|
TRAINING TRACK
Overview |
Sunday |
Monday |
Tuesday |
Wednesday |
Thursday |
Friday |
By Instructor
Sunday, November 11, 2007
|
Full-Day Tutorials
|
S1
Computer Forensics
NEW!
Simson L. Garfinkel,
Naval Postgraduate School
Who should attend:
Anyone interested in forensics: recovering lost or deleted data, hunting for clues, and tracking information.
Computer forensics is the study of information stored in computer
systems for the purpose of learning what happened to that computer at
some point in the pastand for making a convincing argument about
what was learned in a court of law. Today computer forensics covers
four broad categories:
- Hard drive forensics, which aims to inventory and locate information that is on a computer's hard drive, whether or not the information is visible to the computer's user. Hard drive forensics includes the recovery of deleted files and file fragments, the construction of timelines, and the creation of profiles of a computer's user.
- Memory forensics, which analyzes the memory (or memory dump) of a computer system to reveal information about what the computer has been doing.
- Network forensics, which captures and analyzes information moving over a computer network. Network forensics can be based on full-content analysis or the analysis of network flows.
- Document forensics, in which specific files are analyzed for subtle and possibly hidden information. Document forensics can recover deleted information from Microsoft Word files or reveal which computers were used to create an individual file.
Take back to work:
- Modern forensic tools, including both open source
and commercial
- Drill-down familiarity with disk forensics, including specific tools and techniques
- The history of computer forensics (celebrated cases)
- The legal environment that governs forensics in the U.S.
- Enough information about operating systems to understand why forensic tools are possible, what they can do, and their limits
Topics include:
- Introduction to computer forensics
- What is forensics?
- Why is information left behind on computer systems?
- Forensics history
- Computer forensics vs. physical forensics
- ASCII and Unicode
- Memory forensics and file carving
- Memory hierarchy, swap space, sleep and hibernation
- Tools for understanding:
- Microsoft memory
- UNIX memory
- Carving memory and disk partitions
- Forensics and policy
- Forensics and the law (discovery, criminal law, etc.)
- The federal rules of evidence
- Forensics history
- The C.S.I. effect
- Disk forensics
- Understanding file systems
- ASCII and Unicode
- Recovery of deleted files without the use of forensic
tools
- Recovery of deleted files with commercial and open source tools
- What to do when you can't recover an entire file
- Hash code databases
- Network forensics
- Understanding IP packets, UDP, TCP, protocols (in 5 minutes)
- Understanding network hubs, switches, where you monitor
- Data rates
- Flows vs. full-content
- Using commercial and open source tools
- Wireshark (Ethereal)
- NetIntercept
- Document and Web forensics
- MS Word structure
- PDF structure
- Identifying similar documents
- Anti-forensics
S2
Introduction to VMware Virtual Infrastructure 3
John Arrasjid and
Stephen Sorota, VMware
Who should attend:
System administrators and architects who are interested in deploying a VMware Virtual Infrastructure, including ESX Server and VirtualCenter, in a production environment. No prior experience with VMware products is required. Knowledge of Linux is helpful; basic knowledge of SANs is
useful but not required.
VMware ESX Server is virtual infrastructure software for
partitioning, consolidating, and managing systems in mission-critical
Intel/AMD environments. In this tutorial, we will provide an overview
of virtual machine technology, as well as the features and
functionality of VMware Virtual Infrastructure 3, which includes ESX
Server and VirtualCenter. Migration strategies using tools such as
VMware Converter (replacement for P2V) will be covered. Installation,
configuration, and best practices will be the focus of the session.
Time permitting, live demonstrations will be given of key features
such as VMotion.
Take back to work:
How to deploy a VMware virtual infrastructure effectively on your own site.
Topics include:
- Virtual Infrastructure overview
- ESX Server and VirtualCenter overview
- Installation and configuration
- Virtual machine creation and operation
- Migration technologies such as VMware Converter
- Operations and administration best practices
- Advanced configuration (SAN and networking)
S3
Effective Change Management: Making System
Integrity Easy
NEW!
Geoff Halprin, Consultant
Who should attend: System
administrators who wish to learn how to better manage change and risk
and become more professional in their system management practices,
those who are responsible for developing or managing their
organization's change management process, and those who are frustrated
by and hoping to influence and improve their organization's
process.
As a system administrator, you perform change management every
day. Every time your finger hovers over the return key, that's risk
management. Every time you apply a patch to your desktop before you
apply it to production, that's change qualification. Every time you
stay late to apply a patch out of hours, that's change scheduling.
Although you may be doing it now, you have probably never considered
the deeper aspects of what you do and how you might do it better.
Take back to work: A grasp of the many aspects of effective change management and how you can improve the process, using tactics, tools, and tips learned in this course.
Topics include:
- The basic change management process
- Building a change plan
- Regression planning and risk management strategies
- Change execution tools and techniques
- Managing an organization's change pipeline
- Emergency changes and downtime conferences
- Quality assurance across the change life cycle
S5
System and Network Performance Tuning
Marc Staveley,
Consultant
Who should attend: Novice and
advanced UNIX system and network administrators, and UNIX developers
concerned about network performance impacts. A basic understanding of
UNIX system facilities and network environments is assumed.
We will explore procedures and techniques for tuning systems,
networks, and application code. Starting from the single system view,
we will examine how the virtual memory system, the I/O system, and the
file system can be measured and optimized. We'll extend the single
host view to include Network File System tuning and performance
strategies. Detailed treatment of networking performance problems,
including network design and media choices, will lead to examples of
network capacity planning. Application issues, such as system call
optimization, memory usage and monitoring, code profiling, real-time
programming, and techniques for controlling response time will be
addressed. Many examples will be given, along with guidelines for
capacity planning and customized monitoring based on your workloads
and traffic patterns. Question and analysis periods for particular
situations will be provided.
Take back to work: Procedures
and techniques for tuning your systems, networks, and application
code, along with guidelines for capacity planning and customized
monitoring.
Topics include:
- Performance tuning strategies
- Practical goals
- Monitoring intervals
- Useful statistics
- Tools, tools, tools
- Server tuning
- Filesystem and disk tuning
- Memory consumption and swap space
- System resource monitoring
- NFS performance tuning
- NFS server constraints
- NFS client improvements
- NFS over WANs
- Automounter and other tricks
- Network performance, design, and capacity planning
- Locating bottlenecks
- Demand management
- Media choices and protocols
- Network topologies: bridges, switches, and routers
- Throughput and latency considerations
- Modeling resource usage
- Application tuning
- System resource usage
- Memory allocation
- Code profiling
- Job scheduling and queuing
- Real-time issues
- Managing response time
|
Sunday Morning Half-Day Tutorials
|
|
S7
Time Management for System
Administrators
Tom Limoncelli,
Google NYC
Who should attend: IT people,
sysadmins, and other busy people who want to improve their
time-management skills; those who want to have more control over their
time and better follow-through on assignments.
If you agree with any of these statements, this class is for
you:
- I don't have enough time to get all my work done.
- As a sysadmin, I can't schedule, prioritize, or plan my work.
- I'm spending all my time mopping the floor; I don't have time to
fix the leaking pipe.
- My boss says I don't work hard enough, but I'm always working my ____ off!
Based on a new book from O'Reilly, this tutorial will help you get
more done in less time.
Take back to work: The skills
you need to streamline your workflow to make your users—and
you!—happy.
Topics
include:
- Why typical "time management" books don't work for sysadmins.
- What makes "to-do" lists fail, and how to make them work.
- How not to forget a user's request ever again!
- How to prioritize tasks so that users think you're a genius.
- Ways to have more time for fun (for people with a social life).
- How to leave the office every day with a smile on your face.
S8
Advanced DHCP (This Is Not Your Grandparents' DHCP)
NEW!
David Hankins, ISC
Who should attend: Anyone who
is involved in administering a network and who still believes that
DHCP is a simple protocol like ARP that you just turn on and forget.
The protocol now includes (and ISC's reference implementation now
provides) important tools to improve the security, reliability,
administerability, and Sarbanes-Oxley auditability.
We are well aware that your parents' home router implements DHCP
along with NAT, and that you've never had to change or even look at
its configuration. But, unlike that home system, your enterprise
network will be attacked, hacked, and audited, and it needs to keep
working even during significant partitions and failures.
Take back to work: How to use
DHCP to keep your networks secure and reliable.
Topics
include:
- How to make DHCP more reliable
- Configuring, managing, and administering failover
- How to have more flexible control over users (you are no longer limited to simple yes/no access control keyed on MAC address)
- Access-controlled address pools
- Conditional response
- Client classing
- Allocation by class
- Using DHCP LEASEQUERY to find information about a lease using IP address, MAC address, or client
identifier
- How to integrate DHCP with Dynamic DNS (when your DHCP server allocates an address, you can make sure DNS knows about it
immediately, without using the hack of giving pre-assigned DNS names
to every address in your pools)
- How to configure your DHCP server so that it does everything that VOIP phones need
- Using the new RFC 3925 Vendor-Identifying Options
S9
Integrating Cfengine into Organizational Service Management
NEW!
Mark Burgess, Oslo
University College
Who should attend: Anyone with
a basic knowledge of cfengine and an interest in organizational
(including business) processes who would like an overview of the
concepts surrounding configuration management for business, with
implementation examples.
The tutorial is loosely aligned with the IT Infrastructure Library (ITIL) notion of best practices.
