Sun BluePrints Rescue Project
Sun Blueprint program was at least partially a reaction to IBM Red Books
program but it never managed to get to the same level. In this sense it's
funny that they call them blue. Still some of blueprints are honest attempt
to help Sun administrators and represent great values. Still a lot of them
are typical corporate junk.
That's typical for IBM too (some Redbooks and red papers are written
in obscure jargon and there is a strong suspicion that they were written
to hide information not to inform the readers and
that IBM famous note "this page is intentionally left blank" has some
subtle meaning indeed ;-) and is probably a side effect of
the size of the company.
As Sun put it:
Articles are maintained in this archive
for the benefit and historical reference
of our readers. Details of the recommendations set forth
in these articles may not reflect Sun's latest hardware and software
releases.
Caution, careful analysis and common
sense should be exercised when applying these Sun BluePrints articles
to newer products and software releases.
We will try to connect and preserver some of them "for the benefit and historical reference
of our readers". It looks like this page is one of the few on
the Web that contain more or less sizable list of Sun blueprints
published.
Unfortunately Oracle did not preserve this part of Sun legacy and links
below try to provide some information about selected blueprints that still
are available.
- 20110814 : The Solaris Fingerprint Database - A Security Tool for Solaris Operating Environment Files by Vasanthan Dasan, Alex Noordergraaf, and Lou Ordorica ( The Solaris Fingerprint Database - A Security Tool for Solaris Operating Environment Files, Aug 14, 2011 )
- 20110814 : Performance Forensics by Bob Sneed ( Performance Forensics, Aug 14, 2011 )
- 20110814 : Still available via Google ( Aug 14, 2011 )
- 20110814 : InformIT Understanding Tuning TCP TCP Tuning Domains ( InformIT Understanding Tuning TCP TCP Tuning Domains, Aug 14, 2011 )
- 20110814 : Sun BluePrints Online - Articles by Sarma Vempat ( Sun BluePrints Online - Articles , )
- 20110814 : Creating a Customized Boot CD/DVD for the Solaris Operating System for x86 Platforms by John Cecere, Dana Fagerstrom ( Creating a Customized Boot CD/DVD for the Solaris Operating System for x86 Platforms, )
- 20110814 : Configuring JumpStart Servers to Provision Sun x86-64 Systems by Pierre Reynes ( Configuring JumpStart Servers to Provision Sun x86-64 Systems, )
- 20110814 : Securing Web Applications through a Secure Reverse Proxy by Anh-Duy Nguyen ( Securing Web Applications through a Secure Reverse Proxy, )
Rescued by somebody in Oracle
March 2006
The Solaris Fingerprint Database (sfpDB) enables you
to verify the integrity of files distributed with the Solaris Operating
Environment. By validating that these files have not been modified administrators
can determine whether their systems have, or have not, been hacked and
had trojaned malicious replacements for system files installed.
Originally from Dec, 2003
The health care industry
has well-established protocols for the triage, diagnosis, and treatment
of patient complaints, while the resolution of system-performance complaints
often seems to take a path that lacks any recognizable process or discipline.
This article draws from lessons and concepts of health care delivery
to provide ideas for addressing system-performance complaints with predictable
and accurate results. Specific tools from the Solaris Operating System
are discussed. This article is applicable to all audience levels.
[Aug 14, 2011] Still available via Google
See also
fs-performance-149840
[Jan, 2004]
Design, Features, and Applicability of Solaris File Systems
- by Brian Wong
The Solaris Operating System includes
many file systems, and more are available as add-ons. Deciding which
file system to apply to a particular application can be puzzling
without insight into the design criteria and engineering tradeoffs
that go into each product. This article offers a taxonomy of file
systems, describes some of the strengths and weaknesses of the different
file systems, and provides insight into the issues you should consider
when deciding how to apply the set of file systems that are available
for specific applications. This article requires an intermediate
reader.
Bluprint is gone but main content is preserved in this article.
[March, 2004]
Understanding Tuning TCP - by Deepak Kakadia
This article describes some of key
Transport Control Protocol (TCP) tunable parameters related to performance
tuning. More importantly, it describes how these tunables work,
how they interact with each other, and how they impact network traffic
when they are modified. This article requires an advanced level
reader.
12/2006
December 2006
The Messenger Express Web-based email client includes a
Personal Address Book (PAB) application for
storing and managing user's personal
information, such as email addresses and
phone numbers.
Sun Java System Communications Express,
the unified Web client introduced in
Sun Java Enterprise System 2004Q2
supersedes Messenger Express and Calendar
Express. Communications Express also
includes Address Book Store (ABS) that
provides all of the functionality of PAB and
is better integrated with mail and calendar
components.
When upgrading from Messenger Express
(also known as Webmail) to Communications
Express, you need to migrate users' PAB
entries to ABS. (This migration does not
occur automatically as part of the upgrade
process.) A new tool, pab2abs.pl, has been
made available that provides improved
performance over the earlier migration tool,
runMigrate.sh. This article describes how
you can use the pab2abs.pl tool to either
migrate a single or a few users, or to
migrate your entire PAB database.
Note: This article is available in
PDF Format only.
This article explains the mechanics of the boot process on the Solaris
Operating System for x86 platforms so that you understand what is needed
to create a customized CD/DVD. It discusses both the hard disk and CD/DVD
boot processes, and points out the differences between the two.
There are a number of practical applications for this topic, including:
- Jumpstart Software - The feature in Solaris that allows access
to Solaris installation media and configuration rules over a network
- Diagnostics - The ability to create a bootable CD for the purpose
of diagnosing system problems without accessing or modifying the
copy of the operating system that is installed on the target system
- Restoration - The ability to create a bootable CD with tools
that aid in the repair and restoration of a down system
- Diskless clients that cannot do PXE booting-PXE is a DHCP-based
network-based installation technology similar to Solaris Jumpstart.
Some older x86-based system are incapable of using PXE
- Canned Firewall-The creation of a bootable CD that starts Solaris
on a system configured with multiple network interfaces. A preset
ipf configuration is then used to establish a network firewall on
that system.
This article begins by examining the layout of a hard disk in the
x86 architecture and the components on it that are used for booting.
It then describes the pieces that are unique to a CD boot. Finally,
this article puts the pieces together and creates an image file that
can be burned to CD.
Organizations are constantly challenged to deploy systems throughout
the enterprise with consistent and reliable configurations. Solaris
JumpStart technology provides a mechanism for fully automating the Solaris
Operating System (Solaris OS) installation process. With the ability
to locate installation information over the network or from a local
CD-ROM drive, and use customized profiles, JumpStart facilitates the
rapid and consistent deployment of Solaris OS-based systems.
Many organizations have relied on UltraSPARC/Solaris platforms for years,
and use JumpStart technology for operating system deployment. With the
introduction of Sun x86-64 based systems, organizations are now seeking
ways to use existing JumpStart servers to deploy the Solaris OS and
Linux operating environment on Sun x86-64 based systems. This article
describes how to modify existing JumpStart servers to support the deployment
of the Solaris OS and Linux operating environment on Sun x86-64 based
systems, as well as how to use standard Linux installation tools for
configuring Sun x86-64 based systems.
[April, 2004]
Building OpenSSH--Tools and Tradeoffs, Updated for OpenSSH 3.7.1p2
-by Jason Reid
This article updates the information
in the January 2003 Sun BluePrints OnLine article,
"Building OpenSSH--Tools and Tradeoffs". This article contains
information about gathering the needed components, deciding the compile-time
configuration decisions, building the components, and finally assembling
OpenSSH. The script file,
"Building OpenSSH Tools TAR", provides tools that simplify
the packaging and deployment of the OpenSSH tool on the Solaris Operating
Environment. This article targets an advanced audience.
[April, 2004]
Building a Bootable DVD to Deploy a Solaris Flash Archive
-by John S. Howard
This article provides techniques to augment
a DVD-ROM-based installation with the services and behaviors typically
provided by a JumpStart server. The techniques presented in this article
can be used when you need to perform an automated installation of a
Solaris Flash archive, but are unable to use a JumpStart server. This
article describes a procedure to create a bootable installation DVD-ROM
with a complete software stack on a DVD that you can use to perform
a standardized and fully automated installation of the software stack
from the DVD.
This article also examines the structure of a bootable Solaris OS DVD
and provides information about modifying installation behaviors to perform
an automated install of a Solaris Flash archive from a DVD.
[Jan, 2004]
Solaris Operating System Availability Features -by Thomas
M. Chalfant
The processor offlining feature enables
a processor to be removed from use by Solaris in response to one or
more L2 cache errors. The page retirement feature enables a page of
memory to be removed from use by Solaris in response to repeated ECC
errors within a memory page on a DIMM. This paper provides detailed
discussion regarding the algorithm, implementation, kernel tunables,
and messages you are likely to see on a system running the appropriate
kernel updates. This article is ideal for an intermediate to advanced
reader.
This article describes recommended practices
for setting up the Sun ONE Proxy Server software to represent a secure
content server to outside clients, preventing direct, unmonitored access
to your server's data from outside your company. This article uses recommended
practices to secure your web applications behind a firewall and leverage
access and authentication using the Sun ONE platform products.
This article assumes an intermediate
reader who is familiar with installing and configuring the Sun ONE Proxy
Server. It also assumes that the reader can configure the firewall router
to allow a specific server on a specific port access through the firewall
without allowing any other machines in or out.
Design, Features, and Applicability of Solaris File Systems
by Brian Wong
The Solaris Operating System includes
many file systems, and more are available as add-ons. Deciding which
file system to apply to a particular application can be puzzling without
insight into the design criteria and engineering tradeoffs that go into
each product. This article offers a taxonomy of file systems, describes
some of the strengths and weaknesses of the different file systems,
and provides insight into the issues you should consider when deciding
how to apply the set of file systems that are available for specific
applications. This article requires an intermediate reader.
[Feb, 2001]
Auditing in the Solaris 8 Operating Environment -by William
Osser and Alex Noordergraaf
The use of the Solaris 8 Operating Environment
auditing (BSM) has never been well understood. This article presents
an auditing configuration optimized for the Solaris 8 OE. The recommended
configuration will audit activity on a system without generated
gigabytes of data every day. In addition, the configuration
files are available for download from
http://www.sun.com/blueprints/tools.
Softpanorama Recommended
Old Sun sites
Books
-
A Strategy for Managing Performance (December 2002)
-by John Brady
This article addresses the importance of adopting and executing a thorough
performance management strategy in your compute environment. Managing
performance puts you in the position of being proactive and in control
of your compute resources, not vice versa, while saving revenue at the
same time. This article offers suggestions for developing a performance
management strategy that enables you to predict and correct potential
performance problems, to control resources, to track changes for capacity
planning and to consolidate resources.
-
System Performance Management: Moving from Chaos to Value
(July 2001)
-by Jon Hill and Kemer Thomson
This article presents the rationale for formal system performance management
from a management, systems administrative and vendor perspective. It
describes four classes of systems monitoring tools and their uses. The
article discusses the issues of tool integration, "best-of-breed versus
integrated suite" and the decision to "buy versus build."
-
Performance Oriented System Administration (December 2002)
-by Bob Larson
In most cases, using the default configuration for an operating system
helps ensure that cascading effects don't overly complicate system tuning
and maintenance. In some cases, however, you might need to tune a system.
This article explains the algorithms and heuristics surrounding the
most important tunables and describes several kernel tunables and the
algorithms behind them.
-
Performance Forensics (December 2003)
-by Bob Sneed
The health care industry has well-established protocols for the triage,
diagnosis, and treatment of patient complaints, while the resolution
of system-performance complaints often seems to take a path that lacks
any recognizable process or discipline. This article draws from lessons
and concepts of health care delivery to provide ideas for addressing
system-performance complaints with predictable and accurate results.
Specific tools from the Solaris Operating System are discussed. This
article is applicable to all audience levels.
-
Application Troubleshooting: Alternate Methods of Debugging
(November 2001)
-by Christopher Duncan
What to do when applications are crashing or hanging is a critical issue
for any software user. Few people will have the resources and skill
set to debug the application directly using a source code debugger.
In many cases source code debugging may not even be an option. This
paper will discuss a variety of options open to a Solaris Operating
Environment user to narrow down the causes and scope of a application
failure. The article discusses programs such as truss, proc tools and
features of the Solaris runtime linker.
-
Design, Features, and Applicability of Solaris File Systems
(January 2004)
-by Brian Wong
The Solaris Operating System includes many file systems, and more are
available as add-ons. Deciding which file system to apply to a particular
application can be puzzling without insight into the design criteria
and engineering tradeoffs that go into each product. This article offers
a taxonomy of file systems, describes some of the strengths and weaknesses
of the different file systems, and provides insight into the issues
you should consider when deciding how to apply the set of file systems
that are available for specific applications. This article requires
an intermediate reader.
-
System Management Services Software: An Inside Look (January
2003)
-by Tom Chalfant
This article addresses some of the more advanced topics of System Management
Services (SMS) software including the Management Network (MAN) and SMS
security. In addition, it provides insight to a new security feature
that enables you to use secure shell for file synchronization between
system controllers (SCs).
-
WebStart Flash (November 2001)
-by John S. Howard and Alex Noordergraaf
The Solaris Operating Environment Flash installation component extends
JumpStart technology by adding a mechanism to create a system archive,
a snapshot of an installed system, and installation of the Solaris Operating
Environment from that archive. This article introduces the concepts
and best practices for a Flash archive, describes the master machine,
and suggested storage strategies, and provides a complete example of
creating a Flash archive and installing a Web server with Flash.
-
Hardware Replication Challenges (November 2003)
-by Selim Daoud
This article describes the challenges of keeping valuable hardware-replicated
data safe. Being able to access and manipulate the cloned data is crucial
and often neglected. This article describes the different types of data
replication and the procedure to access a hardware-replicated set of
data. This article targets an intermediate audience.
-
Configuring Boot Disks (December 2001)
-by John S. Howard and David Deeths
This article is the fourth chapter of the Sun BluePrints book titled
Boot Disk Management: A Guide For The Solaris Operating Environment
(ISBN 0-13-062153-6), which is available through www.sun.com/books,
amazon.com, and Barnes & Noble bookstores.
This chapter presents a reference configuration of the root disk and
associated disks that emphasizes the value of configuring a system for
high availability and high serviceability. This chapter explains the
value of creating a system with both of these characteristics, and outlines
the methods used to do so.
-
Using filesync for Disaster Recovery, Business Continuance, and Mobility
(July 2003)
-by John Rosander
The Solaris Operating Environment filesync(1) command can be used for
disaster recovery, business continuance, and mobility. This article
details how to use the filesync(1) command to synchronize directories
between Sun servers, and between Sun servers and Linux laptops. This
article is ideal for a reader with an intermediate level of expertise.
-
The IT Utility Model--Part II (August 2003)
-by Emlyn Pagden
This article is the second part of a two-part series and provides solutions
for implementing and maintaining a utility model within a service provider
or data center environment. This article also discusses the required
financial management systems, and describes the application software
and hardware required to support each of the solution areas of a utility
model. This article is targeted to an advanced audience.
-
The IT Utility Model--Part I (July 2003)
-by Emlyn Pagden
This article is part one of a two-part series that describes the current
business requirements for a utility model, and discusses the current
commercial and political issues faced when implementing one. Both financial
and technical aspects are covered, from detailing what a utility model
is and why it is needed, to describing the mechanism required for capturing
compute resource consumption to accurately bill customers. The intended
audience for this article is IT Architects, Finance staff, and Executive
officers. This article is targeted for an advanced level of expertise.
-
Planning to Fail (December 2000)
-by John S. Howard
This article presents design guidelines and "best practices" for the
selection and configuration of system software such as Veritas Volume
Manager, Dynamic Mulit-pathing, Dynamic Reconfiguration, and Live Update.
It also focuses on which versions and combinations of these software
tools result in viable configurations, and which combinations to avoid.
-
Architecting a Service Provider Infrastructure for Maximum Growth
(June 2000)
-by Stan Stringfellow - Special to Sun BluePrints OnLine
Stan introduces the first of a new series of Sun BluePrints OnLine articles
that will examine the issues involved with building scalable and highly
available service provider infrastructures. ISPs, ASPs, NSP's corporate
Web services, Telco services, and digital wireless network services
all benefit from the principles that will be discussed in these series
of articles.
-
Establishing an Architectural Model (February 2002)
-by John V. Nguyen
This article is the complete third chapter of the upcoming Sun BluePrints
book, Designing ISP Architectures, ISBN 0-13-045496-6. This article
introduces an architectural model as a framework for designing platform-independent
ISP architectures, based upon expertise and Sun best practices for designing
ISP architectures. Ideal for IT architects and consultants who design
ISP architectures, John's complete book will be available beginning
March 2002 through www.sun.com/books, amazon.com, and Barnes & Noble
bookstores.
-
Enterprise Network Design Patterns: High Availability (December
2003)
-by Deepak Kakadia, Sam Halabi, and Bill Cormier
This article describes how to create highly available network designs,
using Sun technologies and network switching/routers. Its content is
geared for an advanced reader.
-
Network Design Patterns: N-Tier Data Centers (October 2003)
-by Deepak Kakadia and Richard Croucher
This article describes design concepts and principles that can be extremely
valuable in the construction of optimal Sun ONE N-Tier Data Center architectures.
When trying to deliver complete and optimal solutions, there is a void
on how to assemble the various Sun ONE components to craft a complete
working system. This paper describes in detail how to assemble the various
building blocks of an N-Tier system.
