0% found this document useful (0 votes)
16 views2 pages

itec2210

The document covers various technical concepts related to IT infrastructure, including continuous delivery in CI/CD pipelines, monitoring techniques, encryption methods, and troubleshooting frameworks. It emphasizes the importance of systematic problem-solving and effective communication in system administration. Additionally, it discusses the roles of configuration management tools and the TCP protocol in data transfer and network management.

Uploaded by

Shakiba Akhbari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views2 pages

itec2210

The document covers various technical concepts related to IT infrastructure, including continuous delivery in CI/CD pipelines, monitoring techniques, encryption methods, and troubleshooting frameworks. It emphasizes the importance of systematic problem-solving and effective communication in system administration. Additionally, it discusses the roles of configuration management tools and the TCP protocol in data transfer and network management.

Uploaded by

Shakiba Akhbari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Local worksta on passwords is not a namespace.

In a CI/CD pipeline, what does Con nuous Delivery (CD) mean : CD means code is con nuously available for delivery to produc on

Aler ng will be off indefinitely for that check un l it is un-acknowledged t is a possible problem that can arise when acknowledging
an alert.

Black-box monitoring means: : Using monitoring tools that only detect if something is up/down or broken

Nginx is a Web server

Copy the DBMS files to another disk or server is an incorrect way to backup a database

: Historical monitoring requires a pull architecture is about historical monitoring systems is false

Configura on Management/IaC systems is false : Will automate you out of a job

a DNS resolver is a A system that queries other DNS servers

The RSA algorithm requires: : Two prime numbers and an exponent

-How does a differen al backup work? A differen al backup grows by accumula ng all the changes backed up in between the last
and present full backup.

-What is the difference between a namespace and a nameservice? The difference between namespaces and nameservices are that
namespaces are provided by the Internet for TCP/IP usage, and are used in DNS, while nameservices are mainly used for users,
apps, and worksta on to store info of their names to be used in communica on.

-What are some problems that can arise with poorly chosen host or DNS names?
Choosing inconsistent or inappropriate host and DNS names can make it easier for a ackers to iden fy and exploit vulnerabili es.

-What is symmetric encryp on and how does it work? Symmetric encryp on is a type of encryp on process where both par es
share the same secret encryp on key to encrypt and decrypt any data, which must be kept secret from any third par es to prevent
any security hazards.

- How do hashing algorithms/func ons work and why are they useful? Hashing algorithms/func ons work by using any input data
array of arbitrary length to output a bit string of a certain length, based on which algorithm/func on you are using the output may
be different. This is useful because both processes are very hard to decrypt, and make it easy to provide a secure way to send data
one way.

- Explain how the TLS handshake works when you browse to h ps://itec2210.ca with a browser or command line client.
Before encrypted data can be transmi ed between client and server, the TLS handshake first has to occur. The steps to the TLS
handshake Protocol when browsing h ps://itec2210.ca are: - The client sends hello messages to itec2210.ca to agree on
algorithms, random values, and check for session resump on - The server itec2210 then replies back sending the necessary
cryptographic parameters for premaster secret and to agree on cer ficates and cryptographic informa on to authen cate the
client and server to each other. - The client then generates a master secret from the premaster secret and exchanged random
values to the match the server itec2210 - A er all this, the encrypted data is then sent and received by the relevant par es, where
in this case we would be able to browse and access h ps://itec2210.ca from our side.

Why are configura on management tools like Puppet and Ansible useful? What kind of tasks would you carry out using either tool
ff Puppet and Ansible streamline Infrastructure as Code (IaC) by automa ng configura on tasks, ensuring desired states, and
allowing version control. Puppet's declara ve approach provides idempotent changes, while Ansible's agentless nature excels in
task orchestra on and infrastructure provisioning. Together, they enhance efficiency and facilitate seamless deployment and
tes ng, making them indispensable for consistent and automated IT management.

