 2015 Assimilation Systems Limited
19
"sshd": {
"exe": "/usr/sbin/sshd",
"cmdline": [ "/usr/sbin/sshd", "-D" ],
"uid": "root",
"gid": "root",
"cwd": "/",
"listenaddrs": {
"0.0.0.0:22": { "proto": "tcp" }
}
sshdsshd ServiceService JSON SnippetJSON Snippet
(from netstat and /proc)(from netstat and /proc)
© 2015 Assimilation Systems Limited
20
"ssh": {
"exe": "/usr/sbin/ssh",
"cmdline": [ "ssh", "servidor" ],
"uid": "alanr",
"gid": "alanr",
"cwd": "/home/alanr/monitor/src",
"clientaddrs": {"10.10.10.5:22": {"proto": "tcp"}
}
sshssh ClientClient JSON SnippetJSON Snippet
(from netstat and /proc)(from netstat and /proc)
© 2015 Assimilation Systems Limited
21
Service Dependency GraphService Dependency Graph
© 2015 Assimilation Systems Limited
22
Switch Discovery GraphSwitch Discovery Graph
from LLDP (or CDP)from LLDP (or CDP)
© 2015 Assimilation Systems Limited
23
Why a graph database? (Neo4j)Why a graph database? (Neo4j)
● Humans describe systems as graphs
● Dependency & Discovery information: graph
● Speed of graph traversals depends on size of subgraph,
not total graph size
● Root cause queries  graph traversals – notoriously slow
in relational databases
● Visualization is Natural
● Schema-less design: good for constantly changing
heterogeneous environment
● Graph Model === Object Model
© 2015 Assimilation Systems Limited
24
A Few Canned QueriesA Few Canned Queries
allipports get all port/ip/service/hosts
allswitchports get switch connections
crashed get crashed servers
shutdown get gracefully shutdown servers
downservices get nonworking services
findip get system owning IP
findmac get system owning MAC
unknownips get unknown IP addresses
unmonitored get unmonitored services
© 2015 Assimilation Systems Limited
25
BBest Practice Analysesest Practice Analyses
Under active development
● Triggered by Discovery Updates
– Analysis occurs within seconds of change
– No change => No analysis
● We can analyze anything discovered
● Expect to create alerts and reports
● SIEM integration
© 2015 Assimilation Systems Limited
26
Sample Security Best PracticesSample Security Best Practices
● Inappropriate services (telnet, etc)
● Settings in /proc/sys/
● Security Patch Coverage
– OS vendor (RedHat, SuSE, Canonical, etc)
– Application (Oracle, IBM, WordPress, etc)
● Other OS settings
● Common Application Settings
● Looking at best practices
FYI: Collaborating with Lynis project and Linux Foundation
© 2015 Assimilation Systems Limited
27
Other Sample Security FeaturesOther Sample Security Features
● Discovery of “forgotten” IP addresses
● Monitoring of Open Ports and Services
● Collection of network-facing app checksums
● Nmon profiling of new MAC addresses
● Checksum outliers analysis
● Security Best Practice Analyses
© 2015 Assimilation Systems Limited
28
IT Best Practices ProjectIT Best Practices Project
ITBestPractices.info
● IT-Bestpractices GitHub project
● Working on Linux Foundation Sponsorship
● Apache 2 License (or similar)
● Initial Sources
– DISA STIGs
– Lynis project
– PCI DSS rules
– Individual contributions
© 2015 Assimilation Systems Limited
29
IT Best Practices GoalsIT Best Practices Goals
● Make Best Practice rules available in JSON
– Curate mechanically-verifiable practices
– Human-readable descriptions of issues and
remedies
– Multiple language support
– Not limited to security best practices
– Web server under development
© 2015 Assimilation Systems Limited
30
Sample short descriptionSample short description
The system must limit the ability of processes to
have simultaneous write and execute access to
memory.
© 2015 Assimilation Systems Limited
31
Sample long descriptionSample long description
ExecShield uses the segmentation feature on all
x86 systems to prevent execution in memory
higher than a certain address. It writes an address
as a limit in the code segment descriptor, to control
where code can be executed, on a per-process
basis. When the kernel places a process's memory
regions such as the stack and heap higher than
this address, the hardware prevents execution in
that address range.
© 2015 Assimilation Systems Limited
32
Sample Security Rule checkSample Security Rule check
The status of the "kernel.exec-shield" kernel parameter can
be queried by running the following command:
$ sysctl kernel.exec-shield
$ grep kernel.exec-shield /etc/sysctl.conf
The output of the command should indicate a value of "1". If
this value is not the default value, investigate how it could
have been adjusted at runtime, and verify it is not set
improperly in "/etc/sysctl.conf".
If the correct value is not returned, this is a finding.
© 2015 Assimilation Systems Limited
33
Assimilation /proc/sys RuleAssimilation /proc/sys Rule
Disallow executing code on writable pages
“nist_V-38597”:
{“rule”: “EQ($kernel.exec-shield, 1)”,
“category”: “security”
}
© 2015 Assimilation Systems Limited
34
Assimilation Networking RuleAssimilation Networking Rule
Buffer bloat prevention
“itbp-0001”:
{“rule”: “IN($kernel.core.default_qdisc,
fq_codel, codel)”,
“category”: “networking”
}
© 2015 Assimilation Systems Limited
35
DDiscovery / Monitoring / Bestiscovery / Monitoring / Best
Practices DemoPractices Demo
● Demonstrate basic capabilities
– Discovery-driven monitoring configuration
– Discovery-driven 'tripwire-like' checksums
– Monitoring – failures / successes
– Host down notification
– Best Practices
● No configuration was supplied
– everything comes from discovery
http://assimilationsystems.com/90_second_demo/
© 2015 Assimilation Systems Limited
36
Current StatusCurrent Status
● 1.1.0 release out 3 November 2015
● Way-cool simplified installer!
● Continuous Security Monitoring
– ~50 best practice rules implemented
● Great unit and system tests
● Strongly encrypted communication
● Quite a few discovery methods written
● Extensible Automated Discovery Triggers
● Discovery => Automatic Monitoring + Network-Facing Checksums
● Compatible with Nagios remote monitoring agent API
● REST + Command Line Queries
© 2015 Assimilation Systems Limited
37
Get Involved!Get Involved!
● Trials! Early Adopters!
● Contributors
– Testers, Continuous Integration
– Best practice experts
– Designers
– Developers (C, Python, Shell, PowerShell, JavaScript)
– Porters (esp Windows)
– Promoters, Publicists, Packagers, etc.
© 2015 Assimilation Systems Limited
38
Resistance Is Futile!Resistance Is Futile!
These slides: bit.ly/DOSUG0915
Mailing List: bit.ly/AssimML
@OSSAlanR
#assimilation on irc.freenode.net
Project Web Site: assimproj.org
Company Web Site: assimilationsystems.com
Download: assimilationsystems.com/download
© 2015 Assimilation Systems Limited
39
Risk Management/MitigationRisk Management/Mitigation
● Intrusions
● Vulnerable Software
● Licensed Software
● Audit Risk
● Outages
● System management
© 2015 Assimilation Systems Limited
40
Monitoring Pros and ConsMonitoring Pros and Cons
Pros
Simple & Scalable
Uniform work distribution
No single point of failure
Distinguishes switch vs
host failure
Easy on LAN, WAN
Multi-tenant approach
Cons
Active agents
Potential slowness
at power-on
© 2015 Assimilation Systems Limited
41
Sixth Dimension:Sixth Dimension:
Graph SchemaGraph Schema
Two Schema subgraphs
● Client / server
dependency
● Switch interconnect
First DimensionFirst Dimension::
Problems AddressedProblems Addressed
● Discovering and maintaining documentation
(CMDB) using continuous discovery
– Services, Systems, Dependencies, Switches, Interconnects,
Configuration
● Monitoring and alerting: services, systems and
compliance
● Managing compliance
● Mitigating risk
© 2015 Assimilation Systems Limited
45
Why Discovery? (DevOps)Why Discovery? (DevOps)
● Documentation: incomplete, incorrect
● Dependencies: unknown
● Planning: Needs accurate data
● Best Practices: Verification needs data
● ITIL CMDB (Configuration Management
Data Base)
Our Discovery: continuous, low-profile
© 2015 Assimilation Systems Limited
46
Second Dimension:Second Dimension:
Unique Powerful FeaturesUnique Powerful Features
1. Continuous Discovery
2. Discovery: Zero network footprint
3. Centralized graph database
4. We know everything that changes
5. Discover and update dependency information
6. Discovery and monitoring tightly integrated –
discovery drives automation
© 2015 Assimilation Systems Limited
47
(even more) Features...(even more) Features...
7. Discovery and monitoring easily extensible
8. Naturally scalable to > 100K systems
9. Minimal network load
10.Server failures distinguishable from switch failures
11.Best practice and vulnerability alerts
12.Multi-tenant support
© 2015 Assimilation Systems Limited
48
Third Dimension:Third Dimension:
Fully distributed workFully distributed work
Two philosophical underpinnings
1. Monitoring and Discovery are fully distributed
2. Reliable “no news is good news”
Only responses to changes are centralized
© 2015 Assimilation Systems Limited
49
Sample /proc/sys RulesSample /proc/sys Rules
“BPC-00002-1”:
{“rule”: “OR(EQ($kernel.core_uses_pid, 1),
NE($kernel.core_pattern, ""))”
“url”: “https://trello.com/c/6LOXeyDD” },
“BPC-00003-1”: {“rule”: “EQ($kernel.ctrl-alt-del, 0)”,
“url”: “https://trello.com/c/aUmn4WFg”},
“BPC-00006-1”: {“rule”: “EQ($kernel.sysrq, 0)”,
“url”: “https://trello.com/c/QSovxhup” },

More Related Content

What's hot

Security Change Management: Agility vs. Control
Security Change Management: Agility vs. ControlSecurity Change Management: Agility vs. Control
Security Change Management: Agility vs. ControlAlgoSec
 
5º MeetUP ARQconf 2016 - IoT: What is it really and how does it work?
5º MeetUP ARQconf 2016 - IoT: What is it really and how does it work?5º MeetUP ARQconf 2016 - IoT: What is it really and how does it work?
5º MeetUP ARQconf 2016 - IoT: What is it really and how does it work?GlobalLogic Latinoamérica
 
Production Ready Microservices at Scale
Production Ready Microservices at ScaleProduction Ready Microservices at Scale
Production Ready Microservices at ScaleRajeev Bharshetty
 
5 things you didn't know you could do with security policy management
5 things you didn't know you could do with security policy management5 things you didn't know you could do with security policy management
5 things you didn't know you could do with security policy managementAlgoSec
 
Shift Happens: Eliminating the Risks of Network Security Policy Changes
Shift Happens: Eliminating the Risks of Network Security Policy ChangesShift Happens: Eliminating the Risks of Network Security Policy Changes
Shift Happens: Eliminating the Risks of Network Security Policy ChangesAlgoSec
 
Open Security Controls Assessment Language (OSCAL) - 1st Workshop, Nov 5-7, 2019
Open Security Controls Assessment Language (OSCAL) - 1st Workshop, Nov 5-7, 2019Open Security Controls Assessment Language (OSCAL) - 1st Workshop, Nov 5-7, 2019
Open Security Controls Assessment Language (OSCAL) - 1st Workshop, Nov 5-7, 2019MichaelaIorgaPhD
 
2008-01-22 Red Hat (Security) Roadmap Presentation
2008-01-22 Red Hat (Security) Roadmap Presentation2008-01-22 Red Hat (Security) Roadmap Presentation
2008-01-22 Red Hat (Security) Roadmap PresentationShawn Wells
 
Perforce on Tour 2015 - Securing the Helix Platform at Citrix
Perforce on Tour 2015 - Securing the Helix Platform at CitrixPerforce on Tour 2015 - Securing the Helix Platform at Citrix
Perforce on Tour 2015 - Securing the Helix Platform at CitrixPerforce
 
Putting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallPutting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallCisco Canada
 
Savvius_Introduction to workshop
Savvius_Introduction to workshopSavvius_Introduction to workshop
Savvius_Introduction to workshopSTelligence Company
 
Software Defined Networking: Network Virtualization
Software Defined Networking: Network VirtualizationSoftware Defined Networking: Network Virtualization
Software Defined Networking: Network VirtualizationNetCraftsmen
 
Threat intelligence solution
Threat intelligence solutionThreat intelligence solution
Threat intelligence solutionARUN REDDY M
 
Long Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and SplunkLong Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and SplunkSavvius, Inc
 
Managing a Widely Distributed Network
Managing a Widely Distributed NetworkManaging a Widely Distributed Network
Managing a Widely Distributed Network Savvius, Inc
 
How can Savvius help your organization?
How can Savvius help your organization?How can Savvius help your organization?
How can Savvius help your organization?STelligence Company
 
Top 5 favourite features of Cisco ACI in Pulsant Cloud Data Centres
Top 5 favourite features of Cisco ACI in Pulsant Cloud Data Centres Top 5 favourite features of Cisco ACI in Pulsant Cloud Data Centres
Top 5 favourite features of Cisco ACI in Pulsant Cloud Data Centres Martin Lipka
 
Software Defined Network - SDN
Software Defined Network - SDNSoftware Defined Network - SDN
Software Defined Network - SDNVenkata Naga Ravi
 
NCS: NEtwork Control System Hands-on Labs
NCS:  NEtwork Control System Hands-on Labs NCS:  NEtwork Control System Hands-on Labs
NCS: NEtwork Control System Hands-on Labs Cisco Canada
 

What's hot (19)

Security Change Management: Agility vs. Control
Security Change Management: Agility vs. ControlSecurity Change Management: Agility vs. Control
Security Change Management: Agility vs. Control
 
5º MeetUP ARQconf 2016 - IoT: What is it really and how does it work?
5º MeetUP ARQconf 2016 - IoT: What is it really and how does it work?5º MeetUP ARQconf 2016 - IoT: What is it really and how does it work?
5º MeetUP ARQconf 2016 - IoT: What is it really and how does it work?
 
Production Ready Microservices at Scale
Production Ready Microservices at ScaleProduction Ready Microservices at Scale
Production Ready Microservices at Scale
 
5 things you didn't know you could do with security policy management
5 things you didn't know you could do with security policy management5 things you didn't know you could do with security policy management
5 things you didn't know you could do with security policy management
 
Shift Happens: Eliminating the Risks of Network Security Policy Changes
Shift Happens: Eliminating the Risks of Network Security Policy ChangesShift Happens: Eliminating the Risks of Network Security Policy Changes
Shift Happens: Eliminating the Risks of Network Security Policy Changes
 
Open Security Controls Assessment Language (OSCAL) - 1st Workshop, Nov 5-7, 2019
Open Security Controls Assessment Language (OSCAL) - 1st Workshop, Nov 5-7, 2019Open Security Controls Assessment Language (OSCAL) - 1st Workshop, Nov 5-7, 2019
Open Security Controls Assessment Language (OSCAL) - 1st Workshop, Nov 5-7, 2019
 
Avi Network SDN meetup
Avi Network  SDN meetupAvi Network  SDN meetup
Avi Network SDN meetup
 
2008-01-22 Red Hat (Security) Roadmap Presentation
2008-01-22 Red Hat (Security) Roadmap Presentation2008-01-22 Red Hat (Security) Roadmap Presentation
2008-01-22 Red Hat (Security) Roadmap Presentation
 
Perforce on Tour 2015 - Securing the Helix Platform at Citrix
Perforce on Tour 2015 - Securing the Helix Platform at CitrixPerforce on Tour 2015 - Securing the Helix Platform at Citrix
Perforce on Tour 2015 - Securing the Helix Platform at Citrix
 
Putting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallPutting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation Firewall
 
Savvius_Introduction to workshop
Savvius_Introduction to workshopSavvius_Introduction to workshop
Savvius_Introduction to workshop
 
Software Defined Networking: Network Virtualization
Software Defined Networking: Network VirtualizationSoftware Defined Networking: Network Virtualization
Software Defined Networking: Network Virtualization
 
Threat intelligence solution
Threat intelligence solutionThreat intelligence solution
Threat intelligence solution
 
Long Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and SplunkLong Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and Splunk
 
Managing a Widely Distributed Network
Managing a Widely Distributed NetworkManaging a Widely Distributed Network
Managing a Widely Distributed Network
 
How can Savvius help your organization?
How can Savvius help your organization?How can Savvius help your organization?
How can Savvius help your organization?
 
Top 5 favourite features of Cisco ACI in Pulsant Cloud Data Centres
Top 5 favourite features of Cisco ACI in Pulsant Cloud Data Centres Top 5 favourite features of Cisco ACI in Pulsant Cloud Data Centres
Top 5 favourite features of Cisco ACI in Pulsant Cloud Data Centres
 
Software Defined Network - SDN
Software Defined Network - SDNSoftware Defined Network - SDN
Software Defined Network - SDN
 
NCS: NEtwork Control System Hands-on Labs
NCS:  NEtwork Control System Hands-on Labs NCS:  NEtwork Control System Hands-on Labs
NCS: NEtwork Control System Hands-on Labs
 

Viewers also liked

OSMC 2015: What's Happening with OpenNMS? by Tarus Balog
OSMC 2015: What's Happening with OpenNMS? by Tarus BalogOSMC 2015: What's Happening with OpenNMS? by Tarus Balog
OSMC 2015: What's Happening with OpenNMS? by Tarus BalogNETWAYS
 
OSMC 2015: Testing in Production by Devdas Bhagat
OSMC 2015: Testing in Production by Devdas BhagatOSMC 2015: Testing in Production by Devdas Bhagat
OSMC 2015: Testing in Production by Devdas BhagatNETWAYS
 
OSMC 2015: NSClient++: A brief Introduction by Michael Medin
OSMC 2015: NSClient++: A brief Introduction by Michael MedinOSMC 2015: NSClient++: A brief Introduction by Michael Medin
OSMC 2015: NSClient++: A brief Introduction by Michael MedinNETWAYS
 
OSMC 2015: Zabbix 3.0. The Simple, the Powerful and the Shiny by Wolfgang Alper
OSMC 2015: Zabbix 3.0. The Simple, the Powerful and the Shiny by Wolfgang AlperOSMC 2015: Zabbix 3.0. The Simple, the Powerful and the Shiny by Wolfgang Alper
OSMC 2015: Zabbix 3.0. The Simple, the Powerful and the Shiny by Wolfgang AlperNETWAYS
 
OSMC 2015: Monitoring Linux and Windows Logs with the Graylog Collector byBer...
OSMC 2015: Monitoring Linux and Windows Logs with the Graylog Collector byBer...OSMC 2015: Monitoring Linux and Windows Logs with the Graylog Collector byBer...
OSMC 2015: Monitoring Linux and Windows Logs with the Graylog Collector byBer...NETWAYS
 
OSMC 2014: Using elasticsearch, logstash & kibana in system administration | ...
OSMC 2014: Using elasticsearch, logstash & kibana in system administration | ...OSMC 2014: Using elasticsearch, logstash & kibana in system administration | ...
OSMC 2014: Using elasticsearch, logstash & kibana in system administration | ...NETWAYS
 
OSMC 2015: MQTT it´s also for monitoring by Jan-Piet Mens
OSMC 2015: MQTT it´s also for monitoring by Jan-Piet MensOSMC 2015: MQTT it´s also for monitoring by Jan-Piet Mens
OSMC 2015: MQTT it´s also for monitoring by Jan-Piet MensNETWAYS
 
OSMC 2015: End to End Monitoring mit Alyvix-Jürgen Vigna
OSMC 2015: End to End Monitoring mit Alyvix-Jürgen VignaOSMC 2015: End to End Monitoring mit Alyvix-Jürgen Vigna
OSMC 2015: End to End Monitoring mit Alyvix-Jürgen VignaNETWAYS
 
OSMC 2015: Grafana and Future of Metrics Visualization by Torkel Ödegaard
OSMC 2015: Grafana and Future of Metrics Visualization by Torkel ÖdegaardOSMC 2015: Grafana and Future of Metrics Visualization by Torkel Ödegaard
OSMC 2015: Grafana and Future of Metrics Visualization by Torkel ÖdegaardNETWAYS
 
OSMC 2015:The road to lazy monitoring with Icinga 2 and Puppet by Tom de Vylder
OSMC 2015:The road to lazy monitoring with Icinga 2 and Puppet by Tom de VylderOSMC 2015:The road to lazy monitoring with Icinga 2 and Puppet by Tom de Vylder
OSMC 2015:The road to lazy monitoring with Icinga 2 and Puppet by Tom de VylderNETWAYS
 
