sponsors
usenix conference policies
Training Program - Details
A variety of topics are being covered at LISA '14. Use the icons listed below to focus on a key subject area:
Full Day
A computational daemonologist, Chris works in San Francisco as a SiteReliability Engineer for Google App Engine, a platform serving over 28 billion requests per day. He was previously responsible for the care and feeding of advertising statistics, data warehousing, and customer support systems, joining Google in 2007. In other lives, Chris has worked in academic IT, analyzed data for political campaigns, and engaged in some light BSD kernel hacking, picking up degrees in computer engineering, economics, and technology policy along the way.
Grand Ballroom C
Truly large-scale systems are still rare, and in a world of out-sourcing, and cloud-computing, it's harder for System Administrators to get the opportunity to design large systems. It's even harder to get the design right. Most organizations don't have the in-house expertise to build a large system, so outsource the detailed design to external contractors. If your organization doesn't have the expertise to design a large system, it's unlikely that it has the expertise to confirm a proposal is fit for your purposes and is cost effective.
While anyone can wave their hands convincingly, and come up with a rough outline of a large distributed system, those who can also fill in the detail are highly-prized. This class will teach you how to design software systems like Imgur and Twitter, then estimate the hardware needed to ensure you can deliver to a hard SLA. You will learn how requirements like queries-per-second, multi-site reliability, and data security impact the cost of implementation.
This will *not* cover concurrent programming and the software-engineering side of distributed systems.
System Admins who want to understand large systems, System Engineers who want to build large systems and business people who expect to procure large systems.
An ability to assess whether a design will work before it's built. The ability to communicate large system design with systems architects and business people. An ability to assess requirements, communicate constraints and predict performance of large systems before money is spent.
- How design works
- Finding bottlenecks in systems
- Large scale design patterns
- Lab work: gathering requirements in teams
- Lab work: estimating hardware requirements
- Lab work: building in reliability
Jennifer has years of experience improving platform development efficiency through building reliable large scale services, reducing complexity of product implementation, and automation of infrastructure. As a Chef Automation Consulting Engineer, she helps companies discover their own best practices. Prior to joining Chef, she was a lead service engineer at Yahoo! within cloud platform services supporting the multi-tenant Hadoop environment and Sherpa. She is also a sparkly devops princess that is passionate about increasing diversity in tech. She doesn’t play favorites for programming languages or editors, but her favorite board game is Waterdeep.
Grand Ballroom B
If you are interested in running Hadoop and need to understand how to manage a cluster and not how to write Java applications, this course is for you. If you inherited a non-production environment that now has mission critical data and you need to harden that Hadoop environment for production, then this course is also for you. In this class, I will teach you the core set of skills needed to deploy, configure, and monitor resources with an emphasis on providing you with the basics so you can use self-directed learning to go deeper. While there will be some exercises to show you how to use Hadoop, the focus of this tutorial and its hands-on exercises is operation.
Unix system administrators interested in an introduction to hadoop operations.
- Techniques for deploying, configuring, monitoring, and securing a hadoop cluster
- Essential Hadoop troubleshooting skills
- Working Hadoop environment on laptop
- Overview of Hadoop and HDFS
- Sandbox setup for class exercises
- Architecture
- Installation
- Configuration
- Logging
- Monitoring
- Security
Neil Gunther, M.Sc., Ph.D. is a researcher specializing in performance and capacity management. Prior to starting his own consulting company in 1994 (www.perfdynamics.com), Neil worked on the NASA Voyager and Galileo missions, the Xerox PARC Dragon multiprocessor, and the Pyramid/Siemens RM1000 parallel cluster. Neil has authored many technical articles and several books including: Guerrilla Capacity Planning (Springer 2007) and the 2nd edition of Analyzing Computer System Performance with Perl::PDQ (Springer 2011) and received the A.A. Michelson Award in 2008.
Grand Ballroom D
Most system administrators are already familiar with diagnosing and tuning computer systems using performance data captured by open source or commercial monitoring tools such as Splunk, Graphite, and BMC Patrol.
This full-day tutorial will show you how to get beyond performance monitoring to performance analysis and capacity planning. These skills are in demand more than ever for sizing (over-engineering can't improve single-threaded performance), procurement (try buying a 10GHz processor), as well as ensuring scalability of large infrastructures used in both private and public clouds.