How does TCP work? Explain the types of packets, how they are ordered during handshakes, and what they contain. TCP, or
Transmission Control Protocol, operates by ini a ng a connec on through a three-way handshake: SYN is sent, SYN-ACK is
received, and ACK acknowledges. During data transfer, PSH and ACK packets are used. Connec on termina on involves a four-way
handshake: FIN is sent, ACK is received, the other end sends FIN, and ACK acknowledges, fully termina ng the connec on. Packets
contain sequence numbers, acknowledgment numbers, flags (SYN, ACK, PSH, FIN), and window size for flow control. This process
ensures reliable, ordered data transfer.
Lecture 2 - Troubleshooting
Effective Troubleshooting
**Anecdote - Build Farm Storage Cluster Issue:**
Why start the course with troubleshooting? - Issue with launchpadlibrarian.net (build farm storage cluster).
-Provides a systematic approach to problem-solving. - Users reported intermittent timeouts with no build errors.
-Essential skill in system administration and general problem-solving. - Ongoing for a month, unnoticed until alerts.
Troubleshooting Framework (SRE) **Troubleshooting Approach:**
1.Receive problem report - Colleagues and managers failed to solve.
2.Triage the issue - Started with a catch-up discussion with a colleague.
- Colleagues focused on core routers between data centers.
3.Examine components
- Decided to start at the beginning with HTTP errors.
4.Diagnose each step **Architecture Overview:**
5.Test and treat - Apache web front-ends -> Haproxy load-balancers -> Librarian App processes ->
6.Cure (fix) the issue Swift storage proxy -> Backend storage nodes.
Troubleshooting Methods (PSNA) **Diagnosis:**
-Elimination - Started with Apache logs showing generic timeouts.
-Successive refinement/addition - Haproxy status showed healthy backend processes with a 5% error rate.
Common Pitfalls (SRE) - Backend processes indicated application logic was fine, but incoming files were
timing out.
-Irrelevant information
**Resolution:**
-Incorrect understanding of system changes - Identified Swift proxy logs showing ConnectionTimeout errors.
-Improbable theories and recency bias - Traced it to a recently replaced drive on a storage node.
Problem Report Components - Fixed by changing user/group ownership.
-Expected behavior **Lessons Learned:**
-Actual behavior - Methodical approach, awareness of ongoing work, and proper logging are
-Reproduction steps (EAR) crucial.
- Implemented monitoring for incorrect permissions.
Example Problem Report
- Introduced a +1 process for peer review before committing changes.
-"I should be able to browse the corporate wiki." ### Launching a New Service
-"I get a 503 gateway error when browsing the site." **Six-Step Launch Process:**
-Visit `http://<foo>` in a browser, cURL, etc. 1. Define the ready list.
Effective Triage 2. Work the ready list.
-Who is affected? 3. Launch the beta service.
-What is affected? 4. Launch the production service.
5. Capture lessons learned.
-How widespread is the issue?
6. Repeat.
-Save asking 'why' for last. **Define the Ready List:**
Examining Systems - Must-have features.
-Look at log files. - Would-be-nice features.
-Useful tools: cURL, wget, netcat, lsof, strace, netstat, tcpdump, top, free, ps,
An Infrastructure as a Service provider will Provide you with CPU, memory, network, and storage
A router’s main task is to Send packets closer to their des na ons
RAID 1 disk failure is not a reason to restore a file or system.
Let's Encrypt is a: Free service that issues TLS cer ficates
The sudo command is intended for Execu ng a command as a different use
A level 2 incremental backup Only contains changes since the last incremental backup
The chown command is used to Alter ownership of files or directories
A DNS root hints file contains A list of name servers used to ini alize a DNS resolver
a machine name prod-o awa-db01 Hybrid of naming method is being used
Symmetric encryp on Can operate on blocks of data or a stream of bits
RFC 1149 IPoAC is designed to Send data using birds
CM systems only have modules for the pla orm you run them on is not true regarding Configura on Management (CM)
systems.
RAID 0 is Not a backup./ RAID 1 is Not a backup
Transposi on is a primi ve cryptographic opera on.
A cryptographic hash func on Maps an input of arbitrary length to a fixed length binary output.
Kubernetes uses abstrac ons on top of abstrac ons to manage complex applica ons and environments. Order the following
from the lowest level of abstrac on (e.g. hardware/machine level) at the bo om of the list, to the abstrac on that contains all
the others at the top of the list. 1.Deployment 2. Replica set 3.Pod 4.Container 5.Process
In a TCP session, SYN packets are intended to Synchronize sequence numbers for subsequent communica on.
So ware Defined Networking (SDN) abstracts away: Underlay networks
Diffie-Hellman is a method to: : Establish a shared symmetric encryp on key over an insecure channel

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy