IMPORTANT info regarding IBM speaker guidelines and disclaimers
• If your presentation has forward looking content, it is mandatory that you put the forward disclaimer
as slide 2 in your presentation (this is the “Please Note” slide, third slide down in this template).
• All presentations, whether they have future content or not, must include the mandatory “Notices and
Disclaimers” – slides 8 and 9 in the template. Insert these slides just before the “Thank You” slide in
your deck.
• Please refer to the FAQ document in the Speaker Kit regarding additional legal guidance for use of
photos, logos, customer references and analyst information.
• It is recommended to have your material reviewed by Legal if you have any concerns regarding your
content.
• Please submit your final presentation, using the instructions in the online Speaker Kit, by February
5th
, 2016. Post your final file in native format using the following naming convention: session code.ppt
(For example, 1576.ppt)
• Disclosures regarding forward guidance is embedded in the tool and also available through this link:
• https://w3-03.ibm.com/finance/finsubp.nsf/WebPages/N01FF08SoftwareRevenueRecognitionGuidelinesRelatedtoProductDisclosures
• Please remove these instructions before finalizing your presentation.
1
Section Head Goes Here
Subhead
Agentless System Crawler
https://developer.ibm.com/open/agentless-system-crawler/
Canturk Isci
IBM Research, NY
@canturkisci
DeveloperWorks
SmartBar Talk
Mon Feb 22, 4:00 PM
Please Note:
4
• IBM’s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM’s sole
discretion.
• Information regarding potential future products is intended to outline our general product direction and it should not be relied on in
making a purchasing decision.
• The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any
material, code or functionality. Information about potential future products may not be incorporated into any contract.
• The development, release, and timing of any future features or functionality described for our products remains at our sole
discretion.
• Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual
throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the
amount of multiprogramming in the user’s job stream, the I/O configuration, the storage configuration, and the workload processed.
Therefore, no assurance can be given that an individual user will achieve results similar to those stated here.
- Provide unmatched deep, seamless visibility into cloud instances
- Drive operational insights to solve real-world pain points
- Provide unmatched deep, seamless visibility into cloud instances
- Drive operational insights to solve real-world pain points
Built-in Monitoring [& Analytics] Designed for Cloud
- Provide unmatched deep, seamless visibility into cloud instances
- Drive operational insights to solve real-world pain points
- Provide unmatched deep, seamless visibility into cloud instances
- Drive operational insights to solve real-world pain points
Built-in Monitoring [& Analytics] Designed for Cloud
- Provide unmatched deep, seamless and unified visibility into ALL cloud instances
- Drive operational insights to solve real-world pain points
- Provide unmatched deep, seamless and unified visibility into ALL cloud instances
- Drive operational insights to solve real-world pain points
Built-in Monitoring [& Analytics] Designed for Cloud
Agentless System Crawler (ASC)
Key Driver: Agentless (Non-intrusive) Introspection
Patch
Relevance
Security
Monitor
Compliance
Audit
Traditional Monitoring vs. Crawlers
OS
Host
Wkld
Agent
Agent
Agent
Agent
OS
Host
Wkld A A
AA
V
M
OS Wkld A A
AA
Host
OS
Wkld
A A
AA
Cont
. Wkld
A A
AA
Cont
. Wkld
A A
AA
Cont
.
VMBMS Container
OS
Host
Wkld OS
Host
Wkld
V
M
OS Wkld
Host
OS
Wkld
Cont
. Wkld
Cont
. Wkld
Cont
.
VMBMS Container
Key Advantages
Key Advantages
App
Cont
.App
Cont
.App
Cont
.App
Cont
.
Why Agentless System Crawlers
magicmagic
 Monitoring built into the platform
not in end-user systems
 No complexity to end user
(They do nothing, all they see is the service)
 No agents/credentials/access
(nothing built into userworld)
 Works out of the box
 Makes data consumable
(lower barrier to data collection and analytics)
 Better Security for end user
(No attack surface, in userworld)
 Better Availability of monitoring
(From birth to death, inspect even defunct guest)
 Guest Agnostic
(Build for platform, not each user distro)
 Decoupled from user context
(No overhead/side-effect concerns)
 Monitoring done right for the
processes of the Cloud OS
”Users do not have to do anything to get this visibility. It is already there by default”
Container Cloud
Docker Hosts
App
Cont
.App
Cont
.App
Cont
.App
Cont
.
