SlideShare uma empresa Scribd logo
1 de 26
Baixar para ler offline
Dell World 2014
KACE Agent Architecture and Troubleshooting
Overview
Allen Tsai: Principal Engineer
Rob Napier: Principal Engineer November, 06, 2014
Dell World
User Forum
Dell World 2014
• Changes in 6.0/6.3
• Key field issues addressed
• What a healthy agent looks like
• Data files
• Agent plugins
• Log file
• Windows installer
• AMP watchdog
• Agent security
• Debugging tips
Overview
Dell World 2014
• Application Blacklisting for Windows and Mac
• Updated User Alert (Windows and Mac parity)
• Expanded inventory collection
• Improved reliability
• Improved security
• AMP watchdog
Changes in 6.0 & 6.3
Dell World 2014
• KA-334 : Cannot replicate patches to UNC path
• KA-1231: Replicated large files keep on growing in size
• KA-1328: AMPAgent incorrectly terminates csrss.exe as its child process
upon exit
• KA-231: AMPAgent can utilize too much CPU on Mac and Windows
Key Field Issues Addressed in 6.0/6.3
Dell World 2014
• AMPAgent service/daemon running
• Valid amp.conf with the proper host specified
• Valid amp_auto.conf (6.3) with AMP port 52230
• Network characteristics of a healthy agent
• Heartbeat every 20 seconds
• Regular inventory (interval specified by K1)
• Cycle thru read/write operations (visible in debug)
What a healthy agent looks like
Dell World 2014
• amp.conf
• amp_auto.conf (6.3)
• inventory.xml
• kinventory.db
• InventoryData.Software
• ksw_process.db
• ksw_timestamps.db
• Metering_data.txt
• kbots_cache/kbots.xml
Data Files
Dell World 2014
• host=<hostname> : all you need in amp.conf is a host field, and the agent
can fill in the rest once it’s connected to the server.
• debug=true|all : use debug field to increase logging, but watch out for
rollover.
• The log will roll over at 4 MB and 5 old logs are kept.
• Starting with 6.3, all the below calculated properties are stored in
amp_auto.conf
• wto, rto, cto, crto : write, read, connect and connect-retry timeouts
• servercompress : control whether the agent automatically compress uploads
• maxDownloadSpeed : set the max speed in KB/s that the agent can download payloads at
• processtimeout=xxx : override default process timeout in milliseconds
• ampurl, ampport, weburl, webport, companyname, splashtext, etc… : some variables are
controlled by agent and should not be changed by the user
amp.conf & amp_auto.conf
Dell World 2014
• kinventory.db
• SQLite database used for inventory capture and for generating inventory.xml file.
• Useful for debugging when inventory.xml is missing or incomplete.
• Can be deleted to have kinventory repopulate in case of suspected corruption.
• inventory.xml
• The XML that describes the machine generated from the information in
kinventory.db
• Useful to check if agent is collecting the information correctly when troubleshooting
incorrect inventory data
kinventory.db & inventory.xml
Dell World 2014
• Software inventory collected to match against Dell Software Catalog
• Contains the list of all binaries and their attributes from the entire file system
• Contains some additional information such as Windows add/remove registry
keys
• Used by K1 to determine all the software titles installed on the system
• Not to be confused with regular inventory, which is more hardware oriented
InventoryData.software
Dell World 2014
• SQLite database introduced in 5.5 to capture the software metering data.
• This database stores all the real time metering data as processes
launch/terminate, and will be flushed when server asks for a report.
• Maximum rows is configurable. The default maximum is 5000 rows and can
be adjusted depending on the software meter flush interval.
• On the Mac, there are multiple copies of ksw_process database, one per
logged in user. The databases will have _username appended to the base
filename.
• E.g.: ksw_process_atsai.db
ksw_process.db
Dell World 2014
• SQLite database introduced in 5.5 to store information such as last alive date
• Used to recover in case software metering process itself is terminated and
unable to determine the termination time for process it is monitoring.
Provides a best guess answer as to when processed we were monitoring
terminated once software meter process starts back up.
• Like ksw_process.db, there are multiple DB on the Mac, one per user with
_username appended to the base filename.
• E.g.: ksw_timestamp_atsai.db
ksw_timestamp.db
Dell World 2014
• Software meter results flushed from ksw_process.db
• Contains a list of all processes that ran on the system, their attributes, start
time and end time as well as user that launched the process.
• This is generated when K1 asks the agent to flush its result and upload to
server.
metering_data.txt
Dell World 2014
• Lists all online and offline scripts.
• Provides ID and VERSION of active scripts, located in the same folder.
• Used by the boot, login and offline script engines to loop through and look
for applicable scripts.
• Updated by kbot number 3.
• C:Program Files (x86)DellKACErunkbot.exe 3 0
kbots_cache/kbots.xml
Dell World 2014
• The primary functions of the agent arehandled by the AMPAgent
service/daemon and 4 supporting plugins
• pluginWeb: handles script downloads, replication, log uploads.
• pluginRunProcess: handles scripts and runs processes thru runkbot.
• pluginPatching: handles detecting/deploying of patches.
• pluginDesktopAlerts: handles displaying broadcast user alerts or pre-install script
alerts.
Agent Plugins
Dell World 2014
• With 6.0, we consolidated all agent logs into a single log file KAgent.log.
• This allows for a better trace of exact events that happened on the agent
without having to cross reference all the logs and match up by time.
• The log contain the date, module and the function name that generated the
log.
[2014-10-14.19:58:32][KInventory:CInventoryData::Initi] KInventory InventoryData opened DB successfully
[2014-10-14.19:58:32][KInventory:CInventoryData::Initi] KInventory InventoryData populated the DB
[2014-10-14.19:59:15][KInventory:runInventory ] KInventory Inventory Capture completed and stored in
C:ProgramDataDellKACEinventory.xml
[2014-10-14.19:59:15][KCopy:UploadUsingCurl ] UploadFile: Server gzip compression is active