Since computer hardware has become a mass-produced commodity, its cost no longer drives capacity planning in the strategic sense. The capacity part has become cheap and easy; it's the planning part that requires skill. And capacity planning is not just about the future anymore. Rather, it needs to respond rapidly to the fast-paced changes and tighter budgets of modern business environments. Enter tactical planning: Guerrilla-style capacity planning.
Anyone looking for job security by improving their skill set to include capacity management. No specialized background in performance analysis or capacity planning is assumed. A working knowledge of Linux or Unix performance tools will be helpful.
The ability to start analyzing performance data you may already have collected to forecast system capacity and predict bottlenecks that can hinder system scalability.
- What is performance and capacity management?
- The Guerrilla approach to capacity planning.
- Monitoring the volatile technology marketplace for procurement.
- The three performance metrics you need to know.
- Who ordered multicores and what are their performance limitations?
- Statistical forecasting with R.
- How to establish a capacity line.
- Queueing analysis for those who can’t wait.
- How to use PDQ for bottleneck analysis in R, C, Perl, and Python.
- Quantifying scalability using Amdahl's law and the Universal Scalability Law.
- Virtualization capacity management from core hyperthreads to cloud hyperservices.
- Scalability analysis of Xen, VMware and WebLogic virtualized servers.
- Case studies in capacity planning for large-scale web sites and multi-tier applications.
Half Day Morning
Kyrre Begnum works as an Associate Professor at Oslo and Akershus University College of Applied Sciences where he teaches sysadmin courses at the MSc and BS levels. Kyrre holds a PhD from the University of Oslo with a focus on understanding the behavior of large systems. He has experience with large scale virtual machine management, cloud architectures and developing sysadmin tools. His research focus is on practical and understandable approaches that bring advanced models to real life scenarios.
Nicole Forsgren Velasquez is considered an expert in the work, tools, knowledge sharing, and communication of technical professionals. Her background spans user experience, enterprise storage, cost allocation, and systems design and development. She has worked with large and small corporations across many industries and government. She holds a Ph.D. in Management Information Systems and a Masters in Accounting from the University of Arizona. She is currently an Assistant Professor at Utah State University.
Grand Ballroom A
This tutorial is a course in statistics with a specific focus on system administrators and the types of data they face. We assume little prior knowledge of statistics and cover the most common concepts in descriptive statistics and apply them to data taken from real-life examples. Our aim is to provide insight into what methods provide good interpretation of data such as distributions, probability and formulating basic statements about the properties of observed data.
The tutorial instructors will be available in a Lab Space following the tutorial in order to answer questions and offer personal feedback on cases the attendees wish to investigate with their own data.
Sysadmins who are faced with data overload and wish they had some knowledge of how statistics can be used to make more sense of it. We assume little prior knowledge of statistics, but a basic mathematical proficiency is recommended.
- A fundamental understanding of how descriptive statistics can help provide additional insight on the data in the sysadmin world and that will allow for further self-study on statistics.
- A basic set of statistical approaches that can be used to identify fundamental properties of the data they see in their own environments, and identify patterns in that data.
- Learn how to make accurate and clear statements about metrics that are valuable to their organization.
- Descriptive statistics for single datasets, including: mean, median, mode, range, and distributions
- Basic analysis of distributions and probabilities using percentiles typically seen in ops
- Interpretation of analyses to include team and business implications
- Regression analysis to suggest predictive relationships, with an emphasis on interpretation and implications
- Correlation analysis and broad pattern detection (if time allows)
Thomas A. Limoncelli is an internationally recognized author, speaker, and system administrator. His best known books include Time Management for System Administrators (OReilly) and The Practice of System and Network Administration (Addison-Wesley). He works in New York City at Stack Exchange, home of ServerFault.com and StackOverflow.com. Previously he’s worked at small and large companies including Google and Bell Labs. http://EverythingSysadmin.com is his blog. His new book, “The Practice of Cloud System Administration” has just been released.
Cedar Room AB
System Administration is a team sport. How can we better collaborate and work as a team? Techniques will include many uses of Google Docs, wikis and other shared document systems, as well as strategies and methods that create a culture of cooperation.
System administrators and managers that work on a team of 3 or more.
- Understanding the different roles people play within a team.
- Behavior that builds team cohesion
- 3 uses of Google docs you had not previously considered
- How to organize team projects to improve teamwork
- Track projects using Kanban boards.
- How to divide big projects among team members
- Collaborating via the "Tom Sawyer Fence Painting" technique
- How to criticize the work of teammates constructively
- How to get agreement on big plans
- Meetings: How to make them more effective, shorter, and more democratic
- How to create accountability, stop re-visiting past decisions, improve involvement
- Strategy for leaving “fire-fighting” mode, be more “project focused”.
- Project Work: Using “design docs” to get consensus on big and small designs before they are committed to code.
- Service Docs: How to document services so any team member can cover for any other.
- Kanban: How to manage work that needs to be done.
- Chatroom effectiveness: How to make everyone feel included, not lose important decisions.
- Playbooks: How to get consistent results across the team, train new-hires, make delegation easier.
- Send more effective email: How to write email that gets read.
(NOTE: This class is a reboot of last year’s “Advanced Time Management: Team Efficiency”)
Half Day Afternoon
Jason Maughan is a predictive data analyst at PurePredictive, Inc., where his primary role is machine learning ensemble construction and optimization. He enjoys data exploration and visualization using tools such as R. His mission is to find hidden patterns in data to explain the past and predict the future. Jason holds a Masters in Management Information Systems from Utah State University.
Nicole Forsgren Velasquez is considered an expert in the work, tools, knowledge sharing, and communication of technical professionals. Her background spans user experience, enterprise storage, cost allocation, and systems design and development. She has worked with large and small corporations across many industries and government. She holds a Ph.D. in Management Information Systems and a Masters in Accounting from the University of Arizona. She is currently an Assistant Professor at Utah State University.
Grand Ballroom A
We provide a brief introduction to the R programming and statistics language, with a focus on exploratory data analysis for sysadmins. We assume little prior knowledge of statistics and no prior knowledge of the R language or programming environment. The course includes data input, basic manipulation, visualization and plotting, and basic analysis in R. The instructors will be available in the LISA Labs space after the tutorial for attendees that have additional questions or have brought their own data. R (http://www.r-project.org/) and RStudio (http://www.rstudio.com/), an IDE for R, should be installed prior to attending.
Sysadmins who would like an introduction to R as a tool for gaining additional insight into their wealth of data using R’s statistical and visualization capabilities. We assume little prior knowledge of R or statistics, but basic mathematical proficiency is recommended.
- Experience with basic methods and data types in R
- Experience with basic visualizations in R
- Basic understanding of data exploration, and analysis to identify patterns in R, such as correlations, regressions, and decision trees (as time allows)
- An introduction to R and the RStudio programming environment
- Basic instructions for loading, manipulating, and saving data
- Basic functions and algorithms for exploring data, and the types of analysis useful for sysadmins
- An introduction to descriptive statistics for single datasets, including: mean, median, mode, range, and distributions
- Basic visualizations in R, including histograms, scatterplots, and heatmaps (as time allows)
Jean-Charles has been an instructor in IT storage environments for the last 15 years. He has been working with equipment from different vendors. He joined Inktank (since then acquired and now a division of Red Hat) in December 2013 as Senior Technical Instructor and head of Inktank University to help the adoption of Ceph in general and Red Hat Inktank Ceph Enterprise (Red Hat ICE) offering in particular.
Cedar Room AB
Learn about the history of Ceph and get to know how Ceph, as Software Defined Storage, uses its different components to offer Object access (S3 and Swift compatible), Block Level access and File Level access. I combine lecture with instructor-led demonstrations using Ceph.
Any system or storage administrator who wants to get a better and more in depth understanding of Ceph. Any CIO or CTO who would like to know how Ceph could benefit his infrastructures and help contain costs.
- Virtual Machine images for playing with Ceph
- Lab instructions on how to setup and play with a test cluster
- Overview of the Ceph Architecture
- Different access methods to the Ceph Storage Cluster
- Hands-on using Ceph
Full Day
Theodore Ts'o has been a Linux kernel developer since almost the very beginnings of Linux: he implemented POSIX job control in the 0.10 Linux kernel. He is the maintainer and author of the Linux COM serial port driver and the Comtrol Rocketport driver, and he architected and implemented Linux's tty layer. Outside of the kernel, he is the maintainer of the e2fsck filesystem consistency checker. Ted is currently employed by Google.
