Administering Virtual Machines With

Total Page:16

File Type:pdf, Size:1020Kb

Administering Virtual Machines With :FM<IJKFIP MLN 8[d`e`jk\i`e^m`iklXcdXZ_`e\jn`k_DCE N8K:?@E> K?<=CF:B This simple command-line tool helps you keep ahead of your virtual infrastructure. BY KYRRE BEGNUM AND ÆLEEN FRISCH he simplest virtualization scenar- tion, the open source MLN VM adminis- ฀ ฀฀฀฀฀฀฀฀ ios are very easy to manage. In tration tool might be just what you need. implement complex VM deployments. Kthe real world, though, virtual- MLN, which stands for “Manage Large ฀ ฀฀฀฀฀฀ ization does not always simplify system Networks,” lets you build sophisticated, ployment should be as efficient as pos- administration. In fact, many of the most dynamic, virtual infrastructures with the sible. powerful uses of virtualization result in use of freely available virtualization plat- The configuration language should be additional administrative tasks and chal- forms. The versatile MLN currently sup- extensible, so users can customize MLN lenges. For example, large data centers ports the widely used VMware Server [1] easily for their unique needs. use virtualization to consolidate several and Xen [2] packages, as well as User- MLN is designed to work in concert servers onto the same physical hard- Mode Linux [3]. with other VM management tools. For ware, thereby minimizing space, cost, For Xen, MLN also provides live mi- example, if you have a VMware Server, and power requirements. gration of entire network topologies, you can use MLN for efficient building These virtual machines (VMs) can mi- which is otherwise available in applica- and redeploying of complex virtual net- grate between servers to achieve higher tions only at the highest end. MLN’s works and also use VMware Server Con- uptimes and flexible load balancing. simple command-line and config file in- sole for starting and stopping individual However, managing such a complex vir- terfaces serve the needs of complex vir- virtual machines. tual infrastructure is at least as challeng- tualization scenarios, but it is easy Download MLN from SourceForge [4]. ing as administering the equivalent enough for administrators who are new The installation process is simple and number of separate server systems, and to virtualization. similar to the procedure for other Linux it requires very different skills. programs: Many high-end commercial virtualiza- 8YflkDCE tion products come with sophisticated The MLN environment helps you man- # wget 5 VM management features. If you are age large numbers of virtual machines http://mln.sourceforge.net/5 wondering whether the free software through a simple command-line inter- files/mln-latest.tar.gz community offers an equivalent applica- face. MLN has three main design goals: # tar xzfv mln-latest.tar.gz 22 ISSUE 98 JANUARY 2009 022-030_mln.indd 22 13.11.2008 17:57:08 Uhr MLN :FM<IJKFIP # cd mln-latest Listing 1: ldaptest.mln # ./mln setup 01 global { 17 (Settings affecting all VMs and 18 host ldapserver { ;\]`e`e^Gifa\Zkj switches in the file.) 19 xen Another Xen VM. MLN organizes virtual machines into 02 project ldaptest Project name. units called projects. Projects are groups 20 memory 256M 03 } of virtual machines and their associated 21 lvm 04 virtual networks. The simplest project 22 size 2GB 05 host ldapclient { consists of a single virtual machine. A 23 template ubuntu-ldap.ext3 more powerful approach is to group vir- 06 xen This is a Xen VM. (Initial OS image.) tual machines that belong together: all 07 memory 128M Memory size for VM. 24 nameserver 10.0.0.15 virtual machines that are web servers, 08 lvm Create logical volume 25 network eth0 { This VM uses a an entire replica of a small business net- for storing VM. static address. work, all the test systems for a software 09 size 2GB Size of the VM. 26 address 10.0.0.2 test suite. 10 template ubuntu-client.ext3 27 netmask 255.255.255.0 Projects are defined in MLN configura- 11 nameserver 10.0.0.15 Set the 28 gateway 10.0.0.1 tion files. The configuration file shown name server. 29 switch LDAPlan Connect to in Listing 1 (ldaptest.mln) defines two 12 network eth0 { Config. virt. virtual LAN. net.interface. virtual machines connected by a virtual 30 } LAN. Annotations in the file highlight 13 address dhcp Use DHCP for 31 } the most important configuration set- IP address. 32 tings. 14 switch LDAPlan Connect to Listing 1 starts with the global stanza, virt. switch. 33 switch LDAPlan { } (Create virtual switch connecting 15 } wherein the name of the project is de- the VMs.) fined. Next follows a declaration of a vir- 16 users { kyrre l47/Y.NtB9p7w } tual machine called ldapclient – a Xen (Create user and set encoded host with 128MB of memory built from password.) 