Docker Hosts
App
Cont
.App
Cont
.App
Cont
.App
Cont
.
Docker Hosts
App
Cont
.App
Cont
.App
Cont
.App
Cont
.
Metrics & Logs
Bus
Multitenant
Index
Logmet
Svc
Provisioning
Tenancy Info
State
Events
 Built-in in every compute node, all geos
 Enabled by default for all users in all prod
 O(10K) metrics/s & logs/s
Current State
Seamless: Built-in Monitoring & Logging in Bluemix Containers
Container Cloud
App
Cont
.App
Cont
.App
Cont
.App
Cont
.
Cool!
Happy User:
Effortless, painless
visibility in user world
magicmagic
Seamless: Built-in Monitoring & Logging in Bluemix Containers
”Users do not have to do anything to get this visibility. It is already there by default”
Deep Visibility: What We Actually Collect (and Annotate)
- OS Info
- Processes
- Disk Info
- Metrics
- Network Info
- Packages
- Files
- Config Info
From Container/VM
- Docker metadata
(docker inspect)
- CPU metrics
(/cgroup/cpuacct/)
- Memory metrics
(/cgroup/memory)
- Docker history
Docker Runtime
Config
Annotator
Vulnerability
Annotator
Compliance
Annotator
Password
Annotator
SW
Annotator
Licence
Annotator
Deep Visibility  Operational Insights/Analytics  Solve Real Problems
- OS Info
- Processes
- Disk Info
- Metrics
- Network Info
- Packages
- Files
- Config Info
From Container/VM
- Docker metadata
(docker inspect)
- CPU metrics
(/cgroup/cpuacct/)
- Memory metrics
(/cgroup/memory)
- Docker history
Docker Runtime
Config
Annotator
Vulnerability
Annotator
Compliance
Annotator
Password
Annotator
SW
Annotator
Licence
Annotator
Index (Data)
Vuln. &
Compl.
Analysis
Secure
Config
Analysis
Forensic
Security &
Compl.
Pipeline
Service
Remediation
Service
Deep Visibility  Operational Insights/Analytics  Solve Real Problems
- OS Info
- Processes
- Disk Info
- Metrics
- Network Info
- Packages
- Files
- Config Info
From Container/VM
- Docker metadata
(docker inspect)
- CPU metrics
(/cgroup/cpuacct/)
- Memory metrics
(/cgroup/memory)
- Docker history
Docker Runtime
Config
Annotator
Vulnerability
Annotator
Compliance
Annotator
Password
Annotator
SW
Annotator
Licence
Annotator
Index (Data)
Vuln. &
Compl.
Analysis
Secure
Config
Analysis
Forensic
Security &
Compl.
Pipeline
Service
Remediation
Service
Also at InterConnect:
Vulnerability Advisor
Session: SAD-7286
Sun: 11am & Wed:4pm
Crawler: How it Works for VMs
• Leverage VM Introspection (VMI) techniques to access VM Mem and Disk state
(We built bunch or our own optimizations that make this very efficient and practical)
• Can even remote both (decouple all from VM and host)
• Almost no new dependencies on host
• Currently support 1000+ kernel distros
Hypervisor
MEM
View
KB
APP
Analytics
Apps
Memory
Crawl
API
VM
OS
MEMDisk
Disk
View
Disk
Crawl
API
Cloud Analytics
Crawl
Logic Structured
view of
VM states
APP
APP
{
.......
.......
}
Frames
Crawler: How it Works for Containers
• Leverage Docker APIs for base container information
• Exploit container abstractions (namespace mapping and cgroups) for deeper insight
• Provide deep state info at scale with no visible overheads to end user
1) Get visibility into container world
by namespace mapping
2) Crawl the container
(Crawler dependencies still borrowed from host.
No need to inject into container!)
