1 / 41

Monitoring and Troubleshooting Servers

Monitoring and Troubleshooting Servers. Lesson 4. Objectives. Information Technology Infrastructure Library.

pakuna
Télécharger la présentation

Monitoring and Troubleshooting Servers

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Monitoring and Troubleshooting Servers Lesson 4

  2. Objectives

  3. Information Technology Infrastructure Library • The Information Technology Infrastructure Library (ITIL) is a set of concepts and practices for managing Information Technology (IT) systems, IT Service Management (ITSM), IT development, and IT operations. • ITIL gives detailed descriptions of a number of important IT practices and provides comprehensive checklists, tasks, and procedures that any IT organization can tailor to its needs.

  4. Implementing Servers, Services and Applications • When you want to start using a server, service, or application, you should follow certain steps to implement it properly. • Those steps include: • Collecting requirements • Designing and planning • Implementing • Managing and monitoring

  5. Troubleshooting Methodology • As a computer technician, a server administrator, or a network administrator, you will eventually have to deal with problems. • Some problems will have obvious solutions and be easy to fix. • Many problems will need to be figured out by following a troubleshooting methodology to efficiently resolve a problem.

  6. Troubleshooting Methodology • Discover the problem • Evaluate system configuration • List or track possible solutions and try to isolate the problem by removing or disabling hardware or software components • Execute a plan • Check results • Take a proactive approach

  7. Troubleshooting Tools • Device Manager • System Information • Event Viewer • Task Manager • Resource Monitor • Performance Monitor • System Configuration • Memory Diagnostics tool • Troubleshooting Wizard • Boot Menu including Safe mode • Windows Repair

  8. Getting Help • When troubleshooting issues within Windows and related programs, you will eventually deal with problems that you do not know how to fix. • Therefore, you may have to ask co-workers and do some research on the Internet. Using good search engines such as Google and Bing are invaluable. • You will also need to check the vendor Web sites including Microsoft’s (www.microsoft.com).

  9. System Information

  10. Event Viewer

  11. Booting the System • One of the most frustrating problems to troubleshoot is when Windows does not boot and you cannot log in to Windows. • To overcome these problems, you need to understand how the computer boots and be familiar with the tools available during boot up. • Every time you turn on a computer, it goes through the Power-On Self Test (POST), which initializes hardware and finds an operating system to load.

  12. Master Boot Record • A master boot record (MBR) is the first 512-byte boot sector of a partitioned data storage device such as a hard disk. • It is used to hold the disk’s primary partition table, contains the code to bootstrap an operating system, which usually passes control to the volume boot record and uniquely identifies the disk media. • A volume boot record (VBR) is a type of boot sector, stored in a disk volume on a hard disk, floppy disk, or similar data storage device that contains code for booting an operating system such as NTLDR and BOOTMGR.

  13. Boot.ini File

  14. BCDEdit • Boot Configuration Data (BCD) is a firmware-independent database for boot-time configuration data used by Microsoft’s Windows Boot Manager found with Windows Vista, Windows 7, and Windows Server 2008. • To edit the Boot Configuration, you typically use Bcdedit.exe.

  15. Advanced Boot Options

  16. System Configuration

  17. Virtual Memory and Paging File

  18. Task Manager

  19. Performance Monitor

  20. Resource Monitor

  21. Business Continuity • When a server goes down, it will most likely cause your company to lose money. • If your network contains an external Web site or database that controls your sales, ordering, inventory, or production, server downtime can be detrimental to these business needs. • If it is an internal server, it may not allow your users to perform their jobs. In either case, your company is losing money either through revenue or through productivity.

  22. High Availability

  23. Fault Tolerance • To make a server more fault tolerant, you should first look at what components are the most likely to fail and implement technology to make a system less likely to fail. • Some of the components that are made redundant within a system are usually: • Disks: Use some form or RAID and hot spares. • Power supplies: Use redundant power supplies. • Network cards: Use redundant network cards.