Grand Ballroom C
The Linux operating system is commonly used both in the data center and for scientific computing applications; it is used in embedded systems as small as a wristwatch, as well as in large mainframes. As a result, the Linux system has many tuning knobs so that it can be optimized for a wide variety of workloads. Some tuning of the Linux operating system has been done ""out of the box"" by enterprise-optimized distributions, but there are still many opportunities for a system administrator to improve the performance of his or her workload on a Linux system.
This class will cover the tools that can be used to monitor and analyze a Linux system, and key tuning parameters to optimize Linux for specific server applications, covering the gamut from memory usage to filesystem and storage stacks, networking, and application tuning.
Intermediate and advanced Linux system administrators who want to understand their systems better and get the most out of them.
The ability to hone your Linux systems for the specific tasks they need to perform.
- Strategies for performance tuning
- Characterizing your workload's requirements
- Finding bottlenecks
- Tools for measuring system performance
- Memory usage tuning
- Filesystem and storage tuning
- NFS performance tuning
- Network tuning
- Latency vs. throughput
- Capacity planning
- Profiling
- Memory cache and TLB tuning
- Application tuning strategies
Nathen Harvey is the Director of Community at Chef. Before joining Chef, Nathen spent a number of years managing operations and infrastructure for a number of web applications. Nathen is a co-host of the Food Fight Show, a podcast about Chef and DevOps. He participates in many different meetup groups and organizes the DevOpsDC Meetup Group. When not working or hosting meetups, Nathen enjoys going to concerts, drinking craft beer, and over-sharing on sites like Twitter, untappd, and foursquare.
Cedar Room AB
This is a hands-on tutorial that will cover the basics that everyone needs to know about how to test your automation code. We’ll start off with a quick introduction to Chef and work our way through writing a fully-tested cookbook or two using linting, unit testing, integration testing, and cross-platform testing.
Hands-on exercises throughout the tutorial will reinforce the material discussed.
Anyone responsible for managing infrastructure especially those who are interested in automating the provisioning and management of said infrastructure using state-of-the-art tools and practices.
A working code base that includes samples for building out testable infrastructure components.
- Introduction to Chef
- Test-driven Development (TDD)
- syntax check - knife cookbook test
- linting - foodcritic
- unit testing - ChefSpec
- integration testing - ServerSpec
Branson is a 27-year veteran of system administration and security. He started in cryptology for the Navy and has since worked on NASA shuttle projects, TSA security systems, search engines and supports many open-source projects. He founded sandSecurity to provide policy and technical audits, support and training for IT security and system administrators. Branson is currently the Director of IT for Blackphone, and generally likes to spend time responding to the statement "I bet you can't…"
Grand Ballroom B
System administrators often run into interesting conflicts between sysadmin, customer, and IT security needs. These conflicts generally lead to difficulty in achieving a balance between administrative convenience, good customer service, and minimal risk. There are processes or services available that can significantly improve any of these areas; however, many times they are costly or resource intensive. This course is designed for system administrators who want to improve the security posture of their organizations, using IT security standards paired with good system administration practices, resulting in better service, lower risk, and minimal impact to time and budget.
We will walk a path, covering many domains of IT security and enterprise system administration in ways that utilize the interconnection between good system administration practices and security fundamentals. We will discuss recent risks and threats, analyze them with respect to your environment, review possible impacts and develop mitigations that you can apply immediately. Training includes instruction, discussion, many hands-on labs, and a strong dose of common sense.
Attendees should bring a laptop capable of running a Virtual Guest and will be provided a VM in which to work. The class will have access to a test network of systems for training and lab exercises.
Beginning to mid-level system administrators of any stripe with an interest in IT security and a desire to improve their security. It is suggested that participants have experience with the *nix command line.
A toolbox of documentation, (mostly) free software, and a good starting point for developing better practices to improve security and system administration.
