You are on page 1of 386

Remote IT Infrastructure Operations

and Management
Introduction of candidates

October 19, 2018 2


Logistics

October 19, 2018 3


The cone of learning

October 19, 2018 4


Mentality

October 19, 2018 5


Expectation

October 19, 2018 6


Road map

a. Overview of Passive •Energy i.e. Power/Electrical Equipment, Generator, UPS, Battery


•Rack, Area or Architecture, Cooling, Fire Protection, Safety i.e. CCTV, Access Control
IT Infrastructure •Documentation

b. Overview of Passive •Telecom Equipment


•Specification, Requirement
IT Infrastructure •Documentation

•Hardware
c. Overview of Systems •Application of Operating System, Utility System Software
•Documentation

•IT Infrastructure
d. Troubleshooting •Network
•Operating System, Utility System Software

•IT Standard Operating Procedure (SOP)


e. Process & Procedure •Reporting
•Communication

October 19, 2018 7


Attitude

October 19, 2018 8


Day-01
Information Technology Infrastructure

October 19, 2018 10


Remote infrastructure management (RIM)
Remote infrastructure management (RIM) is the process of monitoring and
managing IT infrastructure (datacenter, networks, email, devices, storage, ERP, OS,
security, servers, support, database, applications, telephony, and services) from a
remote location with the ability to perform remedial actions to enable continuous
availability. With RIM, an administrator needs to make on-site repairs only when
hardware fails.

October 19, 2018 11


Why remote infrastructure management?
Centralized IT infrastructure management offers greater coordination and ease of
maintenance, and helps make IT as an enabler of innovation. Benefits include cost
savings, improved availability, reduced risk, and increased productivity, flexibility,
and efficiency. Outsourcing RIM processes to remote infrastructure management
providers lets enterprises concentrate on core business and meet growing
business requirements without inflating the IT budget.

Remote infrastructure management (RIM) is the remote management of


information technology (IT) infrastructure. This can include the management of
computer hardware and software, such as workstations (desktops, laptops,
notebooks, etc.), servers, network devices, storage devices, IT security devices, etc.
of a company.

October 19, 2018 12


Energy/Power
Power from source to destination

October 19, 2018 14


In the Building, Redundancy options

October 19, 2018 15


Function of the ATS - Automatic Transfer Switch

October 19, 2018 16


Function of the STS - Static Transfer Switch

October 19, 2018 17


Three phase power cabling

October 19, 2018 18


Three phase / single phase usage

October 19, 2018 19


Proper power cable routing

October 19, 2018 20


Rack power distribution – dual feed

October 19, 2018 21


Dual power sources

October 19, 2018 22


Dual power sources (contd.)

October 19, 2018 23


Low availability

October 19, 2018 24


Slightly better availability

October 19, 2018 25


Improved availability

October 19, 2018 26


High-availability (example A)

October 19, 2018 27


High-availability (example B)

October 19, 2018 28


Cabling or busbar trunking

October 19, 2018 29


Cabling or busbar trunking (contd.)

October 19, 2018 30


Cabling or busbar trunking (contd.)

October 19, 2018 31


Cabling or busbar trunking (contd.)

October 19, 2018 32


Cable distribution methods

October 19, 2018 33


Grounding in the data centre

October 19, 2018 34


Grounding in the data centre (contd.)

October 19, 2018 35


Grounding in the data centre (contd.)

October 19, 2018 36


CMN – Common mode noise

October 19, 2018 37


CMN – Common mode noise (contd.)

October 19, 2018 38


Time for a break

October 19, 2018 39


Generator sets
Generator sets

October 19, 2018 41


Generator sets (contd.)

October 19, 2018 42


UPS
UPS – uninterrupted power supply technology

October 19, 2018 44


Battery
Main battery technology for ups

October 19, 2018 46


Flooded cells

October 19, 2018 47


SLA / VRLA

October 19, 2018 48


SLA / VRLA (contd.)

October 19, 2018 49


Nickel cadmium

October 19, 2018 50


Thermographic Scanning
Thermographic scanning

October 19, 2018 52


Thermo graphic scanning (contd.)