OSMC 2015: Monitor Open stack environments from the bottom up and front to ba...
OSMC 2015: Monitor Open stack environments from the bottom up and front to ba...OSMC 2015: Monitor Open stack environments from the bottom up and front to ba...
OSMC 2015: Monitor Open stack environments from the bottom up and front to ba...NETWAYS
 
OSMC 2015: Prometheus: A Next-Generation Monitoring System by Fabian Reinartz
OSMC 2015: Prometheus: A Next-Generation Monitoring System by Fabian ReinartzOSMC 2015: Prometheus: A Next-Generation Monitoring System by Fabian Reinartz
OSMC 2015: Prometheus: A Next-Generation Monitoring System by Fabian ReinartzNETWAYS
 
OSMC 2015: Collectd Thresholds Plugin and Icinga by Florian Forster
OSMC 2015: Collectd Thresholds Plugin and Icinga by Florian ForsterOSMC 2015: Collectd Thresholds Plugin and Icinga by Florian Forster
OSMC 2015: Collectd Thresholds Plugin and Icinga by Florian ForsterNETWAYS
 
OSMC 2015: Monitoring at Spotify-When things go ping in the night by Martin Parm
OSMC 2015: Monitoring at Spotify-When things go ping in the night by Martin ParmOSMC 2015: Monitoring at Spotify-When things go ping in the night by Martin Parm
OSMC 2015: Monitoring at Spotify-When things go ping in the night by Martin ParmNETWAYS
 
OSMC 2014: Business Prozessmonitoring mit BPView | Rene Koch
OSMC 2014: Business Prozessmonitoring mit BPView | Rene KochOSMC 2014: Business Prozessmonitoring mit BPView | Rene Koch
OSMC 2014: Business Prozessmonitoring mit BPView | Rene KochNETWAYS
 
OSMC 2014: Interesting use cases of Zabbix improvements in latest versions | ...
OSMC 2014: Interesting use cases of Zabbix improvements in latest versions | ...OSMC 2014: Interesting use cases of Zabbix improvements in latest versions | ...
OSMC 2014: Interesting use cases of Zabbix improvements in latest versions | ...NETWAYS
 
Open Source Backup Cpnference 2014: Bareos in scientific environments, by Dr....
Open Source Backup Cpnference 2014: Bareos in scientific environments, by Dr....Open Source Backup Cpnference 2014: Bareos in scientific environments, by Dr....
Open Source Backup Cpnference 2014: Bareos in scientific environments, by Dr....NETWAYS
 
Open Source Backup Conference 2014: Migration from bacula to bareos, by Danie...
Open Source Backup Conference 2014: Migration from bacula to bareos, by Danie...Open Source Backup Conference 2014: Migration from bacula to bareos, by Danie...
Open Source Backup Conference 2014: Migration from bacula to bareos, by Danie...NETWAYS
 
Puppet Camp Duesseldorf 2014: Kris Buytaert - Monitoring (with) Puppet
Puppet Camp Duesseldorf 2014: Kris Buytaert - Monitoring (with) PuppetPuppet Camp Duesseldorf 2014: Kris Buytaert - Monitoring (with) Puppet
Puppet Camp Duesseldorf 2014: Kris Buytaert - Monitoring (with) PuppetNETWAYS
 
Puppet Camp Duesseldorf 2014: Martin Alfke - Can you upgrade to puppet 4.x?
Puppet Camp Duesseldorf 2014: Martin Alfke - Can you upgrade to puppet 4.x?Puppet Camp Duesseldorf 2014: Martin Alfke - Can you upgrade to puppet 4.x?
Puppet Camp Duesseldorf 2014: Martin Alfke - Can you upgrade to puppet 4.x?NETWAYS
 

Viewers also liked (20)

OSMC 2015: What's Happening with OpenNMS? by Tarus Balog
OSMC 2015: What's Happening with OpenNMS? by Tarus BalogOSMC 2015: What's Happening with OpenNMS? by Tarus Balog
OSMC 2015: What's Happening with OpenNMS? by Tarus Balog
 
OSMC 2015: Testing in Production by Devdas Bhagat
OSMC 2015: Testing in Production by Devdas BhagatOSMC 2015: Testing in Production by Devdas Bhagat
OSMC 2015: Testing in Production by Devdas Bhagat
 
OSMC 2015: NSClient++: A brief Introduction by Michael Medin
OSMC 2015: NSClient++: A brief Introduction by Michael MedinOSMC 2015: NSClient++: A brief Introduction by Michael Medin
OSMC 2015: NSClient++: A brief Introduction by Michael Medin
 
OSMC 2015: Zabbix 3.0. The Simple, the Powerful and the Shiny by Wolfgang Alper
OSMC 2015: Zabbix 3.0. The Simple, the Powerful and the Shiny by Wolfgang AlperOSMC 2015: Zabbix 3.0. The Simple, the Powerful and the Shiny by Wolfgang Alper
OSMC 2015: Zabbix 3.0. The Simple, the Powerful and the Shiny by Wolfgang Alper
 
OSMC 2015: Monitoring Linux and Windows Logs with the Graylog Collector byBer...
OSMC 2015: Monitoring Linux and Windows Logs with the Graylog Collector byBer...OSMC 2015: Monitoring Linux and Windows Logs with the Graylog Collector byBer...
OSMC 2015: Monitoring Linux and Windows Logs with the Graylog Collector byBer...
 
OSMC 2014: Using elasticsearch, logstash & kibana in system administration | ...
OSMC 2014: Using elasticsearch, logstash & kibana in system administration | ...OSMC 2014: Using elasticsearch, logstash & kibana in system administration | ...
OSMC 2014: Using elasticsearch, logstash & kibana in system administration | ...
 
OSMC 2015: MQTT it´s also for monitoring by Jan-Piet Mens
OSMC 2015: MQTT it´s also for monitoring by Jan-Piet MensOSMC 2015: MQTT it´s also for monitoring by Jan-Piet Mens
OSMC 2015: MQTT it´s also for monitoring by Jan-Piet Mens
 
OSMC 2015: End to End Monitoring mit Alyvix-Jürgen Vigna
OSMC 2015: End to End Monitoring mit Alyvix-Jürgen VignaOSMC 2015: End to End Monitoring mit Alyvix-Jürgen Vigna
OSMC 2015: End to End Monitoring mit Alyvix-Jürgen Vigna
 
OSMC 2015: Grafana and Future of Metrics Visualization by Torkel Ödegaard
OSMC 2015: Grafana and Future of Metrics Visualization by Torkel ÖdegaardOSMC 2015: Grafana and Future of Metrics Visualization by Torkel Ödegaard
OSMC 2015: Grafana and Future of Metrics Visualization by Torkel Ödegaard
 
OSMC 2015:The road to lazy monitoring with Icinga 2 and Puppet by Tom de Vylder
OSMC 2015:The road to lazy monitoring with Icinga 2 and Puppet by Tom de VylderOSMC 2015:The road to lazy monitoring with Icinga 2 and Puppet by Tom de Vylder
OSMC 2015:The road to lazy monitoring with Icinga 2 and Puppet by Tom de Vylder
 
OSMC 2015: Monitor Open stack environments from the bottom up and front to ba...
OSMC 2015: Monitor Open stack environments from the bottom up and front to ba...OSMC 2015: Monitor Open stack environments from the bottom up and front to ba...
OSMC 2015: Monitor Open stack environments from the bottom up and front to ba...
 