3) Return to original namespace
4) Push data to backend index
DEMO TIME
This Session
This Session
 Agentless System Crawler
 Bluemix Test Drive (live – ldwave)
https://developer.ibm.com/bluemix/2015/11/16/built-in-monitoring-and-logging-for-
bluemix-containers/
 LogCrawler and JSON Parsing
(live – CanoLibUK3)
 Vanilla LogCrawler
(20150619_LogCrawlerDemo)
 Crawl even Non-responsive systems
(oopsRconsole2)
 Out of Band SIEM
(QRadarDemo)
 TopoLog for Topology Discovery
(newTopo)
 RTop for Realtime Monitoring
(RtopAnnotatedMOV)
 Crawling for Rootkits with RConsole
(RConsoleAnnotatedMOV)
Sunday & Wednesday
Sunday & Wednesday
 Vulnerability Advisor
 Research Day Sessions
SAD-7286
Sun 11:00am
Wed 4:00pm
Bluemix Test Drive
Just start a Bluemix Container
(https://console.ng.bluemix.net/)
Just start a Bluemix Container
(https://console.ng.bluemix.net/)
Go to Container Overview
(Metrics show up in few mins)
Go to Container Overview
(Metrics show up in few mins)
… Bluemix Test Drive
Go to Monitoring and Logs
>> Monitoring
Go to Monitoring and Logs
>> Monitoring
… Bluemix Test Drive
Go to Monitoring and Logs
>> Logging
Go to Monitoring and Logs
>> Logging
Notices and Disclaimers
22
Copyright © 2016 by International Business Machines Corporation (IBM). No part of this document may be reproduced or transmitted in any form without written permission
from IBM.
U.S. Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM.
Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of
initial publication and could include unintentional technical or typographical errors. IBM shall have no responsibility to update this information. THIS DOCUMENT IS
DISTRIBUTED "AS IS" WITHOUT ANY WARRANTY, EITHER EXPRESS OR IMPLIED. IN NO EVENT SHALL IBM BE LIABLE FOR ANY DAMAGE ARISING FROM THE
USE OF THIS INFORMATION, INCLUDING BUT NOT LIMITED TO, LOSS OF DATA, BUSINESS INTERRUPTION, LOSS OF PROFIT OR LOSS OF OPPORTUNITY. IBM
products and services are warranted according to the terms and conditions of the agreements under which they are provided.
Any statements regarding IBM's future direction, intent or product plans are subject to change or withdrawal without notice.
Performance data contained herein was generally obtained in a controlled, isolated environments. Customer examples are presented as illustrations of how those
customers have used IBM products and the results they may have achieved. Actual performance, cost, savings or other results in other operating environments may vary.
References in this document to IBM products, programs, or services does not imply that IBM intends to make such products, programs or services available in all countries
in which IBM operates or does business.
Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not necessarily reflect the views of IBM. All materials
and discussions are provided for informational purposes only, and are neither intended to, nor shall constitute legal or other guidance or advice to any individual participant
or their specific situation.
It is the customer’s responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and
interpretation of any relevant laws and regulatory requirements that may affect the customer’s business and any actions the customer may need to take to comply with such
laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law
Notices and Disclaimers Con’t.
23
Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not
tested those products in connection with this publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products.
Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. IBM does not warrant the quality of any third-party products, or the
ability of any such third-party products to interoperate with IBM’s products. IBM EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING BUT
NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
The provision of the information contained h erein is not intended to, and does not, grant any right or license under any IBM patents, copyrights, trademarks or other
intellectual property right.
IBM, the IBM logo, ibm.com, Aspera®, Bluemix, Blueworks Live, CICS, Clearcase, Cognos®, DOORS®, Emptoris®, Enterprise Document Management System™, FASP®,
FileNet®, Global Business Services ®, Global Technology Services ®, IBM ExperienceOne™, IBM SmartCloud®, IBM Social Business®, Information on Demand, ILOG,
Maximo®, MQIntegrator®, MQSeries®, Netcool®, OMEGAMON, OpenPower, PureAnalytics™, PureApplication®, pureCluster™, PureCoverage®, PureData®,
PureExperience®, PureFlex®, pureQuery®, pureScale®, PureSystems®, QRadar®, Rational®, Rhapsody®, Smarter Commerce®, SoDA, SPSS, Sterling Commerce®,
StoredIQ, Tealeaf®, Tivoli®, Trusteer®, Unica®, urban{code}®, Watson, WebSphere®, Worklight®, X-Force® and System z® Z/OS, are trademarks of International Business
Machines Corporation, registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM
trademarks is available on the Web at "Copyright and trademark information" at: www.ibm.com/legal/copytrade.shtml.
Thank You
Your Feedback is Important!