October 19, 2018 53


Electromagnetic Field
Electromagnetic spectrum

October 19, 2018 55


Electric and magnetic fields

October 19, 2018 56


Electric and magnetic fields (contd.)

October 19, 2018 57


What causes EMF ?

October 19, 2018 58


What causes EMF ? (contd.)

October 19, 2018 59


What causes EMF ? (contd.)

October 19, 2018 60


EMF – effects on integrated circuits

October 19, 2018 61


Rack / Cabinet
Type of rack and standards

October 19, 2018 63


Security system of rack

October 19, 2018 64


Power connectivity of rack

October 19, 2018 65


Power connectivity of rack

October 19, 2018 66


Additional consideration

October 19, 2018 67


Q. & A.
Review Day-01
Day-02
Mechanical/Cooling
Data centre cooling

October 19, 2018 72


Recommended Temperature/Humidity

October 19, 2018 73


Cooling capacity

October 19, 2018 74


Sensible or latent heat

October 19, 2018 75


Cooling Systems

October 19, 2018 76


Cooling Systems (contd.)

October 19, 2018 77


Basic principle of Air Conditioning

October 19, 2018 78


Air-Conditioning: Air-cooled, Self-Contained

October 19, 2018 79


Air-Conditioning: Air-cooled, Split System (DX)

October 19, 2018 80


Air-Conditioning: Fluid-Cooled (Glycol)

October 19, 2018 81


Air-Conditioning: Water Cooled

October 19, 2018 82


Air-Conditioning: Chilled Water

October 19, 2018 83


Top flow or down flow

October 19, 2018 84


Principle of Raised Floor Design

October 19, 2018 85


Principle of Raised Floor Design (contd.)

October 19, 2018 86


Hot and cold – aisle setup

October 19, 2018 87


Hot and cold – aisle setup with suspended ceiling

October 19, 2018 88


Air conditioning positioning

October 19, 2018 89


Placement of equipment in rack

October 19, 2018 90


Non-raised floor cooling options: Overhead Duct

October 19, 2018 91


High density cooling: Air duct fan

October 19, 2018 92


Hot aisle or cold aisle containment

October 19, 2018 93


Hot aisle vs cold aisle containment (contd.)

October 19, 2018 94


Hot aisle vs cold aisle containment (contd.)

October 19, 2018 95


Cold aisle containment

October 19, 2018 96


Time for a break

October 19, 2018 97


Fire protection & safety
Fire protection and safety

October 19, 2018 99


Requirements for Data Centre fire suppression

October 19, 2018 100


Standards

October 19, 2018 101


Fire Detection systems

October 19, 2018 102


Fire Detection systems (contd.)

October 19, 2018 103


Fire Detection systems (contd.)

October 19, 2018 104


Fire Detection systems (contd.)

October 19, 2018 105


Fire Detection systems (contd.)

October 19, 2018 106


Fire Detection systems (contd.)

October 19, 2018 107


Fire Detection systems (contd.)

October 19, 2018 108


Fire Detection systems (contd.)

October 19, 2018 109


Fire Detection systems (contd.)

October 19, 2018 110


Best practices for fire suppression systems

October 19, 2018 111


Handheld extinguishers

October 19, 2018 112


Handheld extinguishers (contd.)

October 19, 2018 113


Signage and safety

October 19, 2018 114


Regulatory requirements / Best practice

October 19, 2018 115


Security & Safety
Physical Security

October 19, 2018 117


Door / Access Controls

October 19, 2018 118


Security within the Data Centre

October 19, 2018 119


Fire safety

October 19, 2018 120


Essential signage

October 19, 2018 121


Documentation
Documentation

October 19, 2018 123


Documentation (contd.)