[Nov 2000] ****
Solaris Operating Environment Minimization for Security: A Simple, Reproducible
and Secure Application Installation Methodolgy - Updated for Solaris
8 Operating Environment -by Alex Noordergraaf
This article updates the
original OS Minimization article's required package listings for Solaris
8 Operating Environment and 64bit UltraSPARC II hardware.
Review:
This is a very good paper. It explains
how to remove unnecessary packages -- actually they consider a very
practical case of Solaris + Netscape Enterprise Server. The paper
a little bit weak on the tool side, though.
The Solaris Operating Environment
installation process requires the selection of one of four installation
clusters:
-
- Core
- End User
- Developer
- Entire Distribution
Each installation cluster represents
a specific group of packages (operating system modules) to be installed.
This grouping together of packages into large clusters is done to
simplify the installation of the OS for the mass market. Because
each of these installation clusters contains support for a variety
of hardware platforms (SolarisTM Operating Environment
(Intel Platform Edition), microSPARCTM, UltraSPARCTM,
UltraSPARC II, and so on) and software requirements (NIS, NIS+,
DNS, OpenWindowsTM, Common Desktop Environment (CDE),
Development, CAD, and more), far more packages are installed than
will actually ever be used on a single Solaris Operating Enironment.
The Core cluster installs the smallest
Solaris Operating Environment image. Only packages that may be required
for any SPARCTM or Solaris Operating Environment (Intel
Platform Edition) system are installed. The End User cluster
builds on the Core cluster by also installing the window managers
included with the Solaris Operating Environment (OpenWindows and
CDE). The Developer and Entire Distribution clusters include
additional libraries, header files, and software packages that may
be needed on systems used as compile and development servers.
The size of the clusters varies significantly:
the Core cluster contains only 39 packages and uses 52MBytes; the
End User cluster has 142 packages and uses 242 MBytes; the Developer
cluster has 235 packages and consumes 493 MBytes of disk space.
Experience to date has shown that in many cases, a secure server
may require only 10 Solaris Operating Environment packages and use
as few as 36MBytes of disk space.
Installing unnecessary services,
packages, and applications can severely compromise system security.
One well known example of this is the rpc.cmsd daemon, which is
unnecessary on many data center systems. This daemon is installed
and started by default when the End User, Developer, or Entire Distribution
cluster is chosen during the installation process.
There have been many bugs filed against
the rpc.cmsd subsystem of OpenWindows/CDE in the last few years,
and at least two CERT advisories (CA-99-08, CA-96.09). To make matters
even worse, scanners for rpc.cmsd are included in the most common
Internet scanning tools available on the Internet. The best protection
against rpc.cmsd vulnerabilities is to not install the daemon at
all, and avoid having to insure it is not accidentally enabled.
The problem described above is well
known in the computer industry, and there are hundreds of similar
examples. Not surprisingly, almost every security reference book
ever written discusses the need to perform "minimal OS installations"
[Garfinkel]. Unfortunately, this is easier said than done. Other
than the occasional firewall, no software applications are shipped
with lists of their package requirements, and there's no easy way
of determining this information other then through trial and error.
Because it is so difficult to determine
the minimal set of necessary packages, system administrators commonly
just install the Entire Distribution cluster. While this may be
the easiest to do from the short-term perspective of getting a system
up and running, it makes it nearly impossible to secure the system.
Unfortunately, this practice is all too common, and is even done
by so-called experts brought in to provide infrastructure support,
web services, or application support. (If your organization is outsourcing
such activities, be sure to require the supplier to provide information
on what their OS installation policies and procedures are, or you
may be in for some unpleasant surprises.)
The rest of this article presents
one method for determining the minimal set of packages required
by a particular application--the iPlanetTM Enterprise
Server. Future articles will discuss other applications. The tentative
list includes NFSTM Servers (with SecureRPC and Solstice
DiskSuiteTM), iPlanetTM WebTop, and SunTM
Cluster. If you have followed this procedure and developed the scripts
for a particular application, please forward them to the authors
for inclusion in future articles.
Solaris Operating Environment Security: Updated for Solaris 9 Operating
Environment (December 2002) -by Alex Noordergraaf and Keith Watson
This article provides recommendations
on how to secure a Solaris Operating Environment (Solaris OE). Securing
a Solaris OE system requires that changes be made to its default configuration.
The changes outlined in this article address the majority of the methods
that intruders use to gain unauthorized or privileged access to an improperly
configured system. Implementing the changes recommended in this article
requires planning, testing, and documentation to be successful in securing
a computing environment.
Solaris Operating Environment Network Settings for Security
Auditing System Security (May 2003) -by Alex Noodergraaf and
Glenn Brunette
This article describes how to audit (validate) a system's security using
the Solaris Security Toolkit software. You can use the information and procedures
in this article to maintain an established security profile after hardening.
For systems that are already deployed, you can use this information to assess
security before hardening.
This article is the entire sixth chapter of the Sun BluePrints book,
"Securing Systems With the Solaris Security Toolkit", by Alex Noodergraaf
and Glenn Brunette (ISBN 0-13-141071-7)
General Security
-
Public Key Infrastructure Overview (August 2001)
-by Joel Weise
This article removes some of the mystique, fear and misconceptions with
Public Key Infrastructures (PKI), by providing an overview of what it
is, how it works, why and when it should be used, and the benefits it
can provide. After reading this article individuals should be better
able to determine their requirements for a PKI and what features they
need for their particular business.
-
A Patch Management Strategy for the Solaris Operating Environment
(January 2003)
-by Ramesh Radhakrishnan
Managing software patches is complex and time consuming. This article
offers a high-level strategy for managing patches in a variety of different
types of compute environments that are running on the Solaris operating
environment. This article divides the patch management process into
seven phases, each of which can be tailored to suit your distinct IT
environment. This article does not discuss the step-by-step process
of installing Solaris OE patches, but instead addresses higher-level
concepts that can be used with any patch installation utility. This
article is intended for IT managers, IT architects, lead system administrators,
and anyone interested in developing a patch management strategy.
-
Securing Web Applications through a Secure Reverse Proxy
(November 2003)
-by Anh-Duy Nguyen
This article describes recommended practices for setting up the Sun
ONE Proxy Server software to represent a secure content server to outside
clients, preventing direct, unmonitored access to your server's data
from outside your company. This article uses recommended practices to
secure your web applications behind a firewall and leverage access and
authentication using the Sun ONE platform products.
This article assumes an intermediate reader who is familiar with installing
and configuring the Sun ONE Proxy Server. It also assumes that the reader
can configure the firewall router to allow a specific server on a specific
port access through the firewall without allowing any other machines
in or out.
- ***
Securing the Sun Fire 12K/15K System Controller (January 2004)
-by Alex Noordergraaf, Steven Spadaccini and Dina Nimeh
This article provides recommendations on how to securely deploy the
Sun Fire 12K and 15K system controllers (SC). These recommendations
apply to environments where security is a concern, particularly environments
where the uptime requirements of the SC and/or the information on the
Sun Fire server is critical to the organization. This article is one
in a series that provides recommendations for enhancing security of
a Sun Fire system. After securing the SC, we recommend that you use
the
"Securing the Sun Fire 12K and 15K Domains" article to secure
the SC domains. This article includes updates related to System Management
Services (SMS) version 1.4.
- ***
Securing the Sun Fire 12K/15K Domains (January 2004)
-by Alex Noordergraaf, Steven Spadaccini and Dina Nimeh
This article documents security modifications that you can implement
on Sun Fire 12K and 15K domains without adversely affecting their behavior.
The configuration changes in this article enable Solaris Operating Environment
(OE) security features and disable potentially insecure services and
daemons. This article is one in a series that provides recommendations
for enhancing security of a Sun Fire system. Before securing the domains,
we recommend that you use the
"Securing the Sun Fire 12K and 15K System Controllers" article
to secure the system controllers. This article includes updates related
to System Management Services (SMS) version 1.4.
-
Securing Linux Systems With Host-Based Firewalls: Implemented With
Linux iptables (November 2003)
-by Ge' Weijers
This article provides information and recommendations for securing Linux
operating systems with host-based firewalls. This article aims to provide
readers with a template for constructing a host-based firewall that
provides a useful layer of protection against the risks of exposing
a system to internal and/or external users. Additionally, readers can
gain an understanding of construction methods for host-based firewalls
in general and Linux-based firewalls in particular. This article targets
an intermediate audience.
-
Deploying the Solaris Operating Environment Using a Solaris Security
Toolkit CD (September 2003)
-by Steven Spadaccini
The Solaris Security Toolkit is a collection of shell scripts combined
to form a flexible and extensible framework for rapidly deploying hardened
platforms running the Solaris Operating Environment. The Toolkit is,
however, quite versatile and can be used for much more than just hardening
a system. This article discusses how the Toolkit can be used to construct
a bootable CD, based on Sun's JumpStart framework, for building and
configuring new systems. This article is authored for intermediate and
advanced system administrators.
-
Securing the Sun Cluster 3.x Software (February 2003)
-by Alex Noordergraaf
To provide a robust environment where Sun Cluster 3.x software can be
deployed, very specific requirements are placed on the configuration
of the Solaris Operating Environment (Solaris OE). This article describes
how to secure the Solaris OE and the Sun Cluster 3.x software. Before
the release of Sun Cluster 3.0 (12/01) software, no secured configurations
were supported. This article includes updates for Sun Cluster 3.1 software.
-
Building Secure Sun Fire Link Interconnect Networks Using Midframe
Servers (February 2003)
-by Joe Higgins
This article describes how to install and deploy the Sun Fire Link interconnect
so that it can be securely managed and operated. The software architecture
and the steps to secure the Sun Fire Link interconnect software are
documented.
-
System Management Services Software: An Inside Look (January
2003)
-by Tom Chalfant
This article addresses some of the more advanced topics of System Management
Services (SMS) software including the Management Network (MAN) and SMS
security. In addition, it provides insight to a new security feature
that enables you to use secure shell for file synchronization between
system controllers (SCs).
-
Trust Modeling for Security Architecture Development (December
2002)
-by Donna Andert, Robin Wakefield, and Joel Weise
Information technology architects must build applications, systems,
and networks that match ordinary users' expectations of trust in terms
of identity, authentication, service level agreements, and privacy.
This article describes the vocabulary of trust relationships and demonstrates
the practical importance of using trust modeling to formalize the threshold
for risk.
-
Minimizing the Solaris Operating Environment for Security: Updated
for Solaris 9 Operating Environment (November 2002)
-by Alex Noordergraaf
This article provides tips, instructions, and preferred practices for
minimizing the Solaris Operating Environment (Solaris OE) to increase
system security. It focuses on operating system (OS) installation practices
for minimizing and automating Solaris OE installations. It provides
a simple, reproducible, and secure application installation methodology.
-
Securing LDAP Through TLS/SSL--A Cookbook (June 2002)
-by Stefan Weber
Deploying secure Lightweight Directory Access Protocol (LDAP) connections
is becoming more demanding. This article details the steps on how to
set up the Sun Open Net Environment (Sun ONE) Directory Server software
so that it can be accessed securely from command line tools.
-
How Hackers Do It: Tricks, Tools, and Techniques (May 2002)
-by Alex Noordergraaf
Learn how to build and maintain secure systems and implement preventive
solutions against the common tricks, tools, and techniques used by hackers
to gain unauthorized access to Solaris Operating Environment systems.
-
Securing the Sun Cluster 3.0 Software (May 2002)
-by Alex Noordergraaf
Reduce susceptibility to attacks and increase the reliability, availability,
and serviceability of systems that run Sun Cluster 3.0 software by implementing
the recommendations for configuring the Solaris Operating Environment
and supported agents detailed in this article.
-
Server Virtualization Using Trusted Solaris 8 Operating Environment
(February 2002)
-by Glenn Faden
Building on the concepts presented in his follow-on article, Maintaining
Network Separation with Trusted Solaris 8 Operating Environment,
expands on the techniques of configuring labeled networks to show how
the Trusted Solaris Operating Environment can be deployed by a network
service provider to support multiple customers within a single infrastructure.
Through the use of the appropriate Trusted Solaris Operating Environment
functionality, each customer can have its own virtual server or community.
This article describes best practices for administrative procedures
and configuration files that are required to set up fully contained
communities.
-
Developing a Security Policy (December 2001)
-by Joel Weise and Charles R. Martin
Security policy development is a frequently overlooked component of
overall security architectures. This article details the importance
of security policies and the basic steps involved in their creation.
-
Sun Cluster 3.0 12/01 Security: with the Apache and iPlanet Web and
Messaging Agents (December 2001)
-by Alex Noordergraaf, Mark Hashimoto and Richard Lau
This article takes a first step in providing secured configurations
for Sun Cluster 3.0 software by describing how three specific agents
can be deployed in a secured configuration that is supported by Sun
Microsystems. Sun Cluster 3.0 software is used by organizations to provide
additional assurance that mission-critical services will be available
despite unexpected hardware or software failures.
-
Kerberos Network Security in the Solaris Operating Environment
(October 2001)
-by Wyllys Ingersoll
This article describes how to correctly and securely configure Kerberos
in the Solaris Operating Environment. It provides best practices and
recommendations.
-
Securing Systems with Host-Based Firewalls - Implemented With SunScreen
Lite 3.1 Software (September 2001)
-by Martin Englund
This article provides a discussion of why host-based firewalls can be
an effective alternative to choke-point based firewalls or an additional
layer of security in an environment. Details are then provided on how
to implement a host-based firewalls using Sun's free host-based firewall
software - SunScreen SecureNet Lite.
-
The Solaris Fingerprint Database - A Security Tool for Solaris Operating
Environment Files (May 2001)
-by Vasanthan Dasan, Alex Noordergraaf, and Lou Ordorica
The Solaris Fingerprint Database (sfpDB) enables you to verify the integrity
of files distributed with the Solaris Operating Environment. By validating
that these files have not been modified administrators can determine
whether their systems have, or have not, been hacked and had trojaned
malicious replacements for system files installed.
- Updated
Solaris Operating Environment Security - Updated for Solaris 8
Operating Environment (April 2001)
-by Alex Noordergraaf and Keith Watson
This article discusses how system and network security can be dramatically
improved on a Solaris Operating Environment (Solaris OE) system. Specific
security recommendations are made for Solaris OE versions 2.5.1 through
8. This revised version, of the original Solaris OE Security
Sun BluePrints published in January of 2000, incorporates all security-related
updates in Solaris 8 OE.
-
Maintaining Network Separation with Trusted Solaris 8 Operating Environment
(March 2001)
-by Glenn Faden
Glenn Faden describes how Mandatory Access Control (MAC) can be used
to provide concurrent access to two isolated networks without compromising
the separation.
-
Auditing in the Solaris 8 Operating Environment (February
2001)
-by William Osser and Alex Noordergraaf
The use of the Solaris 8 Operating Ennvironment auditing (BSM) has never
been well understood. This article presents an auditing configuration
optimized for the Solaris 8 OE. The recommended configuration will audit
activity on a system without generated gigabytes of data every day.
In addition, the configuration files are available for download from
http://www.sun.com/blueprints/tools.
-
Directory Server Security (December 2000)
-by Tom Bialaski
This article provides an overview of what the LDAP security model consists
of and what security changes need to be made to accommodate the Solaris
Operating Environment naming service requirements.
-
Building Secure N-Tier Environments (October 2000)
-by Alex Noordergraaf
This article provides recommendations on how to architect and implement
secure N-Tier ecommerce environments.
-
JumpStart Architecture and Security Scripts for the Solaris Operating
Environment - Part 3 (September 2000)
-by Alex Noordergraaf
This article is third in a three part series describing an automated
toolkit for implementing the security modifications documented in earlier
Sun BluePrints onLine articles. In conjuction with this final article
the toolkit itself is being made freely available.
-
JumpStart Architecture and Security Scripts for the Solaris Operating
Environment - Part 2 (August 2000)
-by Alex Noordergraaf
This article is part two of a three part series that presents the JumpStart
Architecture and Security Scripts toolkit. We continue with an in-depth
review of the configuration files, directories, and scripts used by
the toolkit to enhance the security of Solaris Operating Environment
systems. This series is a must read for anyone interested in upgrading
the security of their site.
-
JumpStart Architecture and Security Scripts for the Solaris Operating
Environment - Part 1 (July 2000)
-by Alex Noordergraaf
This article is part one of a three part series presenting the JumpStart
Architecture and Security Scripts tool (Toolkit) for the Solaris Operating
Environment. The Toolkit is a set of scripts which automatically harden
and minimize Solaris Operating Environment systems. The modifications
made are based on the recommendations made in the previously published
Sun BluePrints OnLine security articles.
-
Solaris Operating Environment Security (January 2000)
-by Keith Watson and Alex Noordergraaf
This article splits the discussion of the Solaris Operating Environment
system security into two parts.
-
Solaris Operating Environment Minimization for Security: A Simple,
Reproducible and Secure Application Installation Methodology
(December 1999)
-by Keith Watson and Alex Noordergraaf
Discuss OS minimization as a technique for reducing system vulnerabilities;
a simple method for duplicating these installations on large numbers
of servers is also introduced. (See
"November 2000" updated
for the Solaris 8 Operating Environment)
- Updated (11/01)
Solaris Operating Environment Network
Settings for Security (December 1999)
-by Keith Watson and Alex Noordergraaf
Discuss the many low-level network options available within Solaris
and their impact on security. (See
"December 2000" updated for the
Solaris 8 Operating Environment)
-
Linux Overview for Solaris Users (August 2003)
-by John Cecere
This article provides a technical overview of the Linux operating environment
and compares and contrasts it with the Solaris Operating Environment
(Solaris OE). The purpose of this article is to quickly familiarize
advanced system administrators with the Linux OE and to provide a reference
for Solaris to Linux usage. This article is for intermediate and advanced
readers who are experienced with the Solaris OE and are tasked with
deploying, servicing,maintaining, and using Linux-based systems.