Access the InterConnect 2016 Conference Attendee Portal to complete your
session surveys from your smartphone, laptop or conference kiosk.
DeveloperWorks SmartBar Talk/Demo:
Agentless System Crawler
@canturkisci

More Related Content

PPTX
VMworld 2016: Troubleshooting 101 for Horizon
PPTX
VMworld 2016: Ask the vCenter Server Exerts Panel
PPTX
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
PPTX
VMworld 2016: The KISS of vRealize Operations!
PPTX
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...
PPTX
VMworld 2015: Troubleshooting for vSphere 6
PPTX
VMworld 2015: How To Troubleshoot Using vRealize Operations Manager (Deep Liv...
PPTX
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation
VMworld 2016: Troubleshooting 101 for Horizon
VMworld 2016: Ask the vCenter Server Exerts Panel
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
VMworld 2016: The KISS of vRealize Operations!
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...
VMworld 2015: Troubleshooting for vSphere 6
VMworld 2015: How To Troubleshoot Using vRealize Operations Manager (Deep Liv...
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation

What's hot (20)

PPTX
VMworld 2015: vCloud Air 2015 – Getting Started with Hybrid Cloud
PDF
VMworld 2013: VMware Horizon View Troubleshooting: Looking under the Hood
PPTX
VMworld 2015: Extreme Performance Series - vSphere Compute & Memory
PPTX
VMworld 2015: Horizon View Troubleshooting - Looking Under the Hood
PPTX
VMworld 2016: Virtual Volumes Technical Deep Dive
PPTX
VMworld 2015: vSphere Web Client- Yesterday, Today, and Tomorrow
PPTX
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...
ODP
Nagios Conference 2011 - Mike Guthrie - Distributed Monitoring With Nagios
PPTX
VMworld 2015: What's New in vSphere?
PPTX
VMworld 2015: Explaining Advanced Virtual Volumes Configurations
PPTX
VMworld 2015: Extreme Performance Series - vCenter Performance Best Practices
PPTX
VMworld 2015: Just Because You COULD, Doesn’t Mean You SHOULD – vSphere 6.0 A...
PPTX
VMworld 2015: Virtualize Active Directory, the Right Way!
PPTX
VMworld 2015: Deliver High Performance Desktops with VMware Horizon and NVIDI...
PPTX
VMworld 2015: Automating Everything VMware with PowerCLI- Deep Dive
PPTX
VMworld 2016: What's New with Horizon 7
PPTX
HBC9363 Virtualization 2.0 How the Cloud is Evolving the Modern Data Center
PPTX
VMworld 2015: Managing Users: A Deep Dive into VMware User Environment Manager
PPTX
VMworld 2015: Advanced SQL Server on vSphere
PPTX
VMworld 2015: Conducting a Successful Virtual SAN Proof of Concept
VMworld 2015: vCloud Air 2015 – Getting Started with Hybrid Cloud
VMworld 2013: VMware Horizon View Troubleshooting: Looking under the Hood
VMworld 2015: Extreme Performance Series - vSphere Compute & Memory
VMworld 2015: Horizon View Troubleshooting - Looking Under the Hood
VMworld 2016: Virtual Volumes Technical Deep Dive
VMworld 2015: vSphere Web Client- Yesterday, Today, and Tomorrow
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...
Nagios Conference 2011 - Mike Guthrie - Distributed Monitoring With Nagios
VMworld 2015: What's New in vSphere?
VMworld 2015: Explaining Advanced Virtual Volumes Configurations
VMworld 2015: Extreme Performance Series - vCenter Performance Best Practices
VMworld 2015: Just Because You COULD, Doesn’t Mean You SHOULD – vSphere 6.0 A...
VMworld 2015: Virtualize Active Directory, the Right Way!
VMworld 2015: Deliver High Performance Desktops with VMware Horizon and NVIDI...
VMworld 2015: Automating Everything VMware with PowerCLI- Deep Dive
VMworld 2016: What's New with Horizon 7
HBC9363 Virtualization 2.0 How the Cloud is Evolving the Modern Data Center
VMworld 2015: Managing Users: A Deep Dive into VMware User Environment Manager
VMworld 2015: Advanced SQL Server on vSphere
VMworld 2015: Conducting a Successful Virtual SAN Proof of Concept
Ad

Viewers also liked (11)

PPTX
Behaviourism in management
PDF
9 мая
PDF
Retail
PPT
IBM InterConnect 2016 - 3505 - Cloud-Based Analytics of The Weather Company i...