October 19, 2018 124


Q. & A.
Review on Course Module- a
Day- 01 & 02
Road Map

a. Overview of Passive •Energy i.e. Power/Electrical Equipment, Generator, UPS, Battery


•Rack, Area or Architecture, Cooling, Fire Protection, Safety i.e. CCTV, Access Control
IT Infrastructure •Documentation

b. Overview of Passive •Telecom Equipment


•Specification, Requirement
IT Infrastructure •Documentation

•Hardware
c. Overview of Systems •Application of Operating System, Utility System Software
•Documentation

•IT Infrastructure
d. Troubleshooting •Network
•Operating System, Utility System Software

•IT Standard Operating Procedure (SOP)


e. Process & Procedure •Reporting
•Communication

October 19, 2018 127


Agenda on Course Module – c & d

• Utility System Software and Application - VMware


Workstation

• Operating System – Linux CentOS v6.10 and v7.5.1804


Overview of Systems
and Troubleshooting • NMS – CactiEZ v0.7, Applications Manager, Smoke Ping,
Nagios Core

• Install, Configure and Troubleshooting

Lab Based Session from Day-03 to 08

October 19, 2018 128


Day- 03
VMware Workstation v.14
Installation Procedure
Virtualization: An Introduction

Server virtualization enables multiple operating systems to run on a single physical server as
highly efficient virtual machines. Key benefits include: Greater IT efficiencies. Reduced
operating costs.

• Virtualization refers to a concept in which access to a single server, is coordinated so that


multiple guest(client) operating systems can share that server

• No guest(client) operating system being aware that it is actually sharing anything at all

• Creating a virtual environment for any program to run on an existing platform as a guest

• The virtual environment running might be an Operating System, Storage device, Network
or an Application server among other things
Virtualization Business Benefits
Virtualization Architecture
Virtualization Architecture
Host machine or host computer:
• The computer on which the virtual machine software is installed (Virtual PC or VMWare, e.g.)

Virtual machine (VM) or Guest OS:


• Similar to physical machines. Have CPU, RAM, Hard disk, NIC etc.
• The operating system that runs in virtual machine software on the host computer
• Comprised primarily of a configuration file and one or more virtual hard drive files

Virtual disk:
• One or more files that reside on the host computer that make up the VM‟s hard disk

Virtual network:
• The network configuration used by the VM
• Options include: bridged, host only, NAT and none
• VMs behave like just another computer on the network

Snapshot:
• A partial copy of a VM at a particular moment in time. Allows you to „go back‟ to the VM at that
particular state.
• Some programs allow saving multiple snapshots
Installation Steps
Installation steps (contd.)

Select “Next”
Installation steps (contd.)

Select & Click on “Next”


Installation steps (contd.)

Select “Next”
Installation steps (contd.)

Select “Next”
Installation steps (contd.)

Select “Next”

Select both
Installation steps (contd.)

Select “Next”
Installation steps (contd.)

Progress status
Installation steps (contd.)

Select “License”
Installation steps (contd.)

Enter license Key

Select “Next”
Installation steps (contd.)

Select “Finish”
Installation steps (contd.)

Select “Yes”
Q. & A. Session
Virtual Machine
Creation Procedure
Create Virtual Machine

Select “New Virtual


Machine”
Create Virtual Machine (contd.)

Select “Next”

Select “Custom”
Create Virtual Machine (contd.)

Select “ESXi 6.5”


Create Virtual Machine (contd.)

Select
Create Virtual Machine (contd.)

Select “Guest OS”

Select “OS Version”


Create Virtual Machine (contd.)

Select “VM Name”

Select “VM Store


Location”
Create Virtual Machine (contd.)

Select “Processor No and


No of Core Per
Processor”
Create Virtual Machine (contd.)

Select “Amount of
Memory of VM”
Create Virtual Machine (contd.)
Select “Network
Type”
Create Virtual Machine (contd.)

Select “I/O Controller


Type”
Create Virtual Machine (contd.)

Select “Disk Type”


Create Virtual Machine (contd.)
Select “New Virtual Disk”
Create Virtual Machine (contd.)
Specify “Disk Size
(GB)”

Select “Single File for


Store VD”
Create Virtual Machine (contd.)

Specify “Disk File


Name”
Create Virtual Machine (contd.)

Select “Customize
Hardware”
Create Virtual Machine (contd.)

Put you ISO file


location
Create Virtual Machine (contd.)

Select required
ISO file
Create Virtual Machine (contd.)

Click on “Advanced”
Create Virtual Machine (contd.)