-
Securing Sun Linux Systems: Part I, Local Access and File Systems
(July 2003)
-by Glenn Brunette, Michael Hullhorst, and Ge Weijers
This article is the first part of a two-part series that provides recommendations
for securing the Sun Linux 5.0 operating system. This part provides
recommendations for securing local access and file systems. The information
in this article applies only to the Sun Linux 5.0 distribution, although
some of the techniques or recommendations might apply to other Linux
distributions. This article is ideal for a reader with a beginner to
Intermediate level of expertise.
-
Securing Sun Linux Systems: Part II, Network Security (July
2003)
-Glenn Brunette, Michael Hullhorst, and Ge Weijers
The second in a two-part series, this article provides recommendations
for securing the Sun Linux 5.0 operating system. This part provides
specific recommendations for network security. The information in this
article applies only to the Sun Linux 5.0 distribution, although some
techniques or recommendations may apply to other Linux distributions.
This article is ideal for a reader with a beginner to Intermediate level
of expertise.
-
Role Based Access Control and Secure Shell--A Closer Look At Two
Solaris Operating Environment Security Features (June 2003)
-by Thomas M. Chalfant
To aid the customer in adopting better security practices, this article
introduces and explains two security features in the Solaris operating
environment. The first is Role Based Access Control and the second is
Secure Shell. The goal is to provide you with enough information to
make an effective decision to use or not use these features at your
site as well as to address configuration and implementation topics.
This article is targeted to the intermediate level of expertise.
-
Responding to Customer's Security Incidents--Part 1: Establishing
Teams and a Policy (March 2003)
-by Vijay Masurkar
This article is the first of a series of articles that discuss building
teams, establishing a security incident response policy, and executing
it. The article is intended to provide highlights and best practices
information about computer security incident response, building teams
to process security incidents, and developing important factors in establishing
a security incident response policy framework. The primary audience
consists of computer security managers, security policy developers,
system administrators, and other related staff responsible for the creation
or operation of a computer incident response team and/or a computer
security incident response (CSIR) policy and service.
-
Responding to Customer's Security Incidents--Part 2: Executing a
Policy (April 2003)
-by Vijay Masurkar
This article is the second in a series that discusses a policy of security
incident responses. The article describes the policy best practices
and execution features - evaluation, containment, and eradication of
and recovery from a security incident - for responding to a customer's
incident within the policy scope. Part one of this series,
"Responding to Customer's Security Incidents (Part 1): Establishing
Teams and a Policy" was a March 2003 Sun BluePrints OnLine article.
-
Responding to Customer's Security Incidents--Part 3: Following Up
After an Incident (September 2003)
-by Vijay Masurkar
The third in a five-part series, this article focuses on following up
after an incident and presents the best practices that should be executed
in the follow-up phase. These topics include acquiring incident data,
resorting to legal actions when deemed necessary, and conducting post-incident
activities such as taking inventory of the affected assets, assessing
the damage, and capturing the lessons learned. This article is intended
for advanced readers such as computer security managers, security policy
developers, system administrators, and other related staff, who are
responsible for the creation or operation of a computer security incident
response policy and service.
-
Responding to a Customer's Security Incidents--Part 4: Processing
Incident Data (October 2003)
-by Vijay Masurkar
This fourth article focuses on authenticating, preserving, and processing
the incident data. Only the salient points for best practices that should
be executed in processing the incident data are discussed here. These
practices are typically preceded by a recovery phase and are only starting
points for a more detailed analysis for building a policy with the associated
processes and procedures. This article is targeted to an advanced reader.
-
IP Network Multipathing (Updated) (August 2001)
-by Mark Garner
IP Network Multipathing allows a server to have multiple network adapters
connected to the same subnet. This article looks at the features of
IP Network Multipathing and the steps required to configure it for network
adapter resilience.
-
Internet Protocol Network Multipathing (Update) (November
2002)
-by Mark Garner
This article looks at the features of Internet Protocol network multipathing
and the steps required to configure it for network adapter resilience.
This article is an update to the IPMP article published in November
2002. This revision addresses Bug ID: 4451678, "Synopsis: in.mpathd
does not accurately detect interface failures in active-standby config".
This problem is resolved by applying patch 108528-15 and above. This
problem was fixed in the Solaris 9 Operating Environment.
-
Building Secure Sun Fire Link Interconnect Networks Using Sun Fire
15K and Sun Fire 12K Servers (August 2003)
-by Joe Higgins and Steven Spadaccini
Deploying a secure distributed computer system can be difficult. This
article describes how to install and deploy the Sun Fire Link product
so that it can be securely managed and operated. The article documents
the software architecture and steps needed to secure the Sun Fire Link
interconnect. The commands used in configuration steps are either Fire
Link Manager (FM) or Solaris Operating Environment (Solaris OE) tools.
The article also includes a section on how to create, configure, and
secure a Sun Fire Link fabric. This article requires a general knowledge
of Solaris OE system administration and is written for advanced system
administrators.
-
Understanding Gigabit Ethernet Performance on Sun Fire Servers
(February 2003)
-by Jian Huang
The recent network-centric computing has been exercising tremendous
pressure on servers' network performance. With the increasing popularity
of gigabit Ethernet, especially the availability of lower-cost copper-based
gigabit Ethernet adapters, the question of how Sun's servers perform
in this arena has become one of the most important issues that Sun engineering
teams are trying to address. This paper presents an overview of the
performance of the new Sun GigaSwift Ethernet MMF Adapter card on a
Sun Fire server in terms of TCP/IP networking.
Most of the previous effort on TCP/IP network performance has been focused
on bulk-transfer traffic, which imposes on servers a continuous flow
of packets with sizes equal to the Maximal Transfer Unit (MTU) of the
underlying carrier.
In the client-server computing environment, however, not all requests
from clients, nor all replies from the servers are constantly large.
The traffic of small packets, whose size is below that of the MTU of
the carrier, is also very commonly seen. Hence, this paper investigates
the performance of both the bulk-transfer and small-packet traffic on
a Sun Fire 6800 server.
In addition to presenting a performance picture, this paper also takes
the initiative to study the root cause of the behavior of Sun servers
by revealing some of the implementation details of the Solaris Operating
Environment (Solaris OE). A set of tuning parameters that affect TCP/IP
network performance is discussed and some tuning recommendations is
given.
-
(April 2002) Enterprise Management Systems Part I: Architectures
and Standards
-by Deepak Kakadia, Dr. Tony Thomas, Dr. Sridhar Vembu and Jay Ramasamy
The first in a two-part series focused on managing services in Service
Driven Networks (SDNs), this article presents a summary of typical architectures
and a clarification of the standards to help the reader better understand
the implementations of various third-party vendor EMSystems solutions.
-
Enterprise Quality of Service (QoS) Part II: Enterprise Solution
using Solaris Bandwidth Manager 1.6 Software (March 2002)
-by Deepak Kakadia
Deepak's article is the second in a two-part series that focuses on
Quality of Service (QoS) issues. This article explores possible approaches
to deploying an Enterprise Quality of Service solution using Solaris
Bandwidth Manager 1.6 software. It also presents an integrated close-loop
solution using Sun Management Center 3.0 software, which exploits API's
offered by both products and creates a policy-based QoS solution for
the enterprise.
-
Enterprise Quality of Service (QoS): Part I - Internals (February
2002)
-by Deepak Kakadia
In a two-article series, distinguished Sun BluePrints author works to
clear the confusion surrounding QoS by explaining what it is, how it
is implemented, and how to use it in an enterprise. This month's part
one article details the basics surrounding the "what" and "how" of implementation,
as well as the internals of QoS. Be sure to return to Sun BluePrints
OnLine next month for his second article which will focus on how to
deploy QoS in an enterprise.
-
Using NTP to Control and Synchronize System Clocks - Part III: NTP
Monitoring and Troubleshooting (September 2001)
-by David Deeths and Glenn Brunette
This article is the third in a series of three articles that discuss
using Network Time Protocol (NTP) to synchronize system clocks. The
goal of this article is to provide an effective understanding of NTP
troubleshooting and monitoring.
-
Using NTP to Control and Synchronize System Clocks - Part II: Basic
NTP Administration and Architecture (August 2001)
-by David Deeths and Glenn Brunette
This is Part 2 of a three-article series that discusses how to use Network
Time Protocol (NTP) to synchronize system clocks. This article explains
the basics of client and server administration, covering various client/server
configurations, as well as authentication and access control mechanisms.
This article also provides a number of suggestions for an effective
NTP architecture.
-
Using NTP to Control and Synchronize System Clocks - Part I: Introduction
to NTP (July 2001)
-David Deeths and Glenn Brunette
This article is the first of a series on the Network Time Protocol (NTP).
NTP allows synchronizing clocks on different network nodes, which is
critical in today's networked world. This first article provides an
overview of why time synchronization is important and introduces basic
NTP concepts.
-
Maintaining Network Separation with Trusted Solaris 8 Operating Environment
(March 2001)
-by Glenn Faden
Glenn Faden describes how Mandatory Access Control (MAC) can be used
to provide concurrent access to two isolated networks without compromising
the separation.
-
Policy-Based Networks (October 1999)
-by Jean-Christophe Martin
Explores the network policy concept in greater depth, and see how it
is implemented in the Solaris Bandwidth Manager software.
-
Resource Management: Solaris Bandwidth Manager (June 1999)
-by Evert Hoogendoorn
Evert explains the benefits of Solaris Bandwidth Manager.
-
Sun/Oracle Best Practices (January 2001)
-by Bob Sneed
In this paper, Best Practice concepts are first defined, then specific
high-impact technical issues common with Oracle in the Solaris Operating
Environment are discussed.
-
Solaris Operating System and ORACLE Relational Database Management
System Performance Tuning (October 2003)
-by Ramesh Radhakrishna
This article focuses on the performance problems at the Resource Tier
(database server). The assumption is that the database server is a Sun
server running an ORACLE Relational Management System (RDBMS). The article
requires a general knowledge of Solaris Operating System (Solaris OS)
and Oracle RDBMS system administration. It is written for beginner-
and intermediate-level system administrators responsible for Sun systems,
and for Sun's customer engineers, and database administrators responsible
for tuning Oracle databases.
-
Avoiding Common Performance Issues When Scaling RDBMS Applications
With Oracle9i Release 2 And Sun Fire Servers (March 2003)
-byGlenn Fawcett
There are a handful of common performance issues that arise when trying
to scale Oracle database applications on Solaris Operating Enironment.
These issues are sometimes difficult to identify and address. This paper
incorporates the experiences of Sun's Strategic Application Engineering
group in tuning Oracle RDBMS systems on a variety of workloads. There
are accompanying document,
Avoiding Common Performance Issues When Scaling RDBMS Applications
With Oracle9i Release 2 And Sun Fire Servers Appendices, that
supplements the information in this article.
-
Monitoring and Tuning Oracle - Chapter 22 Part 1 (July 2002)
-by Allan N. Packer
Allan N. Packer shares Oracle monitoring and tuning recommendations
from his recently-released book,
"Configuring and Tuning Databases on the Solaris Platform", ISBN#
0-13-083417-2. In this article, Allan examines ways of managing Oracle
behavior, changing tunable parameters, calculating the buffer cache
hit rate, and other topics. The article goes on to discuss Oracle monitoring
using the utlbstat/utlestat scripts.
-
Drill-Down Monitoring of Database Servers - Chapter 21 (June
2002)
-by Allan N. Packer
Database expert, Allan N. Packer, shares database best practices from
his recently-released book,
"Configuring and Tuning Databases on the Solaris Platform", ISBN#
0-13-083417-2. In this article, Allen presents a process for identifying
and resolving problems with the performance of database servers.
-
Monitoring and Tuning Oracle - Chapter 22, Part II (August
2002)
-by Allan N. Packer
Building on his July 2002 Sun BluePrints OnLine article, Allan continues
to provide more best practices for Oracle monitoring using utlbstat/utlestat
scripts and to recommend parameter settings for OLTP and DSS environments.
Issues ranging from load performance to dynamic reconfiguration and
Oracle recovery are also examined. Additional Oracle monitoring and
tuning recommendations are available in his recently released book
"Configuring and Tuning Databases on the Solaris Platform."
-
Dynamic Reconfiguration and Oracle 9i Dynamically Resizeable SGA
(January 2004)
-by Erik Vanden Meersch and Kristien Hens
This article explains how Oracle 9i can operate in combination with
Sun's dynamic reconfiguration (DR). It provides a brief overview of
DR, intimate shared memory (ISM), dynamic intimate shared memory (DISM),
and dynamically resizable system global area (SGA), and explains how
these technologies fit together. In addition, this article provides
step-by-step details for configuring Oracle relational databases on
Sun Fire servers so that the DR capabilities of the Sun platform can
be maximized. This article requires an intermediate reader.
-
Avoiding Common Performance Issues When Scaling RDBMS Applications
With Oracle9i Release 2 And Sun Fire Servers (March 2003)
-byGlenn Fawcett
There are a handful of common performance issues that arise when trying
to scale Oracle database applications on Solaris Operating Enironment.
These issues are sometimes difficult to identify and address. This paper
incorporates the experiences of Sun's Strategic Application Engineering
group in tuning Oracle RDBMS systems on a variety of workloads. There
are accompanying document,
Avoiding Common Performance Issues When Scaling RDBMS Applications
With Oracle9i Release 2 And Sun Fire Servers Appendices, that
supplements the information in this article.
- APPENDICES -
Avoiding Common Performance Issues When Scaling RDBMS Applications
With Oracle9i Release 2 And Sun Fire Servers Appendices (March
2003)
-by Glenn Fawcett
These are the appendices for the article
Avoiding Common Performance Issues When Scaling RDBMS Applications
With Oracle 9i Release 2 And Sun Fire Servers (March 2003)
-
ORACLE Middleware Layer Net8 Performance Tuning Utilizing Underlying
Network Protocol (October 2002)
-by Gamini Bulumulle
This article discusses performance optimization and tuning of SQL*Net
based on an arbitrary UNP which could be TCP/IP, SPX/IP or DECnet. SQL*Net
performance can be maximized by synchronization with tunable parameters
of the UNP, for example, buffer size. This article explain how total
SQL*Net transaction performance can be divided into components of connect
time and query time, where Total SQL*Net (Net8) Transaction Time = Connect
Time + Query Time. Connect time can be maximized by calibration of tunable
parameters of SQL*Net and the UNP when designing and implementing networks.
Query time is typically affected by database tuning parameters which
are outside the scope of this article. However, database tuning parameters,
which impact network performance, are discussed.
-
Best Practices for Deploying the Sun StorADE Utility (January
2004)
-by Christian Cadieux and Mike Monahan
This article discusses the Sun Automated Diagnostic Environment (StorADE)
utility. The StorADE utility provides centralized monitoring and diagnostics
for most Sun storage product offerings. The first part of this article
provides an overview and describes how to plan a StorADE deployment.
The second part provides step-by-step installation information with
best practice recommendations for StorADE configuration; whether the
environment contains complex storage area networks (SANs), or straightforward
direct-connect devices. This article is intended for IT architects,
administrators, and anyone looking for an introductory article on a
storage monitoring utility.
-
Solaris Volume Manager Performance Best Practices (November
2003)
-by Glenn Fawcett
Compelling new features such as soft partitioning and automatic device
relocation make the Solaris Volume Manager software a viable candidate
for storage management needs. Solaris Volume Manager software features
enhance storage management capabilities beyond what is handled by intelligent
storage arrays with hardware RAID. Now Solaris Volume Manager software
is integrated with the Solaris Operating Environment (Solaris OE) and
does not require additional license fees. This article provides specific
Solaris Volume Manager tips for system, storage, and database administrators
who want get the most of Solaris Volume Manager software in their data
centers. This article targets an intermediate audience.
- APPENDICES -
Avoiding Common Performance Issues When Scaling RDBMS Applications
With Oracle9i Release 2 And Sun Fire Servers Appendices (March
2003)
-by Glenn Fawcett
These are the appendices for the article
Avoiding Common Performance Issues When Scaling RDBMS Applications
With Oracle 9i Release 2 And Sun Fire Servers (March 2003)
-
Configuring Databases Using Soft Links (January 2003)
-by Carlos Godinez
This article explains the advantages of using symbolic (soft) links
when configuring databases and provides techniques and examples for
using them. This article presents information that will enable you to
manage database configuration efficiently and accurately.
-
Managing Shared Storage in a Sun Cluster 3.0 Environment With Solaris
Volume Manager Software (November 2002)
-by Kristien Hens and Peter Dennis
Traditionally, VERITAS Volume Manager (VxVM) has been the volume manager
of choice for shared storage in enterprise-level configurations. In
this article, a free and easy-to-use alternative, Solaris Volume Manager
software, which is part of the Solaris 9 Operating Environment (Solaris
9 OE) is explored. This mature product offers similar functionality
to VxVM. Moreover, it is tightly integrated into the Sun Cluster 3.0
software framework and, therefore, should be considered to be the volume
manager of choice for shared storage in this environment.
-
Memory Hierarchy in Cache-Based Systems (November 2002)
-by Ruud Van Der Pas
This article will help the reader understand the architecture of modern
microprocessors by introducing and explaining the most common terminology
and addressing some of the performance related aspects. Written for
programmers and people who have a general interest in microprocessors,
this article presents introductory information on caches and is designed
to provide understanding on how modern microprocessors work and how
a cache design impacts performance.
Despite improvements in technology, microprocessors are still much faster
than main memory. Memory access time is increasingly the bottleneck
in overall application performance. As a result, an application might
spend a considerable amount of time waiting for data. This not only
negatively impacts the overall performance, but the application cannot
benefit much from a processor clock-speed upgrade either. One method
for overcoming this problem is to insert a small high-speed buffer memory
between the processor and main memory. Such a buffer is generally referred
to as cache memory, or cache for short.
