Академический Документы
Профессиональный Документы
Культура Документы
Lanamark Explorer
March 2018
Abstract
Infrastructure design can be optimized by leveraging workload metrics from physical and
virtual machines that will depend on the new storage architecture. This guide outlines
the steps for discovering and profiling server workloads across physical and virtual
infrastructure using the Lanamark Explorer data collector, which is an integral part of the
Lanamark One systems engineering automation platform.
Contents
1 Introduction 3
1.1 System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.2 Outbound Connectivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.3 Target Platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.4 Data Collection Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.5 Data Collected . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
3 Installation 8
3.1 Welcome . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
3.2 End User License Agreement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3.3 Connection Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3.4 Installation Path . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
3.5 Confirmation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
3.6 Launch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
4 Credential Management 12
4.1 Global Credentials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
4.2 Individual Credentials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
4.3 Applying Credentials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
5 Discovery 16
5.1 Microsoft Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
5.2 List of Machines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
5.3 Subnet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
5.4 IP Range . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
6 Monitoring 20
6.1 Starting and Stopping Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
6.2 Terminating Data Collection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
7 Settings 22
7.1 Monitoring Frequency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
7.2 Data Synchronization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
7.3 Automatic Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
7.4 Connectivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Requirement Description
Operating System Microsoft Windows Server 2008 R2, 2012, 2012 R2 or 2016
Application Components Microsoft .NET Framework 4.0 Client Profile (or higher)
Security The user is responsible for installing patches and updates to the .NET
Framework and the underlying operating system.
Up to 100 machines 2 2 2
Discovery
Workload discovery can be performed via Active Directory, NetBIOS domain name, IP range or subnet,
Standalone Microsoft Hyper-V and VMware vCenter.
Best Practice: import hostnames / IPs from a .csv file if the target systems are known in advance.
Note: Performance statistics can only be collected from directly-connected or SAN-attached disks and
not from volumes accessed via file protocols such as NFS and CIFS/SMB.
Step Description
Note: Credentials are encrypted when they are entered into the
collection tool and are never transmitted by the Lanamark Explorer.
Area Description
Ports 135, 139 and 445 as well as ports used by WMI must be open.
Network
In Microsoft Windows, firewall rules must be specified to allow
this type of communication.
A network path must exist between target systems and the Lanamark
Explorer assigned to monitor them.
Note: Monitoring the machine hosting the Lanamark Explorer is not supported.
Area Description
CentOS 4 - 7.3
Supported Operating Debian 3.1 - 8.7
Systems Fedora 6 - 25
FreeBSD 6.1 - 10.2
Novell SUSE Linux Enterprise 10 - 12
openSUSE 10.2 - 42.2
Oracle Linux 4.5 - 7.3
Red Hat Enterprise Linux 4 - 7.3
Ubuntu 6.06 - 16.10
3.1 Welcome
The Welcome screen contains your company name and contact details of your account manager or
systems engineer. If the client name does not correspond to your company’s name, the installation
should be aborted.
3.5 Confirmation
Click Install to complete the Lanamark Explorer installation.
To create new global credentials, select the type of credentials to create and then click new or use the
button in the top left corner of the Credential Manager.
All discovery methods can be accessed by clicking on Discover in the top left corner of the Lanamark
Explorer console.
Active Directory
1. To discover target systems via Active Directory, specify the Active Directory domain, username and
password. Then click Connect to select organizational units (OUs) in scope for discovery.
2. If the specified credentials can be used for target systems in this domain, then select Use this cre-
dential for Windows machines in this domain in the bottom left corner. These credentials will be
automatically added to the Credential Manager.
3. Once applicable OUs are selected in the Active Directory tree on the right side, click Discover in the
bottom right corner of the dialog.
Note: Subnet discovery is limited to class C subnets (maximum of 254 addresses). Multiple subnet
discoveries can be executed in parallel.
5.4 IP Range
To discover target systems via an IP range, click on the Discover IP Range discovery option and specify
the starting and the ending IP address in the same class C subnet. Then click Discover in the bottom
right corner:
IP range discovery will run as a background task. If any target systems are discovered in the specified
IP range, they will appear under the Not Inventoried tab in the Lanamark Explorer.
Note: IP range discovery is limited to class C subnets (maximum of 254 addresses). Multiple IP range
discoveries can be executed in parallel.
Each monitored target system will appear under Machine and the applicable Physical Machine or Vir-
tual Machine tab. For example, if there are 10 physical machines and 50 virtual machines, Lanamark
Explorer will show 60 Machines, 10 Physical Machines and 50 Virtual Machines.
Target systems without credentials or that do not meet data collection requirements will appear under
the Not Inventoried tab.
To restart monitoring, select applicable target systems and click start in the Monitoring section of the
dashboard in the top right corner:
Note: If the user interface console is not operational, Lanamark Explorer Local Service should be al-
lowed to carry on with data collection.
Settings Manager is used to view and modify Lanamark Explorer settings. It can be opened by clicking
on the gears icon to the right of the tab indicating the hostname running Lanamark Explorer. Settings
are organized under Information, Connection Settings and Host & Service Statistics tabs:
Automatic Synchronization
Heartbeat and snapshots will be automatically synchronized for two weeks from the first point of data
collection. Lanamark Explorer will stop collecting data 45 days from the first point of data collection.
Upload Schedule
By default, snapshots are uploaded daily starting at 12:00 am plus a random increment of up to 5 hours.
The setting can be modified in the Settings Manager under the Delivery section in the Information
tab. The Systems Engineer will not have access to collected data until the following day, unless data
synchronization is forced.
Example: If snapshot delivery is set to 2:00 am, snapshots may be uploaded between 2:00 and 7:00
am.
7.4 Connectivity
Connectivity between Lanamark Explorer and Lanamark One is established during installation. If con-
nection settings are changed during the course of data collection, they can be updated in the Settings
Manager under Proxy Settings in the Connection Settings tab:
Connection settings should be validated before being saved using Validate button in the bottom right
corner of the Connection Settings view.
Inventory Data
Inventory data is collected and updated for each machine once a day to ensure accuracy of hardware,
software and performance metrics for each target system.
Linux SSH: awk, cat, df, dmidecode, dpkg-query, fdisk, free, grep, hal-find-
by-capability, hal-find-byproperty, hal-get-property, hwinfo, ifconfig,
kudzu, lsb_release, lshw, lspci, rpm, sed
Performance Data
Workload performance metrics are collected from target systems at the specified monitoring interval,
which is five (5) minutes by default.
Microsoft Windows Perfmon: CPU, memory, disk IO, network IO, etcâĂę
Inventory
Each target system generates 250-500 KB of data during inventory data collection and the number of
concurrent inventories is limited to 20. Since each inventory operation can take several minutes, the
network load from inventory ranges from 0.5 to 1.0 Mbps.
Performance
Lanamark Explorer collects 50-100 KB of data from each target system per monitoring interval. If the
monitoring interval is kept at a default of five (5) minutes, performance data collection will generate a
network load between 0.15 to 0.3 Mbps.
Data Synchronization
Lanamark Explorer takes daily inventory and performance data snapshots and uploads them securely
to Lanamark One using HTTPS (port 443).
Data Storage
Inventory and performance data is stored on encrypted storage infrastructure and is only available to
the Lanamark partner performing the assessment.
Version 2.0 February 15, 2016 Reviewed and updated all content
Version 1.3 March 27, 2015 Added Outbound Connectivity section with in-
formation where the data is uploaded
Version 1.1 August 19, 2014 Added additional Linux commands used for
post-processing inventory and performance
data to Appendix A: awk, cat, free, grep, sed