Ready to Start Your Career?

Cloud+ Outline - Modules 7, 8 and 9

cdoyle 's profile image

By: cdoyle

April 21, 2017

cloud-3Module 7: Allocation and OptimizingUnit OverviewVM and Host Resource Allocation
  • Resources
  • Memory
  • CPU
  • Disk Space
  • Quotas
  • Quotas are the total amount of resources that a Vm can use
  • Hard – maximum amount of resources
  • Soft – allows a user to exceed maximum amount
  • Licensing
  • Allows an origination to use the software
  • Most expensive part of the install
  • The license agreement should be read
  • Reservations
  • A set aside of resources given to the customer of VM
  • VM will always get a set level of resources
  • Resource Pools
  • Resources set aside for a VM
  • Possible for the resources to be divided for specific groups
  • Provide organization
  • Dynamic Resource Allocation
  • Best performance
  • Availability
  • Capacity arrangements
  • Helps reduce power costs
Physical Resource Redirection
  • External modem
  • Handheld device
  • File on the host computer
  • Printers (parallel or serial ports)
  • Scanners
  • Dongles
  • USB device
Configuration Practices
  • Memory Ballooning
  • Memory is typically the limited factor
  • Ballooning allows the OS to exceed the limits loosely
  • Usually requires a third party software
  • Swap Disk Space
  • When all physical memory has been issued swap disk space can be used
  • Similar to page file but for VM
  • CPU
  • Typically VM are limited to how many cores a CPU has
  • Fast CPU allow for more request to be achieved
  • If VM or host is performing slow, too many processes might be running
  • Disk
  • Disk speeds can limit the VM
  • RAID can improve performance and allow for fault tolerance
Common Issues
  • Common Disk Failures
  • Physical Hard Disk Failures
  • Disk Corruption
  • HBA Fails (Host Bus Adapter)
  • Common Memory Failures
  • RAM failures
  • Swap Files out of space
  • Network Failures
  • NIC failures
  • Speed/Duplex mismatches
  • External devices fail
Common Performance Considerations
  • DISK
  • Caching
  • Network
  • Bandwidth
  • Latency
  • Quality of Service (QoS)
  • Multipathing
  • Load Balancing
 Unit SummaryDescribed VM and Host Resource AllocationDescribed Configuration Best PracticesDescribed Common IssuesDescribed Common Performance Concepts Module 8: Network Storage Types and ConfigurationUnit OverviewProtocols
  • Simple Network Management Protocol (SNMP)
  • Used to monitor devices for issues
  • Used primarily on routers, switches, printers and servers
  • Windows Management Instrumentation (WMI)
  • Give admin the ability to create scripts to automate tasks
  • Scripts can look at CPU, memory, OS and hard drive space performance
  • Out-of-band Management
  • Give admin ability to manage and monitor a device remotely even if device is off
  • Intelligent Platform Management Interface (IPMI) is needed
  • Not part of the OS but a third party software of part of the motherboard
  • BIOS can be modified
  • Short Message Service
  • Alerts can be sent to a mobile device after hours
  • Designed as a troubleshooting tool
  • Shows the computing resources being consumed by a device at that time
  • Allows an admin to compare to a previous point in time
  • Tipping point for a server
  • Point when a device is consuming more resources than needed
  • Compare to a baseline
Automated Event Responses
  • Automated responses monitor the events
  • When the threshold is triggered
  • The trigger or event causes a program or script to start
  • Can be caused by an alert
  • Allows the administrator to keep the system safe with little or no intervention
Remote Access Tools
  • Console Port
  • Connect directly to the PC with a cable
  • Uses parallel or serial ports
  • Allows for management of a host from another PC
  • Remote Desktop Protocol (RDP)
  • Remotely connects to a PC or VM as if the admin was at the PC
  • Allows for management
  • One sessions for one PC or VM
  • Remote Hypervisor Access
  • Connect to a hypervisor from your workstation
  • Add multiple hypervisors into a single console
  • Manage all hypervisor hosts from a single console
  • Create or modify VHDs, VM settings, etc. from a local workstation
  • Secure Shell (SSH)
  • Securely connect to a host
  • Creates a secure tunnel to a remote device
  • Allows an admin to remotely log into a host and execute commands
  • HTTP
  • Access devices via a web browser
  • Can use HTTP or HTTPS
  • Additional software needs to be loaded during host installation
Unit SummaryDescribed Resource Monitoring TechniquesDescribed Remote Access Tools Module 9: Management and TestingUnit OverviewPolicies and Procedures
  • Change Management
  • Maximizes the Value
  • Reduces Disruptions
  • Minimize Risk
  • Provides control for configuration management
  • Configuration Management
  • Improve performance
  • Optimizes cost and risk
  • Capacity Management
  • Gives the customers the best performance
  • Allows for justifiable cost
  • Gives justification for demands and performance
  • Life Cycle Management
  • Process or processes put in place by an organization to assist
  • Coordination
  • Control
  • Delivery
  • Support
  • Information Technology Infrastructure Library (ITIL)
  • Microsoft Operations Framework (MOF)
    • Documentation
    • Strategic Planning
    • Requirements (Business, Technical, SLAs)
    • Designs (Service Design Package)
    • Service Delivery (Incidents, Problems, COnfiguration Item Records)
    • Continual Service IMprovement Register
    • Standardization
    • Naming conventions
    • Configuration Options
    • Procedures
    • Baselines
    • Planning
    • Maintenance WIndows
    • Change Advisory Board (CAB) Approvals
 Testing Techniques
  • Testing the components
  • Network
  • Data
  • Applications
  • Storage
Security Testing
  • For legal reasons the organization should review the contract with the cloud provider
  • Before testing begins the organizations should inform the provider the plan to test
  • White box – the tester is given information about the system, designed for specific attacks
  • Black box – the tester knows very little about the system, simulate a real-world hacker
Roles and Responsibilities
  • Separation of duties
  • Checks and balances
  • Internal controls help reduce potential damage
  • A single administrator can cause issues if he has all the keys
  • ipconfig (Windows) / ifconfig (Linux)
  • nslookup (exit)
  • Netstat (what’s connected to the machine)
  • ARP (address resolution protocol)
  • Telnet (remote into a computer via command prompt – unsecure vs SSH)
  • Should be easy to understand
  • Record responsibilities
  • Record device configurations
  • Updated changes
  • Makes troubleshooting easier if issues arise
System Logs
  • Records events on PCs
  • Tracks device changes
  • Device drivers
  • System changes
  • Events
  • Some third party software allow the logs to be consolidated
Unit SummaryDescribed Policies and ProceduresDescribed Systems Management Best PracticesDescribed Testing TechniquesDescribed Troubleshooting and Tools
Schedule Demo
Build your Cybersecurity or IT Career
Accelerate in your role, earn new certifications, and develop cutting-edge skills using the fastest growing catalog in the industry