-
Configuring Boot Disks With Solaris Volume Manager Software
(October 2002)
-by Erik Vanden Meersch and Kristien Hens
This article is an update to the April 2002 Sun BluePrints OnLine article,
Configuring Boot Disks With Solstice DiskSuite Software.
This article focuses on the Solaris 9 Operating Environment, Solaris
Volume Manager software, and VERITAS Volume Manager 3.2 software. It
describe how to partition and mirror the system disk, and how to create
and maintain a backup system disk. In addition, this article presents
technical arguments for the choices made, and includes detailed runbooks.
-
Sun StorEdge[tm[ Instant Image 3.0 and Oracle8i Database Best Practices
(August 2002)
-by Art Licht
A methodology for implementing the Sun StorEdge Instant Image 3.0 Point-In-Time
(PIT) copy technology to perform non-intrusive and efficient backup
operations on Oracle8i databases, without impacting business operations
is presented. A method customers can use to repurpose the PIT Oracle8i
data for parallel business processes is also included.
-
Reducing the Backup Window With Sun StorEdge Instant Image Software
(July 2002)
-by Selim Daoud
This article discusses the advantages and methods of using a point-in-time
(PIT) type of backup system versus a more traditional backup approach
that requires extended downtime. This article is for anyone interested
in reducing the backup window (improving the uptime of important applications)
while backing up a system that is nearly online.
-
LAN-Free Backups Using the Sun StorEdge Instant Image 3.0 Software
(June 2002)
-by Art Licht
As data grows in size and backup windows shrink, performing backups
across the LAN is no longer the ideal method. This article gives an
overview of LAN and SAN backup practices and includes procedures for
performing LAN-free backups.
-
Network Storage Evaluations Using Reliability Calculations
(June 2002)
-by Selim Daoud
This article uses a case study to introduce concepts and calculations
for systematically comparing redundancy and reliability factors as they
apply to network storage configurations.
-
Storage Resource Management: A Practitioner's Approach (April
2002)
-by Stevan Arbona and Joe Catalanotti
Storage resource management (SRM) best practices are presented, with
a particular focus on the positive impact that SRM can have on controlling
costs by increasing operational efficiency.
-
Configuring Boot Disks With Solstice DiskSuite Software (April
2002)
-by Erik Vanden Meersch and Kristien Hens
How to partition the system disk, mirror it, and create and maintain
a contingency boot disk are presented. Topics include two-, three-,
and four-disk configurations, their associated runbooks, and the SUNBEsdm
package with scripts.
-
Configuring Boot Disks (December 2001)
-by John S. Howard and David Deeths
This article is the fourth chapter of the Sun BluePrints book titled
Boot Disk Management: A Guide For The Solaris Operating Environment
(ISBN 0-13-062153-6), which is available through www.sun.com/books,
amazon.com, and Barnes & Noble bookstores.
This chapter presents a reference configuration of the root disk and
associated disks that emphasizes the value of configuring a system for
high availability and high serviceability. This chapter explains the
value of creating a system with both of these characteristics, and outlines
the methods used to do so.
-
Sun StorEdge T3 Array: Installation, Configuration and Monitoring
Best Practices (October 2001)
-by Ted Gregg
In order to fully realize the benefits of the capabilities built into
the Sun StorEdge T3 array, it must be installed, configured, and monitored
with best practices for RAS. This article details these best practices.
It includes both Sun StorEdge T3 array configuration and host system
configuration recommendations, along with brief descriptions of some
of the available software installation and monitoring tools.
Sun StorEdge T3 Dual Storage Array Part 3 - Basic Management
(April 2001)
-by Mark Garner
The final article in the series looks at the configuration of basic
management and monitoring functions on the T3 array. It concludes with
example Expect scripts that could be used as a starting point for automating
your own T3 installations.
-
Sun StorEdge T3 Dual Storage Array Part 2 - Configuration
(March 2001)
-by Mark Garner
This second article in the series addresses the installation and configuration
of a T3 array partner group. It covers how two single arrays would be
reconfigured to form a partner group, how the new devices are created
on the host and how VERITAS Volume Manager integrates into the solution.
-
Sun StorEdge T3 Dual Storage Array Part 1 - Installation, Planning
and Design (February 2001)
-by Mark Garner
This article looks at the planning and design requirements for the installation
of a Sun StorEdge T3 Array partner group. It is the first of three articles
which address planning and design, configuration and basic management
of a Sun StorEdge T3 Array.
-
Storage Area Networks: A blueprint for Early Deployment (January
2001)
-by Brian Wong
This paper surveys the applications to which Storage Area Networks (SANs)
aspire, the available SAN technology-and its limitations-and attempts
to prepare users for forthcoming technology, so that they can deploy
real operational storage in data centers without further delay.
-
Wide Thin Disk Striping (October 2000)
-by Bob Larson
In this article, the technique of using stripes to distribute data and
indexes over several disks is described. The article also contains the
recommendations to use wide-thin stripes to maximize operational flexibility
while minimizing complexity.
-
Online Backups Using the VxVM Snapshot Facility (September
2000)
-by John S. Howard
Complete and accurate backups performed in a timely fashion are crucial
to every datacenter. This article presents a procedure utilizing the
snapshot facility of the Veritas Volume Manager software which enables
the System Administrator to perform timely, complete and accurate online
backups with minimal impact to the user or application.
-
Sun StorEdge T3 Single Storage Array Design and Installation
(September 2000)
-by Mark Garner
This article provides a roadmap for the cinfiguration of a single Sun
StorEdge T3 Storage Array. It addresses: Prerequisites, Storage Layout
Design, Implementation, Configuration and Basic Management.
-
Toward a Reference Configuration for VxVM Managed Boot Disks
(August 2000)
-by Gene Trantham and John S. Howard
Gene and John outline the fundamental procedures typically followed
in a boot disk encapsulation and the problems this default encapsulation
introduces. A best practice for VxVM installation, root disk encapsulation
and a reference configuration is presented.
(See the Sun BluePrints book
Boot Disk Management: A Guide for the Solaris Operating Environment
by John S. Howard and David Deeths ISBN # 0-13-062153-6 for updated
information about the topics detailed in this article.)
-
SCSI-Initiator ID (August 2000)
-by David Deeths
Changing the SCSI-initiator ID is necessary for cluster configurations
that share SCSI devices between multiple hosts. This article walks you
through the process, and also provides an excellent background on SCSI
issues in clustered systems.
-
VxVM Private Regions: Mechanics and Internals of the VxVM Confirguration
Database (July 2000)
-by Gene Trantham
Gene discuss the functions of the VxVM public and private regions, the
configuration database, and the special considerations for root disk
encapsulation.
-
Scrubbing Disk Using the Solaris Operating Environment Format Program
(June 2000)
-by Rob Snevely
Rob explains how to effectively scrub disks on a Solaris Operating Environment
system, using the format utility.
-
Veritas VxVM Storage Management Software (May 2000)
-by Gene Trantham
Gene explains the underlying actions VxVM during boot disk encapsulation,
and details the mechanism by which it seizes and manages a boot device.
Performance
-
Performance Forensics (December 2003)
-by Bob Sneed
The health care industry has well-established protocols for the triage,
diagnosis, and treatment of patient complaints, while the resolution
of system-performance complaints often seems to take a path that lacks
any recognizable process or discipline. This article draws from lessons
and concepts of health care delivery to provide ideas for addressing
system-performance complaints with predictable and accurate results.
Specific tools from the Solaris Operating System are discussed. This
article is applicable to all audience levels.
-
Capacity Planning as a Performance Tuning Tool--Case Study for a
Very Large Database Environment (July 2003)
-by Gamini Bullumille and Marcos Bordin
This article discusses the performance and scaleability impact due to
severe CPU and I/O bottlenecks in a very large database (over 20 terabytes).
It describes the methodologies used to collect performance data in a
production environment, and explains how to evaluate and analyze the
memory, CPU, network, I/O, and Oracle database in a production server
by using the following tools:
- Solaris Operating Environment (Solaris OE) Standard UNIX
tools
- Oracle STATSPACK performance evaluation software from ORACLE Corporation
- Trace Normal Form (TNF)
- TeamQuest Model software from Team Quest Corporation
- VERITAS Tool VxBench from VERITAS Corporation
The article is intended for use by intermediate to advanced performance
tuning experts, database administrators, and TeamQuest specialists.
It assumes that the reader has a basic understanding of performance
analysis tools and capacity planning. The expertise level of this article
is intermediate to advanced.
-
Understanding Gigabit Ethernet Performance on Sun Fire Servers
(February 2003)
-by Jian Huang
The recent network-centric computing has been exercising tremendous
pressure on servers' network performance. With the increasing popularity
of gigabit Ethernet, especially the availability of lower-cost copper-based
gigabit Ethernet adapters, the question of how Sun's servers perform
in this arena has become one of the most important issues that Sun engineering
teams are trying to address. This paper presents an overview of the
performance of the new Sun GigaSwift Ethernet MMF Adapter card on a
Sun Fire server in terms of TCP/IP networking.
Most of the previous effort on TCP/IP network performance has been focused
on bulk-transfer traffic, which imposes on servers a continuous flow
of packets with sizes equal to the Maximal Transfer Unit (MTU) of the
underlying carrier.
In the client-server computing environment, however, not all requests
from clients, nor all replies from the servers are constantly large.
The traffic of small packets, whose size is below that of the MTU of
the carrier, is also very commonly seen. Hence, this paper investigates
the performance of both the bulk-transfer and small-packet traffic on
a Sun Fire 6800 server.
In addition to presenting a performance picture, this paper also takes
the initiative to study the root cause of the behavior of Sun servers
by revealing some of the implementation details of the Solaris Operating
Environment (Solaris OE). A set of tuning parameters that affect TCP/IP
network performance is discussed and some tuning recommendations is
given.
-
BluePrint for Benchmarking Success (January 2003)
-by Hans Joraandstad and Barbara Perz
This article provides best practices for benchmarking and it's ideal
for those using benchmarking to gather information that will help make
a decision on which computer to buy.
-
Memory Hierarchy in Cache-Based Systems (November 2002)
-by Ruud Van Der Pas
This article will help the reader understand the architecture of modern
microprocessors by introducing and explaining the most common terminology
and addressing some of the performance related aspects. Written for
programmers and people who have a general interest in microprocessors,
this article presents introductory information on caches and is designed
to provide understanding on how modern microprocessors work and how
a cache design impacts performance.
Despite improvements in technology, microprocessors are still much
faster than main memory. Memory access time is increasingly the bottleneck
in overall application performance. As a result, an application might
spend a considerable amount of time waiting for data. This not only
negatively impacts the overall performance, but the application cannot
benefit much from a processor clock-speed upgrade either. One method
for overcoming this problem is to insert a small high-speed buffer memory
between the processor and main memory. Such a buffer is generally referred
to as cache memory, or cache for short.
-
HPC Administration Tips and Techniques (October 2002)
-by Omar Hassaine
This article gives an introduction to the features introduced in the
latest Sun HPC ClusterTools 4 software, including best practices for
configuration and mixed clusters. It describes how to configure a checkpointing
and migration environment using both Sun Grid Engine and Condor standalone
checkpointing libraries. This article also includes discussion about
administrative best practices.
-
Application Performance Optimization (March 2002)
-by Börje Lindh
This article provides a brief introduction to optimization on the Solaris
Operating Environment. To explore this subject in more detail, refer
to Rajat Garg's and Ilya Sharapov's Sun BluePrints book, Techniques
for Optimizing Applications, published July 2001(ISBN 0-13-093476-3).
-
Sizing Sun Ray Servers Running Windows Applications with SunPCi IIpro
Coprocessor Cards (November 2001)
-by Don DeVitt
This paper addresses the task of sizing a server capable of supporting
Wintel based applications on a Sun Ray Server utilizing Sun Pci IIpro
co-processor cards. The paper integrates the the informationof several
previously published documents and sizing tools to determine a baselineconfiguration.
The paper also suggests many best practice options for configuring the
server.
-
Supporting Microsoft Windows 2000 Server Applications from Sun Enterprise
Servers (June 2001)
-by Don DeVitt
This article explores using multiple SunPCi II Pro cards running on
Sun Enterprise servers to support Microsoft Windows 2000 Server applications.
New SunPCi II Pro hardware and software now support multiple cards in
one Sun Enterprise server. Benchmarks and Sizing information for a Windows
2000 Terminal Server environment are discussed.
-
Administering Sun Cluster 2.2 Environments (October 2000)
-by David Deeths
David Deeths discusses the fundamentals and best practices of installing,
configuring, and managing a Sun Cluster 2.2 environment. He also offers
many tips for effective cluster administration and how to increase and
maintain a high level of system availability.
-
Sun HPC ClusterTools Software Best Practices(September 2000)
-by Omar Hassaine
This paper discusses the Best Practices for successfully configuring,
installing and using the Sun High Performance Computing (HPC) ClusterTools
software. It also covers the current status of the Sun HPC ClusterTools
in the field and briefly describes the architecture.
-
Static Performance Tuning (May 2000)
-by Richard Elling
Richard discusses a class of problems that can affect system performance
which is not dynamic by nature, and cannot be detected by conventional
dynamic tuning tools.
-
Tales from the Trenches: The Case of the RAM Starved Cluster
(April 2000)
-by Richard Elling
Richard discusses how Veritas File System (VxFS) affects memory on a
Solaris Operating Environment server. He also describes a real world
example of the interactions between the Solaris Operating Environment
Version 2.5.1, VxFS Version 2.3.1, and user applications.
-
Scenario Planning - Part 2 (March 2000)
-by Adrian Cockcroft
Presents part two of the Scenario Planning article and explains how
to follow-up a simple planning methodology based on a spreadsheet that
is used to break down the problem and experiment with alternative future
scenarios.
-
Fast Oracle Parallel Exports on Sun Enterprise Servers (March
2000)
-by Stan Stringfellow - Special to Sun BluePrints OnLine
Gives a script that performs very fast Oracle database exports by taking
advantage of parallel processing on SMP machines. This script can be
invaluable for situations where you need to perform exports of large
mission-critical databases that require high availability.
-
Scenario Planning - Part 1 (February 2000)
-by Adrian Cockcroft
Discusses scenario planning techniques to help predict latent demand
during overload periods. In this part 1 he explains how to simplify
your model down to a single bottleneck.
-
Upgrading the Solaris PC NetLink Software (January 2000)
-by Don DeVitt
Highlights some of the subtle upgrade options that many system administrators
will want to be aware of as they move from one version of Solaris PC
NetLink software to the next.
-
Observability (December 1999)
-by Adrian Cockcroft
Discusses Capacity Planning and Performance Management techniques.
-
Processing Accounting Data into Workloads (October 1999)
-by Adrian Cockcroft
Information about Solaris operating system accounting to include code
examples that extract the data in a usable format and pattern match
it into workloads.
Back to Top
JumpStart
-
Deploying the Solaris Operating Environment Using a Solaris Security
Toolkit CD (September 2003)
-by Steven Spadaccini
The Solaris Security Toolkit is a collection of shell scripts combined
to form a flexible and extensible framework for rapidly deploying hardened
platforms running the Solaris Operating Environment. The Toolkit is,
however, quite versatile and can be used for much more than just hardening
a system. This article discusses how the Toolkit can be used to construct
a bootable CD, based on Sun's JumpStart framework, for building and
configuring new systems. This article is authored for intermediate and
advanced system administrators.
-
Managing Data Centers With Sun Management Center Change Manager
(October 2002)
-John S. Howard
Deploying and updating software are two of the most challenging and
time consuming tasks facing datacenter managers. The Sun Management
Center (Sun MC) Change Manager software provides a framework and tools
for quickly and efficiently deploying, replicating, updating, and managing
software over a large number of systems. This article presents techniques
and best practices for using Sun Management Center Change Manager software.
-
Customizing JumpStart Framework for Installation and Recovery
(August 2002)
-by John S. Howard and Alex Noordergraaf
Techniques to augment a CDROM-based installation with the services and
behaviors provided by a JumpStart server are detailed in this article.
These techniques are suitable to situations when a hands-free Solaris
Operating Environment (Solaris OE) installation is necessary but when
a JumpStart server cannot be used. This article is a chapter from the
Sun BluePrints book,
"JumpStart Technology: Effective Use in the Solaris Operating Environment",
ISBN# 0-13-062154-4.
-
Using Live Upgrade 2.0 With JumpStart Technology and Web Start Flash
(April 2002)
-by John S. Howard
In this final installment of his three-part series on Solaris Live Upgrade
2.0 (LU) technology, John S. Howard provides recommendations and techniques
for integrating LU with the JumpStart software framework and the Solaris
Web Start Flash software.
-
WebStart Flash (November 2001)
-by John S. Howard and Alex Noordergraaf
The Solaris Operating Environment Flash installation component extends
JumpStart technology by adding a mechanism to create a system archive,
a snapshot of an installed system, and installation of the Solaris Operating
Environment from that archive. This article introduces the concepts
and best practices for a Flash archive, describes the master machine,
and suggested storage strategies, and provides a complete example of
creating a Flash archive and installing a Web server with Flash.
-
Cluster Platform 220/1000 Architecture-A Product from the SunTone
Platforms Portfolio (August 2001)
-by Enrique Vargas
This article will provide customers a better understanding of this product
capabilities by presenting its hardware and software architecture as
well as best practices used in integrating the design.
-
Automating LDAP Client Installations (July 2001)
-by Tom Bialaski
The article explains how to configure a native LDAP client at installation
time, which is a new feature in Solaris 8 Operating Environment U3.
The basics of sysidtools and creating a sysidcfg
file for hands-off installation is covered along with how they relate
to LDAP. Hard to find (non-documented) tips are provided to avoid common
pitfalls.
-
Building a JumpStart Infrastructure (April 2001)
-by Alex Noordergraaf
This article discussed how the core JumpStart components interract.
Recommendations on how to structure the JumpStart server are provided
in addition to step by step instructions on how to get a basic automated
JumpStart environment up and running as quickly as possible.
-
Customizing the JumpStart Boot Image Recovery (March 2001)
-by John S. Howard
This article includes techniques and recommendations for creating a
recovery platform by augmenting the Solaris OE boot image (mini-root).
This article will also examine the boot and installation processes by
demonstrating how to adapt those processes for system recovery.
-
Building a Bootable JumpStart Installation CD-ROM (March
2001)
-by John S. Howard
This article presents an examination of the structure of a bootable
Solaris Operating Environment (Solaris OE) CD-ROM and procedures for
how to create a bootable JumpStart installation CD-ROM. This CD can
be used to complete a standardized, hands-free Solaris OE installation
in environments where the disk space or networking constraints do not
allow for a JumpStart server.
-
MR System for Rapid Recovery (January 2001)
-by John S. Howard
This article is an introduction to the MR system for rapid recovery.
As the system uptime requirements have become more exacting, the length
of time it takes to boot these larger and more complex systems has grown.
By implementing MR on your JumpStart servers it may be possible to reduce
the number of reboots required during a system recovery or service event.
This minimization of reboots will speed recovery and service time as
well as enable the system administrator to use datacenter tools during
system recovery procedures.
- Updated (November 2000)
-by Alex Noordergraaf and Glenn Brunette
In parallel with the "JASS" Toolkit version 0.2 release all three articles
describing the "JASS Toolkit have been updated and revised to document
new updates and functionality.
-
JumpStart
Architecture and Security Scripts for the Solaris Operating Environment
- Part 1
JumpStart
Architecture and Security Scripts for the Solaris Operating Environment
- Part 2
JumpStart
Architecture and Security Scripts for the Solaris Operating Environment
- Part 3
-
JumpStart Architecture and Security Scripts for the Solaris Operating
Environment - Part 3 (September 2000) -Alex Noordergraaf
This article is third in a three part series describing an automated
toolkit for implementing the security modifications documented in earlier
Sun BluePrints onLine articles. In conjuction with this final article
the toolkit itself is being made freely available.
-
JumpStart Architecture and Security Scripts for the Solaris Operating
Environment - Part 2 (August 2000) -Alex Noordergraaf
This article is part two of a three part series that presents the JumpStart
Architecture and Security Scripts toolkit. We continue with an in-depth
review of the configuration files, directories, and scripts used by
the toolkit to enhance the security of Solaris Operating Environment
systems. This series is a must read for anyone interested in upgrading
the security of their site.
-
JumpStart Architecture and Security Scripts for the Solaris Operating
Environment - Part 1 (July 2000) -Alex Noordergraaf
This article is part one of a three part series presenting the JumpStart
Architecture and Security Scripts tool (Toolkit) for the Solaris Operating
Environment. The Toolkit is a set of scripts which automatically harden
and minimize Solaris Operating Environment systems. The modifications
made are based on the recommendations made in the previously published
Sun BluePrints OnLine security articles.
-
JumpStart Mechanics: Using JumpStart Application for Hands- Free
Installation of Unbundled Software - Part 2 Automatic Encapsulation
of the Root Disk (June 2000)
-by John S. Howard
John provides procedures to fully automate the initial configuration
of Sun Enterprise Volume Manager and automate encapsulation of the boot
disk using JumpStart.
-
JumpStart Mechanics: Using JumpStart Application for Hands-Free Installation
of Unbundled Software - Part 1 (May 2000)
-by John S. Howard
John discusses automating and standardizing the installation of the
Solaris Operating Environment along with the associated unbundled software
products and datacenter management tools.
-
Solaris 8 Additions to sysidcfg (March 2000)
-by Rob Snevely
Shows you how to do fully hands-off installations of the Solaris 8 Operating
Environment. He also discusses how to use Jumpstart and sysidcfg
to provide uniform Solaris Operating Environment installations and save
you time.
-
Setting Up a Solaris Operating Environment Install Server and the
Solaris JumpStart Feature (December 1999)
-by Rob Snevely
A walkthrough on setting up an install server.
-
JumpStart: NIS and sysidcfg (October 1999)
-by Rob Snevely
How to use JumpStart technology to allows automation of the install
process.
Naming and Directory Services
-
Using the LDAP to NIS+ Gateway (September 2003)
-by Tom Bialaski and Michael Haines
There are two approaches that you can take when transitioning from NIS+
to LDAP-based services. One approach is to replace your naming service
clients with the Secured LDAP Client. The second approach is to keep
your current NIS+ clients, and deploy a transition tool to gain access
to LDAP naming service data. The first approach is covered in chapter
four of the just released Sun BluePrints book, "LDAP in the Solaris
Operating Environment -- Deploying Secure Directory Services", by
Michael Haines and Tom Bialaski. The second approach, using the NIS+
to LDAP Gateway, is discussed in this article. This article is intended
for IT architects and administrators who have deployed an earlier version
of the directory server software, and who are interested in upgrading
to the Sun ONE Directory Server 5.2 software version.
This Sun BluePrints book is scheduled for publication in the Fall of
2003 and will be available at the
Sun
BluePrints Publication page, the amazon.com website, and Borders
and Barnes & Noble bookstores.
-
Transition Guide--Upgrading From the iPlanet Directory Server 5.1
Software to the Sun ONE Directory Server 5.2 Software (August
2003)
-by Tom Bialaski and Michael Haines
The information in this article is derived from an upcoming Sun BluePrints
book, "LDAP in the Solaris Operating Environment -- Deploying Secure
Directory Services," by Michael Haines and Tom Bialaski. This book is
scheduled for publication in the Fall of 2003.
That book and this article cover the recently released Sun ONE Directory
Server 5.2 software, which introduces several significant features,
including support for the Secured LDAP Client. This article discusses
important differences in the packaging, installation, and configuration
of the Sun ONE Directory Server 5.2 software as compared with the previous
version. This article also discusses how to configure the software to
support Secured LDAP Clients. This article is intended for IT architects
and administrators who have deployed an earlier version of the directory
server software, and who are interested in upgrading to the Sun ONE
Directory Server 5.2 software version.
-
Writing an Authentication Plug-in for a Sun ONE Directory Server
(March 2003)
-by Nicola Venditti
The Sun ONE Directory Server has an advanced application program interface
(API) for writing plug-ins that extend the directory server's functionality.
In this article, information is provided for a better understanding
of the tasks involved in writing a plug-in. The impact and benefit plug-ins
can provide to the directory server is explained. In addition, a sample
preoperation
plug-in is provided.
-
Understanding Solaris 9 Operating Environment Directory Services
(December 2002)
-by Tom Bialaski
This article examines the differences between the Solaris 8 Operating
Environment (Solaris OE) Lightweight Directory Access Protocol (LDAP)
Client and the Solaris 9 OE Secured LDAP Client, and explains how to
support them on the same directory server. In addition, this article
details troubleshooting tips for common implementation problems.
-
Extending Authentication in the Solaris 9 Operating Environment Using
Pluggable Authentication Modules (PAM): Part II (October 2002)
-by Michael Haines and Joep Vesseur
This article is part two of a two-part series and details the PAM application
programming interface (API) and the PAM service provider interface (SPI).
Also included are procedures on how to effectively write PAM modules
when using the Solaris 9 Operating Environment (Solaris 9 OE). By writing
these PAM service modules, it is possible to extend the capability of
the Solaris 9 OE authentication mechanisms in a number of different
ways.
Part one,
Extending Authentication in the Solaris 9 Operating Environment Using
Pluggable Authentication Modules (PAM): Part I, was published
in the September 2002 issue of Sun BluePrints Online.
-
Extending Authentication in the Solaris 9 Operating Environment Using
Pluggable Authentication Modules (PAM): Part I (September 2002)
-Michael Haines
This article is the first of a two-part series that offers a technical
overview of how the Solaris 9 Operating Environment implementation of
Pluggable Authentication Modules (PAM) works. This article demonstrates
straightforward methods for configuring PAM to accommodate site-specific
security policy requirements and examines the PAM architecture and its
components.
-
Securing LDAP Through TLS/SSL--A Cookbook (June 2002)
-by Stefan Weber
Deploying secure Lightweight Directory Access Protocol (LDAP) connections
is becoming more demanding. This article details the steps on how to
set up the Sun Open Net Environment (Sun ONE) Directory Server software
so that it can be accessed securely from command line tools.
-
Solaris Operating Environment LDAP Capacity Planning and Performance
Tuning (May 2002)
-by Steve Lopez
Experienced System Administrators can increase the performance and scalability
of Netscape Directory by utilizing the key practice methodologies presented
in this article. These include key practices for the capacity planning
of the LDAP naming service on the Solaris Operating Environment, as
well as performance tuning examples and exercises.
-
Automating LDAP Client Installations (July 2001)
-by Tom Bialaski
The article explains how to configure a native LDAP client at installation
time, which is a new feature in Solaris 8 Operating Environment U3.
The basics of sysidtools and creating a sysidcfg
file for hands-off installation is covered along with how they relate
to LDAP. Hard to find (non-documented) tips are provided to avoid common
pitfalls.
-
Running Multiple Solaris Operating Environment Naming Services on
a Client (May 2001)
-by Tom Bialaski
The native LDAP client installation program assumes that you will not
be running another naming service on your client. Some customers, who
I have worked with, do not want to disable NIS when they configure native
LDAP. This can be done, but there is no readily available document which
describes how to do it. The article not only describes this procedure,
but also highlights best practices for running NIS and LDAP together.
PC Interoperability
-
Migrating to the Solaris Operating System: Migrating From Tru64 UNIX
(Novembe 2003)
-by Ken Pepple, Brian Down, and David Levy
This article presents a fictional case study that illustrates the methodology,
tools, and best practices used to migrate a Tru64 environment to a Solaris
environment.
BR> This article is the complete tenth chapter of the Sun BluePrints
book, "Migrating to the Solaris Operating System", by Ken Pepple,
Brian Down, and David Levy, which is available at our
Sun BluePrints publication page, amazon.com, and Barnes & Noble
bookstores. This article targets an intermediate audience.
-
Desktop Architecture Selection Guide (October 2003)
-by Howard Carlton
This article examines some of the main business drivers behind the current
trend towards adoption of thin client desktop solutions. The article
provides useful insights on the benefits and drawbacks of the various
candidate components for an alternative desktop environment. It also
provides guidelines on non-functional requirements and project life-cycle
approaches. This article is targeted to an introductory reader.
-
Migrating to the Solaris Operating System: Migration Strategies
(September 2003)
-by Ken Pepple, Brian Down, and David Levy
This article defines the most important terms in migration, and differentiates
between these terms. In addition, it presents migration strategies,
the benefits and risks of each strategy, and the appropriateness of
each strategy for various situations. This article is ideal for a beginning
to intermediate audience.
This article is the complete third chapter of the Sun BluePrints book,
"Migrating to the Solaris Operating System", which will be available
at the
Sun
BluePrints Publication page, the amazon.com website, and Borders
and Barnes & Noble bookstores at the end of October, 2003.
-
Windows NT Server Consolidation and Performance Improvements with
Solaris PC NetLink 2.0 Software (August 2002)
-by Don DeVitt
This article focuses on best practices to help data center managers
meet cost reduction goals in supporting multiple users accessing servers
through PC clients. New features in Solaris PC NetLink 2.0 software
that improve performance and add new options for consolidating Windows
NT servers are discussed.
-
Sizing Sun Ray Servers Running Windows Applications with SunPCi IIpro
Coprocessor Cards (November 2001)
-by Don DeVitt
This paper addresses the task of sizing a server capable of supporting
Wintel based applications on a Sun Ray Server utilizing Sun Pci IIpro
co-processor cards. The paper integrates the the informationof several
previously published documents and sizing tools to determine a baselineconfiguration.
The paper also suggests many best practice options for configuring the
server.
-
Supporting Microsoft Windows 2000 Server Applications from Sun Enterprise
Servers (June 2001)
-by Don DeVitt
This article explores using multiple SunPCi II Pro cards running on
Sun Enterprise servers to support Microsoft Windows 2000 Server applications.
New SunPCi II Pro hardware and software now support multiple cards in
one Sun Enterprise server. Benchmarks and Sizing information for a Windows
2000 Terminal Server environment are discussed.
-
Sharing NFS and Remote File Systems via Solaris PC NetLink Software
(November 2000)
-by Don DeVitt
This article offers best practice solutions for sharing NFS and remote
file systems via Solaris PC NetLink software. These solutions help your
enterprise avoid potential conflicts in the decision to allow access
to files using Solaris PC NetLink software.
-
Using Solaris Resource Manager with Solaris PC NetLink Software -
Part 2 (June 2000)
-by Don DeVitt
Don presents part 2 of this article in which he includes an experiment
that is performed to determine a useful range of shares that can be
allocated to the Solaris PC NetLink software by the Solaris Resource
Manager software.
-
Using Solaris Resource Manager with Solaris PC NetLink Software -
Part 1 (May 2000)
-by Don DeVitt
Don discusses the use of Solaris PC NetLink with Solaris Resource Manager.
-
Troubleshooting the Computer Browser Service with Solaris PC NetLink
Software (April 2000)
-by Don DeVitt
Don discusses trouble-shooting network browsing with Solaris PC NetLink
software.
-
Managing the Solaris PC NetLink Registry (February 2000)
-by Don DeVitt
highlights the importance of documenting and managing changes to the
Solaris PC NetLink registry and establishing procedures for maintaining
the state server.
-
Upgrading the Solaris PC NetLink Software (January 2000)
-by Don DeVitt
Highlights some of the subtle upgrade options that many system administrators
will want to be aware of as they move from one version of Solaris PC
NetLink software to the next.
-
Tracing Resource Consumption of Solaris PC NetLink Software Users
(December 1999)
-by Don DeVitt
Shows the Solaris Operating Environment commands and the Solaris PC
NetLink software commands for determining which PC clients are consuming
resources via Solaris PC NetLink software.
-
SunPCi Supporting Highly Available PC Applications with Solaris
(August 1999)
-by Don DeVitt
Creating a highly available environment for supporting PC applications,
using the newly introduced SunPCi card.
-
Transitioning to Solaris PC NetLink 1.0 (June 1999)
-by Don DeVitt
Don takes you through step-by-step on setting up the Solaris PC NetLink.
High Availability
Data Center Practices
-
Migrating to the Solaris Operating System: Migrating From Tru64 UNIX
(November 2003)
-by Ken Pepple, Brian Down, and David Levy
This article presents a fictional case study that illustrates the methodology,
tools, and best practices used to migrate a Tru64 environment to a Solaris
environment.
BR> This article is the complete tenth chapter of the Sun BluePrints
book, "Migrating to the Solaris Operating System", by Ken Pepple,
Brian Down, and David Levy, which is available at our
Sun BluePrints publication page, amazon.com, and Barnes & Noble
bookstores. This article targets an intermediate audience.
-
Migrating to the Solaris Operating System: Migration Strategies
(September 2003)
-by Ken Pepple, Brian Down, and David Levy
This article defines the most important terms in migration, and differentiates
between these terms. In addition, it presents migration strategies,
the benefits and risks of each strategy, and the appropriateness of
each strategy for various situations. This article is ideal for a beginning
to intermediate audience.
This article is the complete third chapter of the Sun BluePrints book,
"Migrating to the Solaris Operating System", which will be available
at
Sun
BluePrints Publication page, the amazon.com website, and Borders
and Barnes & Noble bookstores at the end of October, 2003.
-
Sun Fire 15K/12K Server Preferred Practices (July 2003)
-by Lee Lustig
Many documents about configuring Sun Fire servers have been written
at Sun Microsystems. This article consolidates the information in those
documents to derive a set of preferred practices you can quickly reference
while planning an implementation. This article addresses preferred practices
at a high level, referencing supporting documentation when a more in-depth
technical discussion is warranted. This article is targeted for an introductory
level of expertise.
-
Role Based Access Control and Secure Shell--A Closer Look At Two
Solaris Operating Environment Security Features (June 2003)
-by Thomas M. Chalfant
To aid the customer in adopting better security practices, this article
introduces and explains two security features in the Solaris operating
environment. The first is Role Based Access Control and the second is
Secure Shell. The goal is to provide you with enough information to
make an effective decision to use or not use these features at your
site as well as to address configuration and implementation topics.
This article is targeted to the intermediate level of expertise.
-
Using NTP on the Sun Fire 15K/12K Server (June 2003)
-by Jason Beloro
This article addresses the time skew issues for the Sun Fire 12K/F15K
server and explains how the system controllers and domains can be configured
as NTP clients to external servers. A sample configuration is also provided.
This article is targeted to the intermediate level of expertise.
-
Consolidation Methodology (June 2003)
-by David Hornby and Ken Pepple
A proven methodology is critical to the success of a consolidation project.
This article outlines the major phases of the consolidation methodology
developed by Sun Professional Services. If you are considering, or have
already begun, a consolidation project for your data center, you can
use the methodology presented in this article to get a consolidation
effort underway.
This article is the complete fourth chapter of the Sun BluePrints book,
Consolidation in the Data Center, by David Hornby and Ken Pepple (ISBN
#0-13-045495-8). The later chapters in this book address the feasibility,
assessment, architecture, implementation, and management phases in detail.