OSMC 2015: Prometheus: A Next-Generation Monitoring System by Fabian Reinartz
OSMC 2015: Prometheus: A Next-Generation Monitoring System by Fabian ReinartzOSMC 2015: Prometheus: A Next-Generation Monitoring System by Fabian Reinartz
OSMC 2015: Prometheus: A Next-Generation Monitoring System by Fabian Reinartz
 
OSMC 2015: Collectd Thresholds Plugin and Icinga by Florian Forster
OSMC 2015: Collectd Thresholds Plugin and Icinga by Florian ForsterOSMC 2015: Collectd Thresholds Plugin and Icinga by Florian Forster
OSMC 2015: Collectd Thresholds Plugin and Icinga by Florian Forster
 
OSMC 2015: Monitoring at Spotify-When things go ping in the night by Martin Parm
OSMC 2015: Monitoring at Spotify-When things go ping in the night by Martin ParmOSMC 2015: Monitoring at Spotify-When things go ping in the night by Martin Parm
OSMC 2015: Monitoring at Spotify-When things go ping in the night by Martin Parm
 
OSMC 2014: Business Prozessmonitoring mit BPView | Rene Koch
OSMC 2014: Business Prozessmonitoring mit BPView | Rene KochOSMC 2014: Business Prozessmonitoring mit BPView | Rene Koch
OSMC 2014: Business Prozessmonitoring mit BPView | Rene Koch
 
OSMC 2014: Interesting use cases of Zabbix improvements in latest versions | ...
OSMC 2014: Interesting use cases of Zabbix improvements in latest versions | ...OSMC 2014: Interesting use cases of Zabbix improvements in latest versions | ...
OSMC 2014: Interesting use cases of Zabbix improvements in latest versions | ...
 
Open Source Backup Cpnference 2014: Bareos in scientific environments, by Dr....
Open Source Backup Cpnference 2014: Bareos in scientific environments, by Dr....Open Source Backup Cpnference 2014: Bareos in scientific environments, by Dr....
Open Source Backup Cpnference 2014: Bareos in scientific environments, by Dr....
 
Open Source Backup Conference 2014: Migration from bacula to bareos, by Danie...
Open Source Backup Conference 2014: Migration from bacula to bareos, by Danie...Open Source Backup Conference 2014: Migration from bacula to bareos, by Danie...
Open Source Backup Conference 2014: Migration from bacula to bareos, by Danie...
 
Puppet Camp Duesseldorf 2014: Kris Buytaert - Monitoring (with) Puppet
Puppet Camp Duesseldorf 2014: Kris Buytaert - Monitoring (with) PuppetPuppet Camp Duesseldorf 2014: Kris Buytaert - Monitoring (with) Puppet
Puppet Camp Duesseldorf 2014: Kris Buytaert - Monitoring (with) Puppet
 
Puppet Camp Duesseldorf 2014: Martin Alfke - Can you upgrade to puppet 4.x?
Puppet Camp Duesseldorf 2014: Martin Alfke - Can you upgrade to puppet 4.x?Puppet Camp Duesseldorf 2014: Martin Alfke - Can you upgrade to puppet 4.x?
Puppet Camp Duesseldorf 2014: Martin Alfke - Can you upgrade to puppet 4.x?
 

Similar to OSMC 2015: The Assimilation Project by Alan Robertson

OpsStack--Integrated Operation Platform
OpsStack--Integrated Operation PlatformOpsStack--Integrated Operation Platform
OpsStack--Integrated Operation PlatformChinaNetCloud
 
Design and Deploy Secure Clouds for Financial Services Use Cases
Design and Deploy Secure Clouds for Financial Services Use CasesDesign and Deploy Secure Clouds for Financial Services Use Cases
Design and Deploy Secure Clouds for Financial Services Use CasesPLUMgrid
 
MuleSoft Manchester Meetup #2 slides 29th October 2019
MuleSoft Manchester Meetup #2 slides 29th October 2019MuleSoft Manchester Meetup #2 slides 29th October 2019
MuleSoft Manchester Meetup #2 slides 29th October 2019Ieva Navickaite
 
Reactive Cloud Security | AWS Public Sector Summit 2016
Reactive Cloud Security | AWS Public Sector Summit 2016Reactive Cloud Security | AWS Public Sector Summit 2016
Reactive Cloud Security | AWS Public Sector Summit 2016Amazon Web Services
 
Network Automation Journey, A systems engineer NetOps perspective
Network Automation Journey, A systems engineer NetOps perspectiveNetwork Automation Journey, A systems engineer NetOps perspective
Network Automation Journey, A systems engineer NetOps perspectiveWalid Shaari
 
AWS Well-Architected Framework (nov 2017)
AWS Well-Architected Framework (nov 2017)AWS Well-Architected Framework (nov 2017)
AWS Well-Architected Framework (nov 2017)Rick Hwang
 
Serverless security - how to protect what you don't see?
Serverless security - how to protect what you don't see?Serverless security - how to protect what you don't see?
Serverless security - how to protect what you don't see?Sqreen
 
On the Application of AI for Failure Management: Problems, Solutions and Algo...
On the Application of AI for Failure Management: Problems, Solutions and Algo...On the Application of AI for Failure Management: Problems, Solutions and Algo...
On the Application of AI for Failure Management: Problems, Solutions and Algo...Jorge Cardoso
 
Mulesoft Meetup Milano #9 - Batch Processing and CI/CD
Mulesoft Meetup Milano #9 - Batch Processing and CI/CDMulesoft Meetup Milano #9 - Batch Processing and CI/CD
Mulesoft Meetup Milano #9 - Batch Processing and CI/CDGonzalo Marcos Ansoain
 
OSMC 2017 | Monitoring Challenges in a World of Automation by Anthony Goddard
OSMC 2017 | Monitoring Challenges in a World of Automation by Anthony GoddardOSMC 2017 | Monitoring Challenges in a World of Automation by Anthony Goddard
OSMC 2017 | Monitoring Challenges in a World of Automation by Anthony GoddardNETWAYS
 
Updates to Apache CloudStack and LINBIT SDS
Updates to Apache CloudStack and LINBIT SDSUpdates to Apache CloudStack and LINBIT SDS
Updates to Apache CloudStack and LINBIT SDSShapeBlue
 