022-030_mln.indd 23 13.11.2008 17:57:11 Uhr :FM<IJKFIP MLN Table 1: Working with the mln Command Clearly, writing host stanzas for large numbers of virtual machines would get Action Command tedious. The MLN configuration lan- Build VM mln build -f project-config-file [-r] guage allows you to define superclasses: Reconfigure VM (including live migration) mln upgrade -f modified-config-file named groups of settings that can be Start VM mln start -p project [-h host] applied to multiple hosts. Stop VM mln stop -p project [-h host] Query status of all/ specified projects mln status [-p project] Jlg\iZcXjj List defined projects mln list Listing 2 illustrates the use of a super- Remove a project mln remove -p project class. The superclass, which is called Register a template mln rt -t file-system-image-file basic in Listing 2, provides a bundle of Backup an entire project mln export -p project -d location [-z] settings that are then available for host Restore a saved project mln import -p project -d location definitions. Listing 2 defines three hosts based on the superclass. The third host the template ubuntu-client.ext3. The command to build the virtual machines illustrates the technique of overriding a host has one network interface config- and virtual network inside it. For exam- setting from the superclass. Of course, ured to use DHCP for its IP address. The ple, the following commands create the many more settings could be placed into third stanza defines another Xen host, virtual hosts and network defined in the superclass or individual host stanzas ldapserver, with similar settings, al- Listing 1 and then start the hosts and as required. One project file can include though it is given more memory. Note virtual network: multiple superclasses, and the super- that the second host uses a different classes can even be nested. template as its initial operating system # mln build -f ldaptest.mln Substanzas, such as network interface image and has a static IP address. The # mln start -p ldaptest definitions, which appear both within final stanza defines a virtual switch to superclass and host definitions, are which both virtual machines are con- The build subcommand instantiates the merged. Directives that appear in the nected; this switch allows them to com- entities in the specified project file, and host definition have precedence over municate with one another. the start subcommand boots the virtual directives within the superclass. Most of the settings are straightfor- machines and activates the virtual net- ward, but the template specifications work. ;`jki`Ylk\[Gifa\ZkjXe[ deserve special mention. Templates are Typically, the build subcommand is C`m\D`^iXk`fe pre-fabricated VM filesystems. Each time used only once – initially to create the So far, all the examples have been lo- you build a new virtual machine, you project – whereas the start subcommand cated on a single server. However, MLN specify a template to use as its base. The and its sibling stop are used to activate supports distributed projects in which virtual machine will be individualized and deactivate the project hosts and net- virtual machines are located on one or by MLN during the build process. Some work. more remote hosts. The host and switch people like to use very generic templates By including the -h option, you can definitions in a distributed project re- $$ ' $$ for all their virtual machines and cus- apply the command to a single host quire an additional service_host direc- % & % & tomize them later, whereas others create within a project: tive, which specifies the server location: very specialized templates, like a fully functional LAMP server or a copy of a # mln stop -p ldaptest -h 5 host rem-vm { typical employee desktop. ldapserver vmware The definition for a VMware Server template rhel5.vmdk virtual machine differs only slightly from Table 1 summarizes the most important ... the host definition in Listing 1. The vm- subcommands related to project man- service_host bigvmbox ware keyword is used in the VM host agement. } & definition stanzas instead of xen, and a ! " # VMware format template is used instead Listing 2: Working with a Superclass & . / of a filesystem image. The switch defini- 01 global { project italy } 12 } () ! tion stanza also requires the vmware 02 13 ! keyword. 03 superclass basic { 14 host uno { superclass basic } % *+ , ! " # Valid host and switch names are case 04 vmware 15 host due { superclass basic } 0 ,- $%&&' sensitive and can contain lowercase and 05 template rhel5.vmdk 16 host tre { uppercase letters, numbers, and hy- ""# 06 memory 128M 17 superclass basic () ! phens. ! 07 network eth0 { 18 memory 256MB % *+ , DXeX^`e^MDjn`k_k_\dce 08 address dhcp 19 } :fddXe[ 09 switch lan 20 ,- 10 } 21 switch lan { vmware } ! Once you have defined a project in a configuration file, you can use the mln 11 service_host milano 24 ISSUE 98 JANUARY 2009 022-030_mln.indd 24 13.11.2008 17:57:11 Uhr MLN :FM<IJKFIP Superclasses can include the service_host To move virtual machines from one noted by bigvmbox to the one denoted directive as well (as shown in Listing 2).