-
An Architecture for Creating and Managing Integrated Software Stacks
(May 2003)
-by John S. Howard
Creating and managing complex, integrated system software stacks are
some of the most challenging and time-consuming tasks facing data center
managers. This article examines the challenges of these tasks and provides
an architecture for software stack creation and management.
-
A Patch Management Strategy for the Solaris Operating Environment
(January 2003)
-by Ramesh Radhakrishnan
Managing software patches is complex and time consuming. This article
offers a high-level strategy for managing patches in a variety of different
types of compute environments that are running on the Solaris operating
environment. This article divides the patch management process into
seven phases, each of which can be tailored to suit your distinct IT
environment. This article does not discuss the step-by-step process
of installing Solaris OE patches, but instead addresses higher-level
concepts that can be used with any patch installation utility. This
article is intended for IT managers, IT architects, lead system administrators,
and anyone interested in developing a patch management strategy.
-
BluePrint for Benchmarking Success (January 2003)
-by Hans Joraandstad and Barbara Perz
This article provides best practices for benchmarking and it's ideal
for those using benchmarking to gather information that will help make
a decision on which computer to buy.
-
Configuring Databases Using Soft Links (January 2003)
-by Carlos Godinez
This article explains the advantages of using symbolic (soft) links
when configuring databases and provides techniques and examples for
using them. This article presents information that will enable you to
manage database configuration efficiently and accurately.
-
Managing Data Centers With Sun Management Center Change Manager
(October 2002)
-John S. Howard
Deploying and updating software are two of the most challenging and
time consuming tasks facing datacenter managers. The Sun Management
Center (Sun MC) Change Manager software provides a framework and tools
for quickly and efficiently deploying, replicating, updating, and managing
software over a large number of systems. This article presents techniques
and best practices for using Sun Management Center Change Manager software.
-
Sun Fire Systems Design and Configuration Guide (September
2002)
-Nathan Wiger and Roger Blythe
This article details key features of the Sun Fire product line and presents
a process you can follow to determine which server best meets your needs.
An excerpt from the new Sun BluePrints book, "Sun Fire Systems Design
and Configuration Guide" by Nathan Wiger and Roger Blythe, this article
provides best practice design consideration, rules of thumb, and sample
server configurations.
-
Consolidation in the Data Center (September 2002)
-by Ken Pepple and David Hornby
Data center consolidation is about reducing the number of devices
you have to manage and reducing the number of ways you use to manage
them. This article introduces various types of consolidations you can
perform - servers, applications, storage, shared services, networks,
and people resources - and describes some of the benefits of each type
of consolidation.
-
Sun StorEdge[tm[ Instant Image 3.0 and Oracle8i Database Best Practices
(August 2002)
-by Art Licht
A methodology for implementing the Sun StorEdge Instant Image 3.0 Point-In-Time
(PIT) copy technology to perform non-intrusive and efficient backup
operations on Oracle8i databases, without impacting business operations
is presented. A method customers can use to repurpose the PIT Oracle8i
data for parallel business processes is also included.
-
An Information Technology Management Reference Architecture Implementation
(July 2002)
-by Edward Wustenhoff
This article is the fifth in a series of articles by Edward Wustenhoff
on the data center management infrastructure. The focus of this article
is on the implementation of the management infrastructure. It is a follow-up
article on the
"An information Technology Management Reference Architecture article
published earlier by Edward Wustenhoff and the Sun BluePrints group.
It describes the implementation of IT management reference architecture
in the Authorized iForce Ready Center (iFRC) program that displays an
IDC Mail and Messaging Architecture. The iFRC program is a Sun program
that provides reference implementations and proof of concepts to assist
our customers in avoiding common pitfalls. This article describes the
technical aspects and details of the management and organization (M&O)
architecture deployment.
-
An Information Technology Management Reference Architecture
(June 2002)
-by Edward Wustenhoff
Building on Edward's prior Sun BluePrints OnLine articles, this article
describes the results of a proof-of-concept process to create an IT
management reference architecture that displays IDC mail and messaging,
as conducted at Sun's iForce Ready Center.
-
Deployment Considerations for Data Center Management Tools
(May 2002)
-by Edward Wustenhoff
Build a better management infrastructure by understanding more about
the basic building blocks, architecture, and key design elements of
a complete Systems Management Tools Framework, as presented in this
first article in a two-part series.
-
Using Live Upgrade 2.0 With JumpStart Technology and Web Start Flash
(April 2002)
-by John S. Howard
In this final installment of his three-part series on Solaris Live Upgrade
2.0 (LU) technology, John S. Howard provides recommendations and techniques
for integrating LU with the JumpStart software framework and the Solaris
Web Start Flash software.
-
Service Level Agreement in the Data Center (April 2002)
-by Edward Wustenhoff
Building on the definitions, processes, and best practices supporting
the Service Level Management (SLM) process presented in the first article
in this two-part series, this article explores Service Level Agreements
(SLAs). Best practices for keeping SLAs simple, measurable, and realistic--thus
avoiding the most common pitfalls of overpromising and underdelivering
on agreements--are detailed and templates are provided that illustrate
the translation of SLA principles to real-world examples.
-
Using Live Upgrade 2.0 With a Logical Volume Manager (March
2002)
-by John S. Howard
Part two of a three-part series by John S. Howard, this article addresses
best practices for upgrading systems, specifically using Live Upgrade
2.0 (LU 2.0) with a logical volume manager. As system administrators
know, system upgrades can be time-consuming and error-prone processes.
Further, mission-critical systems or datacenter systems typically cannot
afford to be taken down for much time to test patches and execute software
upgrades. While the examples in this article use VERITAS Volume Manager
(VxVM), the concepts and high-level procedural steps are the same whether
you use LU 2.0 with Solstice DiskSuite software.
-
Service Level Management in the Data Center (March 2002)
-by Edward Wustenhoff
Service Level Management (SLM) provides the methodology and discipline
for measuring overall system performance parameters and forms the basis
for implementing service level agreements (SLAs). This article presents
a basic definition of SLM, details the SLM process, and provides best
practices for using SLM. Tasks described include all aspects of gathering
the metrics needed, at all platform layers, to evaluate compliance with
SLAs and to ensure continuous improvement in overall system performance.
Future articles from this author will investigate best practices surrounding
SLAs.
-
Managing Solaris Operating Environment Upgrades with Live Upgrade
2.0 (February 2002)
-by John S. Howard
Performing an upgrade of an operating system and the associated system
software is one of the most time-consuming and error prone tasks facing
system administrators. Compounding the upgrade process is the reality
that most mission-critical or datacenter systems cannot afford to be
taken down for any length of time to test patches and execute software
upgrades. This article, part one of a three-part series, focuses on
how Live Upgrade (LU) provides a mechanism to manage and upgrade multiple
on-disk Solaris Operating Environments without taking the systems down.
LU provides a framework to upgrade and work within multiple on-disk
environments and reboots into the new Solaris Operating Environment
after completion of changes to the on-disk software images.
-
Data Center Design Philosophy (January 2002)
-by Rob Snevely
This article is from the entire first chapter of the Sun BluePrints
book, Enterprise Data Center Design and Methodology, (ISBN 0-13-047393-6),
which is available beginning January 30th through www.sun.com/books,
amazon.com, and Barnes & Noble bookstores.
This article lays the foundation for addressing challenges of data center
design, through a presentation of the more important design issues,
priorities, and philosophies. The article concludes with a summary of
the ten most important design guidelines.
-
The Intelligent Architectures Design Philosophy (December
2001)
-by John S. Howard
This article introduces the design philosophy and tenets of the Intelligent
Architectures (IA) approach to systems architecture: a philosophy centered
on the use of archetypes - original models after which similar things
are patterned. This article presents the IA archetypes in brief, as
well as rules and recommendations for combining archetypes to design
systems and datacenters.
-
Configuring Boot Disks (December 2001)
-by John S. Howard and David Deeths
This article is the fourth chapter of the Sun BluePrints book titled
Boot Disk Management: A Guide For The Solaris Operating Environment
(ISBN 0-13-062153-6), which is available through www.sun.com/books,
amazon.com, and Barnes & Noble bookstores.
-
Using NTP to Control and Synchronize System Clocks - Part III: NTP
Monitoring and Troubleshooting (September 2001)
-by David Deeths and Glenn Brunette
This article is the third in a series of three articles that discuss
using Network Time Protocol (NTP) to synchronize system clocks. The
goal of this article is to provide an effective understanding of NTP
troubleshooting and monitoring.
-
Using NTP to Control and Synchronize System Clocks - Part II: Basic
NTP Administration and Architecture (August 2001)
-by David Deeths and Glenn Brunette
This is Part 2 of a three-article series that discusses how to use Network
Time Protocol (NTP) to synchronize system clocks. This article explains
the basics of client and server administration, covering various client/server
configurations, as well as authentication and access control mechanisms.
This article also provides a number of suggestions for an effective
NTP architecture.
-
Using NTP to Control and Synchronize System Clocks - Part I: Introduction
to NTP (July 2001)
-by David Deeths and Glenn Brunette
This article is the first of a series on the Network Time Protocol (NTP).
NTP allows synchronizing clocks on different network nodes, which is
critical in today's networked world. This first article provides an
overview of why time synchronization is important and introduces basic
NTP concepts.
-
Datacenter Naming Scheme (May 2001)
-by Mark Garner
Eighty percent of outages are allegedly the result of people or proces
issues. An intuitive and informative naming scheme can define and highlight
the composition and function of components within a service infrastructure.
The article looks at the merits of such a naming scheme and includes
an example system for servers, storage, networks and cables that may
help reduce operational error.
-
Customizing the JumpStart Boot Image Recovery (March 2001)
-by John S. Howard
This article includes techniques and recommendations for creating a
recovery platform by augmenting the Solaris OE boot image (mini-root).
This article will also examine the boot and installation processes by
demonstrating how to adapt those processes for system recovery.
-
MR System for Rapid Recovery (January 2001)
-by John S. Howard
This article is an introduction to the MR system for rapid recovery.
As the system uptime requirements have become more exacting, the length
of time it takes to boot these larger and more complex systems has grown.
By implementing MR on your JumpStart servers it may be possible to reduce
the number of reboots required during a system recovery or service event.
This minimization of reboots will speed recovery and service time as
well as enable the system administrator to use datacenter tools during
system recovery procedures.
-
Sun/Oracle Best Practices (January 2001)
-by Bob Sneed
In this paper, Best Practice concepts are first defined, then specific
high-impact technical issues common with Oracle in the Solaris Operating
Environment are discussed.
-
Planning for Large Configurations of Netra t1 Servers (January
2001)
-by Stan Stringfellow - Special to the Sun BluePrints OnLine
This article examines a wide range of management and serviceability
issues that should be considered when planning a large (and possibly
geographically disbursed) server farm consisting of Netra t1 servers.
The use of the Netra alarms and lights-out management (LOM) module is
discussed in some detail. Consideration is also given to several other
topics, including the power and cooling issues that arise when up to
32 Netra t1 servers are mounted within a single rack or cabinet.
-
An Introduction to Live Upgrade (July 2000)
-by John S. Howard
John provides an introduction and overview of Live Upgrade and also
provides techniques and best practices for the usage of Live Upgrade.
-
Disaster Recovery Requirements Analysis (July 2000)
-by Stan Stringfellow - Special to Sun BluePrints OnLine
Stan discusses how to successfully implement a disaster recovery program
through careful and exhaustive disaster recovery requirements analysis.
He also provides a disaster recovery requirements analysis form that
can serve as the basis for an iterative negotiation process that helps
all parties to arrive at realistic expectations and well-understood
disaster recovery service level agreements.
-
JumpStart Mechanics: Using JumpStart Application for Hands- Free
Installation of Unbundled Software - Part 2 Automatic Encapsulation
of the Root Disk (June 2000)
-by John S. Howard
John provides procedures to fully automate the initial configuration
of Sun Enterprise Volume Manager and automate encapsulation of the boot
disk using JumpStart.
-
The Art of Production Environment Engineering (June 2000)
-by Bill Walker
Bill addresses the production environment needs of the datacenter using
the International Organization for Standardization (ISO), Fault Configuration
Application Performance Security model (FCAPS), Information Technology
Infrastructure Library framework (ITIL), a basic IT reference model,
and the SunReady Methodology's roadmap to prodution.
-
JumpStart Mechanics: Using JumpStart Application for Hands-Free Installation
of Unbundled Software - Part 1 (May 2000)
-by John S. Howard
John discusses automating and standardizing the installation of the
Solaris Operating Environment along with the associated unbundled software
products and datacenter management tools.
-
Solaris 8 Additions to sysidcfg (March 2000)
-by Rob Snevely
Shows you how to do fully hands-off installations of the Solaris 8 Operating
Environment. He also discusses how to use Jumpstart and sysidcfg
to provide uniform Solaris Operating Environment installations and save
you time.
-
Fast Oracle Parallel Exports on Sun Enterprise Servers (March
2000)
-by Stan Stringfellow - Special to Sun BluePrints OnLine
Gives a script that performs very fast Oracle database exports by taking
advantage of parallel processing on SMP machines. This script can be
invaluable for situations where you need to perform exports of large
mission-critical databases that require high availability.
-
An Overview of Methodology (April 1999)
-by Adrian Cockcroft
An in-depth overview on Service Level Definitions and Interactions and
Resource Management Control Loop.
-
Dynamic Reconfiguration (April 1999)
-by Enrique Vargas
The fundamentals of Dynamic Reconfiguration.
Rapid Recovery Techniques
-
Tuning ORACLE to Minimize Recovery Time: For Solaris Operating System
on SPARC (November 2003)
-by James Mauro
This article provides recommendations for tuning ORACLE on SPARC processor-based
systems running the Solaris Operating System (Solaris OS) to minimize
recovery in the event of a system or database failure. This article
is relevant for any audience level
-
Deploying the Solaris Operating Environment Using a Solaris Security
Toolkit CD (September 2003)
-by Steven Spadaccini
The Solaris Security Toolkit is a collection of shell scripts combined
to form a flexible and extensible framework for rapidly deploying hardened
platforms running the Solaris Operating Environment. The Toolkit is,
however, quite versatile and can be used for much more than just hardening
a system. This article discusses how the Toolkit can be used to construct
a bootable CD, based on Sun's JumpStart framework, for building and
configuring new systems. This article is authored for intermediate and
advanced system administrators.
-
Sun StorEdge[tm[ Instant Image 3.0 and Oracle8i Database Best Practices
(August 2002)
-by Art Licht
A methodology for implementing the Sun StorEdge Instant Image 3.0 Point-In-Time
(PIT) copy technology to perform non-intrusive and efficient backup
operations on Oracle8i databases, without impacting business operations
is presented. A method customers can use to repurpose the PIT Oracle8i
data for parallel business processes is also included.
-
Customizing the JumpStart Boot Image for Recovery (March
2001)
-by John S. Howard
This article includes techniques and recommendations for creating a
recovery platform by augmenting the Solaris OE boot image (mini-root).
This article will also examine the boot and installation processes by
demonstrating how to adapt those processes for system recovery.
-
MR Systme for Rapid Recovery (January 2001)
-by John S. Howard
This article is an introduction to the MR system for rapid recovery.
As the system uptime requirements have become more exacting, the length
of time it takes to boot these larger and more complex systems has grown.
By implementing MR on your JumpStart servers it may be possible to reduce
the number of reboots required during a system recovery or service event.
This minimization of reboots will speed recovery and service time as
well as enable the system administrator to use datacenter tools during
system recovery procedures.
-
SCSI-Initiator ID (August 2000)
-by David Deeths
Changing the SCSI-initiator ID is necessary for cluster configurations
that share SCSI devices between multiple hosts. This article walks you
through the process, and also provides an excellent background on SCSI
issues in clustered systems.
-
Disaster Recovery Requirements Analysis (July 2000)
-by Stan Stringfellow - Special to Sun BluePrints OnLine
Stan discusses how to successfully implement a disaster recovery program
through careful and exhaustive disaster recovery requirements analysis.
He also provides a disaster recovery requirements analysis form that
can serve as the basis for an iterative negotiation process that helps
all parties to arrive at realistic expectations and well-understood
disaster recovery service level agreements.
-
A Sun StorEdge Rapid Restore Solution for Disaster Resiliency
(April 2000)
-by Raza Hussain
Raza gives a quick and efficient method for using point in time images
to minimize the potential of data loss and expedite the restoration
of business to normal.
-
SSP Best Practices (March 2000)
-by John S. Howard
Presents best practice procedures and configurations for the SSP and
backup SSP. In addition, an overview of the MR system for rapid recovery
of systems or domains.
-
Rapid Recovery Techniques: Auditing Custom Software Configurations
(February 2000)
-by Richard Elling
The fourth article in a series that covers rapid recovery techniques
for the Solaris Operating Environment.
-
Rapid Recovery Techniques for the Solaris Operating Environment
(January 2000)
-by Richard Elling
Discusses the Solaris Operating Environment software registry, the ease
of building packages, and the use of these packages in an automated
installation environment.
-
Rapid Recovery Techniques: Repairing File Ownership and Mode
(December 1999)
-by Richard Elling
The second article in a series that will discuss rapid recovery techniques
for the Solaris Operating Environment.
-
Rapid Recovery Techniques: Exploring the Solaris Software Registry
(October 1999)
-by Richard Elling
How to use processes to recover from errors caused by people.
-
Solaris Operating System Availability Features (January 2004)
-by Thomas M. Chalfant
The processor offlining feature enables a processor to be removed from
use by Solaris in response to one or more L2 cache errors. The page
retirement feature enables a page of memory to be removed from use by
Solaris in response to repeated ECC errors within a memory page on a
DIMM. This paper provides detailed discussion regarding the algorithm,
implementation, kernel tunables, and messages you are likely to see
on a system running the appropriate kernel updates. This article is
ideal for an intermediate to advanced reader.