  24. Cluster • A computer cluster is a group of linked computers that work together as one computer. • Based on the technology used, clusters can provide fault tolerance (often referred to as availability), load balancing, or both. • If the system fails, including the processor, memory, or motherboard, a cluster that provides fault tolerance can still service requests. • The two most popular forms of clusters are failover clusters and load-balancing clusters.

  25. Power • Without electricity, the server will not run. Even if you have redundant power supplies, they cannot protect against a power outage or other forms of power fluctuations. • In these situations, your company should look at uninterruptible power supplies and power generators to provide power when no power is available from the power company.

  26. Protecting Data • Data stored on a computer or stored on the network is vital to the users and the organization. • It represents hours of work and its data is sometimes irreplaceable. One of the most essential components of any server design is the backup process. • No matter how much effort, hardware, and software you put into a system, you will eventually have a failure. • Sometimes when the downtime occurs, you may have data loss.

  27. Backups • A backup or the process of backing up refers to making copies of data so that these additional copies may be used to restore the original after a data-loss event. • They can be used to restore entire systems following a disaster or to restore small sets of files that were accidentally deleted or corrupted.

  28. Planning Backups • When planning backups, you should isolate your program files and your data files. Program files usually do not change, so they do not have to be backed up often. • Data files change often so they should be backed up more often. • If you isolate them in different areas, you can create different backup policies for each area.

  29. System State • The Windows system state is a collection of system components that are not contained in a simple file but can be backed up easily. It includes: • Boot files (boot.ini, NTLDR, NTDetect.com) • DLLScache folder • Registry (including COM settings) • SYSVOL (Group Policy and log on scripts) • Active Directory NTDS.DIT (domain controllers) • Certificate Store (if the service is installed) • User profiles • COM+ and WMI information • IIS metabase

  30. Media Management Methods • When you plan a backup, your plan needs to balance between accessibility, security, and cost. Larger organizations will often combine one of the following management methods: • On-line • Near-line • Off-line • Backup site or DR site

  31. Types of Backups • When planning and performing a backup, specialized backup software will usually include different types of backups, each varying in the amount of time it takes to do a backup and restore. • Traditional backups include: • Full backup • Full backup with incremental backups • Full backup with differential backup

  32. Backup Rotations • One of the questions you should ask yourself is “How often should I do a backup?” • The answer will vary based on your needs. • You must first look at how important your data is and how much effort would be required to re-create it. • One common backup rotation scheme is the grandfather-father-son (GFS).

  33. Windows Backup

  34. Shadow Copies

  35. Recovery Console

  36. Windows Server 2008 R2 Repair

  37. Windows Server 2008 R2 Repair

  38. Summary • You need to have processes in place to plan, design, implement, monitor, and retire servers, services, and applications. • The Information Technology Infrastructure Library (ITIL) is a set of concepts and practices for managing Information Technology (IT) services (ITSM), IT development, and IT operations. • An effective troubleshooting methodology is to reduce the amount of guesswork and random solutions so that you can troubleshoot and fix the problem in a timely manner.

  39. Summary • Performance is the overall effectiveness of how data moves through the system. • If your computer lacks the RAM needed to run a program or perform an operation, Windows uses virtual memory to compensate. • When RAM runs low, virtual memory moves data from RAM to a space called a paging file. Moving data to and from the paging file frees up RAM so your computer can complete its work.

  40. Summary • As a server administrator, you need to minimize downtime by identifying potential failures and taking steps to avoid those failures and to reduce the effect of those failures. • NIC teaming is the process of grouping together two or more physical NICs into one single logical NIC, which can be used for network fault tolerance and increased bandwidth through load balancing. • A computer cluster is a group of linked computers that work together as one computer. Based on the technology used, clusters can provide fault tolerance (often referred to as availability), load balancing, or both.

  41. Summary • The best method for data recovery is back up, back up, back up. • The Windows system state is a collection of system components that are not contained in a simple file that can be backed up easily. It includes boot files and the registry. • Full backups back up all designated files and data.

More Related