Select “Legacy
Emulation”
Q. & A. Session
Operating System
Linux – CentOS EL. v7 / v6
Installation Procedure
Operating System Installation Steps
Operating System Installation Steps (contd.)
Operating System Installation Steps (contd.)
Operating System Installation Steps (contd.)
Operating System Installation Steps (contd.)
Operating System Installation Steps (contd.)
Operating System Installation Steps (contd.)
Operating System Installation Steps (contd.)
Operating System Installation Steps (contd.)
Operating System Installation Steps (contd.)
Operating System Installation Steps (contd.)
Operating System Installation Steps (contd.)
Operating System Installation Steps (contd.)
Operating System Installation Steps (contd.)
Operating System Installation Steps (contd.)
Operating System Installation Steps (contd.)
Operating System Installation Steps (contd.)
Operating System Installation Steps (contd.)
Operating System Installation Steps (contd.)
Operating System Installation Steps (contd.)
Operating System Installation Steps (contd.)
Operating System Installation Steps (contd.)
Operating System Installation Steps (contd.)
Operating System Installation Steps (contd.)
Operating System Installation Steps (contd.)
Operating System Installation Steps (contd.)
Operating System Installation Steps (contd.)
Operating System Installation Steps (contd.)
Operating System Installation Steps (contd.)
Operating System Installation Steps (contd.)
Operating System Installation Steps (contd.)
Operating System Installation Steps (contd.)
Operating System Installation Steps (contd.)
Operating System Installation Steps (contd.)
Q. & A. Session
VMware Tools Install Process in Linux
VMware Tools Install Steps
VMware Tools Install Steps (contd.)
VMware Tools Install Steps (contd.)
VMware Tools Install Steps (contd.)
VMware Tools Install Steps (contd.)
VMware Tools Install Steps (contd.)
VMware Tools Install Steps (contd.)
VMware Tools Install Steps (contd.)
VMware Tools Install Steps (contd.)
VMware Tools Install Steps (contd.)
VMware Tools Install Steps (contd.)
VMware Tools Install Steps (contd.)
VMware Tools Install Steps (contd.)
VMware Tools Install Steps (contd.)
Q. & A. Session
Virtual Network & Settings
VMnet0 – Bridge Networking

Bridged networking connects a virtual machine to a network by using the host computer’s network adapter. If
your host computer is on an Ethernet network, this is often the easiest way to give your virtual machine access
to that network. The virtual network adapter in the virtual machine connects to the physical network adapter
in your host computer, allowing it to connect to the LAN used by the host computer. Bridged networking makes
the virtual machine visible to other computers on the network, and they can communicate directly with the
virtual machine.
VMnet1 – Host-only Networking

Host-only networking creates a network that is completely contained within the host computer. Host-only
networking provides a network connection between the virtual machine and the host computer, using a host
network adapter that is visible to the host operating system. This approach can be useful if you need to set up
an isolated virtual network.
VMnet8 – NAT (Network Address Translation)

NAT gives a virtual machine access to network resources by using the host computer’s IP address. If you are not
able to give your virtual machine an IP address on the external network, you might find that NAT is the easiest
way to give your virtual machine access to the Internet or other TCP/IP network. NAT uses the host computer’s
dial-up networking or broadband connection.
Network Adapters in Windows 10
Virtual Network Settings Steps (contd.)

Select “Virtual
Network Editor”
Virtual Network Settings Steps (contd.)

Click here
To customize the
virtual network
settings
Virtual Network Settings Steps (contd.)

Select the
network interface
for bridging
Virtual Network Settings Steps (contd.)
Virtual Network Settings Steps (contd.)

Go to DHCP
settings to
customize
Virtual Network Settings Steps (contd.)
Virtual Network Settings Steps (contd.)

Click here for


settings NAT
Virtual Network Settings Steps (contd.)
Q. & A. Session
Thank you for your attention
To be continued
Day- 04
An Introduction of Linux
Operating System
History of UNIX operating system

The history of UNIX starts back in 1969,


when Ken Thompson, Dennis Ritchie
and others started working on the
"little-used PDP-7 in a corner" at AT&T’s
Bell Labs and what was to become UNIX.