Recommended publications
  • Naemonbox Manual Documentation Release 0.0.7
    NaemonBox Manual Documentation Release 0.0.7 NaemonBox Team September 16, 2016 Contents 1 Introduction 3 1.1 Target audience..............................................3 1.2 Prerequisite................................................3 2 About Naemonbox 5 2.1 Project..................................................5 2.2 Features..................................................6 3 Installation Guide 7 3.1 System requirements...........................................7 3.2 Recommended system requirements...................................7 3.3 Client Operating Systems........................................7 3.4 Openvz VPS installation.........................................8 3.5 GNU/Linux Debian 7 (or later) Installation...............................8 3.6 Installing Naemonbox..........................................8 4 Getting Started 9 4.1 Step one.................................................9 4.2 Step two................................................. 10 4.3 Step three................................................. 10 4.4 Step four................................................. 10 5 Configuring Naemon 11 5.1 Introduction............................................... 11 5.2 Actions.................................................. 11 5.3 Hosts Definition............................................. 12 5.4 Services.................................................. 13 5.5 Commands................................................ 14 5.6 Time periods............................................... 15 5.7 Contacts................................................
    [Show full text]
  • Josh Malone Systems Administrator National Radio Astronomy Observatory Charlottesville, VA
    heck What the #%!@ is wrong ^ with my server?!? Josh Malone Systems Administrator National Radio Astronomy Observatory Charlottesville, VA 1 Agenda • Intro to Monitoring • Internet protocols 101 • • Nagios SMTP • IMAP • Install/Config • HTTP • Usage • Custom plugins • Packet sniffing for dummies • Intro to Troubleshooting • Tools • telnet, openssl • grep, sed • ps, lsof, netstat 2 MONITORING 3 Automated Monitoring Workflow 4 Monitoring Packages: Open Source • • Pandora FMS • Opsview Core • Naemon • • • • • • Captialware ServerStatus • Core • Sensu All Trademarks and Logos are property of their respective trademark or copyright holders and are used by permission or fair use for education. Neither the presenter nor the conference organizers are affiliated in any way with any companies mentioned here. 5 Monitoring Packages: Commercial • Nagios XI • Groundwork • PRTG network monitor • CopperEgg • WhatsUp Gold • PRTG network monitor • op5 (Naemon) All Trademarks and Logos are property of their respective trademark or copyright holders and are used by permission or fair use for education. Neither the presenter nor the conference organizers are affiliated in any way with any companies mentioned here. 6 Why Automatic Service Monitoring? • Spot small problems before they become big ones • Learn about outages before your users do • Checklist when restoring from a power outage • Gives you better problem reports than users • Problems you might never spot otherwise • Failed HDDs in RAIDs • Full /var partitions • Logs not rotating • System temperature rising 7 Why Automatic Service Monitoring? • Capacity planning • Performance data can generate graphs of utilization • RAM, Disk, etc. • Availability reports - CAUTION • Easy to generate -- even easier to generate wrong • Make sure your configurations actually catch problems • Will also include problems with Nagios itself :( • If you’re going to quote your availability numbers (SLAs, etc.) make sure you understand what you’re actually monitoring.