[2014-10-14.19:59:15][KCopy:UploadUsingCurl ] UploadFile: uploading file C:ProgramDataDellKACEinventory.xml.gz to
https://engk1agent3/service/inventory.php?KUID=F2C603AD-08C8-48D3-A556-25F2702F6D89&VERSION=6.0.32
Log File starting 6.0
Dell World 2014
• By default, Windows agent provisioning, removal and updates produce two debug logs
files:
• ampmsi.log: msiexec /L*v log file, found in the %TEMP% folder
• ampinstaller.log: custom action log file, found in the %TEMP% folder as well as the KACE data
folder
• The log files indicate when agent installed and/or uninstalled, and flags and properties
passed in.
• When run non-silently, the agent will honor the current locale language if is one of the
10 supported languages. Otherwise, default is English.
• Use the new GPO Provisioning tool to help create the GPO. Will not need to use the
setlang VB script to override default locale anymore if use the GPO Provisioning tool.
• https://www.kace.com/support/resources/kb/solutiondetail?sol=133776
Windows Installer
Dell World 2014
• /i <msi file> : install msi file (example: msiexec /i amp.msi)
• /x <msi file> : The preferred way to uninstall agent is to run “AMPTools uninstall”
• /qn : silent install (example: msiexec /qn /i amp.msi)
• /L*v <log_file> : create log file (example: msiexec /L*v amp.log /i amp.msi)
• HOST=<host_name> : set amp.conf host value (example: msiexec /i amp.msi
HOST=kbox7.acme.com)
• Alternatively: you can append to msi filename (example: msiexec /i amp_kbox7.acme.com)
• DEBUG=true : set amp.conf debug value (example: msiexec /i amp.msi HOST=kbox7 DEBUG=true)
• NOHOOKS=1 : don’t install boot & logon hook dlls (msiexec /i amp.msi HOST=kbox7
NOHOOKS=1)
• CLONEPREP=1 : do not start AMP service until next reboot (msiexec /i amp.msi CLONEPREP=1)
Windows Installer Common Properties
Dell World 2014
• Introduced in 6.3, AMPWatchDog monitors the health of agent and perform
simple recovery to address majority of the common issues
• Conditions which AMPWatchDog monitors currently:
• AMPAgent executable exists in expected location
• AMP configuration file exist with server host
• AMP Service/Daemon not running (Restart agent)
• Inventory.xml exists and is less than 3.5 times the configured frequency (Restart
agent)
• ampport=port exists in amp_auto.conf (Restart agent)
• Logs netstat output relevant to ampagent connection
AMPWatchDog
Dell World 2014
• Agent by default will accept http connection if https can not be established with K1
• Uses OpenSSL 1.0.1h with Heartbleed addressed
• Agent is not affected by the POODLE vulnerability
• Only publicly signed certificates honored
• The signing root authority must be included in the curl certificate bundle (cacert.pem
in agent data directory, exported from Mozilla)
• Different SSL options to set in amp.conf
• sslrequired: Agent will not fall back to http if https can not be established
• verifyssl: Agent will verify the server certificate, implied sslrequired
• TLS will be on by default in the future
Agent Security
Dell World 2014
• What are the basic stuff to look for when suspecting agent issues?
• Turn on Debug=true
• Is agent running?
• Is the KAgent.log being updated? (under users directory)
• Is the agent connected? DNS issues? Use FQDN when possible. Can you resolve the
host and telnet to port 52230?
• Agent is 32 bits, remember that for any registry/file system OS redirections
• Test agent functionalities by running runkbot 2 0
• Windows: c:Program Files (x86)DellKACErunkbot 2 0
• Mac: /Library/Application Support/Dell/KACE/bin/runkbot 2 0
• Linux: /opt/dell/kace/bin/runkbot 2 0
• Are there crash dumps?
• Windows: c:ProgramDataDellKACE*.dmp
• Mac: Console
Trouble Shooting
Dell World 2014
• Eliminate possible system conflicts (disable firewall, turn off AV program,
etc.)
• Look at the log file in the KACE data folder
• Win XP: “C:Documents and SettingsAll UsersDellKACEuser
• Vista and Win 7: C:ProgramDataDellKACEuser
• Mac: /Library/Application Support/Dell/KACE/data/user
• Linux: /var/dell/kace/user
• Verify valid amp.conf file, and regenerate it if needed using AMPTools
• AMPTools resetconf host=kbox7.acme.com
• Verify existence of valid kbots_cache/kbots.xml files and supporting script
xml files
Debugging Tips
Dell World 2014
• Verify K1000 host name resolves using browser or command line
• ping kbox7.acme.com
• telnet kbox7.acme.com 52230
• Enable debugging by running “AMPTools debug=true” which will set debug
value in amp.conf and restart the agent.
• Alternatively, you can temporarily enable debugging on Windows without
restarting the agent using “sc control ampagent 199” (This only enables
debug for AMPAgent, not all binaries)
Debugging Tips (continued)
Dell World 2014
• HexDump
• Setting HEX_DMP environment variable before starting AMPAgent will cause
AMPAgent to log the exact informtion it tries to send and receive over the wire.
• HeartBeat
o [Smurf_write_SYNC ] -------------------------------------------------------------
------------------- [Smurf_write_SYNC ] 00000000 00 00 00 01 05
..... [Smurf_write_SYNC ] 00000005 ----------------------------------------------
-----------------------
• Agent connection string
o [Smurf_write_SYNC ] -------------------------------------------------------------
-------------------
o [Smurf_write_SYNC ] 00000000 00 00 00 01 02 00 06 00 00 00 21 36 34 34 35 46
..........!6445F
o [Smurf_write_SYNC ] 00000010 45 42 34 34 34 33 37 34 36 33 31 41 30 33 39 35
EB444374631A0395
o [Smurf_write_SYNC ] 00000020 30 42 31 31 32 34 39 37 34 31 41 00 00 00 00 0a
0B11249741A.....
o [Smurf_write_SYNC ] 00000030 30 2c 32 2c 34 2c 36 2c 35 00 00 00 00 6b 76 65
0,2,4,6,5....kve
Debugging Tips (continued)
Dell World 2014
• Basic information to collect when observed crashes
• Collect crash dumps or crash call stack
• Windows 2008/Vista and newer:
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsWindows Error
ReportingLocalDumps
• Mac: Agent crashes will show under System Diagnostic Report in Console. Collect
the crash call stack.
• Collect agent version
• Collect agent log in debug mode
• All the information are important in order to debug and simulate the failure
successfully. Need the agent version in order to match the crash dump up
with the debug symbols.
Crashes Diagnostics
Dell World User Forum
Q & A
Dell World User Forum
Thank you.