- The relationship between system administration and IT security
- Security theories, standards and risk mitigation as applied by SA's
- Information management using Trac and Subversion
- Good system administration practices that directly improve IT security
- Basic configuration driven system management using Puppet
- Host and network auditing, hardening, and monitoring
- Developing an effective security awareness program
Half Day Morning
Nick Chase has 20+ years of experience as a developer and author. He has written several books and hundreds of articles as an IBM developerWorks Certified Master Author, founded NoTooMi.com, and has done web application development for companies such as Alcatel-Lucent, Sun Microsystems, Oracle, and the Tampa Bay Buccaneers. He is currently Mirantis' Technology Marketing Manager and the Editor of OpenStack:Now.
Grand Ballroom D
This session is designed to give you an understanding of the architecture of OpenStack, how the pieces fit together, and how you can make use of it in your environment. The session provides an understanding of the OpenStack architecture and how to use it. It also includes a hands-on lab during which students will be able to provision and use resources from an existing OpenStack cluster. Students need to bring an internet-capable laptop with a modern browser.
This tutorial will be best suited for those who are either curious about or considering OpenStack, but don't have a deep understanding of how it works. This can include users from companies who are considering private or public cloud, or who are already virtualized in some capacity, such as using vCenter, or who are simply interested in increasing capacity and speed-to-market.
Attendees will go back to work with an understanding of how OpenStack fits into a business environment, and a good grounding in how it works and how it can be applied in their own situations.
- OpenStack architecture and components
- How requests flow through an OpenStack cluster
- Virtual machine provisioning and workload scheduling
- Networking architecture
- Storage architecture
Nicole Forsgren Velasquez is considered an expert in the work, tools, knowledge sharing, and communication of technical professionals. Her background spans user experience, enterprise storage, cost allocation, and systems design and development. She has worked with large and small corporations across many industries and government. She holds a Ph.D. in Management Information Systems and a Masters in Accounting from the University of Arizona. She is currently an Assistant Professor at Utah State University.
Grand Ballroom A
Getting the resources your team needs is a matter of knowing just enough about finances to communicate what you want, and explaining how it will benefit the company. The trick is to speak their language. Learn the basics of budgeting, benchmarking, resource allocation, cost-benefit analysis, and communicating costs using tools like net present value. Understand the importance of your business cycle and the difference between cap-ex and op-ex. The course will also cover spreadsheet magic, like pivot tables and pivot charts.
Sysadmins who want to save their IT budgets, and need to learn how to speak “MBA”. This tutorial will help you do just that, arming you with the right approach and the right tools to go to management and communicate your needs and the alternatives available, so that you’re a part of the budget conversation instead of just the recipient of budget decisions.
- Understand differences between cap-ex and op-ex, and leverage differences in business cycles and settings.
- Write a basic capital proposal, including relevant value analysis
- Draft a budget, complete with impacts.
- Compare alternatives and communicate relevant costs.
- Fundamental understanding of pivot tables and pivot charts.
- Capital expenses vs. operational expenses: knowing the difference, and knowing why the difference matters
- Important business cycles and dates
- Comparing alternatives and communicating relevant costs
- Cost-benefit analysis
- Budgeting, including drafting a budget, burn rates, and standard costs and variances
- Capital planning, including net present value, PV index, internal rate of return, and payback period
- Pivot tables and pivot charts
Half Day Afternoon
John Sellens has been involved in system and network administration for over 25 years, and has been teaching and writing on related topics for many years. He holds an M.Math. in computer science from the University of Waterloo. He is the proprietor of SYONEX, a systems and networks consultancy, and is currently a member of the operations team at FreshBooks.
Grand Ballroom D
Elasticsearch is a distrbuted and reliable data store that can be used for a variety of purposes. One use of particular interest to system administrators is as a storage engine for Logstash. This tutorial covers how to implement an Elasticsearch cluster and use Logstash and related tools to store and query log data (syslog, web logs, etc).
System administrators who need a tool to aggregate and examine log data across their environment.
Participants will leave the tutorial ready to implement and manage an Elasticsearch cluster, store and analyze their logs and other data with Logstash, and methods for using Elasticsearch with other data.
- An introduction to Elasticsearch
- How to implement and manage a replicated and distributed data store.
- How to use Logstash to store log files (or other time-stamped data)
- Tools for querying and analyzing those logs
- Ways to use and abuse Elasticsearch for other types of data
Thomas A. Limoncelli is an internationally recognized author, speaker, and system administrator. His best known books include Time Management for System Administrators (OReilly) and The Practice of System and Network Administration (Addison-Wesley). He works in New York City at Stack Exchange, home of ServerFault.com and StackOverflow.com. Previously he’s worked at small and large companies including Google and Bell Labs. http://EverythingSysadmin.com is his blog. His new book, “The Practice of Cloud System Administration” has just been released.
Grand Ballroom A
You want to innovate: deploy new technologies such as configuration management, kanban, a wiki, or standardized configurations. Your coworkers don’t want change: they like the way things are. Therefore, they consider you evil. However you aren’t evil, you just want to make things better. Learn how to talk your team, managers and executives into adopting DevOps techniques and culture.
Sysadmins and managers looking to influence the technology and culture of your organization.
- Help your coworkers understand and agree with your awesome ideas
- Convince your manager about anything. Really.
- Get others to trust you so they are more easily convinced
- Deciding which projects to do when you have more projects than time
- Turn the most stubborn user into your biggest fan
- Make decisions based on data and evidence
- DevOps "value mapping" exercise: Understand how your work relates to business needs.
- So much to do! What should you do first?
- How to sell ideas to executives, management, co-workers, and users.
- Simple ways to display data to get your point across better.
Full Day
Stuart Kendrick works as a Sustaining Engineer for EMC Isilon. He has worked in software development, help desk, desktop support, system administration, and network support. He spent two decades at the Fred Hutchinson Cancer Research Center in a multi-disciplinary role covering transport, network management, root cause analysis, and Problem Management. He is happiest when correlating packet traces with syslog extracts, writing scripts to query device MIBs, and facilitating hands-on classes at LISA, Cascadia, and Sharkfest.
Chris Shaiman is the Lead Network Engineer and Security Analyst for WatchGuard Technologies. Previously, he worked at Cingular Wireless and Xerox. Specializing in Networking and Security, he recently acquired his Certified Information Systems Security Professional certificate and has been enjoying building a more robust security program at his current employer. When not focusing on his love for networking and security related sciences, he is working on completing his hot yoga teacher training, and bioponic research.
Willow Room A
Our industry has its share of urban legends. In this tutorial, we split into teams, pick an adventure, and practice a methodology to separate myth from reality. We then come together as a class, listen to each other's reports, discuss what is surprising and how the underlying technology actually works. By the end of the day, you've repeated this cycle several times, have experience employing the methodology, and are ready to apply these techniques back at the office. You bring basic equipment and complete your homework prior to class; we provide test environments and coaching.
Sys admins and network engineers involved in designing operational IT environments or trouble-shooting client/server problems … and who enjoy discovering that sometimes what we believe just ain’t so.
Practice using a methodology for sanity-checking performance claims, a deeper understanding of popular technologies, and experience working in ad-hoc teams.
Your team will pick several adventues during the course of the day:
- Jumbo Frames: Do they make your server go faster
- Packet loss: When does it start to matter
- Hops: How many switches does it take to slow down your server
- Contention: When the pipe is full, how much of a difference does it make
- Firewalls: The bad boys of the network -- how much do they skim off the top
- WAN Compression: How much does this buy us
Branson is a 27-year veteran of system administration and security. He started in cryptology for the Navy and has since worked on NASA shuttle projects, TSA security systems, search engines and supports many open-source projects. He founded sandSecurity to provide policy and technical audits, support and training for IT security and system administrators. Branson is currently the Director of IT for Blackphone, and generally likes to spend time responding to the statement "I bet you can't…"
Grand Ballroom C
Today's threats to the enterprise are manifested in many ways but all share similar traits: highly intelligent, well-funded and determined to gain access. In this class, we will explore the murky world of the black-hats. We will examine your security foot-print as they view it, and discuss ways to minimize it, various vectors for attack, and how to detect and defend. We will spend time talking about current threats, and how they can impact your company, and we will build upon the foundations of good security practice. As with all my classes, this will be accompanied with a pinch of humor and a large dollop of common sense.
Participants should be beginning to mid-level system administrators of any stripe with an interest in IT Security and a desire to understand their potential adversaries. It is suggested that participants have experience with *nix command line and virtual hosts. This course is a continuation of, and will build on, what is taught in Hands On Security for Sysadmins. However, attending that course is not a prerequisite.