Dennis Ritchie
History of UNIX operating system (contd.)

First edition of UNIX released 11/03/1971. The first edition of the "Unix
PROGRAMMER'S MANUAL [by] K. Thompson [and] D. M. Ritchie." It
includes over 60 commands like:

• b (compile B program)
• boot (reboot system)
• cat (concatenate files)
• chdir (change working directory)
• Chmod (change access mode)
• chown (change owner)
• cp (copy file)
• ls (list directory contents)
• mv (move or rename file)
• wc (get word count)
• who (who is one the system)
History of UNIX operating system (contd.)

Year History
1972 Second edition of UNIX released December 06, 1972.
1972 Ritchie rewrote B and called the new language C.
1973 Third edition of UNIX released February 1973
1974 It was rewritten in C. Forth edition of UNIX released November
1973
1975 Fifth edition of UNIX released June 1974
1976 Sixth edition of UNIX released May 1975
1976 Bourne shell is introduced begins being added onto.
1979 Seventh edition of UNIX released 1979
1980 1BSD released late
1983 AT&T releases its first version of System V.
History of UNIX operating system (contd.)

Seventh Edition UNIX


(1979)

System-V
BSD (1980)
(1983)

• Solaris (SUN)
• SUN OS 4.0 (SUN)
• AIX (IBM)
• ULTRA IX (DEC)
• IRIX (SGI)
• FreeBSD (Open Source)
• HP-UX (HP)
• NetBSD (Open Source)
• Digital UNIX (DEC)
• OpenBSD (Open Source)
• SCO UNIX (SCO)
History of UNIX operating system (contd.)

Year History
1983 The GNU project is first announced by Richard Stallman.
1985 Eighth edition of UNIX released February 1985
1986 HP-UX 1.0 released.
1986 Ninth edition of UNIX released September 1986
1987 Sun and AT&T lay the groundwork for business computing
1987 Unix clone operating system MINIX by Andrew Tanenbaum
1989 Tenth edition of UNIX released October 1989
1990 AIX was first entered into the market by IBM February 1990.
Free Software Foundation (FSF)

In 1983 Richard Stallman's Free Software


Foundation (FSF) began the GNU project, a
project to create a free version of the Unix
operating system. By free, Stallman meant
software that could be freely used, read,
modified, and redistributed. The FSF
successfully built a vast number of useful
components, including a C compiler (gcc), an
impressive text editor (emacs), and a host of
fundamental tools. However, in the 1990's the
FSF was having trouble developing the
operating system kernel; without a kernel their Richard Stallman
dream of a completely free operating system
would not be realized.
GNU - Project

Year History
1983 The GNU project is first announced by Richard Stallman.
GNU – Project (contd.)

GNU
Nobody should be restricted by the software they use. There are four
freedoms that every user should have:

• The freedom to run the program


• The freedom to study and change the program in source code form
• The freedom to redistribute exact copies
• The freedom to distribute modified versions

When a program offers users all of these freedoms, we call it free software.

www.gnu.org
Linus and Linux

In 1991 Linus Torvalds began


developing an operating system
kernel, which he named ``Linux''. This
kernel could be combined with the free
software advocacy material and other
components (in particular some of the
BSD components and MIT's X-
windows software) to produce a freely-
modifiable and very useful operating
system. This book will term the kernel
itself the ``Linux kernel'' and an entire
combination as ``Linux''. Note that
many use the term ``GNU/Linux'' Linus Torvalds
instead for this combination.
History of Linux

Year History
1994 Red Hat Linux is introduced.
1994 Caldera, Inc was founded in 1994 by
Ransom H Love and Bryan Sparks.
1996 KDE is started to be developed by
Matthias Ettrich Ransom H Love Bryan Sparks

2001 Linus Torvalds releases version 2.4 of


the Linux Kernel source code
2004 The first release of Ubuntu is
released October 20, 2004.

Matthias Ettrich
Linux distribution
CentOS Overview

Unique among business class Linux distributions, CentOS stays true to the open-source nature that Linux
was founded on. The first Linux kernel was developed by a college student at the University of Helsinki
(Linus Torvalds) and combined with the GNU utilities founded and promoted by Richard Stallman. CentOS
has a proven, open-source licensing that can power today’s business world.