Mais conteúdo relacionado

Mais procurados

Hybrid Automation Framework Development introduction
Hybrid Automation Framework Development introductionHybrid Automation Framework Development introduction
Hybrid Automation Framework Development introductionGanuka Yashantha
 
Oracle WebLogic Server Basic Concepts
Oracle WebLogic Server Basic ConceptsOracle WebLogic Server Basic Concepts
Oracle WebLogic Server Basic ConceptsJames Bayer
 
V mware horizon 6 knowledge transfer
V mware horizon 6 knowledge transferV mware horizon 6 knowledge transfer
V mware horizon 6 knowledge transfersolarisyougood
 
Oracle AHF Insights 23c
Oracle AHF Insights 23cOracle AHF Insights 23c
Oracle AHF Insights 23cSandesh Rao
 
Fraud Detection with Amazon Machine Learning on AWS
Fraud Detection with Amazon Machine Learning on AWSFraud Detection with Amazon Machine Learning on AWS
Fraud Detection with Amazon Machine Learning on AWSAmazon Web Services
 
Azure Monitoring Overview
Azure Monitoring OverviewAzure Monitoring Overview
Azure Monitoring Overviewgjuljo
 
Software Testing Tools | Edureka
Software Testing Tools | EdurekaSoftware Testing Tools | Edureka
Software Testing Tools | EdurekaEdureka!
 
What's new in selenium 4
What's new in selenium 4What's new in selenium 4
What's new in selenium 4Knoldus Inc.
 
Analysis of Database Issues using AHF and Machine Learning v2 - AOUG2022
Analysis of Database Issues using AHF and Machine Learning v2 -  AOUG2022Analysis of Database Issues using AHF and Machine Learning v2 -  AOUG2022
Analysis of Database Issues using AHF and Machine Learning v2 - AOUG2022Sandesh Rao
 
Saving Time By Testing With Jest
Saving Time By Testing With JestSaving Time By Testing With Jest
Saving Time By Testing With JestBen McCormick
 
Selenium WebDriver
Selenium WebDriverSelenium WebDriver
Selenium WebDriverRajathi-QA
 
Oracle 11G SCAN: Concepts and Implementation Experience Sharing
Oracle 11G SCAN: Concepts and Implementation Experience SharingOracle 11G SCAN: Concepts and Implementation Experience Sharing
Oracle 11G SCAN: Concepts and Implementation Experience SharingYury Velikanov
 

Mais procurados (20)

Hybrid Automation Framework Development introduction
Hybrid Automation Framework Development introductionHybrid Automation Framework Development introduction
Hybrid Automation Framework Development introduction
 
Oracle WebLogic Server Basic Concepts
Oracle WebLogic Server Basic ConceptsOracle WebLogic Server Basic Concepts
Oracle WebLogic Server Basic Concepts
 
V mware horizon 6 knowledge transfer
V mware horizon 6 knowledge transferV mware horizon 6 knowledge transfer
V mware horizon 6 knowledge transfer
 
Oracle AHF Insights 23c
Oracle AHF Insights 23cOracle AHF Insights 23c
Oracle AHF Insights 23c
 