Take back to work:
The information
needed to evaluate the principles used in configuring hosts and
devices, relate them to standards, and apply them to your own
environments.
Topics include, with
reference to BS/ISO 17799, BS15000, ISO20000, ITIL, and eTOM:
- Incident management
- Change management
- Release management
- Availability and capacity management
- Security management
- Supply chains and e-commerce models
- Service Oriented Architectures (SOAs)
- Inter-domain management configuration
|
Sunday Afternoon Half-Day Tutorials
|
|
S11
Systems Topics in Oracle Database
Administration
NEW!
Chris Page,
Corporate Technologies, Inc.
Who should attend: UNIX
systems managers, administrators, and others interested in learning
about the operating systems features that Oracle databases rely upon
and about the new systems technology introduced by Oracle which is
blurring the line between system and database administration.
Take back to work:
An
understanding of how the new Oracle technologies will change the
sysadmin's job and of the potential consequences when a DBA is
attempting to deploy one or more of them.
Topics include:
- Overview
- Back to basics: Oracle database architecture
review
- Databases
- Instances
- SGA
- PGA
- Listener
- File types (logs, tablespaces, etc.)
- How Oracle provides consistency and why we care
- The Oracle OS interface
- IPC used by Oracle (Shared Memory/Semaphores)
- Networking
- File access mechanisms and RAID
- Asynchronous Direct IO
- Oracle's Volume Manager (ASM)
- Overview and definitions
- ASM architecture
- Installation
- Data protection modes
- Striping and performance with ASM
- Definition of failure groups
- Configuration examples
- Accessing ASM files via OS
- Adding and removing disks
- Oracle Clusterware
- Overview and definitions
- Clusterware architecture
- Clusterware installation
- Cluster daemons/li>
- Oracle Nodeapps
- VIP management
- Oracle Clusterware and RAC
- Overview and definitions
- RAC architecture
- Service definition
- Client-side load balancing
- Server-side load balancing
- RAC installation
- Cache fusion
- Scaling in a RAC environment
- Configuring transparent application failover
- Summary
S12
Network Diagnosis and Improvement with
Netflow
NEW!
Michael W. Lucas, Author and Consultant
Who should attend:
Administrators who need more information about their networks.
Netflow is an extremely powerful network management tool with a
reputation for being obtuse and expensive. While Netflow might not be
easy, it becomes much simpler if someone takes you through it. Netflow
picks up where tools like MRTG leave off, and will not only solve
technical problems but resolve administrative and social problems you
probably resigned yourself to enduring years ago.
Every network administrator has had a problem that can only be caught by a packet sniffer while it's happening. Netflow is a historical packet sniffer, giving you eyes into your network over a period of time. You know not only what is happening now, but what happened yesterday or last week.
With the right knowledge, anyone can implement Netflow for small costs in both hardware and time. I will present a coherent, start-to-finish solution that works in any vaguely modern environment and can be assembled out of a few gigs of disk, some network cards and cables, a free UNIX of choice, and freely available software, while also leveraging any Cisco hardware students already have. Attendees will be fully equipped to work with Netflow the day
they return home.
Take back to work: The ability to work with Netflow and improve your network performance the day you return home.
Topics include:
- Introduction
- Netflow architecture
- The sensor
- The collector
- The reporting system
- Implementing the sensor
- Available sensor tools
- Cisco netflow
- softflowd
- Implementing the collector
- flow-capture
- Collecting from multiple sensors
- Full flow record format
- Pretty pictures with flowscan
- flowscan design and modules
- Common errors and solutions
- flowdumper
- flow-stat and flow-print
- Filtering flows
- Netflow and real-world problems
S13
Implementing Some Autonomic Principles Using
Cfengine
NEW!
Mark Burgess,
Oslo University College
Who should attend: Anyone who
likes to use simple tools well and with an understanding of their
implications; anyone who wants to make the most of a tool that deals
with long- and short-term management.
A lot of marketing and hype has been invested in the term autonomics lately, but what does this actually mean? Autonomics covers a number of ideas, most of which boil down to adding feedback loops into systems so that they can sense operational changes and respond automatically. This basic idea has been embodied in cfengine for many years.
Take back to work: A simple way to use cfengine to achieve the goals of autonomic management.
Topics include:
- When and how does hands-free computer management make sense?
- What mechanisms are there in cfengine for "self-adaptation"?
- Key concepts of and obstacles to implementing hands-free administration
- Self-healing
- Fixed-point rules
- Probabilistic management
- Peer monitoring
- Intermittency and reliability measures
|
Monday, November 12, 2007
|
Full-Day Tutorials
|
M1
Administering Linux in Production Environments
Æleen Frisch,
Exponential Consulting
Who should attend: Both current Linux system administrators and administrators from sites considering converting to Linux or adding Linux systems to their current computing resources.
Linux has graduated from being a "toy" operating system favored by hobbyists into a production-level operating system embraced by major
corporations such as IBM, Novell, and Amazon. It is used on the front
line for mission-critical applications, and mastery of this operating
system is now becoming a major asset to system administrators.
Linux system administrators in production environments face many
challenges: the inevitable skepticism about whether an open source
operating system will perform as required; how well Linux systems will
integrate with existing computing facilities; how to locate, install,
and manage high-end features which the standard distributions may
lack; and many more. Sometimes the hardest part of ensuring that the
system meets production requirements is matching the best solution
with the particular local need. This course is designed to give you a
broad knowledge of production-worthy Linux capabilities, as well as
where Linux currently falls short. The material in the course is all
based on extensive experience with production systems.
This course will cover configuring and managing Linux computer systems in production environments. We will be focusing on the administrative issues that arise when Linux systems are deployed to address a variety of real-world tasks and problems arising from both commercial and research and development contexts. This course is designed for both current Linux system administrators and for administrators from sites considering converting to Linux or adding Linux systems to their current computing resources.
Take back to work: The ability to select the appropriate facilities for use of Linux in your environment and to begin deploying them.
Topics include:
- Recent kernel developments
- High-performance I/O
- Advanced file systems and logical volumes
- Disk striping
- Optimizing I/O performance
- Advanced computer-server environments
- Beowulf
- Clustering
- Parallelization environments/facilities
- CPU performance optimization
- High availability Linux: fault-tolerance options
- Enterprise-wide authentication and other security features
- Automating installations and other mass operations
- Linux performance tuning
M2
Advanced Topics in VMware Virtual Infrastructure 3
NEW!
Stephen Sorota and Dan Anderson,VMware
Who should attend: People already experienced with Virtual Infrastructure 3; those with advanced VI3 skills interested in learning more to help in their support of a VI3 environment. This includes system administrators and architects who are interested in advanced topics on deploying a VMware Virtual Infrastructure. Prior experience with VMware VI2 or VI3 environments is highly recommended.
This tutorial will cover advanced topics concerning VMware's
Virtual Infrastructure 3 environment. We will focus on consolidation
techniques, disaster recovery technologies, performance optimization,
and security. Sample Disaster Recovery architectures utilizing VMware
technologies will be presented. Time permitting, live demonstrations
will be given.
Take back to
work: Ways to make the most of your Virtual Infrastructure
3 environment.
Topics include:
- Server consolidation and containment methodology for Intel/AMD environments
- Disaster recovery technologies
- VMware HA
- VMware Consolidated Backup
- Performance optimization (VMware DRS)
M3
Issues in UNIX Infrastructure Design
Lee Damon, University of
Washington
Who should attend: Anyone who is
designing, implementing, or maintaining a UNIX environment with 2 to
20,000+ hosts; system administrators, architects, and managers who
need to maintain multiple hosts with few admins.
This intermediate class will examine many of the background issues that need to be considered during the design and implementation of a
mixed-architecture or single-architecture UNIX environment. It will
cover issues from authentication (single sign-on) to the Holy Grail of
single system images.
This class won't implement a "perfect solution," as each site has different needs. We will look at some freeware and some commercial solutions, as well as many of the tools that exist to make a workable environment possible.
Take back to work: Questions you should ask (and the answers to them) while designing and implementing the mixed-architecture or single-architecture UNIX environment that will meet your needs.
Topics include:
- Administrative domains: Who is responsible for what, and what can users do for themselves?
- Desktop services vs. farming: Do you do serious computation on the desktop, or do you build a compute farm?
- Disk layout: How do you plan for an upgrade? Where do things go?
- Free vs. purchased solutions: Should you write your own, or hire a consultant or company?
- Homogeneous vs. heterogeneous: Homogeneous is easier, but will it do what your users need?
- The essential master database: How can you keep track of what you have?
- Policies to make life easier
- Push vs. pull
- Getting the user back online in 5 minutes
- Remote administration: Lights-out operation; remote user sites;
keeping up with vendor patches, etc.
- Scaling and sizing: How do you plan on scaling?
- Security vs. sharing: Your users want access to everything. So do the crackers
- Single sign-on: How can you do it securely?
- Single system images: Can users see just one environment, no matter how many OSes there are?
- Tools: The free, the purchased, the homegrown
M4
High-Capacity Email System Design NEW!
Steve VanDevender,
University of Oregon
Who should attend: Anyone who needs to design a high-volume, secure email system or upgrade an existing one.
This tutorial will help you design an email system or upgrade an existing one to deal with large numbers of users, high volumes of email, and increased availability and security.