-
Provisioning in Replicated, Mission-Critical Environments
(March 2003)
-by Jay Daliparthy and James Falkner
This article introduces the concepts and best practices for using Solaris
Flash and Solaris Live Upgrade technologies to perform quick, consistent,
controlled, and reproducible Solaris Operating Environment installations
and upgrades. Creating, archiving, and deploying a Flash archive is
covered along with how to create and manage multiple boot environments.
-
A Patch Management Strategy for the Solaris Operating Environment
(January 2003)
-by Ramesh Radhakrishnan
Managing software patches is complex and time consuming. This article
offers a high-level strategy for managing patches in a variety of different
types of compute environments that are running on the Solaris operating
environment. This article divides the patch management process into
seven phases, each of which can be tailored to suit your distinct IT
environment. This article does not discuss the step-by-step process
of installing Solaris OE patches, but instead addresses higher-level
concepts that can be used with any patch installation utility. This
article is intended for IT managers, IT architects, lead system administrators,
and anyone interested in developing a patch management strategy.
-
Using Live Upgrade 2.0 With JumpStart Technology and Web Start Flash
(April 2002)
-by John S. Howard
In this final installment of his three-part series on Solaris Live Upgrade
2.0 (LU) technology, John S. Howard provides recommendations and techniques
for integrating LU with the JumpStart software framework and the Solaris
Web Start Flash software.
-
Using Live Upgrade 2.0 With a Logical Volume Manager (March
2002)
-by John S. Howard
Part two of a three-part series by John S. Howard, this article addresses
best practices for upgrading systems, specifically using Live Upgrade
2.0 (LU 2.0) with a logical volume manager. As system administrators
know, system upgrades can be time-consuming and error-prone processes.
Further, mission-critical systems or datacenter systems typically cannot
afford to be taken down for much time to test patches and execute software
upgrades. While the examples in this article use VERITAS Volume Manager
(VxVM), the concepts and high-level procedural steps are the same whether
you use LU 2.0 with Solstice DiskSuite software.
-
Managing Solaris Operating Environment Upgrades with Live Upgrade
2.0 (February 2002)
-by John S. Howard
Performing an upgrade of an operating system and the associated system
software is one of the most time-consuming and error prone tasks facing
system administrators. Compounding the upgrade process is the reality
that most mission-critical or datacenter systems cannot afford to be
taken down for any length of time to test patches and execute software
upgrades. This article, part one of a three-part series, focuses on
how Live Upgrade (LU) provides a mechanism to manage and upgrade multiple
on-disk Solaris Operating Environments without taking the systems down.
LU provides a framework to upgrade and work within multiple on-disk
environments and reboots into the new Solaris Operating Environment
after completion of changes to the on-disk software images.
-
Using NTP to Control and Synchronize System Clocks - Part III: NTP
Monitoring and Troubleshooting (September 2001)
-by David Deeths and Glenn Brunette
This article is the third in a series of three articles that discuss
using Network Time Protocol (NTP) to synchronize system clocks. The
goal of this article is to provide an effective understanding of NTP
troubleshooting and monitoring.
-
Using NTP to Control and Synchronize System Clocks - Part II: Basic
NTP Administration and Architecture (August 2001)
-by David Deeths and Glenn Brunette
This is Part 2 of a three-article series that discusses how to use Network
Time Protocol (NTP) to synchronize system clocks. This article explains
the basics of client and server administration, covering various client/server
configurations, as well as authentication and access control mechanisms.
This article also provides a number of suggestions for an effective
NTP architecture.
-
Using NTP to Control and Synchronize System Clocks - Part I: Introduction
to NTP (July 2001)
-by David Deeths and Glenn Brunette
This article is the first of a series on the Network Time Protocol (NTP).
NTP allows synchronizing clocks on different network nodes, which is
critical in today's networked world. This first article provides an
overview of why time synchronization is important and introduces basic
NTP concepts.
-
Building a Bootable JumpStart Installation CD-ROM (March
2001)
-by John S. Howard
This article presents an examination of the structure of a bootable
Solaris Operating Environment (Solaris OE) CD-ROM and procedures for
how to create a bootable JumpStart installation CD-ROM. This CD can
be used to complete a standardized, hands-free Solaris OE installation
in environments where the disk space or networking constraints do not
allow for a JumpStart server.
-
Exploring the iPlanet Directory Server NIS Extensions (August
2000)
-by Tom Bialaski
Tom discusses how to implement a phased deployment using the Solaris
Extensions for Netscape Directory Server 4.11.
-
Upgrading to the Solaris 8 Operating Environment (April 2000)
-by Computer Systems, Solaris Productization and Marketing
This article displays how administrators can upgrade quickly to the
Solaris 8 Operating Environment by proactively testing applications
and using Solaris JumpStart.
-
Building Longevity into Solaris Operating Environment Applications
(April 2000)
-by Computer Systems, Solaris Productization and Marketing
This article discusses specific steps that developers can take to improve
the longevity of their applications. It also introduces evolutionary
new features and interfaces that Sun offers in the Solaris 8 Operating
Environment release.
-
Operating Environment: Solaris 8 Installation and Boot Disk Layout
(March 2000)
-by Richard Elling
Discusses Solaris WebStart. a new Java-based procedure that simplifies
installation of the Solaris 8 Operating Environment. Richard also recommends
a boot disk layout for desktop and small workgroup servers.
-
NIS to LDAP Transition: Exploring (February 2000)
-by Tom Bialaski
Examines technologies that help increase availability during the transition
from legacy Solaris Operating Environment directory services to LDAP
based ones.
-
Solaris Directory Services: Past, Present and Future (October
1999)
-by Tom Bialaski
The high availability features of currently supported Solaris Operating
Environment directory services (NIS, NIS+, DNS) and contrasts them with
LDAP's high availability features.
-
DR Requirements for I/O Device Drivers (June 1999)
-by Enrique Vargas
Covers the device driver functions that are required to fully support
the DR framework.
-
Metropolitan Area Sun Ray Services (May 2002)
-by Lars Persson
Expand into new lines of business and drastically reduce the actual
and hidden costs of ownership of the desktop PC device by implementing
these preferred practice recommendations for deploying Sun Rays over
a Metropolitan Area Network.
-
Planning for Large Configurations of Netra t1 Servers (January
2001)
-by Stan Stringfellow - Special to the Sun BluePrints OnLine
This article examines a wide range of management and serviceability
issues that should be considered when planning a large (and possibly
geographically disbursed) server farm consisting of Netra t1 servers.
The use of the Netra alarms and lights-out management (LOM) module is
discussed in some detail. Consideration is also given to several other
topics, including the power and cooling issues that arise when up to
32 Netra t1 servers are mounted within a single rack or cabinet.
-
Sun Cluster 3.0 Series: Guide to Installation--Part 2 (May
2003)
-by >Chris Dotson
This Sun Cluster implementation guide reviews the Sun Cluster concepts
and components important to the specific installation procedures. This
guide also describes the methods of constructing a Sun Cluster, and
provides procedures for installing the cluster software onto each node
and configuring the disks. This article is teh second part in a two-part
series.
"Sun Cluster 3.0 Series: Guide to Installation--Part 1" was
a Sun BluePrints article in April 2003.
-
Sun Cluster 3.0 Series: Guide to Installation--Part 1 (April
2003)
-by Chris Dotson
Part one of a two-part series, this article guides the reader through
preparation and setup, prior to deployment of a Sun Cluster system.
Sun's preferred methodology for installing Sun Cluster software, Sun's
Enterprise Install Services (EIS) processes, are presented.
- Cluster Column:
IMPLEMENTATION GUIDE:
Guide to Installation--Part II: Sun Cluster 3.0 Software Management
Services (May 2002)
-by Chris Dotson and Steve Lopez
The second in a two-part series, this module details the tasks that
must be performed to install the Solaris Operating Environment on each
cluster node during a Sun Cluster 3.0 software installation.
- Cluster Column:
IMPLEMENTATION GUIDE:
Guide to Installation--Part I: Sun Cluster Management Services
(April 2002)
-by Chris Dotson and Steve Lopez
This module contains the tasks that must be performed for installation
of Sun Cluster 3.0 software. These tasks include setting up the administrative
workstation, configuring the Sun Cluster 3.0 software cluster, implementing
best practices, performing design verifications, and administering a
two-node Sun Cluster 3.0 hardware cluster.
-
Introduction to SunTone Clustered Database Platforms (March
2002)
-by Ted Persky and Richard Elling
While there appears to be unanimous consent in the industry that integrated
hardware and software platforms are needed, there is not a similar agreement
of what, exactly, constitutes an integrated stack, particularly in the
area of clusters and high availability. Further, people want to know
what best practices they should embrace and which services they should
provide. This article details the benefits that can be derived from
a clustered Oracle database software stack that has been integrated
to best practices and is ready to deploy. The examples in this article
highlight Sun's soon-to-be-released Clustered Database Platform 280/3.
-
Automating Sun Cluster 3.0 Data Service Setup (February 2002)
-by Tom Bialaski
After installing Sun Cluster 3.0 software and performing basic cluster
configuration, the next task is to set up the applications or data services
for the application to run on the cluster. This procedure involves a
number of steps, many of which need to be performed from the command
line. Others such as creating a resource group, can be performed through
the SunPlex GUI. Because these steps require executing complicated commands
or traversing through several GUI screens, it is advantageous to write
scripts that can simplify and automate the data service and configuration
process. Scripts are also a valuable tool to capture work completed
in a test environment to ensure consistent deployment on the production
network. In addition, scripts are useful to enable less-experienced
system administrators to perform complex configuration tasks, or to
rebuild systems for multiple testing purposes. To highlight how to architect
such scripts, this article illustrates best practices in deploying the
HA-NFS data service, for which the agent is contained on the Sun Cluster
3.0 Data Services CD-ROM.
-
IMPLEMENTATION GUIDE:
Guide to Installation - Hardware Setup (January 2002)
-by Chris Dotson and Steve Lopez
This article provides hardware configuration and installation procedures
for each component of a Sun Cluster 3.0, two-node cluster. Procedures
include commands required to configure the cluster hardware and best
practices for achieving higher availability and/or performance for the
two-node cluster. Sun's Cluster Platform 220/1000, featuring redundant
Sun Enterprise 220R servers and Sun StorEdge D1000 disk arrays, Terminal
Concentrator, and the Sun Cluster 3.0 Administration Workstation is
examined. Note: This article is available in PDF format only.
-
Building Sun based Beowulf Cluster (December 2001)
-by Börje Lindh
This article explains how you can build compute clusters from Sun Microsystems
components that competes with Beowulf clusters and above.
-
Cluster and Complex Design Issues (November 2001)
-by Richard Elling and Tim Read
This is the entire first chapter from the Sun BluePrints Book Designing
Solutions with Sun Cluster 3.0. In it, the authors examine how failures
occur in complex systems and show methods that contain, isolate, report,
and repair failures. Special considerations for clustered systems are
discussed, including the impact of caches, timeouts, and the various
failure modes, such as split brain, amnesia, and multiple instances.
-
Writing Scalable Services With Sun Cluster 3.0 Software (October
2001)
-by Peter Lees
This article provides an introduction to the supporting features in
the Sun Cluster 3.0 product release. It also describes both the technical
requirements that must be considered when designing and programming
an application to the most effective use of the cluster framework. This
article also details some of the tools available for creating scalable
resources.
-
Robust Clustering: A Comparison of Sun Cluster 3.0 versus Sun Cluster
2.2 Software (September 2001)
-by Tim Read and Don Vance
This article provides a technical comparision between Sun's most recent
version of its clustering software and the previous version. The newest
version includes numerous new features, which are examined in depth.
-
Cluster Platform 220/1000 Architecture-A Product from the SunTone
Platforms Portfolio (August 2001)
-by Enrique Vargas
This article will provide customers a better understanding of this product
capabilities by presenting its hardware and software architecture as
well as best practices used in integrating the design.
-
Securing Web Applications through a Secure Reverse Proxy
(November 2003)
-by Anh-Duy Nguyen
This article describes recommended practices for setting up the Sun
ONE Proxy Server software to represent a secure content server to outside
clients, preventing direct, unmonitored access to your server's data
from outside your company. This article uses recommended practices to
secure your web applications behind a firewall and leverage access and
authentication using the Sun ONE platform products.
This article assumes an intermediate reader who is familiar with installing
and configuring the Sun ONE Proxy Server. It also assumes that the reader
can configure the firewall router to allow a specific server on a specific
port access through the firewall without allowing any other machines
in or out.
-
Sun ONE Portal Server 6 Best Practices (October 2003)
-by Christian Candia
Christian Candia - This article presents the best practices for high
availability, security, and scalability that commonly have significant
success on a Sun ONE Portal Server software solution. In addition, the
article includes guidelines for creating a Sun ONE Portal Server software
solution that can be easily supported. This article is ideal for the
advanced reader.
-
Using the LDAP to NIS+ Gateway (September 2003)
-by Tom Bialaski and Michael Haines
There are two approaches that you can take when transitioning from NIS+
to LDAP-based services. One approach is to replace your naming service
clients with the Secured LDAP Client. The second approach is to keep
your current NIS+ clients, and deploy a transition tool to gain access
to LDAP naming service data. The first approach is covered in chapter
four of the soon-to-be released Sun BluePrints book, "LDAP in the
Solaris Operating Environment -- Deploying Secure Directory Services",
by Michael Haines and Tom Bialaski. The second approach, using the NIS+
to LDAP Gateway, is discussed in this article. This article is intended
for IT architects and administrators who have deployed an earlier version
of the directory server software, and who are interested in upgrading
to the Sun ONE Directory Server 5.2 software version.
This Sun BluePrints book is scheduled for publication in the Fall of
2003 and will be available at
Sun
BluePrints Publication page, the amazon.com website, and Borders
and Barnes & Noble bookstores.
-
Sun ONE Messaging Server Practices and Techniques for Enterprise
Customers (September 2003)
-by Dave Pickens
Often times a messaging server implementation isn't properly monitored
for "soft" faults or warnings until it's too late. This article, a chapter
from the new Sun BluePrints book, "Sun ONE Messaging Server, Practices
and Techniques for Enterprise Customers", provides insight and guidance
into methods for monitoring the Sun ONE Messaging Server. This article
is ideal for a beginning to intermediate audience.
This new book will be available at
Sun
BluePrints Publication page, the amazon.com website, and Borders
and Barnes & Noble bookstores in September 2003.
-
Sun ONE Portal Server and Lotus iNotes Integration Recipe
(August 2003)
-by Rob Baker
This article describes a best-practices approach to integrating the
latest version of Lotus iNotes with the Sun ONE Portal Server 6.0 software.
This article covers Lotus iNotes configuration, advanced portal configuration,
and how to coordinate both products so that they complement each other
in a successful, secure-portal deployment. This article is intended
for integrators, administrators, and Sun Professional Services personnel.
You should have familiarity with portal administration before performing
the procedure in this article.
-
Transition Guide--Upgrading From the iPlanet Directory Server 5.1
Software to the Sun ONE Directory Server 5.2 Software (August
2003)
-by Tom Bialaski and Michael Haines
The information in this article is derived from an upcoming Sun BluePrints
book, "LDAP in the Solaris Operating Environment -- Deploying Secure
Directory Services," by Michael Haines and Tom Bialaski. This book is
scheduled for publication in the Fall of 2003.
That book and this article cover the recently released Sun ONE Directory
Server 5.2 software, which introduces several significant features,
including support for the Secured LDAP Client. This article discusses
important differences in the packaging, installation, and configuration
of the Sun ONE Directory Server 5.2 software as compared with the previous
version. This article also discusses how to configure the software to
support Secured LDAP Clients. This article is intended for IT architects
and administrators who have deployed an earlier version of the directory
server software, and who are interested in upgrading to the Sun ONE
Directory Server 5.2 software version.
-
Using the Sun ONE Application Server 7 to Enable Collaborative B2B
Transactions (June 2003)
-by Michael Wheaton
This Sun BluePrints OnLine article describes a design for a comprehensive
Web services application architecture that enables businesses to publish,
find, and execute collaborative B2B workflows with trading partners.
It describes how businesses should capture their offerings in a declarative
Web services format and decouple them from the tightly bound code that
exists in point-to-point solutions.
This article is written for system architects and professional service
engineers who have a solid understanding of Web services technologies,
including WS-I Basic Profile and electronic business eXtended Markup
Language (ebXML) specifications. This article is targeted to the introductory
level of expertise.
-
Sun ONE Portal Server and Microsoft Exchange Integration Cookbook
(May 2003)
-by Rob Baker
This article, written in the form of a cookbook, as well as related
scripts, provide you with information and tools necessary to integrate
Microsoft Exchange 2000 SP3, with the Sun Open Net Environment (Sun
ONE) Portal Server software. This article can help portal administrators
solve portal server integration problems caused by new underlying technologies
introduced by Microsoft in Exchange 2000 SP3, specifically for integration
with the portal server Netlet and rewriter components.
You need knowledge of both products prior to attempting this integration.
Extensive familiarity with HTML 4.x, JavaScript, CSS, XML, and XSL is
also important to fully understand the implications of changes suggested
by this article. To download the scripts for this article, see the
Sun BluePrints
Scripts and Tools page and click on Exchange Integration Cookbook
Scripts.
-
Writing an Authentication Plug-in for a Sun ONE Directory Server
(March 2003)
-by Nicola Venditti
The Sun ONE Directory Server has an advanced application program interface
(API) for writing plug-ins that extend the directory server's functionality.
