The Pros and Cons of Collecting Performance Data using Agentless Technology Dima Seliverstov John Tavares Tianxiang Zhang BMC Software, Inc.

Slides:



Advertisements
Similar presentations
What's a Proxy Printer Provider? PWG WIMS-CIM Working Group Rick Landau Dell, CTO Office 2008/08/08 v0.2.
Advertisements

Heroix Longitude - multiplatform, automated application performance monitoring and management software.
Welcome to Middleware Joseph Amrithraj
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Chapter 14 Web-Based Management 14-1 Chapter 14
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 24 Network Management: SNMP.
Chapter 7 HARDENING SERVERS.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
Introduction to Network Administration. Objectives.
1 Secure Information Sharing Manager (SIS-M) Thesis 2007 Stephen D. Wise
Security SIG: Introduction to Tripwire Chris Harwood John Ives.
Hands-On Microsoft Windows Server 2003 Administration Chapter 1 Windows Server 2003 Network Administration.
MCITP Guide to Microsoft Windows Server 2008 Server Administration (Exam #70-646) Chapter 14 Server and Network Monitoring.
Windows Management Instrumentation Tool (WMIT) Mike Lawson & Steve Wise CS526 Semester Project 12/08/03.
1 System support & Management Protocols Lesson 13 NETS2150/2850 School of Information Technologies.
SNMP & MIME Rizwan Rehman, CCS, DU. Basic tasks that fall under this category are: What is Network Management? Fault Management Dealing with problems.
Maintaining and Updating Windows Server 2008
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Guide to TCP/IP, Third Edition Chapter 11: Monitoring and Managing IP Networks.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
© 2010 VMware Inc. All rights reserved VMware ESX and ESXi Module 3.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
McGraw-Hill The McGraw-Hill Companies, Inc., 2000 SNMP Simple Network Management Protocol.
11 SYSTEMS ADMINISTRATION AND TERMINAL SERVICES Chapter 12.
1.  TCP/IP network management model: 1. Management station 2. Management agent 3. „Management information base 4. Network management protocol 2.
Emanuele Pasqualucci Extending AppManager Monitoring with the SNMP Toolkit.
Network Protocols UNIT IV – NETWORK MANAGEMENT FUNDAMENTALS.
Web Servers Web server software is a product that works with the operating system The server computer can run more than one software product such as .
Chapter 7: Using Windows Servers to Share Information.
Chapter 9: Novell NetWare
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
Module 7: Fundamentals of Administering Windows Server 2008.
1 Version 3.0 Module 11 TCP Application and Transport.
COMP1321 Digital Infrastructure Richard Henson February 2014.
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.1 Module 6 Introduction to Network Administration.
CCNA 4 Module 6 Introduction to network Administration.
1 Network Management: SNMP The roots of education are bitter, but the fruit is sweet. - Aristotle.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.
Business Data Communications, Fourth Edition Chapter 11: Network Management.
2.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 2: Examining.
Chapter 13: LAN Maintenance. Documentation Document your LAN so that you have a record of equipment location and configuration. Documentation should include.
CCNA4 v3 Module 6 v3 CCNA 4 Module 6 JEOPARDY K. Martin.
How to use mrtg to monitor traffic on your wireless and wired network a bella mia company.
Linux Operations and Administration
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Maintaining and Updating Windows Server 2008 Lesson 8.
COMP1321 Digital Infrastructure Richard Henson March 2016.
Chapter 27 Network Management Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
Simple Network Management Protocol
Overview – SOE Net-SNMP v5.7.2
Chapter 7: Using Windows Servers
Overview – SOE Net-SNMP v
Overview – SOE Net-SNMP v5.7.3
Overview – SOE PatchTT November 2015.
Overview – SOE PatchTT December 2013.
Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts.
How to use mrtg to monitor traffic on your wireless and wired network
Windows Server Administration Fundamentals
PLANNING A SECURE BASELINE INSTALLATION
APACHE WEB SERVER.
Chapter 14 Web-Based Management 14-1 Chapter 14
STATEL an easy way to transfer data
Presentation transcript:

The Pros and Cons of Collecting Performance Data using Agentless Technology Dima Seliverstov John Tavares Tianxiang Zhang BMC Software, Inc.