CentOS has quickly become one of the most prolific server platforms in the world. Any Linux
Administrator, when seeking employment, is bound to come across the words: “CentOS Linux Experience
Preferred”. From startups to Fortune 10 tech titans, CentOS has placed itself amongst the higher echelons
of server operating systems worldwide.

What makes CentOS stand out from other Linux distributions is a great combination of −

• Open source licensing

• Dedicated user-base of Linux professionals

• Good hardware support

• Rock-solid stability and reliability

• Focus on security and updates

• Strict adherence to software packaging standards needed in a corporate environment


CentOS Overview (contd.)

Before starting the lessons, we assume that the readers have a basic knowledge of Linux and
Administration fundamentals such as −

• What is the root use?

• The power of the root user

• Basic concept of security groups and users

• Experience using a Linux terminal emulator

• Fundamental networking concepts

• Fundamental understanding of interpreted programming languages (Perl, Python, Ruby)

• Networking protocols such as HTTP, LDAP, FTP, IMAP, SMTP

• Cores that compose a computer operating system: file system, drivers, and the kernel
Linux operating system

Linux System Architecture is consists of following


layers

Hardware layer - Hardware consists of all


peripheral devices (RAM/ HDD/ CPU etc).

Kernel - Core component of Operating System,


interacts directly with hardware, provides low level
services to upper layer components.

Shell - An interface to kernel, hiding complexity of


kernel's functions from users. Takes commands
from user and executes kernel's functions.

Utilities - Utility programs giving user most of the


functionalities of an operating systems.
Linux operating system (contd.)
Linux boot process
Linux boot process
Linux directory structure
Linux directory and files
Linux commands
Linux file or directory permission
Vim / vi editor
Basic commands
Basic configuration (contd.)
Lab based sessions
LAB:

Login in CentOS Linux


• User id: root
• Create new user and set password
• Log out from root and login with new user id

Familiar with directory structure and file systems

Using essential commands


• man, ls, cd, mv, mkdir, rmdir, rm, locate, tail, df, ps, tar, su, chmod, useradd,
groupadd, chkconfig, service

Practice with vi editor


• File create, edit, save and close, close without save, search, replace

Check basic configuration based on slide-132


• ENTRY => Host name, DNS information, Gateway IP, Interface card
• Check Interface card status
Lab based sessions
LAB:

Set Date, Time and Timezone in Linux - CentOS:

• cat /etc/sysconfig/clock
• cat /etc/localtime
• rm /etc/localtime
• ln -s /usr/share/zoneinfo/Asia/Dhaka /etc/localtime
• date MMDDhhmmYYYY.seconds
• date 092107362016.15
• hwclock --systohc
• date
• Hwclock
Lab based sessions
LAB:

Check nologin user:

• more /etc/passwd | grep nologin

Set nologin user:

• usermod -s /sbin/nologin cactiuser


• usermod -s /sbin/nologin nagios
Q. & A. Session
Install CactiEZ/Cacti
Cacti – Graphing Tools

Cacti is a complete frontend to RRDTool, it stores all of the necessary information


to create graphs and populate them with data in a MySQL database. The frontend
is completely PHP driven. Along with being able to maintain Graphs, Data
Sources, and Round Robin Archives in a database, cacti handles the data
gathering. There is also SNMP support for those used to creating traffic graphs
with MRTG.
Cacti – Graphing Tools (contd.)

Data Sources:
To handle data gathering, you can feed cacti the paths to any external
script/command along with any data that the user will need to "fill in", cacti will
then gather this data in a cron-job and populate a MySQL database/the round
robin archives.

Data Sources can also be created, which correspond to actual data on the graph.
For instance, if a user would want to graph the ping times to a host, you could
create a data source utilizing a script that pings a host and returns it's value in
milliseconds. After defining options for RRDTool such as how to store the data
you will be able to define any additional information that the data input source
requires, such as a host to ping in this case. Once a data source is created, it is
automatically maintained at 5 minute intervals.
Cacti – Graphing Tools (contd.)