    [Show full text]
  • Monitoring Bareos with Icinga 2 Version: 1.0
    Monitoring Bareos with Icinga 2 Version: 1.0 We love Open Source 1 © NETWAYS Table of Contents 1 Environment 2 Introduction 3 Host 4 Active Checks 5 Passive Events 6 Graphite 2 © NETWAYS 1 Environment 3 © NETWAYS Pre-installed Software Bareos Bareos Database (PostgreSQL) Bareos WebUI Icinga 2 IDO (MariaDB) Icinga Web 2 Graphite 4 © NETWAYS 2 Introduction 5 © NETWAYS 2.1 Bareos 6 © NETWAYS What is Bareos? Backup Archiving Recovery Open Sourced Backup, archiving and recovery of current operating systems Open Source Fork of Bacula (http://bacula.org) Forked 2010 (http://bareos.org) AGPL v3 License (https://github.com/bareos/bareos) A lot of new features: LTO Hardware encryption Bandwidth limitation Cloud storage connection New console commands Many more 7 © NETWAYS Bareos Structure 8 © NETWAYS 2.2 Icinga 2 9 © NETWAYS Icinga - Open Source Enterprise Monitoring Icinga is a scalable and extensible monitoring system which checks the availability of your resources, notifies users of outages and provides extensive BI data. International community project Everything developed by the Icinga Project is Open Source Originally forked from Nagios in 2009 Independent version Icinga 2 since 2014 10 © NETWAYS Icinga - Availability Monitoring Monitors everything Gathering status Collect performance data Notifies using any channel Considers dependencies Handles events Checks and forwards logs Deals with performance data Provides SLA data 11 © NETWAYS What is Icinga 2? Core based on C++ and Boost Supports all major *NIX and Windows platforms Powerful configuration
    [Show full text]
  • Network Monitoring Using Nagios and Autoconfiguration for Cyber Defense Competitions
    NETWORK MONITORING USING NAGIOS AND AUTOCONFIGURATION FOR CYBER DEFENSE COMPETITIONS Jaipaul Vasireddy B.Tech, A.I.E.T, Jawaharlal Nehru Technological University, India, 2006 PROJECT Submitted in partial satisfaction of the requirements for the degree of MASTER OF SCIENCE in COMPUTER SCIENCE at CALIFORNIA STATE UNIVERSITY, SACRAMENTO FALL 2009 NETWORK MONITORING USING NAGIOS AND AUTOCONFIGURATION FOR CYBER DEFENSE COMPETITIONS A Project by Jaipaul Vasireddy Approved by: __________________________________, Committee Chair Dr. Isaac Ghansah __________________________________, Second Reader Prof. Richard Smith __________________________ Date ii Student: Jaipaul Vasireddy I certify that this student has met the requirements for format contained in the University format manual, and that this Project is suitable for shelving in the Library and credit is to be awarded for the Project. __________________________, Graduate Coordinator ________________ Dr. Cui Zhang Date Department of Computer Science iii Abstract of NETWORK MONITORING USING NAGIOS AND AUTOCONFIGURATION FOR CYBER DEFENSE COMPETITIONS by Jaipaul Vasireddy The goal of the project is to monitor the services running on the CCDC (College Cyber Defense Competition) network, using Nagios which uses plugins to monitor the services running on a network. Nagios is configured by building configuration files for each machine which is usually done to monitor small number of systems. The configuration of Nagios can also be automated by using shell scripting which is generally done in an industry, where the numbers of systems to be monitored are large. Both the above methods of configuration have been implemented in this project. The project has been successfully used to know the status of each service running on the defending team’s network.
    [Show full text]
  • Performance Monitoring Using Nagios Core Hpc4e-Comcidis Vin´Icius P
    Performance Monitoring Using Nagios Core HPC4e-ComCiDis Vin´ıcius P. Kl^oh Mariza Ferro Gabrieli D. Silva Bruno Schulze LNCC { Petr´opolis,RJ Abstract The High Performance Computing for Energy (HPC4e) project aims to apply\new exascale HPC techniques to energy industry simulations, customizing them if necessary, and going beyond the state-of-the-art in the required HPC exascale simulations for different energy sources that are the present and the future of energy like, wind energy production and design, efficient combustion systems for biomass-derived fuels (biogas), and exploration geophysics for hydrocarbon reservoirs". Beyond the general objective, there are specific technical objectives that will be developed to enhance the final results. Our objective is study the mapping and optimization of the codes proposed for simulations in energy domain (atmosphere, biomass and geophysics for energy), analysing all the aspects related with the performance of these simulations' codes. Trying to meet all these objectives, we are investigating performance tools that would help our research. We investigated at first tools that enable online measurement of performance (online approaches are without code instrumentation). More specifically, in this work we present our initial work with Nagios and the hard begin to put this performance tool on work. In this work we present the steps and instructions, on how to install and configure Nagios Core to enhance it monitoring your local and remote host. July 2016 Contents 1 Introduction 2 2 Nagios Core 3 3 Install and Configure Nagios Core and Basic Plugins 4 4 Plugins 6 4.1 Install and Configure NRPE (Nagios Remote Plugin Executor) .
    [Show full text]
  • Red Hat Ceph Storage 4 Monitoring Ceph with Nagios Guide
    Red Hat Ceph Storage 4 Monitoring Ceph with Nagios Guide Monitoring Ceph with Nagios Core. Last Updated: 2021-09-14 Red Hat Ceph Storage 4 Monitoring Ceph with Nagios Guide Monitoring Ceph with Nagios Core. Legal Notice Copyright © 2021 Red Hat, Inc. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/ . In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, the Red Hat logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries. Node.js ® is an official trademark of Joyent. Red Hat is not formally related to or endorsed by the official Joyent Node.js open source or commercial project.