PDF
Adapting to climate change in agricultural systems: Key findings from CGIAR a...
PPTX
Las 2 ranitas
PPTX
Los objetivos del mentoring
PPTX
Razredna nastava
PPTX
Maize crop disorders A Lecture by Mr Allah Dad Khan
PDF
Cyber threats 2015
PDF
Evidence to enhance resources management planning and decision making
Behaviourism in management
9 мая
Retail
IBM InterConnect 2016 - 3505 - Cloud-Based Analytics of The Weather Company i...
Adapting to climate change in agricultural systems: Key findings from CGIAR a...
Las 2 ranitas
Los objetivos del mentoring
Razredna nastava
Maize crop disorders A Lecture by Mr Allah Dad Khan
Cyber threats 2015
Evidence to enhance resources management planning and decision making
Ad

Similar to Agentless System Crawler - InterConnect 2016 (20)

PDF
Operational Visibiliy and Analytics - BU Seminar
PPT
20160221 va interconnect_pub
ODP
2449 rapid prototyping of innovative io t solutions
PDF
Become an IBM Cloud Architect in 40 Minutes
PPT
Rutgers Cloud Seminar 2017
PPT
Rutgers Cloud Seminar 2017
PDF
Introduction to IBM Cloud Private - April 2018
PDF
Scalable, Available and Reliable Cloud Applications with PaaS and Microservices
PDF
IT Roadmap Atlanta Deliver on your innovation goals with IBM Bluemix
PDF
Connect 2017 DEV-1420 - Blue Mix and Domino – Complementing Smartcloud
PDF
DFW BlueMix Meetup - demo and slides
PDF
IBM Enterprise Social Solutions on Bluemix (XPages and Connections)
PPT
The Bluemix Quadruple Threat
PDF
Integrating BigInsights and Puredata system for analytics with query federati...
PPT
BLADEHarmony Manager
PDF
Learn How to Connect Microservices Using the Open API Initiative
PDF
Vision 2016 fpm 1081 - getting data from sap business warehouse into your ibm...
PDF
BigInsights For Telecom
PDF
Best practices for cloud hosted api management
PDF
Creating your own cloud hosted APIM platform
Operational Visibiliy and Analytics - BU Seminar
20160221 va interconnect_pub
2449 rapid prototyping of innovative io t solutions
Become an IBM Cloud Architect in 40 Minutes
Rutgers Cloud Seminar 2017
Rutgers Cloud Seminar 2017
Introduction to IBM Cloud Private - April 2018
Scalable, Available and Reliable Cloud Applications with PaaS and Microservices
IT Roadmap Atlanta Deliver on your innovation goals with IBM Bluemix
Connect 2017 DEV-1420 - Blue Mix and Domino – Complementing Smartcloud
DFW BlueMix Meetup - demo and slides
IBM Enterprise Social Solutions on Bluemix (XPages and Connections)
The Bluemix Quadruple Threat
Integrating BigInsights and Puredata system for analytics with query federati...
BLADEHarmony Manager
Learn How to Connect Microservices Using the Open API Initiative
Vision 2016 fpm 1081 - getting data from sap business warehouse into your ibm...
BigInsights For Telecom
Best practices for cloud hosted api management
Creating your own cloud hosted APIM platform

Recently uploaded (20)

PDF
EIS-Webinar-Regulated-Industries-2025-08.pdf
PDF
ment.tech-Siri Delay Opens AI Startup Opportunity in 2025.pdf
PDF
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
PDF
Decision Optimization - From Theory to Practice
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PDF
Connector Corner: Transform Unstructured Documents with Agentic Automation
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PPTX
Information-Technology-in-Human-Society.pptx
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PDF
The AI Revolution in Customer Service - 2025
PDF
CCUS-as-the-Missing-Link-to-Net-Zero_AksCurious.pdf
PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
PDF
Launch a Bumble-Style App with AI Features in 2025.pdf
PDF
Introduction to MCP and A2A Protocols: Enabling Agent Communication
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PPTX
Rise of the Digital Control Grid Zeee Media and Hope and Tivon FTWProject.com
PDF
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
EIS-Webinar-Regulated-Industries-2025-08.pdf
ment.tech-Siri Delay Opens AI Startup Opportunity in 2025.pdf
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
NewMind AI Weekly Chronicles – August ’25 Week IV
Decision Optimization - From Theory to Practice
Data Virtualization in Action: Scaling APIs and Apps with FME
Connector Corner: Transform Unstructured Documents with Agentic Automation
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
Information-Technology-in-Human-Society.pptx
Early detection and classification of bone marrow changes in lumbar vertebrae...