We'll start with an overview of mail system architecture and its commonly recognized components. For each of these components, concerns relating to scalability, reliability, and interoperability will be reviewed and implementation suggestions will be discussed.
Take back to work: An understanding of available choices in email system software and methods, with their trade-offs and domains of applicability.
Topics include:
- Mail system architecture and components:
- Message transfer agents (MTAs) and SMTP
- Local delivery agents (LDAs) and the mail store
- Mail access via POP and IMAP
- Mail user agents (MUAs)
- Implementation concerns
- MTAs and SMTP
- Mail relaying for users
- STARTTLS for optional transport encryption
- SMTP AUTH and why it needs STARTTLS
- Mail queuing
- Spam
- Spam and malware blocking at SMTP time
- "Refuse during SMTP or deliver" philosophy
- Avoiding accept-then-bounce/backscatter
- LDAs and the mail store
- mbox, Maildir, and other store formats
- Delivery-time mail filtering and sorting
- POP, IMAP
- POP vs. IMAP comparison
- TLS encryption for security
- Improving POP/IMAP server performance
- Coping with MUAs
- Common MUA issues with interoperability and security
- Webmail systems as MUAs
- Handling multiple concurrent access
- Scaling
and reliability methods
- Considerations for backup/multiple MX hosts
- Load-balancing or failover for SMTP, POP, and IMAP
- How mail store format affects performance and reliability
- User authentication
- Ways to grow your mail system
M5
Solaris 10 Administration Workshop
(Hands-on)
Peter Baer Galvin, Corporate Technologies;
Marc Staveley, Consultant
Who should attend: Solaris
systems managers and administrators interested in learning the new
administration features in Solaris 10 (and features in previous
Solaris releases that they might not be using).
Solaris has always been the premier commercial operating system, and this remains the case today. Its novel features and applications (such as ZFS, Dtrace, and Containers) keep it at the forefront of enterprise use, and many of these features have been copied in other operating systems.
This course covers a variety of system administration topics related
to Solaris 10. Solaris 10 includes many features introduced since the
last major release of Solaris, and there are new issues to consider
when deploying, implementing, and managing Solaris 10. This will be a
workshop featuring instruction and practice/exploration.
Note that, except for a few instances, Solaris 10 security is not
covered in this workshop (see T5,
Solaris 10 Security Features Workshop, for that).
Take back to work: All you need to consider in deploying, implementing, and managing Solaris 10.
Topics include:
- Overview
- Solaris releases (official, Solaris Express, OpenSolaris, others)
- Installing and upgrading to Solaris 10
- Flash archives and live upgrade
- Patching the kernel and applications
- Service Management Facility
- The kernel
- Crash and core dumps
- Cool commands you need to know
- ZFS, the new endian-neutral file system that "will make you forget everything you thought you knew about file systems"
- Virtualization
- Containers (a.k.a. Zones), lightweight virtual environments for application isolation and resource management
- Installation
- Management
- Resource management
- Other Solaris virtualizations: LDOMs, Xen
- DTrace, Solaris 10's system profiling and debugging tool
- Fault Management Architecture (FMA)
- Sysadmin best practices: using the new features effectively and efficiently without hurting yourself
Laptop requirements: Each student should have a laptop with wireless
access for remote access into an instructor-provided Solaris 10
machine (if you do not have a laptop, we will make every effort to
pair you with another student to work as a group). Your laptop does
not need to be running Solaris.
|
Monday Morning Half-Day Tutorials
|
|
M6
Over the Edge System Administration, Volume 1
David N. Blank-Edelman,
Northeastern University
Who should attend: Old-timers
who think they've already seen it all, and those who want to develop
inventive thinking early in their career. Join us and be prepared to
be delighted, disgusted, and amazed. Most of all, be ready to enrich
your network and system adminstration by learning to be different.
It's time to learn how to break the rules, abuse the tools,
and generally turn your system administration knowledge inside out.
This class is a cornucopia of ideas for creative ways to take the
standard (and sometimes not-so-standard) system administration tools
and techniques and use them in ways no one would expect. We'll also
cover some tools you may have missed.
Note: The teacher takes no responsibility should your head explode during this class.
Take back to work:
New approaches
to old problems, along with some ways to solve the insolubles.
Topics include:
- How to (ab)use perfectly good network transports by using them for purposes never dreamed of by their authors
- How to increase user satisfaction during downtimes with 6 lines of Perl
- How to improve your network services by intentionally throwing away data
- How to drive annoying Web-only applications that don't have a command line interfacewithout lifting a finger
- How to use ordinary objects you have lying around the house, such as Silly Putty, to make your life easier (seriously!)
M7
RRDtool as a Communication Tool NEW!
Tobias Oetiker, Consultant and author of RRDTool
Who should attend: Scripters
and programmers who would like to create a custom monitoring
application with great presentation tools.
Over the past few years RRDtool has become the standard method for handling time-series data in the networking area. RRDtool takes care of all the work related to data storage and presentation. Many users only access RRDtool through some front-end application such as Cacti or Cricket.
In this tutorial you will learn how RRDtool works from a programmer's point of view and how you can use it to write your own custom monitoring applications. An emphasis will be put on presentation aspects. The best data is worth only as much as your bosses and customers understand of it, so the graphs you create are key components to any such application.
Take back to work: Ideas for building the monitoring application of your dreams, so that you can find out what you need to know when you need to know it.
Topics include:
- RRDtool overview
- Problems to be solved
- Round Robin Database setup
- Data acquisition
- Graphing
- Programming with RRDtool
- The command line interface
- The pipe interface
- The Perl API
- In-depth graphing
- Concepts
- Simple graphs
- The joy of RPN
- Graph disassembly
- How to make graphs talk
- Scaling RRDtool
- The RRD file format
- Optimizing OS interaction
- Tweaking Linux for speed
M8
Practical Project Management for Sysadmins and IT Professionals
Strata Rose Chalup, Project Management Consultant
Who should attend: System
administrators who want to stay hands-on as team leads or system
architects and need a new set of skills with which to tackle bigger,
more complex challenges. No previous experience with project
management is required.
People who have been through traditional multi-day project management courses will be shocked, yet refreshed, by the practicality of our approach. To get the most out of this tutorial, participants should have some real-world project or complex task in mind for the lab sections.
This tutorial focuses on complementing your own organizational style (or lack thereof) with a toolbox of ways to organize and manage complex tasks without drowning in paperwork or clumsy, meeting-intensive methodologies. Also emphasized is how to bridge the gap between ad hoc methods and the kinds of tracking and reporting traditionally trained managers will understand.
Take back to work:
A no-nonsense grounding in methods that work without adding
significantly to one's workload. You will be able to take an
arbitrarily daunting task and reduce it to a plan of attack that will
be realistic, will lend itself to tracking, and will have functional,
documented goals. You will be able to give succinct and useful
feedback to management on overall project viability and timelines and
easily deliver regular progress reports.
Topics include:
- Quick basics of project management
- The essentials you need to know
- How to map the essentials onto real-world projects
- Skill sets
- Defining success
- Chunking and milestoning
- Delegating
- Tracking
- Reporting
- Problem areas
- Teams, interactions among people
- The albatross project
- When to go deep and when to get "pointy-haired"
- When disaster strikes, should you scrap, or salvage?
- Project management tools
- What tools should do for you
- Leveraging the command line: UNIX PM
- Freeware PM tool options
- The only 15 minutes of MS Project you'll ever need
M9
How to Interview a System Administrator
Adam Moskowitz, Menlo Computing
Who should attend: System
administrators of all levels of experience, as well as managers of
system administrators. The course will focus on techniques for
interviewers, but even sysadmins who are just starting out will learn
some things to use as an interviewee. Managers of system
administrators and junior sysadmins will learn, among other things,
how to interview someone who knows more than you do. Junior
administrators will also learn how to respond (as an interviewee) when
asked a bad questionin particular, how to turn it into a better
question.
Do you know how to interview a system administrator? Do
the questions you ask elicit specific, narrowly focused information,
or do they show you both the depth and breadth of a candidate's
knowledge of a particular subject or technology? Do you know how to
distinguish between a candidate who is just trying to bluff through
the interview and one who has some knowledge of the field but hasn't
yet become an expert? Are trick questions ever appropriate, and, if
so, when and why? Some questions shouldn't be asked, and some would
even land you in hot water with your company's HR or legal department:
do you know what those questions are? Finally, have you figured out
how to help a candidate do well in an interview while still getting an
objective and fair assesment of their skills?
If you answered "no" or even "I'm not sure" to any of these questions, this course is for you.
Take back to work:
Increased confidence in your ability to weed out the posers and hire
really great sysadmins.
Topics include:
- Purposes of an interview
- To assess the candidate's technical skills
- To get a feel for the candidate's personality and interpersonal skills
- To learn whether a candidate is likely to be a good fit with the company and with the IT group
- To help the candidate figure out whether he wants this job and whether he is likely to do well in the position
- Maybe even to teach the candidate something new about system administration
- Basic questions to bear in mind
- Is the candidate comfortable?
- Does he need a drink or a bathroom break?
- Does she know who you are and what your role in the company is?
- Preparatory questions
- What are you really trying to learn about the candidate's skills, and why?
- What makes a good question good?
- What makes a bad question bad?
- How can you turn bad questions into good ones?
- When is it appropriate to ask a trick question, and why?