Tools, tips, tricks and a working security toolkit which can be implemented to improve monitoring, detection and defense in your organization. Experience working with (mostly) free security software tools.
- Understanding an attack from beginning to end
- Security Podiatry Social Engineering detection and prevention
- Detecting undesirable network and server behavior
- Detecting penetration attempts and successes, and stopping them
- Raising awareness
Half Day Morning
Saurav Das has been involved with SDN and OpenFlow since 2008, as part of his PhD work at Stanford. After graduating, he spent two years in the engineering team at Big Switch Networks, working on controller platform scalability in large data center networks. Before Stanford, he spent several years in the networking industry designing sub-systems at Enablence. He holds a PhD in Electrical Engineering from Stanford University, and an MS from the University of Arizona, Tucson.
Prior to founding the SDN Academy, Aseem served as senior vice president at Guavus, where he was instrumental in product definition, roadmaps and pre- and post-sales delivery, at RMI Corp (acquired by NetLogic), and in Cisco Systems’ Optical Networking Group. He came to Cisco via the acquisition of iManage/Pipelinks, where he served as the co-founder and vice president of engineering. In the past, he has also held senior positions at Novell. Aseem earned an M.S.E.E. from UCLA.
Grand Ballroom B
This course will introduce the attendee to a disruptive transformation underway in networking. S/he will learn the fundamentals of Software-Defined Networking (SDN) including its motivation, basic building blocks and standard abstractions. Bring your laptop to participate in exercises.
Any attendee of LISA’14 who is interested in learning about how SDN and OpenFlow present major transformative opportunities to networking professionals.
The fundamental understanding of Software-Defined Networking (SDN) including its motivation, basic building blocks and standard abstractions.
- Introduction to SDN
- What is SDN?
- SDN Architecture
- Benefits of SDN
- The SDN Stack
- SDN Use Cases and Early Deployments
- Wrap-Up: Thinking Differently about Networking
David is the Director of Technology at the Northeastern University College of Computer and Information Science and the author of the O'Reilly book Automating System Administration with Perl.
David has spent the last 27+ years as a system/network administrator in large multi-platform environments, including Brandeis University, Cambridge Technology Group, and the MIT Media Laboratory. He was the program chair of the LISA '05 conference and one of the LISA '06 Invited Talks co-chairs. David is also the recipient of the 2009 SAGE Outstanding Achievement award and is honored to serve on the USENIX Board of Directors.
Grand Ballroom A
Every sysadmin I know has at least four new technologies they would like to play with—and that's just before breakfast. But finding the time to do this can be difficult, often because of the effort it takes to find a machine, set up the network connection, firewall it from the other machines, and so on... If you want to try something that requires multiple components, that's even worse.
What you need is a sandbox: a place where you can experiment with new technologies, mess with cool tools, test the latest versions of software, prototype new services, and so on, without any sort of heavyweight effort.
Sysadmins who want to test technologies safely and efficiently.
The ability to build your own sysadmin sandboxes.
- Using software and services like Git, Vagrant, Amazon EC2, and Docker to make sandbox construction easy and free/inexpensive
- When a sandbox approach is and is not appropriate
- Migrating your work in and out of sandboxes
- How to share the work you've done in a sandbox with others
Carolyn Rowland began her UNIX system administration career in 1991 and currently leads an ops/dev team at the National Institute of Standards and Technology (NIST). She credits her success with being able to be the bridge between senior management and technology. Her team has distinguished itself as a leader in the development of new technology solutions that solve business and research problems within the Engineering Laboratory and across the NIST campus.
Nicole Forsgren Velasquez is considered an expert in the work, tools, knowledge sharing, and communication of technical professionals. Her background spans user experience, enterprise storage, cost allocation, and systems design and development. She has worked with large and small corporations across many industries and government. She holds a Ph.D. in Management Information Systems and a Masters in Accounting from the University of Arizona. She is currently an Assistant Professor at Utah State University.
Grand Ballroom D
This tutorial provides guidelines and suggestions to improve the communication and collaboration of sysadmins and directly increase effectiveness when working with senior management.