Fraud Detection with Amazon Machine Learning on AWS
Fraud Detection with Amazon Machine Learning on AWSFraud Detection with Amazon Machine Learning on AWS
Fraud Detection with Amazon Machine Learning on AWS
 
Monitoring and Alerting
Monitoring and AlertingMonitoring and Alerting
Monitoring and Alerting
 
Azure Monitoring Overview
Azure Monitoring OverviewAzure Monitoring Overview
Azure Monitoring Overview
 
Software Testing Tools | Edureka
Software Testing Tools | EdurekaSoftware Testing Tools | Edureka
Software Testing Tools | Edureka
 
Amazon services ec2
Amazon services ec2Amazon services ec2
Amazon services ec2
 
What's new in selenium 4
What's new in selenium 4What's new in selenium 4
What's new in selenium 4
 
Applitools
ApplitoolsApplitools
Applitools
 
Selenium ppt
Selenium pptSelenium ppt
Selenium ppt
 
Analysis of Database Issues using AHF and Machine Learning v2 - AOUG2022
Analysis of Database Issues using AHF and Machine Learning v2 -  AOUG2022Analysis of Database Issues using AHF and Machine Learning v2 -  AOUG2022
Analysis of Database Issues using AHF and Machine Learning v2 - AOUG2022
 
Saving Time By Testing With Jest
Saving Time By Testing With JestSaving Time By Testing With Jest
Saving Time By Testing With Jest
 
Selenium IDE
Selenium IDESelenium IDE
Selenium IDE
 
Selenium WebDriver
Selenium WebDriverSelenium WebDriver
Selenium WebDriver
 
Types of testing
Types of testingTypes of testing
Types of testing
 
Exadata Cloud Service Overview(v2)
Exadata Cloud Service Overview(v2) Exadata Cloud Service Overview(v2)
Exadata Cloud Service Overview(v2)
 
Weblogic
WeblogicWeblogic
Weblogic
 
Oracle 11G SCAN: Concepts and Implementation Experience Sharing
Oracle 11G SCAN: Concepts and Implementation Experience SharingOracle 11G SCAN: Concepts and Implementation Experience Sharing
Oracle 11G SCAN: Concepts and Implementation Experience Sharing
 

Destaque

Optimizing K2000 Workflow
Optimizing K2000 WorkflowOptimizing K2000 Workflow
Optimizing K2000 WorkflowDell World
 
KACE Ends Mac Systems Management Discrimination
KACE Ends Mac Systems Management DiscriminationKACE Ends Mac Systems Management Discrimination
KACE Ends Mac Systems Management Discriminationsendhil_jay
 
Dell Solutions Tour 2015 - Chromebook - Dell og Google viser vei, Ross Mahon ...
Dell Solutions Tour 2015 - Chromebook - Dell og Google viser vei, Ross Mahon ...Dell Solutions Tour 2015 - Chromebook - Dell og Google viser vei, Ross Mahon ...
Dell Solutions Tour 2015 - Chromebook - Dell og Google viser vei, Ross Mahon ...Kenneth de Brucq
 
Fifty shades of compliance by Mark Bartrick, Forrester Research
Fifty shades of compliance by Mark Bartrick, Forrester ResearchFifty shades of compliance by Mark Bartrick, Forrester Research
Fifty shades of compliance by Mark Bartrick, Forrester ResearchMartin Thompson
 
How to work with a vendor during an audit & what not to do – is there such a ...
How to work with a vendor during an audit & what not to do – is there such a ...How to work with a vendor during an audit & what not to do – is there such a ...
How to work with a vendor during an audit & what not to do – is there such a ...Martin Thompson
 
KACE Endpoint Systems Management Appliances - What’s New for 2017
KACE Endpoint Systems Management Appliances - What’s New for 2017KACE Endpoint Systems Management Appliances - What’s New for 2017
KACE Endpoint Systems Management Appliances - What’s New for 2017Quest
 
IBM Audit Defence Strategies: Eric Chiu - Fisher IT Asset Consulting (ITAM Re...
IBM Audit Defence Strategies: Eric Chiu - Fisher IT Asset Consulting (ITAM Re...IBM Audit Defence Strategies: Eric Chiu - Fisher IT Asset Consulting (ITAM Re...
IBM Audit Defence Strategies: Eric Chiu - Fisher IT Asset Consulting (ITAM Re...Martin Thompson
 
Configuration and lifecycle in Mixed environments
Configuration and lifecycle in Mixed environmentsConfiguration and lifecycle in Mixed environments
Configuration and lifecycle in Mixed environmentsDmitry Kireev
 

Destaque (10)

Optimizing K2000 Workflow
Optimizing K2000 WorkflowOptimizing K2000 Workflow
Optimizing K2000 Workflow
 
KACE Ends Mac Systems Management Discrimination
KACE Ends Mac Systems Management DiscriminationKACE Ends Mac Systems Management Discrimination
KACE Ends Mac Systems Management Discrimination
 
Dell Solutions Tour 2015 - Chromebook - Dell og Google viser vei, Ross Mahon ...
Dell Solutions Tour 2015 - Chromebook - Dell og Google viser vei, Ross Mahon ...Dell Solutions Tour 2015 - Chromebook - Dell og Google viser vei, Ross Mahon ...
Dell Solutions Tour 2015 - Chromebook - Dell og Google viser vei, Ross Mahon ...
 