The AI Revolution in Customer Service - 2025
CCUS-as-the-Missing-Link-to-Net-Zero_AksCurious.pdf
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
Launch a Bumble-Style App with AI Features in 2025.pdf
Introduction to MCP and A2A Protocols: Enabling Agent Communication
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
Rise of the Digital Control Grid Zeee Media and Hope and Tivon FTWProject.com
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf

Agentless System Crawler - InterConnect 2016

  • 1. IMPORTANT info regarding IBM speaker guidelines and disclaimers • If your presentation has forward looking content, it is mandatory that you put the forward disclaimer as slide 2 in your presentation (this is the “Please Note” slide, third slide down in this template). • All presentations, whether they have future content or not, must include the mandatory “Notices and Disclaimers” – slides 8 and 9 in the template. Insert these slides just before the “Thank You” slide in your deck. • Please refer to the FAQ document in the Speaker Kit regarding additional legal guidance for use of photos, logos, customer references and analyst information. • It is recommended to have your material reviewed by Legal if you have any concerns regarding your content. • Please submit your final presentation, using the instructions in the online Speaker Kit, by February 5th , 2016. Post your final file in native format using the following naming convention: session code.ppt (For example, 1576.ppt) • Disclosures regarding forward guidance is embedded in the tool and also available through this link: • https://w3-03.ibm.com/finance/finsubp.nsf/WebPages/N01FF08SoftwareRevenueRecognitionGuidelinesRelatedtoProductDisclosures • Please remove these instructions before finalizing your presentation. 1
  • 2. Section Head Goes Here Subhead
  • 3. Agentless System Crawler https://developer.ibm.com/open/agentless-system-crawler/ Canturk Isci IBM Research, NY @canturkisci DeveloperWorks SmartBar Talk Mon Feb 22, 4:00 PM
  • 4. Please Note: 4 • IBM’s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM’s sole discretion. • Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. • The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code or functionality. Information about potential future products may not be incorporated into any contract. • The development, release, and timing of any future features or functionality described for our products remains at our sole discretion. • Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user’s job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here.
  • 5. - Provide unmatched deep, seamless visibility into cloud instances - Drive operational insights to solve real-world pain points - Provide unmatched deep, seamless visibility into cloud instances - Drive operational insights to solve real-world pain points Built-in Monitoring [& Analytics] Designed for Cloud
  • 6. - Provide unmatched deep, seamless visibility into cloud instances - Drive operational insights to solve real-world pain points - Provide unmatched deep, seamless visibility into cloud instances - Drive operational insights to solve real-world pain points Built-in Monitoring [& Analytics] Designed for Cloud
  • 7. - Provide unmatched deep, seamless and unified visibility into ALL cloud instances - Drive operational insights to solve real-world pain points - Provide unmatched deep, seamless and unified visibility into ALL cloud instances - Drive operational insights to solve real-world pain points Built-in Monitoring [& Analytics] Designed for Cloud Agentless System Crawler (ASC)
  • 8. Key Driver: Agentless (Non-intrusive) Introspection Patch Relevance Security Monitor Compliance Audit
  • 9. Traditional Monitoring vs. Crawlers OS Host Wkld Agent Agent Agent Agent OS Host Wkld A A AA V M OS Wkld A A AA Host OS Wkld A A AA Cont . Wkld A A AA Cont . Wkld A A AA Cont . VMBMS Container OS Host Wkld OS Host Wkld V M OS Wkld Host OS Wkld Cont . Wkld Cont . Wkld Cont . VMBMS Container