We will provide you with skills that are associated with senior IT operations staff. The focus is on understanding the gap between IT operations and management and how to bridge that gap to increase respect for IT operations and improve your relationship with management. We will cover identifying your role within the organization, effective communication with upper management, positioning yourself to increase your visibility, and becoming the go-to person/group for IT within your organization. The instructors make this an interactive class by buliding on real situations of attendees, including specific ideas to help address immediate issues.
Technical staff who want or need to work more effectively with senior management.
The ability to position IT operations to be a valuable partner in your organization. Expect to think differently about IT operations and business when you leave the class.
- The divide between management and IT operations
- Challenges that impact IT operations teams
- Ways to change the perception of IT operations in your organization
- The importance of culture
- How DevOps lessons translate to business
Half Day Afternoon
Saurav Das has been involved with SDN and OpenFlow since 2008, as part of his PhD work at Stanford. After graduating, he spent two years in the engineering team at Big Switch Networks, working on controller platform scalability in large data center networks. Before Stanford, he spent several years in the networking industry designing sub-systems at Enablence. He holds a PhD in Electrical Engineering from Stanford University, and an MS from the University of Arizona, Tucson.
Prior to founding the SDN Academy, Aseem served as senior vice president at Guavus, where he was instrumental in product definition, roadmaps and pre- and post-sales delivery, at RMI Corp (acquired by NetLogic), and in Cisco Systems’ Optical Networking Group. He came to Cisco via the acquisition of iManage/Pipelinks, where he served as the co-founder and vice president of engineering. In the past, he has also held senior positions at Novell. Aseem earned an M.S.E.E. from UCLA.
Grand Ballroom B
This course will build on the morning tutorial, and use hands-on exercises to delve into the details of the various components of the SDN stack and OpenFlow API. Bring your laptop to participate in exercises.
DevOps Engineer, Network Admin, Network Planners, Architect, and Software Engineer, who desire a deeper dive into the "how" of SDN.
Experience with tools and simulation environment to start exploring SDN technologies.
- Review of SDN and Architecture
- Components of SDN Stack
- Intro to OpenFlow
- Play with OpenFlow (Hands-on exercise)
- The SDN Stack: Switches
- The SDN Stack: Network Operating System/Controllers
- Build a Learning Switch (Hands-on exercise)
- Network Functions Virtualization (NFV)
- SDN - A Paradigm Shift
Chris "Mac" McEniry is a practicing sysadmin responsible for running a large ecommerce and gaming service. He's been working and developing in an operational capacity for 15 years. In his free time, he builds tools and thinks about efficiency.
Grand Ballroom D
This tutorial provides an introduction to Go with a focus on using it for everyday tooling.
Sysadmins who want to develop their own tooling, or have a general interest in the Go programming language.
Ability to read and write the Go language. Create, understand, and extend tools written in Go.
- Understanding of the applicability of Go to everyday work
- The Go environment and toolset
- Go language fundamentals:
- Control Structures
- Functions
- Data Types
- Methods and Interfaces
- Goroutines
- Channels
Thomas A. Limoncelli is an internationally recognized author, speaker, and system administrator. His best known books include Time Management for System Administrators (OReilly) and The Practice of System and Network Administration (Addison-Wesley). He works in New York City at Stack Exchange, home of ServerFault.com and StackOverflow.com. Previously he’s worked at small and large companies including Google and Bell Labs. http://EverythingSysadmin.com is his blog. His new book, “The Practice of Cloud System Administration” has just been released.
Grand Ballroom A
People think of “oncall” as responding to a pager that beeps because of an outage. In this class you will learn how to use oncall as a vehicle to improve system reliability so that you get paged less often.
This talk includes never-before seen material from the new book, “The Practice of Cloud System Administration” by Limoncelli, Chalup, Hogan.
Anyone with an oncall responsibility (or their manager).
- How to monitor more accurately so you get paged less
- How to design an oncall schedule so that it is more fair and less stressful
- How to assure preventative work and long-term solutions get done between oncall shifts
- How to conduct “Fire Drills” and “Game Day Exercises” to create antifragile systems
- How to write a good Post-mortem document that communicates better and prevents future problems
- Why your monitoring strategy is broken and how to fix it
- Building a more fair oncall schedule
- Monitoring to detect outages vs. monitoring to improve reliability
- Alert review strategies
- Conducting “Fire Drills” and “Game Day Exercises”
- "Blameless Post-mortem documents"
connect with us