In this article, information is provided for a better understanding
of the tasks involved in writing a plug-in. The impact and benefit plug-ins
can provide to the directory server is explained. In addition, a sample
preoperation
plug-in is provided.
-
Sun ONE Portal Server 3.0 Rewriter Configuration and Management Guide
(July 2002)
-by Rob Baker
This article provides comprehensive best practices and deployment guidelines
for the Sun ONE Portal Server 3.0 product, with a specific emphasis
on the rewriter component of the Secure Remote Access Gateway (SRAP).
The SRAP is a portal server add-on that enables end users to access
enterprise web content securely, using only a standard web browser with
a Java virtual machine. The article highlights best practices for the
SRAP and presents methods for configuring it to leverage existing corporate
intranet content while enabling flexibility for future growth. These
practices allow users to fully utilize this unique feature of the Sun
ONE Portal Server product. Detailed knowledge needed for complex Sun
ONE Portal Server product deployments involving a vast array of aggregated
content and content types are also provided.
-
Sun's Quality, Engineering, and Deployment (QED) Test Train Model
(August 2002)
-by George Wood
The why and how of Sun's integration and interoperability testing process,
known internally as the Solaris OE Train, are explained in this article.
This long conducted software testing program supports each Solaris Operating
Environment (Solaris OE) release and have recently been expanded to
include rigorous integration and interoperability testing of key third
party software from VERITAS Software and Oracle Corporation, as well
as Sun Open Net Environment (Sun ONE) software.
Resource Management
-
Sun Grid Engine, Enterprise Edition-Configuration Use Cases and Guidelines
(July 2003)
-by Charu Chaubal
This article describes a set of use cases for configuration of Sun Grid
Engine, Enterprise Edition 5.3 (Sun ONE GEEE) software. It is meant
to be a starting point from which intermediate to advanced Sun One GEEE
software administrators can create a customized configuration for their
particular environment. It is important to realize that each environment
has unique requirements, and that the greatest benefits of the Sun ONE
GEEE software policy module are obtained by fine-tuning a configuration
once the results of the initial configuration have been assessed. Moreover,
as the environment evolves and the needs of the enterprise change, additional
tuning on an ongoing basis will probably be appropriate. This article
assumes the reader has some familiarity with the features and parameters
of Sun ONE GEEE.
-
Building a Global Compute Grid - Two Examples Using the Sun ONE Grid
Engine and the Globus Toolkit (April 2003)
-by Charu Chaubal & Radoslaw Rafinski
Currently, much research activity is based around the implementation
of advanced resource sharing networks, which are geographically distributed.
Much of this research has taken advantage of the Globus Toolkit, an
open source toolkit provided by the Globus organization. In this Sun
BluePrints article, the problem of building a compute grid using the
Globus Toolkit and how it can best be integrated with Sun ONE Grid Engine
are discussed. Two case studies in the academic arena are presented.
-
A New Open Resource Management Architecture in the Sun HPC ClusterTools
Environment (November 2002)
-by Steve Sistare
This article presents a new architecture for the integration of the
Sun HPC ClusterTools parallel computing environment with distributed
resource management systems such as the Sun Grid Engine system. The
architecture enables a tight integration to be achieved with multiple
distributed resource management systems in a uniform and extensible
framework, which means that any of the popular management systems may
be used to launch and monitor Sun MPI parallel jobs. Unlike previously
available loose integrations, tight integrations allow a resource manager
to accurately measure resources used by the parallel processes, to terminate
jobs that exceed resource limits, and to generate accurate accounting
information for multi-process jobs Tight integrations are implemented
with Sun Grid Engine software, PBS, and LSF. Correct resource accounting
with this tight integration is demonstrated and launching and debugging
Sun MPI jobs using each system is detailed.
-
Resource Management in the Solaris 9 Operating Environment
(September 2002)
-Stuart J. Lawson
The
Solaris Resource Manager (Solaris RM) enables the resources of a
single instance of the operating environment to be shared in an arbitrarily
fine-grained manner, among consolidated or partitioned applications
or system users. The Solaris RM can be used such that a guaranteed level
of service can be given, where appropriate. In this article, Stuart
Lawson describes the three core resource management approaches in the
Solaris 9 Operating Environment and offers best practices for setting
up a resource management framework.
-
Introduction to the Cluster Grid - Part 2 (September 2002)
-James Coomer and Charu Chaubal
Grid computing is a rapidly emerging technology that can be implemented
through the use of the
Sun Cluster
Grid software stack. In the second part of a two-part series, this
article takes the next step in describing the Sun Cluster Grid design
phase which includes information gathering, design decisions, installation
and management considerations, and example implementations.
-
Introduction to the Cluster Grid - Part 1 (August 2002)
-by James Coomer and Charu Chaubal
Grid computing is a rapidly emerging technology which can be implemented
today through the use of the Sun Cluster Grid software stack. Part one
of this two part series provides an introduction to grid architecture,
and discusses how the architecture can be applied to existing compute
environments using the Sun Cluster Grid software stack. Full treatment
of the cluster grid design and implementation will be provided in the
September BluePrints Online article, "Introduction to the Cluster Grid
- Part 2".
-
Enterprise Management Systems Part II: Enterprise Quality of Service
(QoS) Provisioning and Integration (May 2002)
-by Deepak Kakadia with Dr. Tony G. Thomas, Dr. Sridhar Vembu, and
Jay Ramasamy of AdventNet, Inc.
Building on the concepts of how to best manage services in Service Driven
Networks, this second article of the two-part series describes how to
integrate Sun Management Center 3.0 software and AdventNet WebNMS 2.3
software to provision end-to-end services and provide a complete solution
that can effectively manage a multivendor environment.
-
Enterprise Management Systems Part I: Architectures and Standards
(April 2002)
-by Deepak Kakadia, Dr. Tony Thomas, Dr. Sridhar Vembu and Jay Ramasamy
The first in a two-part series focused on managing services in Service
Driven Networks (SDNs), this article presents a summary of typical architectures
and a clarification of the standards to help the reader better understand
the implementations of various third-party vendor EMSystems solutions.
-
Enterprise Quality of Service (QoS) Part II: Enterprise Solution
using Solaris Bandwidth Manager 1.6 Software (March 2002)
-by Deepak Kakadia
Deepak's article is the second in a two-part series that focuses on
Quality of Service (QoS) issues. This article explores possible approaches
to deploying an Enterprise Quality of Service solution using Solaris
Bandwidth Manager 1.6 software. It also presents an integrated close-loop
solution using Sun Management Center 3.0 software, which exploits API's
offered by both products and creates a policy-based QoS solution for
the enterprise.
-
Enterprise Quality of Service (QoS): Part I - Internals (February
2002)
-by Deepak Kakadia
In a two-article series, distinguished Sun BluePrints author works to
clear the confusion surrounding QoS by explaining what it is, how it
is implemented, and how to use it in an enterprise. This month's part
one article details the basics surrounding the "what" and "how" of implementation,
as well as the internals of QoS. Be sure to return to Sun BluePrints
OnLine next month for his second article which will focus on how to
deploy QoS in an enterprise.
-
Managing Systems and Resources in HPC Environments (February
2002)
-by Omar Hassaine
Written for the compute-intensive site administrator and user, this
article highlights the benefits, presents preferred practices, and provides
useful recommendations for using enterprise server tools and features
available in commercial environments.
-
Issues in Selecting a Job Management System (January 2002)
-by Omar Hassaine
This article addresses the problems usually faced when selecting the
most appropriate job management system (JMS) to deploy at HPC sites.
The article describes the three most popular offerings available on
the Sun platform and provides a classification of the most important
features to use as a basis in selecting a JMS. A JMS comparison and
useful set of recommendations are included.
-
Using Solaris Resource Manager with Solaris PC NetLink Software -
Part 2 (June 2000)
-by Don DeVitt
Don presents part 2 of this article in which he includes an experiment
that is performed to determine a useful range of shares that can be
allocated to the Solaris PC NetLink software by the Solaris Resource
Manager software.
-
Using Solaris Resource Manager with Solaris PC NetLink Software -
Part 1 (May 2000)
-by Don DeVitt
Don discusses the use of Solaris PC NetLink with Solaris Resource Manager.
-
Tracing Resource Consumption of Solaris PC NetLink Software Users
(December 1999)
-by Don DeVitt
Shows the Solaris Operating Environment commands and the Solaris PC
NetLink software commands for determining which PC clients are consuming
resources via Solaris PC NetLink software.
-
Policy-Based Networks (October 1999)
-by Jean-Christophe Martin
Talks about the network policy concept in greater depth, and see how
it is implemented in the Solaris Bandwidth Manager software.
-
Modelling the Behavior of Solaris Resource Manager Software
(August 1999)
-by Enterprise Engineering
How Solaris Resource Manager software achieves dynamic resource consumption
by using a fair share CPU scheduling algorithm.
-
Solaris Resource Manager: Resource Assignment (August 1999)
-by Richard McDougall
This article explains how users are assigned resource lnodes and under
what circum-stances they change to ensure that resource limits are allocated
correctly.
-
Solaris Bandwidth Manager (June 1999)
-by Evert Hoogendoorn
Evert explains the benefits of Solaris Bandwidth Manager.
-
Load Sharing Facility (June 1999)
-by Tom Bialaski
How LSF can be used as a resource management tool for running technical
batch applications such as simulations.
-
Solaris Resource Manager - Decay Factors and Parameters (April
1999)
-by Richard McDougall
More on Solaris Resource Manager with the Decay Factors and Parameters.
-
Solaris Resource Manager - Decay and Scheduler Parameters
(April 1999)
-by Richard McDougall
Continues with the topic of Solaris Resource Manager Decay.
-
An Overview of Methodology (April 1999)
-by Adrian Cockcroft
An in-depth overview on Service Level Definitions and Interactions and
Resource Management Control Loop.
-
Dynamic Reconfiguration (April 1999)
-by Enrique Vargas
The fundamentals of Dynamic Reconfiguration.
-
Managing NFS Workloads (April 1999)
-by Richard McDougall, Adrian Cockcroft and Evert Hoogendoorn
Demonstration of the usage and management of NFS.
-
Solaris Resource Manager (April 1999)
-by Richard McDougall
Overview and examples of Solaris Resource Manager functions.
-
Migrating to the Solaris Operating System: Migrating From Tru64 UNIX
(November 2003)
-by Ken Pepple, Brian Down, and David Levy
This article presents a fictional case study that illustrates the methodology,
tools, and best practices used to migrate a Tru64 environment to a Solaris
environment.
BR> This article is the complete tenth chapter of the Sun BluePrints
book, "Migrating to the Solaris Operating System", by Ken Pepple,
Brian Down, and David Levy, which is available at our
Sun BluePrints publication page, amazon.com, and Barnes & Noble
bookstores. This article targets an intermediate audience.
-
Migrating to the Solaris Operating System: Migration Strategies
(September 2003)
-by Ken Pepple, Brian Down, and David Levy
This article defines the most important terms in migration, and differentiates
between these terms. In addition, it presents migration strategies,
the benefits and risks of each strategy, and the appropriateness of
each strategy for various situations. This article is ideal for a beginning
to intermediate audience.
This article is the complete third chapter of the Sun BluePrints book,
"Migrating to the Solaris Operating System", which will be available
at
Sun
BluePrints Publication page, the amazon.com website, and Borders
and Barnes & Noble bookstores at the end of October, 2003.
Society
Groupthink :
Two Party System
as Polyarchy :
Corruption of Regulators :
Bureaucracies :
Understanding Micromanagers
and Control Freaks : Toxic Managers :
Harvard Mafia :
Diplomatic Communication
: Surviving a Bad Performance
Review : Insufficient Retirement Funds as
Immanent Problem of Neoliberal Regime : PseudoScience :
Who Rules America :
Neoliberalism
: The Iron
Law of Oligarchy :
Libertarian Philosophy
Quotes
War and Peace
: Skeptical
Finance : John
Kenneth Galbraith :Talleyrand :
Oscar Wilde :
Otto Von Bismarck :
Keynes :
George Carlin :
Skeptics :
Propaganda : SE
quotes : Language Design and Programming Quotes :
Random IT-related quotes :
Somerset Maugham :
Marcus Aurelius :
Kurt Vonnegut :
Eric Hoffer :
Winston Churchill :
Napoleon Bonaparte :
Ambrose Bierce :
Bernard Shaw :
Mark Twain Quotes
Bulletin:
Vol 25, No.12 (December, 2013) Rational Fools vs. Efficient Crooks The efficient
markets hypothesis :
Political Skeptic Bulletin, 2013 :
Unemployment Bulletin, 2010 :
Vol 23, No.10
(October, 2011) An observation about corporate security departments :
Slightly Skeptical Euromaydan Chronicles, June 2014 :
Greenspan legacy bulletin, 2008 :
Vol 25, No.10 (October, 2013) Cryptolocker Trojan
(Win32/Crilock.A) :
Vol 25, No.08 (August, 2013) Cloud providers
as intelligence collection hubs :
Financial Humor Bulletin, 2010 :
Inequality Bulletin, 2009 :
Financial Humor Bulletin, 2008 :
Copyleft Problems
Bulletin, 2004 :
Financial Humor Bulletin, 2011 :
Energy Bulletin, 2010 :
Malware Protection Bulletin, 2010 : Vol 26,
No.1 (January, 2013) Object-Oriented Cult :
Political Skeptic Bulletin, 2011 :
Vol 23, No.11 (November, 2011) Softpanorama classification
of sysadmin horror stories : Vol 25, No.05
(May, 2013) Corporate bullshit as a communication method :
Vol 25, No.06 (June, 2013) A Note on the Relationship of Brooks Law and Conway Law
History:
Fifty glorious years (1950-2000):
the triumph of the US computer engineering :
Donald Knuth : TAoCP
and its Influence of Computer Science : Richard Stallman
: Linus Torvalds :
Larry Wall :
John K. Ousterhout :
CTSS : Multix OS Unix
History : Unix shell history :
VI editor :
History of pipes concept :
Solaris : MS DOS
: Programming Languages History :
PL/1 : Simula 67 :
C :
History of GCC development :
Scripting Languages :
Perl history :
OS History : Mail :
DNS : SSH
: CPU Instruction Sets :
SPARC systems 1987-2006 :
Norton Commander :
Norton Utilities :
Norton Ghost :
Frontpage history :
Malware Defense History :
GNU Screen :
OSS early history
Classic books:
The Peter
Principle : Parkinson
Law : 1984 :
The Mythical Man-Month :
How to Solve It by George Polya :
The Art of Computer Programming :
The Elements of Programming Style :
The Unix Hater’s Handbook :
The Jargon file :
The True Believer :
Programming Pearls :
The Good Soldier Svejk :
The Power Elite
Most popular humor pages:
Manifest of the Softpanorama IT Slacker Society :
Ten Commandments
of the IT Slackers Society : Computer Humor Collection
: BSD Logo Story :
The Cuckoo's Egg :
IT Slang : C++ Humor
: ARE YOU A BBS ADDICT? :
The Perl Purity Test :
Object oriented programmers of all nations
: Financial Humor :
Financial Humor Bulletin,
2008 : Financial
Humor Bulletin, 2010 : The Most Comprehensive Collection of Editor-related
Humor : Programming Language Humor :
Goldman Sachs related humor :
Greenspan humor : C Humor :
Scripting Humor :
Real Programmers Humor :
Web Humor : GPL-related Humor
: OFM Humor :
Politically Incorrect Humor :
IDS Humor :
"Linux Sucks" Humor : Russian
Musical Humor : Best Russian Programmer
Humor : Microsoft plans to buy Catholic Church
: Richard Stallman Related Humor :
Admin Humor : Perl-related
Humor : Linus Torvalds Related
humor : PseudoScience Related Humor :
Networking Humor :
Shell Humor :
Financial Humor Bulletin,
2011 : Financial
Humor Bulletin, 2012 :
Financial Humor Bulletin,
2013 : Java Humor : Software
Engineering Humor : Sun Solaris Related Humor :
Education Humor : IBM
Humor : Assembler-related Humor :
VIM Humor : Computer
Viruses Humor : Bright tomorrow is rescheduled
to a day after tomorrow : Classic Computer
Humor
The Last but not Least Technology is dominated by
two types of people: those who understand what they do not manage and those who manage what they do not understand ~Archibald Putt.
Ph.D
Copyright © 1996-2021 by Softpanorama Society. www.softpanorama.org
was initially created as a service to the (now defunct) UN Sustainable Development Networking Programme (SDNP)
without any remuneration. This document is an industrial compilation designed and created exclusively
for educational use and is distributed under the Softpanorama Content License.
Original materials copyright belong
to respective owners. Quotes are made for educational purposes only
in compliance with the fair use doctrine.
FAIR USE NOTICE This site contains
copyrighted material the use of which has not always been specifically
authorized by the copyright owner. We are making such material available
to advance understanding of computer science, IT technology, economic, scientific, and social
issues. We believe this constitutes a 'fair use' of any such
copyrighted material as provided by section 107 of the US Copyright Law according to which
such material can be distributed without profit exclusively for research and educational purposes.
This is a Spartan WHYFF (We Help You For Free)
site written by people for whom English is not a native language. Grammar and spelling errors should
be expected. The site contain some broken links as it develops like a living tree...
Disclaimer:
The statements, views and opinions presented on this web page are those of the author (or
referenced source) and are
not endorsed by, nor do they necessarily reflect, the opinions of the Softpanorama society. We do not warrant the correctness
of the information provided or its fitness for any purpose. The site uses AdSense so you need to be aware of Google privacy policy. You you do not want to be
tracked by Google please disable Javascript for this site. This site is perfectly usable without
Javascript.
Last modified:
March, 12, 2019