Grab: Building a Healthy Elasticsearch Ecosystem
Grab: Building a Healthy Elasticsearch EcosystemGrab: Building a Healthy Elasticsearch Ecosystem
Grab: Building a Healthy Elasticsearch EcosystemElasticsearch
 
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...Glen Roberts, CISSP
 
Partnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend OpportunitiesPartnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend OpportunitiesSutedjo Tjahjadi
 
6 Tips to MySQL Performance Tuning
6 Tips to MySQL Performance Tuning6 Tips to MySQL Performance Tuning
6 Tips to MySQL Performance TuningOracleMySQL
 
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...apidays
 
Web scale with-nutanix_rev
Web scale with-nutanix_revWeb scale with-nutanix_rev
Web scale with-nutanix_revScalar Decisions
 
QueueMetrics - Tips and Tricks
QueueMetrics - Tips and TricksQueueMetrics - Tips and Tricks
QueueMetrics - Tips and TricksClarotech_Events
 
Představení Oracle SPARC Miniclusteru
Představení Oracle SPARC MiniclusteruPředstavení Oracle SPARC Miniclusteru
Představení Oracle SPARC MiniclusteruMarketingArrowECS_CZ
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Srinivasa Addepalli
 

Similar to OSMC 2015: The Assimilation Project by Alan Robertson (20)

OpsStack--Integrated Operation Platform
OpsStack--Integrated Operation PlatformOpsStack--Integrated Operation Platform
OpsStack--Integrated Operation Platform
 
Design and Deploy Secure Clouds for Financial Services Use Cases
Design and Deploy Secure Clouds for Financial Services Use CasesDesign and Deploy Secure Clouds for Financial Services Use Cases
Design and Deploy Secure Clouds for Financial Services Use Cases
 
MuleSoft Manchester Meetup #2 slides 29th October 2019
MuleSoft Manchester Meetup #2 slides 29th October 2019MuleSoft Manchester Meetup #2 slides 29th October 2019
MuleSoft Manchester Meetup #2 slides 29th October 2019
 
Reactive Cloud Security | AWS Public Sector Summit 2016
Reactive Cloud Security | AWS Public Sector Summit 2016Reactive Cloud Security | AWS Public Sector Summit 2016
Reactive Cloud Security | AWS Public Sector Summit 2016
 
Network Automation Journey, A systems engineer NetOps perspective
Network Automation Journey, A systems engineer NetOps perspectiveNetwork Automation Journey, A systems engineer NetOps perspective
Network Automation Journey, A systems engineer NetOps perspective
 
AWS Well-Architected Framework (nov 2017)
AWS Well-Architected Framework (nov 2017)AWS Well-Architected Framework (nov 2017)
AWS Well-Architected Framework (nov 2017)
 
Serverless security - how to protect what you don't see?
Serverless security - how to protect what you don't see?Serverless security - how to protect what you don't see?
Serverless security - how to protect what you don't see?
 
On the Application of AI for Failure Management: Problems, Solutions and Algo...
On the Application of AI for Failure Management: Problems, Solutions and Algo...On the Application of AI for Failure Management: Problems, Solutions and Algo...
On the Application of AI for Failure Management: Problems, Solutions and Algo...
 
Mulesoft Meetup Milano #9 - Batch Processing and CI/CD
Mulesoft Meetup Milano #9 - Batch Processing and CI/CDMulesoft Meetup Milano #9 - Batch Processing and CI/CD
Mulesoft Meetup Milano #9 - Batch Processing and CI/CD
 
OSMC 2017 | Monitoring Challenges in a World of Automation by Anthony Goddard
OSMC 2017 | Monitoring Challenges in a World of Automation by Anthony GoddardOSMC 2017 | Monitoring Challenges in a World of Automation by Anthony Goddard
OSMC 2017 | Monitoring Challenges in a World of Automation by Anthony Goddard
 
Updates to Apache CloudStack and LINBIT SDS
Updates to Apache CloudStack and LINBIT SDSUpdates to Apache CloudStack and LINBIT SDS
Updates to Apache CloudStack and LINBIT SDS
 
Grab: Building a Healthy Elasticsearch Ecosystem
Grab: Building a Healthy Elasticsearch EcosystemGrab: Building a Healthy Elasticsearch Ecosystem
Grab: Building a Healthy Elasticsearch Ecosystem
 
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
 
Partnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend OpportunitiesPartnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend Opportunities
 
6 Tips to MySQL Performance Tuning
6 Tips to MySQL Performance Tuning6 Tips to MySQL Performance Tuning
6 Tips to MySQL Performance Tuning
 
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
apidays LIVE Paris - Serverless security: how to protect what you don't see? ...
 
Web scale with-nutanix_rev
Web scale with-nutanix_revWeb scale with-nutanix_rev
Web scale with-nutanix_rev
 
QueueMetrics - Tips and Tricks
QueueMetrics - Tips and TricksQueueMetrics - Tips and Tricks
QueueMetrics - Tips and Tricks
 
Představení Oracle SPARC Miniclusteru
Představení Oracle SPARC MiniclusteruPředstavení Oracle SPARC Miniclusteru
Představení Oracle SPARC Miniclusteru
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2
 

