In my initial blog post, I explained a little bit about Nagios, and how it can be configured to monitor any networking device or server. Nagios' basic operation is this: Define a check Execute the check at a specified interval Take the result of the check and...
Infrastructure
License Management and Monitoring using X-Formation License Statistics
Over the past year, I have been doing a lot of work with clients who use high-end CAD and/or EE software tools from respected vendors like Cadence, Synopsys, and Mentor Graphics. The majority of these software tools require a license server to be setup on your local...
Creating a low cost, high performance ESX cluster
As Senior Systems Integrator for SPK and Associates, a California based IT services company specializing in infrastructure management services, I recently completed an interesting project. The goal was to create an ESX cluster for a small engineering group...
Running Pro/INTRALINK 3.4 on Windows 7, 64-bit
I recently came across a forum post asking for advice on the combination of running Pro/Intralink 3.4 on Windows 7 64-bit. In short, I’m happy to report that we’ve been using this combination without incident: Microsoft Windows 7 Professional 64-bit SP1, PTC...
Using Rational Response Files to Install ClearCase and ClearQuest
This week we continue on the topic of installing using IBM Installation Manager. But with a bit of a difference. Instead of bringing up the IM install GUI and using it to conduct the installation, we will take a step toward greater installation automation and create...
How to setup a weekly backup job with Bacula
In my last post, I gave an overview of Bacula, the enterprise-level free backup software. For this post I wanted to dig into the software a bit more and show how simple it is to setup a weekly backup job. One of the first things we do at SPK when working with a new...
How to Create Google Charts with Python
The goal of a typical system administrator is to get a job or task done as quickly as possible, without worrying about how elegant a solution might be. Reusing any existing scripts, tools, or utilities are always the first line in tackling the job. Often times, the...
Reverse Proxy Configurations
Now it's time to look at some of the server side configurations. The first step is to configure reverse proxy for the HTTP services. These services live on hosts that sit in the DMZ. A proxy is very simple to configure and allows a lot of flexibility to grow over time...
How to Keep Your Linux Servers Up to Date
One of the most important aspects of our Linux server management service is operating system patching. With Windows, Microsoft has made this trivial by means of the Windows Update utility. Microsoft is the single source of the patches, and assuming that the patches...
Deploying Exchange and Outlook 2010 Settings Using MSP, GPO, and ADMX in 15 minutes
Let’s be realistic: Windows users use Microsoft Office and Microsoft Office requires configuration. You’ve probably used the Microsoft Office Customization Tool to create Microsoft Software Patch (MSP) files to automate installation, but you should consider using...
Firewall HA setup with Juniper NS50s
One item I’ve done repeatedly while doing network consulting services is configuring high availability (HA) networks. The recommended way is Virtual Router Redundancy Protocol (VRRP). This requires that you have two firewalls for every location and they run in...
How to Authenticate Linux Users using Active Directory
In my previous post regarding wireless security, I mentioned that a single source of authentication for users is the most ideal in a corporate environment. The advantages of using one source for authentication are vast. One of the biggest advantages is that users only...