  • 10. Key Advantages Key Advantages App Cont .App Cont .App Cont .App Cont . Why Agentless System Crawlers magicmagic  Monitoring built into the platform not in end-user systems  No complexity to end user (They do nothing, all they see is the service)  No agents/credentials/access (nothing built into userworld)  Works out of the box  Makes data consumable (lower barrier to data collection and analytics)  Better Security for end user (No attack surface, in userworld)  Better Availability of monitoring (From birth to death, inspect even defunct guest)  Guest Agnostic (Build for platform, not each user distro)  Decoupled from user context (No overhead/side-effect concerns)  Monitoring done right for the processes of the Cloud OS
  • 11. ”Users do not have to do anything to get this visibility. It is already there by default” Container Cloud Docker Hosts App Cont .App Cont .App Cont .App Cont . Docker Hosts App Cont .App Cont .App Cont .App Cont . Docker Hosts App Cont .App Cont .App Cont .App Cont . Metrics & Logs Bus Multitenant Index Logmet Svc Provisioning Tenancy Info State Events  Built-in in every compute node, all geos  Enabled by default for all users in all prod  O(10K) metrics/s & logs/s Current State Seamless: Built-in Monitoring & Logging in Bluemix Containers
  • 12. Container Cloud App Cont .App Cont .App Cont .App Cont . Cool! Happy User: Effortless, painless visibility in user world magicmagic Seamless: Built-in Monitoring & Logging in Bluemix Containers ”Users do not have to do anything to get this visibility. It is already there by default”
  • 13. Deep Visibility: What We Actually Collect (and Annotate) - OS Info - Processes - Disk Info - Metrics - Network Info - Packages - Files - Config Info From Container/VM - Docker metadata (docker inspect) - CPU metrics (/cgroup/cpuacct/) - Memory metrics (/cgroup/memory) - Docker history Docker Runtime Config Annotator Vulnerability Annotator Compliance Annotator Password Annotator SW Annotator Licence Annotator
  • 14. Deep Visibility  Operational Insights/Analytics  Solve Real Problems - OS Info - Processes - Disk Info - Metrics - Network Info - Packages - Files - Config Info From Container/VM - Docker metadata (docker inspect) - CPU metrics (/cgroup/cpuacct/) - Memory metrics (/cgroup/memory) - Docker history Docker Runtime Config Annotator Vulnerability Annotator Compliance Annotator Password Annotator SW Annotator Licence Annotator Index (Data) Vuln. & Compl. Analysis Secure Config Analysis Forensic Security & Compl. Pipeline Service Remediation Service
  • 15. Deep Visibility  Operational Insights/Analytics  Solve Real Problems - OS Info - Processes - Disk Info - Metrics - Network Info - Packages - Files - Config Info From Container/VM - Docker metadata (docker inspect) - CPU metrics (/cgroup/cpuacct/) - Memory metrics (/cgroup/memory) - Docker history Docker Runtime Config Annotator Vulnerability Annotator Compliance Annotator Password Annotator SW Annotator Licence Annotator Index (Data) Vuln. & Compl. Analysis Secure Config Analysis Forensic Security & Compl. Pipeline Service Remediation Service Also at InterConnect: Vulnerability Advisor Session: SAD-7286 Sun: 11am & Wed:4pm
  • 16. Crawler: How it Works for VMs • Leverage VM Introspection (VMI) techniques to access VM Mem and Disk state (We built bunch or our own optimizations that make this very efficient and practical) • Can even remote both (decouple all from VM and host) • Almost no new dependencies on host • Currently support 1000+ kernel distros Hypervisor MEM View KB APP Analytics Apps Memory Crawl API VM OS MEMDisk Disk View Disk Crawl API Cloud Analytics Crawl Logic Structured view of VM states APP APP { ....... ....... } Frames
  • 17. Crawler: How it Works for Containers • Leverage Docker APIs for base container information • Exploit container abstractions (namespace mapping and cgroups) for deeper insight • Provide deep state info at scale with no visible overheads to end user 1) Get visibility into container world by namespace mapping 2) Crawl the container (Crawler dependencies still borrowed from host. No need to inject into container!) 3) Return to original namespace 4) Push data to backend index
  • 18. DEMO TIME This Session This Session  Agentless System Crawler  Bluemix Test Drive (live – ldwave) https://developer.ibm.com/bluemix/2015/11/16/built-in-monitoring-and-logging-for- bluemix-containers/  LogCrawler and JSON Parsing (live – CanoLibUK3)  Vanilla LogCrawler (20150619_LogCrawlerDemo)  Crawl even Non-responsive systems (oopsRconsole2)  Out of Band SIEM (QRadarDemo)  TopoLog for Topology Discovery (newTopo)  RTop for Realtime Monitoring (RtopAnnotatedMOV)  Crawling for Rootkits with RConsole (RConsoleAnnotatedMOV) Sunday & Wednesday Sunday & Wednesday  Vulnerability Advisor  Research Day Sessions SAD-7286 Sun 11:00am Wed 4:00pm