Recently uploaded

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 

OSMC 2015: The Assimilation Project by Alan Robertson

  • 1. Painlessly Discovering and MonitoringPainlessly Discovering and Monitoring Systems, Services and ComplianceSystems, Services and Compliance #AssimProj @OSSAlanR http://assimproj.org/ Alan Robertson <alanr@assimilationsystems.com> Assimilation Systems Limited http://assimilationsystems.com
  • 2. © 2015 Assimilation Systems Limited 2 BiographyBiography ● 35+ years in IT/development – 10 years in system management (SysAdmin) ● Founded Linux-HA project - led 1998-2007 – aka “Heartbeat” - now called Pacemaker ● Founded Assimilation Project in 2010 ● Founded Assimilation Systems Limited in 2013 ● Alumnus of Bell Labs, SuSE, IBM
  • 3. © 2015 Assimilation Systems Limited 3 Assimilation Project EvolutionAssimilation Project Evolution ● Inspired by 2 million core computer (cyclops64) ● Concerns for extreme scale ● Topology aware monitoring ● Topology discovery w/out security issues =►Discovery of everything!
  • 4. © 2015 Assimilation Systems Limited 4 A 6-dimensional overviewA 6-dimensional overview 1.System Management Suite Overview 2.Basic Technology 3.Best Practice Analyses 4.Demo 5.Current Status 6.What You Need To Do!
  • 5. © 2015 Assimilation Systems Limited 5 Disturbing Trends...Disturbing Trends... 30% of break-ins come through “lost” systems (Verizon) 90% have had failures of unmonitored services (Turnbull) 80% are unable to stay in compliance (Verizon) 30% only start monitoring only after a problem (Turnbull) 30% of systems doing nothing useful (Koomey)
  • 6. © 2015 Assimilation Systems Limited 6 More Trends...More Trends... ● Larger sites have trouble scaling monitoring (Turnbull) ● Larger site admins often don’t know dependencies ● Documentation is incomplete, out of date, expensive
  • 7. © 2015 Assimilation Systems Limited 7 You can't manage what you can'tYou can't manage what you can't see...see... We give you X-Ray vision into your infrastructure ● Provides insight and details through a graph-model CMDB ● Helps you understand and automate your environment – Reduce Errors – Speed up problem resolution ● Reduces Manual Documentation ● CMDB-driven configuration => near-zero configuration ● Automates Monitoring ● Enhances Security ● Designed for Extreme Scale
  • 8. © 2015 Assimilation Systems Limited 8 What's in the Suite?What's in the Suite? ● Graph CMDB ● Exception Monitoring ● Security Discovery ● Network Connections
  • 9. © 2015 Assimilation Systems Limited 9 Our Unique ValueOur Unique Value ● Security – continuous security compliance ● Scalability – scales like nothing else ● Complexity Management – reduces and helps you manage complexity
  • 10. © 2015 Assimilation Systems Limited 10 ComplexityComplexity “Complexity is the enemy of reliability” ● Complexity likely your single biggest problem – Near-zero configuration reduces complexity – Tight service integration reduces complexity – Accurate detailed information provides insights which help manage complexity
  • 11. © 2015 Assimilation Systems Limited 11 Highly Scalable Discovery-DrivenHighly Scalable Discovery-Driven AutomationAutomation Continuous Discovery drives everything ● Continuous extensible discovery (CMDB) – systems, switches, services, dependencies – zero network footprint discovery process ● Extensible exception monitoring – more than 100K systems ● Discovery Drives Best Practice Analyses – Initially concentrating on security ● All data goes into central graph CMDB
  • 12. © 2015 Assimilation Systems Limited 12 This all sounds unreasonable...This all sounds unreasonable... ● Huge scalability without complexity? ● Discovery without pings or port scans? Really?
  • 13. © 2015 Assimilation Systems Limited 13 SSimple Scalabilityimple Scalability I can explain how we scale so your grandmother would understand... istockphoto ©bowdenimages
  • 14. © 2015 Assimilation Systems Limited 14 Massive Scalability –Massive Scalability – oror “I see dead servers in“I see dead servers in OO(1) time”(1) time” ● Adding systems does not increase the monitoring work on any system ● Each server monitors 2 (or 4) neighbors ● Each server monitors and discovers its own services ● Ring repair and alerting is O(n) – but a very small amount of work Current Implementation
  • 15. © 2015 Assimilation Systems Limited 15 Minimizing Network FootprintMinimizing Network Footprint (in our roadmap)(in our roadmap) ● Support diagnosing switch issues ● Minimize network traffic ● Ideal for multi-site arrangements
  • 16. © 2015 Assimilation Systems Limited 16 Service Monitoring based on HAService Monitoring based on HA TechnologiesTechnologies ● Well-proven architecture: – reliable “no news is good news” ● Implements Open Cluster Framework standard, LSB and Nagios remote agent APIs ● Each system monitors own services ● Can also start, stop, migrate services
  • 17. © 2015 Assimilation Systems Limited 17 How does discovery work?How does discovery work? Nanoprobe scripts perform discovery ● Each discovers one kind of information ● Can take arguments from environment ● Output JSON CMA stores Discovery Information ● JSON stored in Neo4j database ● CMA discovery plugins => graph nodes and relationships
  • 18. © 2015 Assimilation Systems Limited 18 OS discovery JSON SnippetOS discovery JSON Snippet { "nodename": "alanr-1225B", "operating-system": "GNU/Linux", "machine": "x86_64", "processor": "x86_64", "hardware-platform": "x86_64", "kernel-name": "Linux", "kernel-release": "3.8.0-31-generic", "kernel-version": "#46-Ubuntu SMP ...", "Distributor ID": "Ubuntu", "Description": "Ubuntu 13.04", "Release": "13.04", "Codename": "raring" }
  • 19. © 2015 Assimilation Systems Limited 19 "sshd": { "exe": "/usr/sbin/sshd", "cmdline": [ "/usr/sbin/sshd", "-D" ], "uid": "root", "gid": "root", "cwd": "/", "listenaddrs": { "0.0.0.0:22": { "proto": "tcp" } } sshdsshd ServiceService JSON SnippetJSON Snippet (from netstat and /proc)(from netstat and /proc)
  • 20. © 2015 Assimilation Systems Limited 20 "ssh": { "exe": "/usr/sbin/ssh", "cmdline": [ "ssh", "servidor" ], "uid": "alanr", "gid": "alanr", "cwd": "/home/alanr/monitor/src", "clientaddrs": {"10.10.10.5:22": {"proto": "tcp"} } sshssh ClientClient JSON SnippetJSON Snippet (from netstat and /proc)(from netstat and /proc)
  • 21. © 2015 Assimilation Systems Limited 21 Service Dependency GraphService Dependency Graph
  • 22. © 2015 Assimilation Systems Limited 22 Switch Discovery GraphSwitch Discovery Graph from LLDP (or CDP)from LLDP (or CDP)
  • 23. © 2015 Assimilation Systems Limited 23 Why a graph database? (Neo4j)Why a graph database? (Neo4j) ● Humans describe systems as graphs ● Dependency & Discovery information: graph ● Speed of graph traversals depends on size of subgraph, not total graph size ● Root cause queries  graph traversals – notoriously slow in relational databases ● Visualization is Natural ● Schema-less design: good for constantly changing heterogeneous environment ● Graph Model === Object Model
  • 24. © 2015 Assimilation Systems Limited 24 A Few Canned QueriesA Few Canned Queries allipports get all port/ip/service/hosts allswitchports get switch connections crashed get crashed servers shutdown get gracefully shutdown servers downservices get nonworking services findip get system owning IP findmac get system owning MAC unknownips get unknown IP addresses unmonitored get unmonitored services
