Failure Is Not An Option: How to build reliable
computer systems from unreliable parts using Open Source software.
By Jeff Silverman
- Introduction: The problem
- Management and organizations
- Cost and Value
- Roles and functions
- Creating a reliable organization
- Job descriptions
- Outsourcing - Make or Buy?
- Shipping and
- Accounting: accounts payable, accounts receivable, auditing
- Technology part 1: Design -
Why? What? Where? When?
- Establishing design goals
- Ease of accomodating change ( expansion and contraction) (new
- Developing implementation designs How?
- A quick introduction to the laws of probability
- Failure resistence
- Fail safe
- Failure tolerant
- Computers - VIPs
- networks of computers
- Physical Security
- Disaster recovery site and how to amortize its cost
- Design rules for the facility
- Measure power consumption
- Measure cooling load
- Accomodate future growth
- Communications infrastructure
- The OSI Network model
- Layer 3 and 4
- Source Network Address
Translation and Destination Network Address Translation
- Virtual Servers
- Make or buy (or obtain)?
- Software packages
- Single tier vs. multi tier
- Programming languages
- Technology part 2:
Implementation - how?
- Processes and process documentation
- Network services
- NIS (yp)
- Intrusion prevention
- Intrusion detection
- port scanning prevention
- security in the backend
- system monitoring
- Fail over
- lvs - ipvsadm
- The high availability daemo ha.d
- Log processing
- Network infrastructure
- Network Address Translation
- Low level - ping testing
- Low level - networking service testing: NTP, DNS, NIS (yp),
- Medium level - SNMP
- Medium level - memory, CPU utilization checking
- Daemon level - SMTP (E-mail)
- Application level - health check
- Technology part 3: Operations
- Reponding to problems
I have a dream: an automatic application
start from a cold metal machine.
- System administrator training
- Auditing - SOX, HIPPA, FACTA
- Case Study
- The four way arms race - performance, reliability, security,
- Technology trends
- Glossary and Acronyms.
- Index, appendices, bibliography
The ideas page.
This book was written in HTML and it uses typography to convey
meaning. Stories from the
trenches are shown in this italic font. Computer dialogs
have keyboard input, sample output, and variables.
Where the sequence goes through menus, tabs, buttons and the like, the
labels are rendered in strong emphasis.
Things that are important (most of the text
this book, if truth be told, is not that important) is labeled
Text that cautions you against stupid mistakes
will not injure or kill you are labeled with caution.
Text that warns you about things that are
potentially injurious or lethal are labeled with warning.
$Log: index.html,v $
Revision 220.127.116.11 2006/10/01 23:36:20 cvsuser
Initial checkin to CVS
Revision 1.2 2006/09/20 21:22:45 jeffs
Updated the acknowledgements list
Revision 1.1 2006/01/05 06:02:19 jeffs