Fifty shades of compliance by Mark Bartrick, Forrester Research
Fifty shades of compliance by Mark Bartrick, Forrester ResearchFifty shades of compliance by Mark Bartrick, Forrester Research
Fifty shades of compliance by Mark Bartrick, Forrester Research
 
How to work with a vendor during an audit & what not to do – is there such a ...
How to work with a vendor during an audit & what not to do – is there such a ...How to work with a vendor during an audit & what not to do – is there such a ...
How to work with a vendor during an audit & what not to do – is there such a ...
 
KACE Endpoint Systems Management Appliances - What’s New for 2017
KACE Endpoint Systems Management Appliances - What’s New for 2017KACE Endpoint Systems Management Appliances - What’s New for 2017
KACE Endpoint Systems Management Appliances - What’s New for 2017
 
IBM Audit Defence Strategies: Eric Chiu - Fisher IT Asset Consulting (ITAM Re...
IBM Audit Defence Strategies: Eric Chiu - Fisher IT Asset Consulting (ITAM Re...IBM Audit Defence Strategies: Eric Chiu - Fisher IT Asset Consulting (ITAM Re...
IBM Audit Defence Strategies: Eric Chiu - Fisher IT Asset Consulting (ITAM Re...
 
IBM License management
IBM License managementIBM License management
IBM License management
 
SCCM
SCCMSCCM
SCCM
 
Configuration and lifecycle in Mixed environments
Configuration and lifecycle in Mixed environmentsConfiguration and lifecycle in Mixed environments
Configuration and lifecycle in Mixed environments
 

Semelhante a KACE Agent Architecture and Troubleshooting Overview

(ATS6-PLAT07) Managing AEP in an enterprise environment
(ATS6-PLAT07) Managing AEP in an enterprise environment(ATS6-PLAT07) Managing AEP in an enterprise environment
(ATS6-PLAT07) Managing AEP in an enterprise environmentBIOVIA
 
High Volume Payments using Mule
High Volume Payments using MuleHigh Volume Payments using Mule
High Volume Payments using MuleAdhish Pendharkar
 
How to accelerate docker adoption with a simple and powerful user experience
How to accelerate docker adoption with a simple and powerful user experienceHow to accelerate docker adoption with a simple and powerful user experience
How to accelerate docker adoption with a simple and powerful user experienceDocker, Inc.
 
Best And Worst Practices Deploying IBM Connections
Best And Worst Practices Deploying IBM ConnectionsBest And Worst Practices Deploying IBM Connections
Best And Worst Practices Deploying IBM ConnectionsLetsConnect
 
1049: Best and Worst Practices for Deploying IBM Connections - IBM Connect 2016
1049: Best and Worst Practices for Deploying IBM Connections - IBM Connect 20161049: Best and Worst Practices for Deploying IBM Connections - IBM Connect 2016
1049: Best and Worst Practices for Deploying IBM Connections - IBM Connect 2016panagenda
 
Sa106 – practical solutions for connections administrators
Sa106 – practical solutions for connections administratorsSa106 – practical solutions for connections administrators
Sa106 – practical solutions for connections administratorsSharon James
 
CNIT 152 10 Enterprise Service
CNIT 152 10 Enterprise ServiceCNIT 152 10 Enterprise Service
CNIT 152 10 Enterprise ServiceSam Bowne
 
be the captain of your connections deployment
be the captain of your connections deploymentbe the captain of your connections deployment
be the captain of your connections deploymentSharon James
 
Planning Optimal Lotus Quickr services for Portal (J2EE) Deployments
Planning Optimal Lotus Quickr services for Portal (J2EE) DeploymentsPlanning Optimal Lotus Quickr services for Portal (J2EE) Deployments
Planning Optimal Lotus Quickr services for Portal (J2EE) DeploymentsStuart McIntyre
 
Soccnx10: Best and worst practices deploying IBM Connections
Soccnx10: Best and worst practices deploying IBM ConnectionsSoccnx10: Best and worst practices deploying IBM Connections
Soccnx10: Best and worst practices deploying IBM Connectionspanagenda
 
CNIT 152: 10 Enterprise Services
CNIT 152: 10 Enterprise ServicesCNIT 152: 10 Enterprise Services
CNIT 152: 10 Enterprise ServicesSam Bowne
 
Detailed Introduction To Docker
Detailed Introduction To DockerDetailed Introduction To Docker
Detailed Introduction To Dockernklmish
 
Windows 2012 R2 Multi Server Management
Windows 2012 R2 Multi Server ManagementWindows 2012 R2 Multi Server Management
Windows 2012 R2 Multi Server ManagementSharkrit JOBBO
 
CNIT 121: 10 Enterprise Services
CNIT 121: 10 Enterprise ServicesCNIT 121: 10 Enterprise Services
CNIT 121: 10 Enterprise ServicesSam Bowne
 
Cloud Native Development
Cloud Native DevelopmentCloud Native Development
Cloud Native DevelopmentManuel Garcia
 
.NET Cloud-Native Bootcamp
.NET Cloud-Native Bootcamp.NET Cloud-Native Bootcamp
.NET Cloud-Native BootcampVMware Tanzu
 