- What questions can't or shouldn't you ask?
|
Monday Afternoon Half-Day Tutorials
|
|
M10
Over the Edge System Administration, Volume 2
David N. Blank-Edelman,
Northeastern University
Who should attend: Old-timers
who think they've already seen it all, and those who want to develop
inventive thinking early in their career. Join us and be prepared to
be delighted, disgusted, and amazed. Most of all, be ready to enrich
your network and system adminstration by learning to be different.
Previous attendance at Volume 1 of the series is recommended but not
required.
Join us for volume two of the wildly successful Over the
Edge System Administration class series. Once again we'll learn how to
break the rules, abuse the tools, and generally turn your system
administration knowledge inside out with the help of a whole new set
of examples. This class is a second cornucopia of ideas for creative
ways to take the standard (and sometimes not-so-standard) system
administration tools and techniques and use them in ways no one would
expect. We'll also cover some tools you may have missed. This class
will take some of the concepts from the first installment and develop
them even further.
Once again, we feel it is important to remind you: The teacher takes no responsibility should your head explode during this class.
Take back to work: Approaches to system administration you never dreamed of—but you wish you had!
Topics include:
- How to exploit side effects to your benefit
- Applying the arts and crafts you learned in camp to system administration
- Pressing Web apps from places like Google and Yahoo! into service as sysadmin tools
- How to perform SQL queries on your network equipment
- How to use even more ordinary objects you have lying around the house to make your life easier (seriously!)
M11
The Joy of Running Diskless Linux NEW!
Tobias Oetiker,
Consultant
Who should attend: Linux/UNIX
system administrators who manage several networked UNIX workstations
or cluster nodes.
Would you like to reap all the benefits of a thin client infrastructure without compromising on raw CPU and graphics performance? Would you like to be able to set up new workstations before you even have the hardware on site? Would you like to be able to upgrade, patch, and test without any of your users noticing, until everything is ready, and then have a downtime of only one reboot? Would you like to be able to install 10 new workstations or cluster nodes in 5 minutes? If you answer yes to one of these questions, come join us on this adventure.
Running diskless
Linux is as simple as using PEX to boot a server and hosting the
filesystem on NFS. If you want to do this with a large number of
machines, there are many ways to optimize procedures and provide
unique features to your users.
Course examples will be based on Debian/Ubuntu, but we will address how this approach can easily be adapted to other distros.
Take back to work: The ability to slash your installation times and downtime, and reduce hardware costs as well.
Topics include:
- Basic PXE netboot and NFS setup
- Installing Linux
without a workstation
- Organizing NFS roots
- Update procedures
- Providing a homogeneous application environment
- Managing user accounts
- How to make the automounter sit up and beg
- Managing mixed 32- and 64-bit environments
M12
Problem-Solving for IT Professionals
Strata Rose Chalup, Project Management Consultant
Who should attend:
IT support people who would like to have a better grasp of
problem-solving as a discipline.
In the world of IT support, you build up a lot of specialized domains of knowledge that may or may not interact. As you will see, most types of troubleshooting rely on what you might call call "guided intuition"-- focusing your attention down a probable path of diagnosis, and then making an intuitive leap. If you haven't practiced your intuitive pole vaulting lately, don't worry. By using checklists and patterns to do brute-force troubleshooting, you will gradually build up a reservoir of understanding that will eventually have you shouting "Aha!" while other folks are still scratching their heads in puzzlement.
Take back to
work:
- A solid grounding in the process of solving problems
- A framework on which to build specialized troubleshooting techniques that are specific to your environment
- Confidence in your ability to apply logic and
common sense to debug problems in complex interacting systems
- How to trace out common patterns of interaction
- How to apply basic principles to isolate symptoms and interactions between subsystems
What this class does not provide:
- Detailed instruction in specific problem-solving situations, such as "what to do when the mouse stops moving"
- Information on custom environments that are unique to your employer or organization
- An intro or remedial tutorial on IT basics such as how DNS lookups occur or what TCP steps happen when a request to a Web server comes in
Rather than cover ground many of you already know, we have chosen
to focus exclusively on the domain of problem-solving itself as a
discipline, not on solving specific problems common to IT situations.
M13
Nagios in Depth
NEW!
John Sellens,
SYONEX
Who should attend:
Network and system administrators ready to implement or extend their
use of the Nagios system and network monitoring tool.
Nagios is a very widely used tool for monitoring hosts and services on a network. It's very flexible, configurable, and can be extended in many ways, using home-grown or already existing extensions.
Take back to work:
The information you need to immediately implement and use Nagios and
related tools for monitoring systems and devices on your networks.
Topics include:
- Introduction: Functionality, features, use, and application
- Installation: Basic steps, prerequisites, common problems
- Theory of operation
- Plug-ins: Their creation, use, and abuse
- Extensions: NRPE, NSCA, NDOUtils
- Add-ons: Graphing, integration with other tools
|
Tuesday, November 13, 2007
|
Full-Day Tutorials
|
T1
Introduction to Ruby, Rails, and Capistrano
NEW!
Faisal N. Jawdat,
Consultant
Who should attend:
Programmers, as well as system administrators with programming
experience, who want to understand Ruby on Rails.
Over the past three years the Ruby on Rails Web development framework has gone from its first release to powering apps used by hundreds of thousands of users. In the process, Rails has dragged the Ruby programming language out of relative obscurity and into the mainstream of scripting languages. The elegance of the language and the power of the framework have gained a lot of attention both from Web 2.0 developers and from in-house application developers. What do you need to know to put Ruby on Rails to work for you?
This tutorial will provide an in-depth introduction to the Ruby language, the Rails application framework, and the Capistrano deployment system. We'll look at what each of these is, how it works, and when you should or shouldn't use it.
Take back to work: The ability to write scripts using Ruby and create and deploy your own applications using Rails and Capistrano.
Topics include:
- The basics of the Ruby programming language, including the object
model, the library, and functional features
- A survey of significant Ruby packages and technologies, including when to use them
- Ruby scripting for admins
- Building a Rails application
- Rails' sharp edges: the limits of easy and rapid
app development and where you'll need to roll your own
- How to decide what infrastructure to use to support your Rails
application
- Using Capistrano to deploy and manage distributed applications
T2
Configuring and Deploying Linux-HA
NEW!
Alan Robertson, IBM Linux Technology Center
Who should attend:
System administrators and IT architects who architect, evaluate, install, or manage critical computing systems. It is suggested that participants have basic familiarity with system V/LSB-style startup scripts, shell scripting, and XML. Familiarity with high availability concepts is not assumed.
The Linux-HA project (http://linux-ha.org/) is the oldest and most
powerful open source high-availability (HA) package available,
comparing favorably to well-known commercial HA packages. Although the
project is called Linux-HA (or "heartbeat"), it runs on a variety of
POSIX-like systems, including FreeBSD, Solaris, and OS X.
Linux-HA provides highly available services on clusters from one to more than 16 nodes with no single point of failure. These services and the servers they run on are monitored. If a service should fail to operate correctly, or a server should fail, the affected services will be quickly restarted or migrated to another server, dramatically
improving service availability.
Linux-HA supports rules for expressing dependencies between services, and powerful rules for locating services in the cluster. Because these services are derived from init service scripts, they are familiar to system administrators and are easy to configure and manage.
Take back to work: Both the basic theory of high availability systems and practical knowledge of how to plan, install, and configure highly available systems using Linux-HA.
Topics include:
- General HA principles
- Compilation and installation of the Linux-HA
("heartbeat") software
- Overview of Linux-HA configuration
- Overview of commonly used resource agents
- Managing services supplied with init(8) scripts
- Sample Linux-HA configurations for Apache, NFS, DHCP, DNS, and Samba
- Writing and testing resource agents conforming to the Open
Cluster Framework (OCF) specification
- Creating detailed resource dependencies
- Creating co-location constraints
- Writing resource location constraints
- Causing failovers on user-defined conditions
T3
Thinking About Security (Because They Really Are Out to Get You)
NEW!
Marcus Ranum, Tenable Network Security, Inc.
Who should attend:
Programmers and managers involved in the design, specification,
deployment, or maintenance of computer-based applications. Does that
sound perhaps overly broad? Well, it isbecause virtually any
software will, eventually, be security-critical whether you like it or
not. Participants do not need any specific knowledge, though a basic
understanding of computer security will help. People who attend this
tutorial should come away with a high-level view of the pressure
points in the development/deployment cycle where they can best stop
the bleeding, along with a collection of mental tools that they can
employ, and a framework for using them.
This tutorial is a high-level mental toolkit for thinking about security in applications and administration. It's aimed not at the tactical level of security (where most of us spend our time) but at the strategic level, and how to think about security as a problem, overall, rather than getting mired in the details.
Take back to work: Either a feeling of confidence or of terror; regardless, you will be much better equipped to cope with security.
Topics include:
- The natural laws of security
- Blocking and carrying
- Whitelisting and blacklisting
- Security in the design process
- Touchpoints for adding security to development
cycles
- Data security
- Dealing with security data
- The insider threat and counter-intelligence problem
- Triage
- Thinking about risk rationally
- Mental tricks
T4
Postfix Configuration and Administration
NEW!
Patrick Ben Koetter, state
of mind; Ralf
Hildebrandt, T-Systems
Who should attend:
Novice and advanced system administrators
and integrators interested in a crash course on Postfix, a fast, easy
to administer, and secure alternative to Sendmail.