Graphs:
Once one or more data sources are defined, an RRDTool graph can be created
using the data. Cacti allows you to create almost any imaginable RRDTool graph
using all of the standard RRDTool graph types and consolidation functions. A
color selection area and automatic text padding function also aid in the creation of
graphs to make the process easier.

Not only can you create RRDTool based graphs in cacti, but there are many ways
to display them. Along with a standard "list view" and a "preview mode", which
resembles the RRDTool frontend 14all, there is a "tree view", which allows you to
put graphs onto a hierarchical tree for organizational purposes.
Cacti – Graphing Tools (contd.)

User Management:
Due to the many functions of cacti, a user based management tool is built in so
you can add users and give them rights to certain areas of cacti. This would allow
someone to create some users that can change graph parameters, while others
can only view graphs. Each user also maintains their own settings when it comes
to viewing graphs.

Templating:
Lastly, cacti is able to scale to a large number of data sources and graphs
through the use of templates. This allows the creation of a single graph or data
source template which defines any graph or data source associated with it. Host
templates enable you to define the capabilities of a host so cacti can poll it for
information upon the addition of a new host
CactiEZ – Install Procedure
CactiEZ – Install Procedure (contd.)
CactiEZ – Install Procedure (contd.)
CactiEZ – Install Procedure (contd.)
CactiEZ – Install Procedure (contd.)
CactiEZ – Install Procedure (contd.)
CactiEZ – Install Procedure (contd.)
CactiEZ – Install Procedure (contd.)
CactiEZ – Install Procedure (contd.)
CactiEZ – Install Procedure (contd.)
CactiEZ – Install Procedure (contd.)
CactiEZ – Install Procedure (contd.)
CactiEZ – Install Procedure (contd.)
CactiEZ – Install Procedure (contd.)
CactiEZ – Install Procedure (contd.)
CactiEZ – Feature Settings (contd.)
CactiEZ – Feature Settings (contd.)
CactiEZ – Feature Settings (contd.)
CactiEZ – Feature Settings (contd.)
CactiEZ – Feature Settings (contd.)
CactiEZ – Feature Settings (contd.)
CactiEZ – Feature Settings (contd.)
CactiEZ – Feature Settings (contd.)
CactiEZ – Feature Settings (contd.)
CactiEZ – Graph of Local Host
CactiEZ – Install VMware Tools

Follow slide 79 to 93 to install VMware Tools in CactiEZ


Cacti - Console
Cacti - Device Add
Cacti - Device Add (contd.)
Cacti - Device Add (contd.)
Cacti - Graph Add
Cacti - Graph Add (contd.)
Cacti - Graph Management
Cacti - Graph Management (contd.)
Cacti - Data Source
Cacti - Data Source (contd.)
Cacti - Data Source (contd.)
Cacti - Graph Tree
Cacti - Graph Tree (contd.)
Cacti - Graph Tree (contd.)
Cacti - User Management
Cacti - User Management (contd.)
Cacti - User Management (contd.)
Cacti - User Management (contd.)
Cacti - User Management (contd.)
Cacti - Graph Output (Tree View)
Q. & A. Session
Day- 05
ManageEngine
Applications Manager
Working Steps
VMware Workstation
• Configure virtual machine Follow slide
• Configure network in bridge mode 96 – 108

Operating System – Linux


• Install CentOS 32bit linux Follow slide
• Install VMware tools in CentOS
• Configure network to reach Internet 44 – 94
• Configure network in bridge mode for SNMP data pooling

OS Preparation
• Package update by yum tools Follow slide
• Install Java, Jre., Net-snmp etc.
• Stop iptables process and flash iptables existing rules
195 – 196
• Disable SE Linux

Mount Pen Drive


• Format pen drive in FAT32 format Follow slide
• Copy “AppsMan-Installer.tar.gz” file in pen drive
• Mount pen drive in CentOS
197 – 198
Working Steps (contd.)