Practical solutions for connections administrators
Practical solutions for connections administratorsPractical solutions for connections administrators
Practical solutions for connections administratorsSharon James
 
Apache Airflow (incubating) NL HUG Meetup 2016-07-19
Apache Airflow (incubating) NL HUG Meetup 2016-07-19Apache Airflow (incubating) NL HUG Meetup 2016-07-19
Apache Airflow (incubating) NL HUG Meetup 2016-07-19Bolke de Bruin
 
Fluentd and docker monitoring
Fluentd and docker monitoringFluentd and docker monitoring
Fluentd and docker monitoringVinay Krishna
 
Cognos Performance Tuning Tips & Tricks
Cognos Performance Tuning Tips & TricksCognos Performance Tuning Tips & Tricks
Cognos Performance Tuning Tips & TricksSenturus
 

Semelhante a KACE Agent Architecture and Troubleshooting Overview (20)

(ATS6-PLAT07) Managing AEP in an enterprise environment
(ATS6-PLAT07) Managing AEP in an enterprise environment(ATS6-PLAT07) Managing AEP in an enterprise environment
(ATS6-PLAT07) Managing AEP in an enterprise environment
 
High Volume Payments using Mule
High Volume Payments using MuleHigh Volume Payments using Mule
High Volume Payments using Mule
 
How to accelerate docker adoption with a simple and powerful user experience
How to accelerate docker adoption with a simple and powerful user experienceHow to accelerate docker adoption with a simple and powerful user experience
How to accelerate docker adoption with a simple and powerful user experience
 
Best And Worst Practices Deploying IBM Connections
Best And Worst Practices Deploying IBM ConnectionsBest And Worst Practices Deploying IBM Connections
Best And Worst Practices Deploying IBM Connections
 
1049: Best and Worst Practices for Deploying IBM Connections - IBM Connect 2016
1049: Best and Worst Practices for Deploying IBM Connections - IBM Connect 20161049: Best and Worst Practices for Deploying IBM Connections - IBM Connect 2016
1049: Best and Worst Practices for Deploying IBM Connections - IBM Connect 2016
 
Sa106 – practical solutions for connections administrators
Sa106 – practical solutions for connections administratorsSa106 – practical solutions for connections administrators
Sa106 – practical solutions for connections administrators
 
CNIT 152 10 Enterprise Service
CNIT 152 10 Enterprise ServiceCNIT 152 10 Enterprise Service
CNIT 152 10 Enterprise Service
 
be the captain of your connections deployment
be the captain of your connections deploymentbe the captain of your connections deployment
be the captain of your connections deployment
 
Planning Optimal Lotus Quickr services for Portal (J2EE) Deployments
Planning Optimal Lotus Quickr services for Portal (J2EE) DeploymentsPlanning Optimal Lotus Quickr services for Portal (J2EE) Deployments
Planning Optimal Lotus Quickr services for Portal (J2EE) Deployments
 
Soccnx10: Best and worst practices deploying IBM Connections
Soccnx10: Best and worst practices deploying IBM ConnectionsSoccnx10: Best and worst practices deploying IBM Connections
Soccnx10: Best and worst practices deploying IBM Connections
 
CNIT 152: 10 Enterprise Services
CNIT 152: 10 Enterprise ServicesCNIT 152: 10 Enterprise Services
CNIT 152: 10 Enterprise Services
 
Detailed Introduction To Docker
Detailed Introduction To DockerDetailed Introduction To Docker
Detailed Introduction To Docker
 
Windows 2012 R2 Multi Server Management
Windows 2012 R2 Multi Server ManagementWindows 2012 R2 Multi Server Management
Windows 2012 R2 Multi Server Management
 
CNIT 121: 10 Enterprise Services
CNIT 121: 10 Enterprise ServicesCNIT 121: 10 Enterprise Services
CNIT 121: 10 Enterprise Services
 
Cloud Native Development
Cloud Native DevelopmentCloud Native Development
Cloud Native Development
 
.NET Cloud-Native Bootcamp
.NET Cloud-Native Bootcamp.NET Cloud-Native Bootcamp
.NET Cloud-Native Bootcamp
 
Practical solutions for connections administrators
Practical solutions for connections administratorsPractical solutions for connections administrators
Practical solutions for connections administrators
 
Apache Airflow (incubating) NL HUG Meetup 2016-07-19
Apache Airflow (incubating) NL HUG Meetup 2016-07-19Apache Airflow (incubating) NL HUG Meetup 2016-07-19
Apache Airflow (incubating) NL HUG Meetup 2016-07-19
 
Fluentd and docker monitoring
Fluentd and docker monitoringFluentd and docker monitoring
Fluentd and docker monitoring
 
Cognos Performance Tuning Tips & Tricks
Cognos Performance Tuning Tips & TricksCognos Performance Tuning Tips & Tricks
Cognos Performance Tuning Tips & Tricks
 

Mais de Dell World

Dell Data Center Networking Overview
Dell Data Center Networking OverviewDell Data Center Networking Overview
Dell Data Center Networking OverviewDell World
 
Dell Storage Management
Dell Storage ManagementDell Storage Management
Dell Storage ManagementDell World
 
Dell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions LabDell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions LabDell World
 