Take back to work:
In-depth instruction in the installation and configuration of Postfix and software commonly used in conjunction with Postfix, such as Cyrus SASL, amavisd-new & SpamAssassin, clamav, and various policy daemons, along with an understanding of the administrative issues that arise when you are running a Postfix SMTP server.
Topics include:
- System architecture
- System metaphor
- Design principles
- Daemons
- Maps: Types, evaluation order
- Configuration files
- Single domain configuration
- What does Postfix need to provide basic services?
- Default settings
- Relay control
- IP-based relay control
- SMTP authentication, both inbound and outbound
- TLS Client Certificate–based relaying
- Multi-domain configurations
- Virtual alias domains
- Virtual mailbox domains
- Relay domains
- Local domains
- How to decide among domain namespaces
- Relay domain configuration
- Configuring a relay host
- What makes a relay host a smart relay host
- Controlling message flow
- Controlling SMTP communication
- Controlling content
T5
Solaris 10 Security Features Workshop
(Hands-on)
Peter Baer Galvin, Corporate Technologies
Who should attend:
Solaris systems managers and administrators interested in the new security features in Solaris 10 (and features in previous Solaris releases that they might not be using).
Solaris has always been the premier commercial operating system, but it is also somewhat different from other UNIX/Linux systems. It has novel features and applications (some have been copied in other operating systems), and there are things you need to know to use them
effectively and securely.
This course covers a variety of topics surrounding Solaris 10 and security. Note that this is not a class about specific security vulnerabilities and hardening; rather, it examines new features in Solaris 10 for addressing the entire security infrastructure, as well as new issues to consider when deploying, implementing, and managing Solaris 10. This will be a workshop featuring instruction and practice/exploration.
Take back to work:
During this exploration of the important new features of Solaris 10, you'll not only learn what it does and how to get it done, but also best practices. Also covered is the status of each of these new features, how stable it is, whether it is ready for production use, and expected future enhancements.
Topics
include:
- Overview
- Virtualization
- Containers (a.k.a. Zones), light-weight virtual environments for application isolation and resource management
- Installation
- Management
- Resource management
- Other Solaris virtualizations: LDOMs, Xen
- RBAC: Role Based Access Control (giving users and
application access to data and functions based on the role they are
filling, as opposed to their login name)
- Privileges: A new Solaris facility based on the principle of least privilege; instead of being root (or not), users are accorded 43 distinct bits of privilege, sometimes spanning classes of actions and sometimes being confined to a specific system call
- NFSv4: The latest version of NFS (based on an industry standard), featuring stateful connection, more and better security, write locks, and faster performance
- Flash archives and live upgrade (automated system builds)
- Moving from NIS to LDAP
- DTrace: Solaris 10's system profiling and debugging tool
- FTP client and server enhancements for security, reliability, and auditing
- PAM (the Pluggable Authentication Module) enhancements, for more detailed control of access to resources
- Auditing enhancements
- BSM (the Basic Security Module), providing a security auditing
system (including tools to assist with analysis) and a device
allocation mechanism (providing object-reuse characteristics for
removable or assignable devices)
- Service Management Facility (a replacement for rc files)
- New "Secure By Default" settings
- Solaris Cryptographic Framework: A built-in system for encrypting anything, from files on disks to data streams between applications
- Kerberos enhancements
- Packet filtering with IPfilters
- BART (Basic Audit Reporting Tool): similar to Tripwire, BART enables you to determine what file-level changes have occurred on a system, relative to a known baseline
- Trusted Extension: Additions to Solaris 10 to make it "Trusted Solaris"
- Securing a Solaris 10 system
Laptop Requirements:
Each student should have a laptop with wireless access for remote access into an instructor-provided Solaris 10 machine (if you do not have a laptop, we will make every effort to pair you up with another student to work as a group; your laptop does not need to be running Solaris).
|
Tuesday Morning Half-Day Tutorials
|
|
T6
Advanced Shell Programming
Mike Ciavarella,
University of Melbourne, Australia
Who should attend: Junior or intermediate system administrators or anyone with a basic knowledge of programming, preferably with some experience in Bourne/Korn shells (or their derivatives).
The humble shell script is still a mainstay of UNIX/Linux system administration, despite the wide availability of other scripting languages. This tutorial details techniques that move beyond the quick-and-dirty shell script.
Take back to work:
An understanding of how to use the "lowly" shell to achieve lofty goals.
Topics include:
- Common mistakes and unsafe practices
- Modular shell script programming
- Building blocks: awk, sed, etc.
- Writing secure shell scripts
- Performance tuning
- Choosing the right utilities for the job
- Addressing portability at the design stage
- When not to use shell scripts
T7 Management 101: Effective Communication Tools for
Sysadmins NEW!
Geoff Halprin,
Consultant; Elizabeth
Zwicky, Acutis, Inc.
Who should attend:
System administrators who wish to become more proactive in managing their duties and to learn tools and tips that will assist them to communicate more effectively with their managers, users, and other important constituents of their services.
You may have noticed that being technically adept is not
sufficient. You have to be able to deal with people: your fellow team
members, your boss, your customers, the finance people, the legal
department, and even upper management. You need them to do things for
you (if it's only leaving you alone). System administrators generally
find talking to people much more stressful and less productive than
talking to computers. People do not operate by the same rules that
computers do, and the process often seems random, irrational, or
incomprehensible.
In this tutorial, we examine the many facets of
communication and introduce various systems, tools, and techniques you
can employ to ease your stress and improve your ability to attain the
outcomes you desire.
Take back to work:
Improved communication skills that will make you a
more effective system administrator; an understanding of how
communication works, so that it becomes a tool you can use instead of
a source of frustration.
Topics include:
- Oral communication
- Effective listening
- Effective talking
- Presentations
- Written communication
- Progress reporting
- Technical documentation
- Writing proposals
- Buy-vs.-build evaluations
- Cost-risk evaluations
- Audit reports
- Understanding others
- Understanding various communities
- Conflict resolution
- Personality types
- Time management
- Risk management
- Project management
T8
Virtualization: VMs! What Are They Good
For? NEW!
Æleen Frisch,
Exponential Consulting;
Kyrre Begnum,
Oslo University College
Who should attend:
System administrators who are curious about the
benefits of virtualization or who need to deploy it in their
environment.
Virtualization is a hot computing topic these days,
but you may be wondering whether it will actually benefit your site.
When is virtualization appropriate, and when isn't it? What does it
take to administer a virtual infrastructure? How do you handle
challenges such as OS and software installation and backups? This
course will answer those questions.
Take back to work:
The ability to begin deploying virtualization
in your environment, along with an understanding of the many tradeoffs
you will need to address.
Topics include:
- What virtualization is and what it can and cannot do for you
- Available software and management options
- Typical deployment scenarios and special-purpose solutions
- Student labs
- Testing environments
- HPC
- HA/load balancing
- Dealing with legacy hardware
- Managing resources and resource competition
- Administrative challenges (e.g., installations, upgrades,
backups)
T9
Disk-to-Disk Backup and Eliminating Backup System Bottlenecks
Jacob Farmer, Cambridge
Computer Services
Who should attend: System administrators involved in the design and management of backup systems and policymakers responsible for protecting their organization's data. A general familiarity with server and storage hardware is assumed. The class focuses on architectures and core technologies and is relevant regardless of what backup hardware and software you currently use.
The data protection industry is going through a mini-renaissance. In
the past few years, the cost of disk media has dropped to the point
where it is practical to use disk arrays in backup systems, thus
minimizing and sometimes eliminating the need for tape. In the first
incarnations of disk-to-disk backup—disk staging and virtual
tape libraries—disk has been used as a direct replacement for
tape media. While this compensates for the mechanical shortcomings of
tape drives, it fails to address other critical bottlenecks in the
backup system, and thus many disk-to-disk backup projects fall short
of expectations. Meanwhile, many early adopters of disk-to-disk backup
are discovering that the longterm costs of disk staging and virtual
tape libraries are prohibitive.
The good news is that the next generation of disk-enabled data protection solutions has reached a level of maturity where they can assist—and sometimes even replace—conventional enterprise backup systems. These new D2D solutions leverage the random access properties of disk devices to use capacity much more efficiently and to obviate many of the hidden backup-system bottlenecks that are not addressed by first-generation solutions. The challenge to the backup system architect is to cut through the industry hype, sort out all of these new technologies, and figure out how to integrate them into an existing backup system.
This tutorial identifies the major bottlenecks in conventional backup
systems and explains how to address them. The emphasis is placed on
the various roles for inexpensive disk in your data protection
strategy; however, attention is given to SAN-enabled backup, the
current state and future of tape drives, and iSCSI.
Take back to work:
Ideas for immediate,
effective, inexpensive improvements to your backup systems.
Topics include:
- Identifying and eliminating backup system bottlenecks
- Conventional disk staging
- Virtual tape libraries
- Removable disk media
- Incremental forever and synthetic full backup strategies
- Block- and object-level incremental backups
- Information lifecycle management and nearline archiving
- Data replication
- CDP (Continuous Data Protection)
- Snapshots
- Current and future tape drives
- Capacity Optimization (Single-Instance File Systems)
- Minimizing and even eliminating tape drives
- iSCSI
|
Tuesday Afternoon
Half-Day Tutorials
|
|
T10
Documentation Techniques for Sysadmins
Mike Ciavarella,
University of Melbourne, Australia
Who should attend: System administrators who need to produce documention for the systems they manage or who want to improve their documentation skills.