© Copyright BMC Software, Inc. Why Agentless › Installing and administrating agents is a pain –Agents have to be distributed across the enterprise –When agents break they have to be patched –Each agent you install has its own file system and network port requirements –Agents are not always built to network or security standards

© Copyright BMC Software, Inc. Blue Sky Model › Wouldn’t it be great if operating systems came with a standards based agent installed and configured for monitoring and capacity planning?

© Copyright BMC Software, Inc. Weather Report › Identify which operating systems come with performance collection installed › Identify the metrics available and how often to collect them › Network and security issue › Identify an alternate way of getting the system performance data without having to install an agent

© Copyright BMC Software, Inc. Overview of the Presentation › Agentless data collection is a powerful technology which has its advantages and disadvantages. –System performance metrics availability –Agentless monitoring components installed as part of the operating system –Security and network issue › Present our experience with Windows agentless technology

© Copyright BMC Software, Inc. Agentless Implementations Considered › SNMP (Simple Network Management Protocol) › WMI (Windows Management Interface) › Windows Remote Registry › WBEM (Web Based Enterprise Management) › Agentless monitoring by sending system commands over the network

© Copyright BMC Software, Inc. WBEM (Web Based Enterprise Management) Introduction › Developed by DMTF (Distributed Management Task Force) › Built on top of the Common Information Model (CIM) –Hierarchical object oriented representation of management information such as computer system, network devices and applications –Compiled textual representation known as MOF (Managed Object Format)

© Copyright BMC Software, Inc. WBEM Communication Mechanism › WBEM Client –Issues CIM Operation requests and receives and processes CIM Operation responses › WBEM Server –Uses CIMOM (CIM Object Manager) to communicate with clients –Receives and processes CIM Operation requests and issues CIM Operation responses –Uses CIM Repository as persistent store containing CIM data in a namespace –The root of the namespace is root\cimv2 › WBEM Provider –Process CIM Operations on one or more managed resources and maps the resource specific interface to a CIM interface

© Copyright BMC Software, Inc. WBEM Security › Windows implementation of WBEM –WMI (Windows Management Instrumentation) – Encryption and authentication on per call or a per packet basis › UNIX WBEM –Encryption and authentication support via public key certificates via https

© Copyright BMC Software, Inc. Windows Remote Registry › In addition to WMI, Microsoft provides a Remote Registry interface to getting system information from the performance registry remotely › Available since Windows NT › Unfortunately, there have been several security warning regarding the use of remote registry service › The protocol for the remote registry is RPC (Remote Procedures Call) and introduces challenges in terms of network connectivity and platform independent client tools

© Copyright BMC Software, Inc. WBEM Availability › Windows –WMI installed as part of the core operating system since Windows 2000 › Solaris –Solaris WBEM Services has been installed since Solaris 2.9 › HP-UX –HP WBEM Services has been installed since HPUX 11.0 › AIX –WBEM is supported for via the AIX 5L Expansion Pack and Web Download Pack for AIX 5.2 and higher › Linux –RedHat and SUSE support Open Pegasus package Linux install packages

© Copyright BMC Software, Inc. SNMP Overview › Standard primarily used for network management › SNMP stores elements in a Management Information Base (MIB ) –Extensible –MIB stores information in a tree format –Extended for system performance data RFC 2790 Host Resource MIB

© Copyright BMC Software, Inc. SNMP Communication Mechanism › Management information is maintained by the SNMP agent and queried by a SNMP manager › SNMP agent and the SNMP manager must have access to the Management Information Base › The SNMP agent and SNMP manager communicate via UDP (User Datagram Protocol) port 161 › The SNMP manager gets the data from the agent via the get-request and get-next-request

© Copyright BMC Software, Inc. SNMP Security › There are 3 major versions of SNMP –SNMP v1 Unencrypted traffic IP address-based access lists and community strings –SNMP v2 Encryption –SNMP v3 Encryption Authentication