    [Show full text]
  • ETERNUS Nagios(R)
    P3AM-7242-07ENZ0 ETERNUS Nagios® Plugin 1.6 User's Guide This page is intentionally left blank. Preface The ETERNUS Nagios® Plugin (referred to as "ETERNUS Nagios Plugin" or "this plugin" in the remainder of this manual) is a plugin that is installed in a Fujitsu server (PRIMEQUEST or PRIMERGY) or non-Fujitsu servers to monitor the ETERNUS AF series, the ETERNUS DX200F All-Flash Arrays, or the ETERNUS DX series Hybrid Storage Systems (hereinafter referred to as "ETERNUS AF/DX"). This manual provides an overview and explains how to use this plugin. In addition, refer to the manuals that are related to the ETERNUS AF/DX as necessary. Seventh Edition December 2019 Microsoft and Internet Explorer are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Red Hat is a registered trademark of Red Hat, Inc. Linux® is the registered trademark of Linus Torvalds in the U.S. and other countries. SUSE is a registered trademark of Novell Inc. in the U.S. and other countries. Nagios, the Nagios logo, and Nagios graphics are the servicemarks, trademarks, or registered trademarks owned by Nagios Enterprises. Mozilla, Firefox, and the Mozilla and Firefox logos are trademarks or registered trademarks of the Mozilla Foundation in the United States and other countries. Other company names, product names, and service names are registered trademarks or trademarks of their respective owners. Microsoft product screen shot(s) reprinted with permission from Microsoft Corporation. 3 ETERNUS Nagios® Plugin 1.6 User’s Guide Copyright 2019 FUJITSU LIMITED P3AM-7242-07ENZ0 About This Manual Organization This manual is composed of the following six chapters and an appendix.
    [Show full text]
  • Ubuntu Server Guide Ubuntu Server Guide Copyright © 2010 Canonical Ltd
    Ubuntu Server Guide Ubuntu Server Guide Copyright © 2010 Canonical Ltd. and members of the Ubuntu Documentation Project3 Abstract Welcome to the Ubuntu Server Guide! It contains information on how to install and configure various server applications on your Ubuntu system to fit your needs. It is a step-by-step, task-oriented guide for configuring and customizing your system. Credits and License This document is maintained by the Ubuntu documentation team (https://wiki.ubuntu.com/DocumentationTeam). For a list of contributors, see the contributors page1 This document is made available under the Creative Commons ShareAlike 2.5 License (CC-BY-SA). You are free to modify, extend, and improve the Ubuntu documentation source code under the terms of this license. All derivative works must be released under this license. This documentation is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE AS DESCRIBED IN THE DISCLAIMER. A copy of the license is available here: Creative Commons ShareAlike License2. 3 https://launchpad.net/~ubuntu-core-doc 1 ../../libs/C/contributors.xml 2 /usr/share/ubuntu-docs/libs/C/ccbysa.xml Table of Contents 1. Introduction ........................................................................................................................... 1 1. Support .......................................................................................................................... 2 2. Installation ............................................................................................................................
    [Show full text]
  • Nagios in High Availability Environments
    Nagios in High Availability Environments Introduction Nagios is a versatile and functional network management tool with a GUI (graphic user interface) comparable to other commercial tools. It’s free software, which makes it a perfect candidate for companies. When Nagios is used in a production environment, its high availability component is required. However, the solutions presented in the official documentation do not make Nagios a very reliable tool in this kind of environments. This document will show a more efficient way. First, we are going to approach the already existing solutions, and afterwards a new solution. It’s expected from the reader an understanding of Nagios’s existing solutions for high availability environments (http://nagios.sourceforge.net/docs/1_0/redundancy.html). Scenario 1 – Redundant Monitoring This solution has various problems. The most obvious one is the increase of redundant information in the network. Consequently, it wastes the available bandwidth, and increases the load on the machines that are being monitored. Another undesirable situation, when the master process recovers, is that two machines can send notifications. It happens because the master process doesn’t have any knowledge of the slave process. It obliges the slave to deactivate the notifications promptly. Finally, if one of the nagios processes fails, it won’t recover information gathered during the down period. This method doesn’t safeguards history. Scenario 2 - Failover Monitoring The difference between this solution and scenario 1 is the inexistence of more than one machine making checks. In this way monitored machines will not be submitted to an extra load, and the bandwidth use is more efficient.