Particular emphasis is placed on documentation as a time-saving tool
rather than a workload imposition.
Take back to work:
The ability to make immediate, practical use
of the documentation techniques presented in this tutorial in your
day-to-day tasks.
Topics include:
- Why system administrators need to document
- The document life cycle
- Targeting your audience
- An adaptable document framework
- Common mistakes
- Tools to assist the documentation process
T11
Management 201: Effective Team Management of
System Administrators
NEW!
Geoff Halprin,
Consultant; Elizabeth
Zwicky, Acutis, Inc.
Who should attend:
System administrators who have found themselves being given (or are hoping to be given, or are anticipating with apprehension) responsibilities for "wetware systems" (i.e., other people).
As you grow in seniority, a funny thing happens: you are expected to pass that wisdom on to others. You are given projects to run, teams to lead, apprentices to mentor, and ever larger budgets to manage effectively. The one thing, however, that you are almost never given is management training.
This tutorial examines many of the diverse areas of team management and provides you with an extensive set of insights, tools, and tips for conquering this brave new world.
Take back to work:
The techniques you need to be effective in your "organization-facing" duties.
Topics include:
- Sysadmin workflow
- Personal and workgroup productivity
- Progress reporting and journals
- Meeting management
- Project management
- Financial management
- Team management
- Delegation
- Mentoring/coaching
- People management
T12
So You Have Active Directory: Now What? A Guide to AD Integration for UNIX Sysadmins
Gerald Carter, Centeris/Samba Team
Who should attend: System administrators who are tasked with integrating authentication, Web, and file/print services provided by UNIX hosts into an Active
Directory domain.
Frequently, AD deployments are handled outside the UNIX infrastructure teams. This can leave UNIX/Linux sysadmins scratching their collective heads about how to make use of the new directory service and increase the amount of work duplicated by the UNIX server teams and the AD administrators. This tutorial will help reduce that workload for you.
Take back to work:
In-depth understanding of the best approaches to
managing your system services with Active Directory.
Topics include:
- AD domain membership using Samba
- NTLM and Kerberos authentication for Apache
- Using PAM for NTLM and Kerberos authentication
- Searching Active Directory using LDAP clients
T13
Next-Generation Storage Networking
Jacob Farmer, Cambridge
Computer Services
Who should attend:
Sysadmins running day-to-day operations and those who set or enforce budgets. This tutorial is technical in nature, but it does not address
command-line syntax or the operation of specific products or
technologies. Rather, the focus is on general architectures and
various approaches to scaling in both performance and capacity. Since
storage networking technologies tend to be costly, there is some
discussion of the relative cost of different technologies and of
strategies for managing cost and achieving results on a limited
budget.
There has been tremendous innovation in the data storage
industry over the past few years. Proprietary, monolithic SAN and NAS
solutions are beginning to give way to open-system solutions and
distributed architectures. Traditional storage interfaces such as
parallel SCSI and Fibre Channel are being challenged by iSCSI (SCSI
over TCP/IP), SATA (serial ATA), SAS (serial attached SCSI), and even
Infiniband. New file system designs and alternatives to NFS and CIFS
are enabling high-performance filesharing measured in gigabytes (yes,
"bytes," not "bits") per second. New spindle management techniques are
enabling higher-performance and lower-cost disk storage. Meanwhile, a
whole new set of efficiency technologies are allowing storage
protocols to flow over the WAN with unprecedented performance. This
tutorial is a survey of the latest storage networking technologies,
with commentary on where and when these technologies are most suitably
deployed.
Take back to work: An understanding of general architectures, various approaches to
scaling in both performance and capacity, relative costs of different
technologies, and strategies for achieving results on a limited
budget.
Topics include:
- Fundamentals of storage virtualization: the storage I/O path
- Shortcomings of conventional SAN and NAS architectures
- In-band and out-of-band virtualization architectures
- The latest storage interfaces: SATA (serial ATA), SAS (serial attached SCSI), 4Gb Fibre Channel, Infiniband, iSCSI
- Content-Addressable Storage (CAS)
- Information Life Cycle Management (ILM) and
Hierarchical Storage Management (HSM)
- The convergence of SAN and NAS
- High-performance file sharing
- Parallel file systems
- SAN-enabled file systems
- Wide-area file systems (WAFS)
|
Wednesday,
November 14, 2007 |
Full-Day
Tutorials
|
W1
Seven Habits of the Highly Effective System Administrator: Hints,
Tricks, Techniques, & Tools of the Trade
Lee Damon, University of Washington;
Mike Ciavarella,
University of Melbourne, Australia
Who should attend: Junior system administrators with anywhere from little to 3+ years of
experience in computer system administration. We will focus on
enabling the junior system administrator to "do it right the first
time." Some topics will use UNIX-specific tools as examples, but the
class is applicable to any sysadmin and any OS. Most of the material
covered is "the other 90%" of system administrationthings every
sysadmin needs to do and to know, but which aren't details of specific
technical implementation.
We aim to accelerate the experience curve for junior system
administrators by teaching them the time honored tricks (and effective
coping strategies) that experienced administrators take for granted
and which are necessary for successful growth of both the
administrator and the site.
The class covers many of the best practices that senior
administrators have long incorporated in their work. We will touch on
tools you should use, as well as tools you should try to avoid. We
will touch on things that come up frequently, as well as those which
happen only once or twice a year. We will look at a basic security
approach.
Take back to work: Ideas about how to improve and to streamline your systems and your workload, and, just as important, where to look to find more answers.
Topics include:
- Why your computers should all agree on what time it is
- Why root passwords should not be the same on every computer
- Why backing up every file system on every computer is not always a good idea
- Policieswhere you want them and where you might want to
avoid them
- Ethical issues
- Growth and success as a solo-sysadmin as well as in small, medium, and large teams
- Training
- Mentoring
- Personal growth planning
- Site planning
- Budgeting
- Logistics
- Books that can help you and your users
W2
Solaris 10 Performance, Observability, and
Debugging
James Mauro, Sun
Microsystems
Who should attend: Anyone who supports or may support Solaris 10 machines.
Take back to work:
How to apply the tools and utilities available in Solaris 10 to resolve performance issues and pathological behavior, and simply to understand the system and workload better.
Topics include:
- Solaris 10 features overview
- Solaris 10 tools and utilities
- The conventional stat tools (mpstat, vmstat, etc.)
- The procfs tools (ps, prstat, map, pfiles, etc.)
- lockstat and plockstat
- Using kstat
- Dtrace, the Solaris dynamic tracing facility
- Using mdb in a live system
- Understanding memory use and performance
- Understanding thread execution flow and profiling
- Understanding I/O flow and performance
- Looking at network traffic and performance
- Application and kernel interaction
- Putting it all together
|
Wednesday Morning Half-Day Tutorials
|
|
W3
Postfix Anti-Spam Workshop
NEW!
Ralf Hildebrandt,
T-Systems;
Patrick Ben Koetter, state of mind
Who should attend: System administrators and integrators interested in using Postfix to stem the tide of spam.
Postfix offers a variety of methods to control the inflow of
unwanted messages. There are built-in facilities, as well as
interfaces to other software. Managing them effectively can
drastically reduce the volume of spam that your users (and you!) need
to suffer under.
Take back to work:
The ability to become a hero to your users by decimating the amount of
spam they receive.
Topics include:
- Available methods
- Advantages and disadvantages
- policy-delegation
- milter
- content_filter
- smtpd_proxy_filter
- The order in which restrictions are applied
- Minimizing overhead
- Maximizing efficiency and accuracy
- How to make exceptions
- Known users
- By site
- By signature
- By content
- Configuration
- Step-by-step configuration
- The rationale behind our decisions
- Cost and efficiency of each method
W4
Climb Out of the "Bad IT" Hole NEW!
Tom Limoncelli, Google
NYC
Who should attend: IT and sysadmin managers who want to know how to solve some fundamental management problems.
Has your IT department or system administration team fallen into a hole and can't climb out? Users hate you, managers want to cut your budget, and nobody is sure what to do next? This class takes stab at fixing the most basic problems that we see time and time again. This class is based on the newly released second edition of The Practice of System and Network Administration, by Limoncelli, Hogan, and Chalup.
Take back to work:
Ideas about how to make your life and your team work smoothly and happily.
Topics nclude:
- Three policies management can create that save
system administrators time and money
- Tricks to help stop "fire fighting"
- Handling user requests really well: Ticket
software, help desk management basics
- Creating a good first impression: PC deployment management, upgrade cycles
- How to make sure the CEO sees you are "turning things around"
- Eliminating "time sink"
- Documentation (no, really!)
- What to do in your first 72 hours as "the new IT manager"
W5 Wireshark (Ethereal) and the Art of Debugging Networks
Gerald Carter,
Centeris
Who should attend: System and network administrators who are interested in learning more about the TCP/IP protocol and how network traffic monitoring and analysis can be used as a debugging, auditing, and security tool. System logs can turn out to be incomplete or incorrect when you're trying to track down network application failures. Sometimes the quickest, or the only, way to find the cause is to look at the raw data on the wire. This course is designed to help you make sense of that data.
Take back to work:
How to use the Wireshark protocol analyzer as a debugging and auditing tool for TCP/IP networks.
