Ready to Start Your Career?

Cloud+ Outline - Modules 7, 8 and 9

cdoyle 's profile image

By: cdoyle

April 21, 2017

cloud-3Module 7: Allocation and OptimizingUnit OverviewVM and Host Resource Allocation
  • Resources
  • Memory
  • CPU
  • Disk Space
  • Quotas
  • Quotas are the total amount of resources that a Vm can use
  • Hard – maximum amount of resources
  • Soft – allows a user to exceed maximum amount
  • Licensing
  • Allows an origination to use the software
  • Most expensive part of the install
  • The license agreement should be read
  • Reservations
  • A set aside of resources given to the customer of VM
  • VM will always get a set level of resources
  • Resource Pools
  • Resources set aside for a VM
  • Possible for the resources to be divided for specific groups
  • Provide organization
  • Dynamic Resource Allocation
  • Best performance
  • Availability
  • Capacity arrangements
  • Helps reduce power costs
Physical Resource Redirection
  • External modem
  • Handheld device
  • File on the host computer
  • Printers (parallel or serial ports)
  • Scanners
  • Dongles
  • USB device
Configuration Practices
  • Memory Ballooning
  • Memory is typically the limited factor
  • Ballooning allows the OS to exceed the limits loosely
  • Usually requires a third party software
  • Swap Disk Space
  • When all physical memory has been issued swap disk space can be used
  • Similar to page file but for VM
  • CPU
  • Typically VM are limited to how many cores a CPU has
  • Fast CPU allow for more request to be achieved
  • If VM or host is performing slow, too many processes might be running
  • Disk
  • Disk speeds can limit the VM
  • RAID can improve performance and allow for fault tolerance
Common Issues
  • Common Disk Failures
  • Physical Hard Disk Failures
  • Disk Corruption
  • HBA Fails (Host Bus Adapter)
  • Common Memory Failures
  • RAM failures
  • Swap Files out of space
  • Network Failures
  • NIC failures
  • Speed/Duplex mismatches
  • External devices fail
Common Performance Considerations
  • DISK
  • Caching
  • Network
  • Bandwidth
  • Latency
  • Quality of Service (QoS)
  • Multipathing
  • Load Balancing
 Unit SummaryDescribed VM and Host Resource AllocationDescribed Configuration Best PracticesDescribed Common IssuesDescribed Common Performance Concepts Module 8: Network Storage Types and ConfigurationUnit OverviewProtocols
  • Simple Network Management Protocol (SNMP)
  • Used to monitor devices for issues
  • Used primarily on routers, switches, printers and servers
  • Windows Management Instrumentation (WMI)
  • Give admin the ability to create scripts to automate tasks
  • Scripts can look at CPU, memory, OS and hard drive space performance
  • Out-of-band Management
  • Give admin ability to manage and monitor a device remotely even if device is off
  • Intelligent Platform Management Interface (IPMI) is needed
  • Not part of the OS but a third party software of part of the motherboard
  • BIOS can be modified
  • Short Message Service
  • Alerts can be sent to a mobile device after hours
Baselines
  • Designed as a troubleshooting tool
  • Shows the computing resources being consumed by a device at that time
  • Allows an admin to compare to a previous point in time
Thresholds
  • Tipping point for a server
  • Point when a device is consuming more resources than needed
  • Compare to a baseline
Automated Event Responses
  • Automated responses monitor the events
  • When the threshold is triggered
  • The trigger or event causes a program or script to start
  • Can be caused by an alert
  • Allows the administrator to keep the system safe with little or no intervention
Remote Access Tools
  • Console Port
  • Connect directly to the PC with a cable
  • Uses parallel or serial ports
  • Allows for management of a host from another PC
  • Remote Desktop Protocol (RDP)
  • Remotely connects to a PC or VM as if the admin was at the PC
  • Allows for management
  • One sessions for one PC or VM
  • Remote Hypervisor Access
  • Connect to a hypervisor from your workstation
  • Add multiple hypervisors into a single console
  • Manage all hypervisor hosts from a single console
  • Create or modify VHDs, VM settings, etc. from a local workstation
  • Secure Shell (SSH)
  • Securely connect to a host
  • Creates a secure tunnel to a remote device
  • Allows an admin to remotely log into a host and execute commands
  • HTTP
  • Access devices via a web browser
  • Can use HTTP or HTTPS
  • Additional software needs to be loaded during host installation
Unit SummaryDescribed Resource Monitoring TechniquesDescribed Remote Access Tools Module 9: Management and TestingUnit OverviewPolicies and Procedures
  • Change Management
  • Maximizes the Value
  • Reduces Disruptions
  • Minimize Risk
  • Provides control for configuration management
  • Configuration Management
  • Improve performance
  • Optimizes cost and risk
  • Capacity Management
  • Gives the customers the best performance
  • Allows for justifiable cost
  • Gives justification for demands and performance
  • Life Cycle Management
  • Process or processes put in place by an organization to assist
Management
  • Coordination
  • Control
  • Delivery
  • Support
  • Information Technology Infrastructure Library (ITIL)
  • Microsoft Operations Framework (MOF)
    • Documentation
    • Strategic Planning
    • Requirements (Business, Technical, SLAs)
    • Designs (Service Design Package)
    • Service Delivery (Incidents, Problems, COnfiguration Item Records)
    • Continual Service IMprovement Register
    • Standardization
    • Naming conventions
    • Configuration Options
    • Procedures
    • Baselines
    • Planning
    • Maintenance WIndows
    • Change Advisory Board (CAB) Approvals
 Testing Techniques
  • Testing the components
  • Network
  • Data
  • Applications
  • Storage
Security Testing
  • For legal reasons the organization should review the contract with the cloud provider
  • Before testing begins the organizations should inform the provider the plan to test
  • White box – the tester is given information about the system, designed for specific attacks
  • Black box – the tester knows very little about the system, simulate a real-world hacker
Roles and Responsibilities
  • Separation of duties
  • Checks and balances
  • Internal controls help reduce potential damage
  • A single administrator can cause issues if he has all the keys
Tools
  • ipconfig (Windows) / ifconfig (Linux)
  • nslookup (exit)
  • Netstat (what’s connected to the machine)
  • ARP (address resolution protocol)
  • Telnet (remote into a computer via command prompt – unsecure vs SSH)
Documentation
  • Should be easy to understand
  • Record responsibilities
  • Record device configurations
  • Updated changes
  • Makes troubleshooting easier if issues arise
System Logs
  • Records events on PCs
  • Tracks device changes
  • Device drivers
  • System changes
  • Events
  • Some third party software allow the logs to be consolidated
Unit SummaryDescribed Policies and ProceduresDescribed Systems Management Best PracticesDescribed Testing TechniquesDescribed Troubleshooting and Tools
Schedule Demo