January 20-22, 2012, Hilton Los Angeles Airport Hotel

Intermediate

Jorge Castro, Clint Byrum

juju Charm School

Additional Speakers: 

juju Charm School is an event where a juju expert is available to answer questions about writing your own juju charms. The intended audience are people who deploy software and want to contribute charms to the wider devops community to make deploying in the public and private cloud easy. Though not required, we recommend that you have juju installed and configured if you want to get deep into the event.

Attendees are more than welcome to:

  • Ask questions about juju and charms
  • Ask for help modifying existing scripts and make charms out of them
  • Ask for peer review on existing charms you might be working on.

 Sponsored by Canonical:

Audience: 
Categories: 

Paul Bokor

CANCELLED - Deep Packet Inspection Using Wireshark

 Sometimes  tools like PING and Traceroute aren’t enough to isolate the cause of network problems.

This class will take a hands-on approach to learning how to use the Wireshark protocol analyzer to analyze network traffic. Numerous examples will be used throughout the day to walk the attendees though the process of filtering out those packets that are working well and drilling down to those that are at the root of the problem.

Attendees will be provided with a CD containing open source network troubleshooting tools, as well as the trace files used in the class. Laptops are required

 Course Outline:

  •  Installing and Configuring Wireshark

  •  Using Display Filters

  •  Using Capture Filters

  •  Isolating the cause of slow data transfers

  •  Running Wireshark from the command-line

  •  Building a capture to disk appliance

 Who Should Attend:

  •  Network Administrators

  •  Network Analysts

  •  Server Administrators

  •  Desktop Administrators

  •  Network Managers

 

Note: This class is part of the SCALE University Program and requires an additional fee. Please remember to select the "SCALE University" addon at registration.

Audience: 
Categories: 

Lee Damon

NASes for the Masses

We will start with an examination of the pros and cons of different base operating systems as well as off-the-shelf NAS servers (both hardware and software). We will look at the more popular RAID levels and the impacts of software vs. hardware RAID implementations, data reliability, and rebuild time. We'll spend some time exploring ZFS. Attention will be paid to backups and some of the more common protocols used for accessing data from a NAS server.

In the later part of the class we will use a ready-made software implementation of a file server to delve into the potential issues involved in setup and maintenance of the server. 

Note: This class is part of the SCALE University Program and requires an additional fee. Please remember to select the "SCALE University" addon at registration.

Audience: 
Categories: 

Robert Mustacchi

Using SmartOS as a Hypervisor

SmartOS is an open source distribution of illumos, currently in production for Joyent's public cloud, where it provides a hypervisor that is secure, flexible and observable. It leverages technologies such as ZFS snapshots and clones for rapid provisioning, KVM and Zones for hardware and OS virtualization, and DTrace to safely understand what's going on inside of guests and the hypervisor. This talk will describe these technologies and their use, including engineering challenges encountered, and discuss opportunities for observing guests such as Linux and Windows.

Audience: 
Categories: 

Brendan Gregg

Performance Analysis: New Tools and Concepts from The Cloud

Cloud Computing introduces new challenges for performance analysis, for both customers and operators of the cloud. Apart from monitoring a scaling environment, issues within a system can be complicated when tenants are competing for the same resources, and are invisible to each other. Other factors include rapidly changing production code and wildly unpredictable traffic surges. For performance analysis in the Joyent public cloud, we use a variety of tools including Dynamic Tracing, which allows us to create custom tools and metrics and to explore new concepts. I'll discuss a collection of these tools and the metrics that they measure. While these are DTrace-based, the focus of the talk is on which metrics are proving useful for analyzing real cloud issues.

Audience: 
Categories: 

Tom King

State of Real-time I/O Processing in Embedded Linux Systems

Real-time I/O is important in embedded systems as many of the systems are used for Process Control. There are 2 approaches to handling real-time: 1) the Kernel Approach: using RTAI, Xenomi, or PREEMPT_RT and 2) the Hardware Approach: Embedded Micro, FPGA/CPLD (programmable logic). This session will cover the current status of Real-time I/O, and discuss the technical merits of both Kernel and Hardware approaches to handling Real-time I/O and the advantages and disadvantages of each approach. Current best practices also will be discussed with examples of Latency and Jitter in Real-time I/O and how they effect performance and outcome of processes controlled by the Linux System. Examples will be from 3D printing and light CNC.

Audience: 
Categories: 

Kir Kolyshkin, Maxim Patlasov

Reinventing Linux loopback device for clouds

Additional Speakers: 

One of the feature differences between hypervisors and containers is the ability to store a virtual machine image in a single file, since most containers exist as a chroot within the host OS rather than as fully independent entities. However, the ability to save and restore state in a machine image file is invaluable in managing virtual machine lifecycles in the data centre. This talk will début a new loopback device which gives all the advantages of virtual machine images by storing the container in a file while preserving the benefits of sharing significant portions with the host OS. We will compare and contrast the technology with the traditional loopback device and LVM, and describe a few features of a new loopback useful in container snapshotting and live migration. This talk will be technical in nature but should be accessible to people interested in cloud, virtualisation and container technologies.

Audience: 

der hans

nginx: Proxy Your Web Servers for Better Performance

nginx can sit between the web browser and the web server. In this position it can offload some of the work for the web server(s). In addition to caching data, nginx can handle URL rewriting, data compression, byte ranges, chunked responses, image resizing, SSL and many other tasks. nginx has support for virtual hosts and can proxy for multiple groups of web servers. nginx can also proxy for IMAP, SMTP and POP3 mail protocols including all three protocols over SSL. In October of 2011, Netcraft claimed that nginx has more than 11%[0] of the web server market and is growing. Learn about the up and coming web server that has already arrived.

[0] http://news.netcraft.com/archives/2011/10/06/october-2011-web-server-sur...

Audience: 
Categories: 

Brian Reames

File Security: Lock Down Your Data

This presentation will begin with an introduction to the concepts of "owner", "group", and "other" as well as "read", "write", and "execute" permissions. We will discuss how these permissions affect files and directories differently. With real examples, we will see how complications and undesired access can arise from different permission settings. A survey of common permissions schemes will be made. The SUID, SGID, and the "sticky bit" will be introduced as means of surmounting common security issues in collaborative directories. With a firm conceptual foundation in place, Access Control Lists can be discussed as a means of fine-tuning access granted by standard permissions. The presentation will close with a dicsusssion of how to implement, manage, and determine ACLs.

Audience: 
Categories: 

Pages

Subscribe to RSS - Intermediate