Topics include:
- Introduction to Wireshark (Ethereal) for local and remote network tracing
- TCP/IP protocol basics
- Analysis of popular application protocols such as DNS, DHCP, HTTP, NFS, CIFS, and LDAP
- How some kinds of TCP/IP network attacks can be recognized
|
Wednesday Afternoon Half-Day Tutorials
|
|
W6
Cyrus SASL Authentication Workshop
NEW!
Patrick Ben Koetter, state of mind; Ralf
Hildebrandt, T-Systems
Who should attend:
System administrators and integrators interested in learning Cyrus SASL–based authentication but know that there's no (usable) user manual that tells operators how to set up Cyrus SASL.
The Cyrus SASL authenticaton framework plays an important role in client-server infrastructures. Radius servers, MTAs, LDAP servers, and numerous other applications use Cyrus SASL to handle authentication requests by clients in order to authorize the clients to take a server action, e.g., permission to relay a message or select protected entries from a LDAP tree.
Take back to work:
How to install, configure, and test Cyrus SASL using various authentication mechanisms and data stores.
Topics include:
- Architecture
- What is Cyrus SASL made of, and how do the pieces fit together?
- libsasl and Cyrus SASL internal communication
- Authentication interface
- Mechanisms
- Password Verification Services
- Methods
- How to install Cyrus SASL and how to get around some rough edges during installation
- Configuration and the pros and cons of authentication back
ends
- shadow
- sasldb
- SQL (MySQL)
- ldapdb (OpenLDAP)
- Ways to verify and/or debug Cyrus SASL authentication
Attendees are encouraged (but not required) to bring a computer and
Cyrus SASL sources (or pre-installed) on their machine.
W7
Setting Up a Server Room or Data Center (or Data Closet)
NEW!
Hunter Matthews, Duke
University
Who should attend: System administrators in most small to medium organizations, those who have either inherited a server "closet" or are trying to build a small
server room.
Most small to medium organizations don't start out with a server room or data center. Instead, an office or a closet gets repurposed for the task. Power or cooling quickly takes center stage as the limiting factor to growth or system reliability. This tutorial is for the system administrator who must now either build a proper room or move the systems into an existing server room that may or may not need retrofits or upgrades. This tutorial may also benefit the sysadmin with an existing room who is looking to plan for growth.
Take back to work:
How to plan the best ways to configure your server room space and spend your money wisely.
Topics include:
- Layout: Where do you put things?
- Electrical power: How to get it and deliver it
- Cooling: How much is enough?
- Console servers and remote access: Is it worth it?
- Budgeting: What is this all going to cost?
- Safety: Is what we're doing safe?
- Wire Management: The difference between good and great
|
Thursday,
November 15, 2007
|
Full-Day
Tutorials
|
R1
Resource Management with Solaris Containers
NEW!
Jeff Victor,
Sun Microsystems
Who should attend: System administrators who want to improve resource utilization of their Solaris (SPARC, x64, and x86) systems. This tutorial covers the facilities available in Solaris for isolating workloads and managing system resources. These facilities enable you to safely host multiple workloads on one instance of an operating system, by creating virtual operating system instances and controlling their resource usage. The features also enable workload management and service level management, the ability to leverage available capacity and manage system utilization. Controls for CPUs, processes and threads, CPU affinity, scheduling classes, memory, and network bandwidth management will be explained and demonstrated.
Take back to work:
A solid understanding of the facilities and commands
available for maximizing usage of the Solaris systems in your data
center.
Topics include:
- What are resources?
- Why would you want to manage them?
- How do you use these Solaris features?
- Dynamic Resource Pools, including processor sets
- Physical Memory management with Resource Capping and Memory Sets
- Network bandwidth management with IPQoS
- Schedulers
- Application isolation with
Zones
- Projects and Tasks
|
Thursday Morning Half-Day Tutorials
|
|
R2
RF Road Warrior: Secure Wireless Computing for Home, Work, and the Road
NEW!
Bruce Potter, Chief Technologist and Founder,
Ponte Technologies
Who should attend:
Security and IT professionals involved or interested in using 802.11 wireless networks at home, work, and on the road while avoiding security pitfalls of the technology. Participants should already be familiar with 802.11 wireless network technology and network security fundamentals and technology such as firewalls, switches, routers, and VPNs, but expertise is not required. This tutorial will assist and inform and enlighten many, including individuals with wireless networks at home and work and individuals who have deployed wireless networks or are planning to, as well as professionals tasked to design secure network architectures for their organization.
You want to use wireless? Who doesn't? But you have read the news. You have heard the hype and the horror stories. War-drivers. Hackers. Nosy neighbors. Spammers. Piggybackers. Credit card thieves. Hostile hotspots. Is there any such thing as "secure wireless networking"? You bet there is!
This course will teach you how to set up a multi-functional wireless network at work that empowers you and your co-workers, while keeping visitors from stealing your bandwidth and drive-by hackers from accessing your corporate secrets. This course will show you how to set up a wireless network at home that keeps people from stealing your MP3 collection or your tax records. This course will teach you how to hit the road securely with your wireless laptop, protecting yourself at coffee shops and airport hotspots along the way.
Take back to work:
The knowledge of what wireless threats you may face at home, at work, and on the road, and how to set up a highly secure wireless network at home, how to avoid wireless attackers, and how to stay secure while using wireless networks on business trips.
Topics include:
- Setting up a truly secure wireless network at work or at home
- Wireless security for gaming, streaming MP3s, TiVos, etc.
- Detecting and avoiding rogue access points and
nearby hackers
- Secure Web surfing and credit card payments at
hotspots and airports
- Proper VPN configurations for road warriors
R3
Hardware for the (Software-Oriented) Sysadmin
NEW!
Rudi van Drunen,
Consultant
Who should attend:
The sysadmin and troubleshooter who wants to know how hardware works on the electronics level in order to understand why some hardware issues occur and to avoid common mistakes.
This course will top up the toolbox of the sysadmin with in-depth knowledge of hardware and the underlying electronics. We will cover the basic electronics of the hardware the syadmin needs to work with and troubleshoot. Practical tips for avoiding common pitfalls will be
offered.
Take back to work: A more thorough understanding of electronics, with the ability to attack hardware-related problems at a fundamental level.
Topics include:
- Technologies
- Analogue electronics
- Digital electronics
- Integrated circuits
- Programmable logic
- Ohm's Law
- Signals
- Analogue signal levels
- Digital logic levels
- Cabling: USB, Ethernet, SCSI
- Crosstalk
- RF issues (including wireless)
- Power
- Power calculations
- Power layout
- Signal processing
- Mixed signal circuits
- A/D conversion
- Audio systems
- Video/VGA/DVI
- Circuit boards
- How to fix your hardware or keep it running until on-site support
arrives
R4
Databases: What You Need to Know
John Sellens,
SYONEX
Who should attend:
System and application administrators who need to support databases and database-backed applications.
Databases used to run almost exclusively on dedicated database servers, with one or more database administrators (DBAs) dedicated to their care. These days, with the easy availability of database software such as MySQL and PostgreSQL, databases are popping up in many more places and are used by many more applications. As a system administrator you need to understand databases, their care and feeding. This course provides an introduction to database concepts, use, and implementation, specifically aimed at system administrators.
Take back to work:
A better understanding of databases and their use and of how to deploy and support common database software and database-backed applications.
Topics include:
- An introduction to database concepts
- The basics of SQL (Structured Query Language)
- Common applications of databases
- Berkeley DB and its applications
- MySQL installation, configuration, and management
- PostgreSQL installation, configuration, and management
- Security, user management, and access controls
- Ad hoc queries with standard interfaces
- ODBC and other access methods
- Database access from other tools (Perl, PHP, sqsh, etc.)
|
Thursday Afternoon Half-Day Tutorials
|
|
R5
Disaster Preparedness (and Recovery): How to Keep Your Company (and Your Job) Alive
Evan Marcus, QD
Technology
Who should attend:
Data center managers, IT directors, and anyone administering critical systems in an environment where extended downtime after an outage is unacceptable.
Disaster planning is like insurance: nobody wants to talk about it and everyone runs from the salesmen. But when you need it, you are very glad to have it! And if you don't have it when you need it, it is too late to do anything about it. It's all about planning and preparation.
We will explore the key aspects of developing a disaster recovery
plan, including identifying the key components, testing the plan, and
some of the technology that can speed recovery, with an eye toward
balancing costs and benefits. We'll build it all around a real-life
organization that completely recovered from the 9/11 disaster in less
than 12 hours.
We'll also look at the ramifications of storing data offline vs. online, what happens when archived backup media starts to get too old, and the security aspects of having a functional DR site.
Take back to work:
The ability to put together a plan that fits your
company's needs and the confidence to make it work.
Topics include:
- What a DR plan should contain, with real-world examples
- Potential legal and civil liabilities if you don't have a DR plan
- Hot vs. warm vs. cold backups
- Costs of developing a DR plan
- Do you really need a plan at all?
- Testing methods for the plan
- Downtime and data loss as two sides of the same coin
- Building and staffing DR teams
- Senior management's role
- Selling DR to senior management
- Disasters that only involve the backup site
R6
Beyond Shell Scripts: 21st-Century Automation Tools and Techniques
Æleen Frisch,
Exponential Consulting
Who should attend:
System administrators who want to explore new ways of automating administrative tasks.