Application Manager 9
• Install Application Manager
• Modify /etc/rc.local file Follow slide
• Start Application Manager process 199 – 214
• Login through browser

Administrative Tasks
• Add monitoring nodes
• Create Monitor Group Follow slide
• Create Monitor & Add in Monitor Group
• Manage Dashboard
215 – 230
• Alarm Notification Settings
• Shutdown Process
OS Preparation (Package Update)
OS Preparation (Java, Jre. & Net-SNMP Install)
OS Preparation (contd.)
Pen Drive Format in Windows

Pen drive
format in
Windows
Pen Drive Mount in CentOS
Application Manager 9 Install Steps
Application Manager 9 Install Steps
Application Manager 9 Install Steps
Application Manager 9 Install Steps
Application Manager 9 Install Steps
Application Manager 9 Install Steps
Application Manager 9 Install Steps
File Modification (/etc/rc.local)
Application Manager 9 (Process Startup)

Note:
nohup is a POSIX command to ignore the HUP (hangup) signal. The HUP
signal is, by convention, the way a terminal warns dependent processes of
logout. Output that would normally go to the terminal goes to a file called
nohup.out if it has not already been redirected.
Application Manager 9 (Process Startup – contd.)
Application Manager 9 (Process Startup – contd.)
Applications Manager – Login Interface

• Url: http://ipaddress of CentOS:9090

• Username: admin
• Password: admin
Applications Manager – Getting Started
Applications Manager – Create Monitor Group
Applications Manager – Monitor Group (NOC)
Applications Manager – Select Monitor Type
Applications Manager – Add Monitor
Applications Manager – Monitor Add Successfully
Applications Manager – Monitor Dashboard
Applications Manager – Dashboard (contd.)
Applications Manager – Dashboard (contd.)
Applications Manager – Dashboard (contd.)
Applications Manager – Dashboard (contd.)
Applications Manager – Dashboard (contd.)
Applications Manager – Administrative Interface
Applications Manager – Notification Settings
Applications Manager – Notification Settings (contd.)
Applications Manager – Shutdown
Applications Manager – Shutdown (contd.)
Q. & A. Session
Day- 06 and 07
SmokePing
Latency Measuring Tool
About - SmokePing
Working Steps
VMware Workstation
• Configure virtual machine Follow slide
• Configure network in NAT mode 96 – 108

Operating System – Linux


• Install CentOS 64bit linux Follow slide
• Install VMware tools in CentOS 44 – 94
• Configure network to reach Internet

OS Preparation
• Package update by yum tools
• Install EPL repository Follow slide
• Install prerequisites 360 – 362
• Stop iptables process and flash iptables existing rules
• Disable SE Linux

Smokeping Install Steps


• Download tar file smokeping-2.6.11.tar.gz Follow slide
• Modify required files 363 - 369
• Debug & Start process
• Login through browser
SmokePing – OS Preparation
SmokePing – OS Preparation (contd.)
SmokePing – OS Preparation (contd.)
SmokePing – Install
SmokePing – Install (contd.)
SmokePing – Install (contd.)
SmokePing – Install (contd.)
SmokePing – Install (contd.)
SmokePing – Install (contd.)
SmokePing – Install (contd.)
Q. & A. Session
Day- 08 and 09
Nagios Core
About – Nagios Core
Working Steps
VMware Workstation
• Configure virtual machine Follow slide
• Configure network in Bridge mode 96 – 108

Operating System – Linux


• Install CentOS 64bit linux Follow slide
• Install VMware tools in CentOS 44 – 94
• Configure network to reach Internet

OS Preparation
• Package update by yum tools
• Install prerequisites Follow slide
• Stop iptables process and flash iptables existing rules
376 & 363
• Disable SE Linux

Nagios Core Install Steps


• Download tar file
• nagios-4.4.2.tar.gz
• nagios-plugins-2.2.1.tar.gz Follow slide
• Modify required files 363 - 369
• Verify & Start process
• Login through browser
Nagios Core – OS Preparation
Nagios Core – Install
Nagios Core – Install (contd.)
Nagios Core – Install (contd.)
Nagios Core – Install (contd.)
Nagios Core – Install (contd.)
Q. & A. Session
Day- 10
IT Standard Operating Procedure
About – IT Standard Operating Procedure
Thank you for your attention

You might also like