    [Show full text]
  • Nagios & Icinga Network Monitoring
    autoscale: true Nagios & Icinga Philippines Network Operators Group, March 2018 Jonathan Brewer Telco2 Limited New Zealand Network Monitoring: Once you have SNMP data Once you have analysed Log data Once you have service performance data It's time to do something with it! Nagios Nagios is an Internet industry standard for monitoring At times it has been the most popular tool Its job is to monitor hosts & services, and alert on problems Alerting is its forte, it can use email, SMS, or API Handling of issues can be as complex as you need Nagios Home Nagios Hosts Hosts are containers for services If a host is unreachable, so are its services If a host is down, so are its services Nagios treats hosts differently from services! Nagios Hosts Nagios Host Groups Many hosts in a network are identical They can be added to a common group Nagios will behave the same way towards all hosts in a group This saves time & effort in adding hosts to Nagios Nagios Host Groups Nagios Services Nagios pre-defines service templates for many common things DNS, FTP, HTTP, HTTPS, SSH Users can define their own services for special cases For example calling a remote application via SSH Nagios Services Nagios Custom Service Nagios Heirarchy All services in Nagios are children of a host All hosts in Nagios are considered in a heirarchy If a host's parent is unavailable, its children are unreachable This prevents Nagios from alerting on unreachable hosts & services Nagios Heirarchy Nagios Contacts Alerting is what Nagios does best! Contacts the basis of alerting How a contact
    [Show full text]
  • Linux and Open Source for (Almost) Zero Cost PCI Compliance
    Linux and Open Source for (Almost) Zero Cost PCI Compliance Rafeeq Rehman 2 Some Introductory Notes ¡ Payment Card Industry (PCI) standard is not a government regulaon. ¡ Who needs to comply with PCI? ¡ Twelve major requirements covering policy, processes, and technology to protect Credit Card Data. ¡ What is Credit Card Data? ¡ Few Clarificaons ¡ Payment Card Industry (PCI) requires some tasks to be performed by external vendors depending upon merchant level. There is no other way around, unfortunately. ¡ Open Source soluCons do need people. That is why it is almost free but not totally free. 9/10/11 3 What the Auditors Look For? ¡ Is PCI just a checklist? ¡ Are auditors genuinely interested in securing the PCI data? ¡ Does it maer if you use an open source or commercial product to meet PCI requirements? ¡ What if you meet PCI requirements while improving security and spending less money? 9/10/11 4 Is it viable to use Open Source for PCI Compliance? ¡ Is there a real company who uses Open Source soQware to achieve PCI compliance? Is it even possible? ¡ PCI 2.0 focuses more on Risk based approach. ¡ PCI (or any compliance) is boring! Make it interesCng by using Open Source. 9/10/11 5 PCI Biggest Expenses 1. Log Management (Storage and archiving, Monitoring and Alerng) 2. Vulnerability Scanning 3. Network Firewalls and Network Segmentaon 4. Intrusion DetecCon System 5. EncrypCon for data-at-rest 6. File Integrity Monitoring 7. IdenCty Management (Password controls, Two factor for remote access, Role based access) 9/10/11 6 AddiConal PCI
    [Show full text]
  • FUJITSU Server Plug-Ins for Nagios Core FUJITSU Server Plug-Ins V3.50 for Nagios Core
    FUJITSU Server Plug-ins for Nagios Core FUJITSU Server Plug-ins V3.50 for Nagios Core Interface Documentation March 2018 Edition Copyright 2018 FUJITSU LIMITED All hardware and software names used are trademarks of their respective manufacturers. All rights, including rights of translation, reproduction by printing, copying or similar methods, in part or in whole, are reserved. Offenders will be liable for damages. All rights, including rights created by patent grant or registration of a utility model or design, are reserved. Delivery subject to availability. Right of technical modification reserved. FUJITSU Server Plug-ins for Nagios Core Page: 3 / 86 Keywords ServerView, Nagios, Icinga, PRIMERGY, Blade, PRIMEQUEST, RAID, CIM, iRMC, RackCDU Copyright 2012-2018 FUJITSU LIMITED All rights reserved. FUJITSU Server Plug-ins for Nagios Core Page: 4 / 86 CONTENTS 1 Introduction ..............................................................................................................................................7 1.1 Change History ..................................................................................................................................8 1.2 Documentation ..................................................................................................................................8 1.3 How to Start .......................................................................................................................................9 1.4 Protocol Overview (SNMP, CIM, REST) .......................................................................................
    [Show full text]