© Copyright BMC Software, Inc. SNMP Agent Availability › Usually not installed as part of the operating system › Open source SNMP agent called net-snmp is available to gather the data for the Host Resource MIB › A Host Resource MIBs provides a limited set of data –The data availability will be shown in the slides to follow

© Copyright BMC Software, Inc. Metric Availability › Windows provides the best data set › UNIX WBEM implementations provide a good data set with a limited number of exceptions › SNMP provides a limited amount of performance configuration data and almost no statistical data

© Copyright BMC Software, Inc. CPU

© Copyright BMC Software, Inc. Memory

© Copyright BMC Software, Inc. Disk and File System

© Copyright BMC Software, Inc. Network

© Copyright BMC Software, Inc. Process

© Copyright BMC Software, Inc. UNIX Agentless Monitoring by Sending System Commands over the Network › Log in remotely to multiple agentless computers and collect the necessary performance metrics › Use Secure Shell –Supports certificate based encryption and authentication Metric TypeCommand CPUsar,uptime Memorysar, vmstat Processps I/Onetstat,iostat,vmstat,netstat,nfsstat Diskdf,iostat

© Copyright BMC Software, Inc. Downside the Approach › The commands vary from operating system to operating system › The output of the command must be parsed specifically for each operating system › Secure shell may not be installed on all computers of interest › Metrics are usually instantaneous and not cumulative and must be sampled frequently for a reliable system estimates

© Copyright BMC Software, Inc. Issues with Agentless Data Collection › Network Ports › Network Bandwidth › Data Sampling › Patching

© Copyright BMC Software, Inc. Network Ports › Windows WMI and Remote Registry use dynamic ports –This wide range of ports used, can play havoc with firewall rules InfrastructurePorts Used SNMP161 WMI Remote Registry 135,137,139, WBEM5988,5989

© Copyright BMC Software, Inc. Network Bandwidth › SNMP agents use considerably/exponentially less bandwidth then WBEM –WBEM uses an XML based protocol › If you lose network connectivity from the client to the agent-less server, you will lose data

© Copyright BMC Software, Inc. Network Bandwidth continued › No batch transfer –Data is collected through out the day –It’s not possible to schedule batch data transfer at a particular time when the network utilization is low › No summarization –Data is not summarized at the agentless computer –Every data point requested is transmitted over the network

© Copyright BMC Software, Inc. Data Sampling › Cumulative Counters and Instantaneous Gauges –Cumulative Counters need to be sampled less frequently because they represent the difference in a system between two points in time › WMI and WBEM provide many metrics that are cumulative › SNMP and sending system commands over the network approach will provide mostly instantaneous metrics › SNMP and some UNIX WBEM implementations CPU and Process Metrics are provided as an average over a 1 minute time interval › In general, to achieve good representation of system activity for capacity planning a sample rate should be 1 – 2 minutes for instantaneous values

© Copyright BMC Software, Inc. Patching agentless components › Isn’t the whole point of going to agentless data collection to avoid patching? › Agentless really means that someone already installed an agent for you › Agentless components do break and need to be patched › It can be challenging to identify and address a problem due to a variety of tools and debugging techniques for each platform

© Copyright BMC Software, Inc. Experience with Windows Agentless Technology › WMI requires 'Enable Account' and 'Remote Enable' permissions for the Root/CIMV2 for the WMI namespace › Configuring user accounts on individual computers can be challenging –Use domain administrator account –Use regular user domain account to configure agent-less computers with a regular user with 'Enable Account' and 'Remote Enable' permissions for the Root/CIMV2 for the WMI namespace You will need to create the permission on each individual computer › Windows WMI encountered frequent security events when running using a non-administrator user account on Windows 2003 machines › Network administrators were concerned about the constant network traffic during the day

© Copyright BMC Software, Inc. Final Thoughts › WBEM is extremely promising › Software vendors including Hewlett-Packard, IBM, Microsoft, RedHat and SUSE are beginning to roll out their products with WBEM support enabled › WBEM provides a common and secure framework for collecting system performance data › A strong development, open source community and a standards organization are supporting a variety of implementations for clients, servers and providers