An Overview to System Management WorldVistA Community Meeting June 14-17, 2007 Seattle, WA.

Slides:



Advertisements
Similar presentations
Ed Duguid with subject: MACE Cloud
Advertisements

2 Copyright © 2005, Oracle. All rights reserved. Installing the Oracle Database Software.
An Introduction to System Administration Chapter 1.
June 23rd, 2009Inflectra Proprietary InformationPage: 1 SpiraTest/Plan/Team Deployment Considerations How to deploy for high-availability and strategies.
1 © Copyright 2010 EMC Corporation. All rights reserved. EMC RecoverPoint/Cluster Enabler for Microsoft Failover Cluster.
11 MONITORING MICROSOFT WINDOWS SERVER 2003 Chapter 3.
Microsoft virtual machine converter
1© Copyright 2011 EMC Corporation. All rights reserved. EMC RECOVERPOINT/ CLUSTER ENABLER FOR MICROSOFT FAILOVER CLUSTER.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 14: Troubleshooting Windows Server 2003 Networks.
1 Disaster Recovery Planning & Cross-Border Backup of Data among AMEDA Members Vipin Mahabirsingh Managing Director, CDS Mauritius For Workgroup on Cross-Border.
Implementing Failover Clustering with Hyper-V
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
November 2009 Network Disaster Recovery October 2014.
Windows Server MIS 424 Professor Sandvig. Overview Role of servers Performance Requirements Server Hardware Software Windows Server IIS.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Module 10 Configuring and Managing Storage Technologies.
Maintaining a Microsoft SQL Server 2008 Database SQLServer-Training.com.
Guide to Linux Installation and Administration, 2e 1 Chapter 9 Preparing for Emergencies.
Verify Hardware Requirements Install Windows Server 2008 R2 Configure Active Directory Install SQL Server 2008 Install SharePoint Server 2010 Configure.
COMPUTER CARE & MAINTENANCE. Protecting Your Computer From Damage Like any kind of equipment, your computer requires care and maintenance to run smoothly.
Chapter 18: Windows Server 2008 R2 and Active Directory Backup and Maintenance BAI617.
Chapter 8 Implementing Disaster Recovery and High Availability Hands-On Virtual Computing.
Appendix B Planning a Virtualization Strategy for Exchange Server 2010.
IT Infrastructure Chap 1: Definition
Module 9 Planning a Disaster Recovery Solution. Module Overview Planning for Disaster Mitigation Planning Exchange Server Backup Planning Exchange Server.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Mark A. Magumba Storage Management. What is storage An electronic place where computer may store data and instructions for retrieval The objective of.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
11 DISASTER RECOVERY Chapter 13. Chapter 13: DISASTER RECOVERY2 OVERVIEW  Back up server data using the Backup utility and the Ntbackup command  Restore.
Module 15 Managing Windows Server® 2008 Backup and Restore.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 11: Monitoring Server Performance.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Chapter 2 Securing Network Server and User Workstations.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
HalFILE 2.1 Network Protection & Disaster Recovery.
Types of Hosting Website Management. Advantages of using hosting company Provides 24hr connection Security – virus protection, firewall Support Back ups.
Optimizing Windows Vista Performance Lesson 10. Skills Matrix Technology SkillObjective DomainObjective # Introducing ReadyBoostTroubleshoot performance.
Install, configure and test ICT Networks
Component 8/Unit 9aHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 9a Creating Fault Tolerant.
1 Chapter Overview Monitoring Access to Shared Folders Creating and Sharing Local and Remote Folders Monitoring Network Users Using Offline Folders and.
Virtual Machine Movement and Hyper-V Replica
High Availability Environments cs5493/7493. High Availability Requirements Achieving high availability Redundancy of systems Maintenance Backup & Restore.
Hands-On Microsoft Windows Server 2008 Chapter 7 Configuring and Managing Data Storage.
Computer Security Sample security policy Dr Alexei Vernitski.
Review of IT General Controls
Chapter 6: Securing the Cloud
IC3 GS3 Standard COMPUTING FUNDAMENTALS Module
Added Value of HA/DR Processing
Diskless Networks By Sam Morris.
Managing Multi-User Databases
File System Implementation
High Availability Linux (HA Linux)
IOT Critical Impact on DC Design
Virtualization OVERVIEW
Securing the Network Perimeter with ISA 2004
MONITORING MICROSOFT WINDOWS SERVER 2003
3.2 Virtualisation.
Oracle Solaris Zones Study Purpose Only
Unisecure Data Centers Has Extended Support For Data Backup and Storage. Philadelphia, US, 4th September 2018 | Unisecure is one of the Data Center Solutions.
Managing Clouds with VMM
SpiraTest/Plan/Team Deployment Considerations
Selling IIoT Solutions to Systems Integrators
Database Backup and recovery
PLANNING A SECURE BASELINE INSTALLATION
An Introduction to System Administration
Designing IIS Security (IIS – Internet Information Service)
Capitalize on Your Business’s Technology
06 | SQL Server and the Cloud
Presentation transcript:

An Overview to System Management WorldVistA Community Meeting June 14-17, 2007 Seattle, WA

Context - Premise The computer system is a tool that must be maintained in an IT “sterile field”

The Context:Support Providers Giving Patient Care ● Support providers with patient care ● Reliable – always available ● Secure – no undetected crackers ● Recoverable – when things do break ● Maintainable – when things need repair

Reliable – always available ● It “just works” ● Configuration of redundant systems allows for uninterrupted service during hardware and software maintenance / enhancement

Secure – no undetected crackers ● Establish an IT “sterile field” ● Computers used to access the system must be considered tools, not toys ● Use a VPN (Virtual Private Network) ● Monitor access attempts (Intrusion detection)

Recoverable – when things break ● Reduce down-time ● Quickly re-establish service

Maintainable – as repair is needed

● Remote Access/Network ● Adequate power and conditioning ● Adequate cooling ● Plan for multiple hosts ● Consider multiple locations (even if only placing on opposite sides of the room) ● Select replication strategy ● Journal files Planning

Building ● VPN for remote access ● Recommend adoption of a tough policy to maintain an IT “sterile field” – All connected computers are tools not toys – If using an insecure system (e.g. Microsoft OS), no “local administrator”, lock down – Consider giving workers for whom the above is too “harsh” a second computer that CANNOT be used to access the system.

Building – 2 ● Uninterruptable Power Supply for servers sufficient to guarantee an orderly shutdown ● Adequate space and cooling capacity to keep the system from “running hot” ● Install systems (at least two) ● With sufficient physical separation so that events like a fire do not cause a complete outage

Building – 3 ● Enable journaling on database ● Build database with selected replication strategy ● Sufficient storage for a complete backup of the database and journals, etc

Maintaining ● Checkpoint changes to configuration ● Checkpoint (commit) changes to routines ● Regular review of automation scripts ● Review resource utilization (nmon)

Monitoring ● Backups – Complete environment – Push to “off-site” media ● Automate processes to monitor: – Free disk space in file systems – Free disk space in database files – Replication processes – Performance monitoring tools (nmon) – Integrity checks

Expanding / Extending ● Having two (or more) host systems allows for uninterrupted operation of business while – Increasing storage capacity – Adding memory – Replacing/upgrading host

Recovering ● Regular and complete backups containing: – All of the application routines – Properly backed up data – All support scripts – All configuration files (xinetd, httpd) ● Alternate host available – Pre-built 'blank' environment – Consistent structure to allow load+go

Conclusion ● The Context ● Planning ● Building ● Maintaining ● Monitoring ● Expanding ● Extending ● Recovering