  • 25. © 2015 Assimilation Systems Limited 25 BBest Practice Analysesest Practice Analyses Under active development ● Triggered by Discovery Updates – Analysis occurs within seconds of change – No change => No analysis ● We can analyze anything discovered ● Expect to create alerts and reports ● SIEM integration
  • 26. © 2015 Assimilation Systems Limited 26 Sample Security Best PracticesSample Security Best Practices ● Inappropriate services (telnet, etc) ● Settings in /proc/sys/ ● Security Patch Coverage – OS vendor (RedHat, SuSE, Canonical, etc) – Application (Oracle, IBM, WordPress, etc) ● Other OS settings ● Common Application Settings ● Looking at best practices FYI: Collaborating with Lynis project and Linux Foundation
  • 27. © 2015 Assimilation Systems Limited 27 Other Sample Security FeaturesOther Sample Security Features ● Discovery of “forgotten” IP addresses ● Monitoring of Open Ports and Services ● Collection of network-facing app checksums ● Nmon profiling of new MAC addresses ● Checksum outliers analysis ● Security Best Practice Analyses
  • 28. © 2015 Assimilation Systems Limited 28 IT Best Practices ProjectIT Best Practices Project ITBestPractices.info ● IT-Bestpractices GitHub project ● Working on Linux Foundation Sponsorship ● Apache 2 License (or similar) ● Initial Sources – DISA STIGs – Lynis project – PCI DSS rules – Individual contributions
  • 29. © 2015 Assimilation Systems Limited 29 IT Best Practices GoalsIT Best Practices Goals ● Make Best Practice rules available in JSON – Curate mechanically-verifiable practices – Human-readable descriptions of issues and remedies – Multiple language support – Not limited to security best practices – Web server under development
  • 30. © 2015 Assimilation Systems Limited 30 Sample short descriptionSample short description The system must limit the ability of processes to have simultaneous write and execute access to memory.
  • 31. © 2015 Assimilation Systems Limited 31 Sample long descriptionSample long description ExecShield uses the segmentation feature on all x86 systems to prevent execution in memory higher than a certain address. It writes an address as a limit in the code segment descriptor, to control where code can be executed, on a per-process basis. When the kernel places a process's memory regions such as the stack and heap higher than this address, the hardware prevents execution in that address range.
  • 32. © 2015 Assimilation Systems Limited 32 Sample Security Rule checkSample Security Rule check The status of the "kernel.exec-shield" kernel parameter can be queried by running the following command: $ sysctl kernel.exec-shield $ grep kernel.exec-shield /etc/sysctl.conf The output of the command should indicate a value of "1". If this value is not the default value, investigate how it could have been adjusted at runtime, and verify it is not set improperly in "/etc/sysctl.conf". If the correct value is not returned, this is a finding.
  • 33. © 2015 Assimilation Systems Limited 33 Assimilation /proc/sys RuleAssimilation /proc/sys Rule Disallow executing code on writable pages “nist_V-38597”: {“rule”: “EQ($kernel.exec-shield, 1)”, “category”: “security” }
  • 34. © 2015 Assimilation Systems Limited 34 Assimilation Networking RuleAssimilation Networking Rule Buffer bloat prevention “itbp-0001”: {“rule”: “IN($kernel.core.default_qdisc, fq_codel, codel)”, “category”: “networking” }
  • 35. © 2015 Assimilation Systems Limited 35 DDiscovery / Monitoring / Bestiscovery / Monitoring / Best Practices DemoPractices Demo ● Demonstrate basic capabilities – Discovery-driven monitoring configuration – Discovery-driven 'tripwire-like' checksums – Monitoring – failures / successes – Host down notification – Best Practices ● No configuration was supplied – everything comes from discovery http://assimilationsystems.com/90_second_demo/
  • 36. © 2015 Assimilation Systems Limited 36 Current StatusCurrent Status ● 1.1.0 release out 3 November 2015 ● Way-cool simplified installer! ● Continuous Security Monitoring – ~50 best practice rules implemented ● Great unit and system tests ● Strongly encrypted communication ● Quite a few discovery methods written ● Extensible Automated Discovery Triggers ● Discovery => Automatic Monitoring + Network-Facing Checksums ● Compatible with Nagios remote monitoring agent API ● REST + Command Line Queries
  • 37. © 2015 Assimilation Systems Limited 37 Get Involved!Get Involved! ● Trials! Early Adopters! ● Contributors – Testers, Continuous Integration – Best practice experts – Designers – Developers (C, Python, Shell, PowerShell, JavaScript) – Porters (esp Windows) – Promoters, Publicists, Packagers, etc.
  • 38. © 2015 Assimilation Systems Limited 38 Resistance Is Futile!Resistance Is Futile! These slides: bit.ly/DOSUG0915 Mailing List: bit.ly/AssimML @OSSAlanR #assimilation on irc.freenode.net Project Web Site: assimproj.org Company Web Site: assimilationsystems.com Download: assimilationsystems.com/download
  • 39. © 2015 Assimilation Systems Limited 39 Risk Management/MitigationRisk Management/Mitigation ● Intrusions ● Vulnerable Software ● Licensed Software ● Audit Risk ● Outages ● System management
  • 40. © 2015 Assimilation Systems Limited 40 Monitoring Pros and ConsMonitoring Pros and Cons Pros Simple & Scalable Uniform work distribution No single point of failure Distinguishes switch vs host failure Easy on LAN, WAN Multi-tenant approach Cons Active agents Potential slowness at power-on
  • 41. © 2015 Assimilation Systems Limited 41 Sixth Dimension:Sixth Dimension: Graph SchemaGraph Schema Two Schema subgraphs ● Client / server dependency ● Switch interconnect
  • 42. First DimensionFirst Dimension:: Problems AddressedProblems Addressed ● Discovering and maintaining documentation (CMDB) using continuous discovery – Services, Systems, Dependencies, Switches, Interconnects, Configuration ● Monitoring and alerting: services, systems and compliance ● Managing compliance ● Mitigating risk
  • 43. © 2015 Assimilation Systems Limited 45 Why Discovery? (DevOps)Why Discovery? (DevOps) ● Documentation: incomplete, incorrect ● Dependencies: unknown ● Planning: Needs accurate data ● Best Practices: Verification needs data ● ITIL CMDB (Configuration Management Data Base) Our Discovery: continuous, low-profile
  • 44. © 2015 Assimilation Systems Limited 46 Second Dimension:Second Dimension: Unique Powerful FeaturesUnique Powerful Features 1. Continuous Discovery 2. Discovery: Zero network footprint 3. Centralized graph database 4. We know everything that changes 5. Discover and update dependency information 6. Discovery and monitoring tightly integrated – discovery drives automation
  • 45. © 2015 Assimilation Systems Limited 47 (even more) Features...(even more) Features... 7. Discovery and monitoring easily extensible 8. Naturally scalable to > 100K systems 9. Minimal network load 10.Server failures distinguishable from switch failures 11.Best practice and vulnerability alerts 12.Multi-tenant support
  • 46. © 2015 Assimilation Systems Limited 48 Third Dimension:Third Dimension: Fully distributed workFully distributed work Two philosophical underpinnings 1. Monitoring and Discovery are fully distributed 2. Reliable “no news is good news” Only responses to changes are centralized
  • 47. © 2015 Assimilation Systems Limited 49 Sample /proc/sys RulesSample /proc/sys Rules “BPC-00002-1”: {“rule”: “OR(EQ($kernel.core_uses_pid, 1), NE($kernel.core_pattern, ""))” “url”: “https://trello.com/c/6LOXeyDD” }, “BPC-00003-1”: {“rule”: “EQ($kernel.ctrl-alt-del, 0)”, “url”: “https://trello.com/c/aUmn4WFg”}, “BPC-00006-1”: {“rule”: “EQ($kernel.sysrq, 0)”, “url”: “https://trello.com/c/QSovxhup” },