  • 19. Bluemix Test Drive Just start a Bluemix Container (https://console.ng.bluemix.net/) Just start a Bluemix Container (https://console.ng.bluemix.net/) Go to Container Overview (Metrics show up in few mins) Go to Container Overview (Metrics show up in few mins)
  • 20. … Bluemix Test Drive Go to Monitoring and Logs >> Monitoring Go to Monitoring and Logs >> Monitoring
  • 21. … Bluemix Test Drive Go to Monitoring and Logs >> Logging Go to Monitoring and Logs >> Logging
  • 22. Notices and Disclaimers 22 Copyright © 2016 by International Business Machines Corporation (IBM). No part of this document may be reproduced or transmitted in any form without written permission from IBM. U.S. Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM. Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors. IBM shall have no responsibility to update this information. THIS DOCUMENT IS DISTRIBUTED "AS IS" WITHOUT ANY WARRANTY, EITHER EXPRESS OR IMPLIED. IN NO EVENT SHALL IBM BE LIABLE FOR ANY DAMAGE ARISING FROM THE USE OF THIS INFORMATION, INCLUDING BUT NOT LIMITED TO, LOSS OF DATA, BUSINESS INTERRUPTION, LOSS OF PROFIT OR LOSS OF OPPORTUNITY. IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided. Any statements regarding IBM's future direction, intent or product plans are subject to change or withdrawal without notice. Performance data contained herein was generally obtained in a controlled, isolated environments. Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual performance, cost, savings or other results in other operating environments may vary. References in this document to IBM products, programs, or services does not imply that IBM intends to make such products, programs or services available in all countries in which IBM operates or does business. Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not necessarily reflect the views of IBM. All materials and discussions are provided for informational purposes only, and are neither intended to, nor shall constitute legal or other guidance or advice to any individual participant or their specific situation. It is the customer’s responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer’s business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law
  • 23. Notices and Disclaimers Con’t. 23 Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. IBM does not warrant the quality of any third-party products, or the ability of any such third-party products to interoperate with IBM’s products. IBM EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. The provision of the information contained h erein is not intended to, and does not, grant any right or license under any IBM patents, copyrights, trademarks or other intellectual property right. IBM, the IBM logo, ibm.com, Aspera®, Bluemix, Blueworks Live, CICS, Clearcase, Cognos®, DOORS®, Emptoris®, Enterprise Document Management System™, FASP®, FileNet®, Global Business Services ®, Global Technology Services ®, IBM ExperienceOne™, IBM SmartCloud®, IBM Social Business®, Information on Demand, ILOG, Maximo®, MQIntegrator®, MQSeries®, Netcool®, OMEGAMON, OpenPower, PureAnalytics™, PureApplication®, pureCluster™, PureCoverage®, PureData®, PureExperience®, PureFlex®, pureQuery®, pureScale®, PureSystems®, QRadar®, Rational®, Rhapsody®, Smarter Commerce®, SoDA, SPSS, Sterling Commerce®, StoredIQ, Tealeaf®, Tivoli®, Trusteer®, Unica®, urban{code}®, Watson, WebSphere®, Worklight®, X-Force® and System z® Z/OS, are trademarks of International Business Machines Corporation, registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at: www.ibm.com/legal/copytrade.shtml.
  • 24. Thank You Your Feedback is Important! Access the InterConnect 2016 Conference Attendee Portal to complete your session surveys from your smartphone, laptop or conference kiosk. DeveloperWorks SmartBar Talk/Demo: Agentless System Crawler @canturkisci

Editor's Notes

  • #6: Seamless -> opword | Implicit monitor me | Colors status
  • #7: Seamless -> opword | Implicit monitor me | Colors status
  • #8: Seamless -> opword | Implicit monitor me | Colors status
  • #10: One Vision + One backend + Capture all of system’s DNA (state) + Events & Metrics