Although a good system administrator will be proficient in creating
shell scripts to solve specific problems and automate routine tasks,
the skill alone is no longer sufficient for the automation
requirements in typical 21st-century computing environments. As system
administration has moved from an informal, poorly defined, and widely
varying job title to a recognized and respected profession, so its
processes and procedures have developed from homegrown, ad hoc,
single-purpose strategies into systematic, wide-ranging ones supported
by powerful and well developed software tools. This course introduces
you to several enterprise-worthy, open source administrative packages,
each of which supports the configuration, management, and/or
monitoring of a specific aspect of system functioning.
Take back to work:
You will be ready to begin using these packages in your own environment and to realize the efficiency, reliability, and thoroughness that they offer compared to traditional approaches.
Topics include:
- Expect: automating interactive processes
- What to Expect
- Using Expect with other tools
- Security issues
- Bacula, an enterprise backup management facility
- Prerequisites
- Configuration
- Getting the most from Bacula
- Network and system monitoring tools
- SNMP Overview
- Nagios: Monitoring network and device performance
- RRDTool: Examining retrospective system data
- Ethereal: monitoring network data
R7
Performance Tracking with Cacti NEW!
John Sellens,
SYONEX
Who should attend: Network and system administrators ready to implement a graphical performance and activity monitoring tool, who prefer an integrated, Web-based interface. Participants should have an understanding of the
fundamentals of networking, familiarity with computing and network
components, UNIX system administration experience, and some
understanding of UNIX programming and scripting languages.
This tutorial will provide in-depth instruction in the installation and configuration of Cacti, a popular Web-based tool for graphing
time-series data from systems and devices on your network, using
RRDTool, PHP, and MySQL.
Take back to work:
The information needed to immediately implement and use Cacti to monitor systems and devices on your networks.
Topics include:
- Installation: Basic steps, prerequisites, common problems and solutions
- Configuration, setup options, and how to manage larger and nontrivial configurations
- User management and access control
- Special cases: how to deal with interesting problems
- Extending Cacti: how to write scripts or programs to extend the functionality of the basic package
- Security concerns and access control
- Ongoing operations
Friday, November 16, 2007
|
Full-Day Tutorials
|
F1
Implementing [Open]LDAP Directories
Gerald Carter, Centeris/Samba Team
Who should attend: Both LDAP directory administrators and architects. The focus is on integrating standard network services with LDAP directories. The examples are based on UNIX hosts and the OpenLDAP directory server and will include actual working demonstrations throughout the course. System administrators are frequently tasked with integrating applications with directory technologies. DNS, NIS, LDAP, and Active Directory are all examples of the directory services that pervade today's networks. This tutorial will focus on helping you to understand how to integrate common services hosted on UNIX servers with LDAP directories. The demo-based approach will show you how to build and deploy an OpenLDAP-based directory service that consolidates account and configuration information across a variety of applications.
Take back to work:
Comfort with LDAP terms and concepts and an understanding of how to extend that knowledge to integrate future applications using LDAP into your network.
Topics include:
- Replacing an NIS domain with an LDAP directory
- Storing user and group account information
- Configuring PAM and Name Service Switch libraries on the client
- Integrating Samba domain file and print servers
- Configuring a Samba LDAP account database
- Performance-tuning account lookups
- Integrating MTAs such as Sendmail and Postfix
- Configuring support for storing mail aliases in an LDAP directory
- Using LDAP for storing mail routing information and virtual domains
- Managing global address books for email clients
- Creating customized LDAP schema items
- Defining custom attributes and object classes
- Examining scripting solutions for developing your own directory administration tools
- Overview of the Net::LDAP Perl module
F2
Wireless Networking, Security, Vulnerability Assessment, and Penetration Testing
NEW!
Bruce Potter, Chief Technologist and Founder,
Ponte Technologies
Who should attend:
Security and IT professionals involved or interested in the security assessment of 802.11 wireless networks or the practical threats wireless networks are faced with. Participants should already be familiar with 802.11 wireless network technology and network penetration testing techniques and tools, but expertise is not
required. This tutorial will assist and inform and enlighten many, to
include: war-driving hobbyists, individuals who have deployed wireless
networks, and professionals tasked to perform security assessments for
their organization.
Wi-Fi is not voodoo, although it may seem that way at times, what with strange behavior and performance characteristics influenced by such things as the environment, 802.11's design, random manufacturer incompatibilities, or just ever-evolving enhancements to the technology. Additionally, Wi-Fi security is not hard, although the industry certainly has not made it appear easy. However, understanding the basic capabilities and features of wireless networking technologies such as Wi-Fi, making sense of the myriad security configurations available for that technology, and assessing and testing the security of 802.11 wireless networks can be a bit
daunting for even the most seasoned IT gurus.
How does Wi-Fi work? What is wrong with Wi-Fi? How do you fix it? How do you test to ensure your "fix" is in place and truly effective? How do you demonstrate that there are some things that you cannot fix? This course answers these questions and more, by providing you with
relevant information in a manner that is easy to digest, with hands-on
labs that reinforce what you learn.
This tutorial begins with basic RF principles that lead to the core functionality and capabilities of Wi-Fi. This is followed by an in-depth inspection of the 802.11 protocol and packet-by-packet analysis of sample Wi-Fi traffic. Students are provided with 802.11 protocol analysis software and examples of traffic dumps so that they can follow along. Wi-Fi security configurations are then discussed, including EAP types and options, with a concentration on the most effective means of securing Wi-Fi for home and enterprise use. Students are provided with access points and enterprise-grade software and are instructed in the step-by-step secure configuration of home and enterprise Wi-Fi networks. Finally, techniques and tools for the vulnerability assessment and penetration testing of Wi-Fi networks are discussed. Students are given copies of these tools and can follow along as the instructor demonstrates vulnerability assessment and penetration testing of the Wi-Fi networks that have been set up in class. Detailed slides, in-depth explanations, and notes are standard, while students are given ample opportunity to ask questions to further clarify course content, if need be.
Take back to work:
A strong awareness of the threats against 802.11 wireless networks, as well as what practical tools and techniques are needed to properly assess the security of those networks.
Topics include:
- Basic RF principles and how they apply to Wi-Fi
- The 802.11 protocol and how to capture and analyze Wi-Fi traffic
- Wireless network security architectures, technology, and products, as well as where and how they should be employed
- The range and impact of 802.11 wireless network threats, vulnerabilities, and exploits
- Successful design and implementation of secure 802.11 wireless networks for the home and the enterprise
- How to assess the security of an 802.11 wireless network, with a focus on validating implementations, as well as testing for exploitable conditions
F3
Achieving High Availability (in Your
Lifetime)
Evan Marcus,
QD Technology
Who should attend: System administrators and data center managers, but the material applies to developers and their managers and to IT managers as well.
What does high availability really mean? Do you need it? Do you already have it? How high is up? How up is high? Whom can you trust to give you a practical and useful answer, an answer you can apply to your data center and your systems? How can you sort through all of the
marketing noise and really put high availability into place on your
systems?
Every systems vendor, every OS vendor, every storage vendor, every networking vendor has his own definition of this very generic termÑand all the definitions are different! Do any of these definitions apply to you and your systems? Probably not.
In this lively and upbeat tutorial, we'll give you some practical and
useful information about high availability. We'll show you the
relationship between cost and availability. We'll walk through our
list of 20 key high availability design principles—the foundation for any critical system—and how you can get started
down the path toward high availability without spending boatloads of
money.
Take back to work:
Simple and practical tools you can use right away to persuade the bean
counters in your organization of the value of putting high
availability techniques and practices into place.
Ultimately, availability is defined by the users of a system: can they use it, or not? With that in mind, we take the approach that high availability is a very broad science, affecting every aspect of system management.
Topics include, in
reference to high availability:
- Backups and restores
- Storage
- Security
- Networking
- The data center environment
- Services and applications
- WANs and replication
- Archiving
F4
Python in Action
NEW!
David Beazley,
Consultant
Who should attend: Software developers and system administrators who want to know the inside story of why Python programmers are able to be so productive while still having time to enjoy life, go on vacation, and play in bands. Attendees should have prior programming experience in another language such as C++, Java, or Perl.
Python is a dynamic programming language which shares many features with languages such as Ruby, Tcl, and Perl. Although sometimes viewed as a scripting language, Python is actually a full-featured general-purpose programming language which incorporates ideas from a variety of other languages, including C, Smalltalk, and Lisp. In addition, it includes a large standard library that provides support for regular expressions, operating system interfaces, networking, threads, XML processing, GUI programming, and more.
In this tutorial, you will learn the basics of Python programming and see how Python makes hard problems easier, impossible problems possible, and programming fun.
Every topic and
example in this tutorial is cross-platform and will work with a
standard Python installation on any machine. Attendees will be able to
follow along and try the examples if Python 2.5 is installed on their
laptop computer.
Take back to work:
An eagerness and ability to apply Python to some of your most common and your most annoying tasks.
Topics include:
- A tour of the Python language
- Basic syntax
- Core datatypes
- Control flow
- Exception handling
- Functions
- Iterators
- Classes
- Module system
- A look at major library modules
- Text processing
- Operating system interfaces
- Network programming
- Threads
- Internet programming
- Practical programming examples
- Effective textprocessing and parsing
- Data analysis and manipulation
- Processing of real-time data streams
- Programming with objects
- Controlling and interacting with subprocesses
- Building custom Web servers and other network services
- Concurrent programming with threads
- Distributed computing
|
|
|