2020 Vision For Your Network
2020 Vision For Your Network2020 Vision For Your Network
2020 Vision For Your NetworkDell World
 
Dell Cloud Manager Overview
Dell Cloud Manager OverviewDell Cloud Manager Overview
Dell Cloud Manager OverviewDell World
 
Dell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch ProvisioningDell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch ProvisioningDell World
 
Simplifying Systems Management
Simplifying Systems ManagementSimplifying Systems Management
Simplifying Systems ManagementDell World
 
Channel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsChannel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsDell World
 
Innovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access ModelInnovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access ModelDell World
 
Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)Dell World
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backupsDell World
 
NVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about TimeNVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about TimeDell World
 
Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Dell World
 
The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...Dell World
 
Client Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsClient Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsDell World
 
What a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do notWhat a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do notDell World
 
Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?Dell World
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Dell World
 
Detecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the networkDetecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the networkDell World
 
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...Dell World
 

Mais de Dell World (20)

Dell Data Center Networking Overview
Dell Data Center Networking OverviewDell Data Center Networking Overview
Dell Data Center Networking Overview
 
Dell Storage Management
Dell Storage ManagementDell Storage Management
Dell Storage Management
 
Dell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions LabDell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions Lab
 
2020 Vision For Your Network
2020 Vision For Your Network2020 Vision For Your Network
2020 Vision For Your Network
 
Dell Cloud Manager Overview
Dell Cloud Manager OverviewDell Cloud Manager Overview
Dell Cloud Manager Overview
 
Dell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch ProvisioningDell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch Provisioning
 
Simplifying Systems Management
Simplifying Systems ManagementSimplifying Systems Management
Simplifying Systems Management
 
Channel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsChannel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software Solutions
 
Innovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access ModelInnovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access Model
 
Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backups
 
NVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about TimeNVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about Time
 
Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats
 
The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...
 
Client Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsClient Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced Threats
 
What a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do notWhat a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do not
 
Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption
 
Detecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the networkDetecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the network
 
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
 

Último

WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2
 
tonesoftg
tonesoftgtonesoftg
tonesoftglanshi9
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...masabamasaba
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyviewmasabamasaba
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is insideshinachiaurasa2
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...Shane Coughlan
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrainmasabamasaba
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Bert Jan Schrijver
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesVictorSzoltysek
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnAmarnathKambale
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfonteinmasabamasaba
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdfPearlKirahMaeRagusta1
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...SelfMade bd
 

Último (20)

WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 

KACE Agent Architecture and Troubleshooting Overview

  • 1. Dell World 2014 KACE Agent Architecture and Troubleshooting Overview Allen Tsai: Principal Engineer Rob Napier: Principal Engineer November, 06, 2014 Dell World User Forum
  • 2. Dell World 2014 • Changes in 6.0/6.3 • Key field issues addressed • What a healthy agent looks like • Data files • Agent plugins • Log file • Windows installer • AMP watchdog • Agent security • Debugging tips Overview
  • 3. Dell World 2014 • Application Blacklisting for Windows and Mac • Updated User Alert (Windows and Mac parity) • Expanded inventory collection • Improved reliability • Improved security • AMP watchdog Changes in 6.0 & 6.3
  • 4. Dell World 2014 • KA-334 : Cannot replicate patches to UNC path • KA-1231: Replicated large files keep on growing in size • KA-1328: AMPAgent incorrectly terminates csrss.exe as its child process upon exit • KA-231: AMPAgent can utilize too much CPU on Mac and Windows Key Field Issues Addressed in 6.0/6.3
  • 5. Dell World 2014 • AMPAgent service/daemon running • Valid amp.conf with the proper host specified • Valid amp_auto.conf (6.3) with AMP port 52230 • Network characteristics of a healthy agent • Heartbeat every 20 seconds • Regular inventory (interval specified by K1) • Cycle thru read/write operations (visible in debug) What a healthy agent looks like
  • 6. Dell World 2014 • amp.conf • amp_auto.conf (6.3) • inventory.xml • kinventory.db • InventoryData.Software • ksw_process.db • ksw_timestamps.db • Metering_data.txt • kbots_cache/kbots.xml Data Files
  • 7. Dell World 2014 • host=<hostname> : all you need in amp.conf is a host field, and the agent can fill in the rest once it’s connected to the server. • debug=true|all : use debug field to increase logging, but watch out for rollover. • The log will roll over at 4 MB and 5 old logs are kept. • Starting with 6.3, all the below calculated properties are stored in amp_auto.conf • wto, rto, cto, crto : write, read, connect and connect-retry timeouts • servercompress : control whether the agent automatically compress uploads • maxDownloadSpeed : set the max speed in KB/s that the agent can download payloads at • processtimeout=xxx : override default process timeout in milliseconds • ampurl, ampport, weburl, webport, companyname, splashtext, etc… : some variables are controlled by agent and should not be changed by the user amp.conf & amp_auto.conf
  • 8. Dell World 2014 • kinventory.db • SQLite database used for inventory capture and for generating inventory.xml file. • Useful for debugging when inventory.xml is missing or incomplete. • Can be deleted to have kinventory repopulate in case of suspected corruption. • inventory.xml • The XML that describes the machine generated from the information in kinventory.db • Useful to check if agent is collecting the information correctly when troubleshooting incorrect inventory data kinventory.db & inventory.xml
  • 9. Dell World 2014 • Software inventory collected to match against Dell Software Catalog • Contains the list of all binaries and their attributes from the entire file system • Contains some additional information such as Windows add/remove registry keys • Used by K1 to determine all the software titles installed on the system • Not to be confused with regular inventory, which is more hardware oriented InventoryData.software
  • 10. Dell World 2014 • SQLite database introduced in 5.5 to capture the software metering data. • This database stores all the real time metering data as processes launch/terminate, and will be flushed when server asks for a report. • Maximum rows is configurable. The default maximum is 5000 rows and can be adjusted depending on the software meter flush interval. • On the Mac, there are multiple copies of ksw_process database, one per logged in user. The databases will have _username appended to the base filename. • E.g.: ksw_process_atsai.db ksw_process.db
  • 11. Dell World 2014 • SQLite database introduced in 5.5 to store information such as last alive date • Used to recover in case software metering process itself is terminated and unable to determine the termination time for process it is monitoring. Provides a best guess answer as to when processed we were monitoring terminated once software meter process starts back up. • Like ksw_process.db, there are multiple DB on the Mac, one per user with _username appended to the base filename. • E.g.: ksw_timestamp_atsai.db ksw_timestamp.db
  • 12. Dell World 2014 • Software meter results flushed from ksw_process.db • Contains a list of all processes that ran on the system, their attributes, start time and end time as well as user that launched the process. • This is generated when K1 asks the agent to flush its result and upload to server. metering_data.txt
  • 13. Dell World 2014 • Lists all online and offline scripts. • Provides ID and VERSION of active scripts, located in the same folder. • Used by the boot, login and offline script engines to loop through and look for applicable scripts. • Updated by kbot number 3. • C:Program Files (x86)DellKACErunkbot.exe 3 0 kbots_cache/kbots.xml
  • 14. Dell World 2014 • The primary functions of the agent arehandled by the AMPAgent service/daemon and 4 supporting plugins • pluginWeb: handles script downloads, replication, log uploads. • pluginRunProcess: handles scripts and runs processes thru runkbot. • pluginPatching: handles detecting/deploying of patches. • pluginDesktopAlerts: handles displaying broadcast user alerts or pre-install script alerts. Agent Plugins
  • 15. Dell World 2014 • With 6.0, we consolidated all agent logs into a single log file KAgent.log. • This allows for a better trace of exact events that happened on the agent without having to cross reference all the logs and match up by time. • The log contain the date, module and the function name that generated the log. [2014-10-14.19:58:32][KInventory:CInventoryData::Initi] KInventory InventoryData opened DB successfully [2014-10-14.19:58:32][KInventory:CInventoryData::Initi] KInventory InventoryData populated the DB [2014-10-14.19:59:15][KInventory:runInventory ] KInventory Inventory Capture completed and stored in C:ProgramDataDellKACEinventory.xml [2014-10-14.19:59:15][KCopy:UploadUsingCurl ] UploadFile: Server gzip compression is active [2014-10-14.19:59:15][KCopy:UploadUsingCurl ] UploadFile: uploading file C:ProgramDataDellKACEinventory.xml.gz to https://engk1agent3/service/inventory.php?KUID=F2C603AD-08C8-48D3-A556-25F2702F6D89&VERSION=6.0.32 Log File starting 6.0
  • 16. Dell World 2014 • By default, Windows agent provisioning, removal and updates produce two debug logs files: • ampmsi.log: msiexec /L*v log file, found in the %TEMP% folder • ampinstaller.log: custom action log file, found in the %TEMP% folder as well as the KACE data folder • The log files indicate when agent installed and/or uninstalled, and flags and properties passed in. • When run non-silently, the agent will honor the current locale language if is one of the 10 supported languages. Otherwise, default is English. • Use the new GPO Provisioning tool to help create the GPO. Will not need to use the setlang VB script to override default locale anymore if use the GPO Provisioning tool. • https://www.kace.com/support/resources/kb/solutiondetail?sol=133776 Windows Installer
  • 17. Dell World 2014 • /i <msi file> : install msi file (example: msiexec /i amp.msi) • /x <msi file> : The preferred way to uninstall agent is to run “AMPTools uninstall” • /qn : silent install (example: msiexec /qn /i amp.msi) • /L*v <log_file> : create log file (example: msiexec /L*v amp.log /i amp.msi) • HOST=<host_name> : set amp.conf host value (example: msiexec /i amp.msi HOST=kbox7.acme.com) • Alternatively: you can append to msi filename (example: msiexec /i amp_kbox7.acme.com) • DEBUG=true : set amp.conf debug value (example: msiexec /i amp.msi HOST=kbox7 DEBUG=true) • NOHOOKS=1 : don’t install boot & logon hook dlls (msiexec /i amp.msi HOST=kbox7 NOHOOKS=1) • CLONEPREP=1 : do not start AMP service until next reboot (msiexec /i amp.msi CLONEPREP=1) Windows Installer Common Properties
  • 18. Dell World 2014 • Introduced in 6.3, AMPWatchDog monitors the health of agent and perform simple recovery to address majority of the common issues • Conditions which AMPWatchDog monitors currently: • AMPAgent executable exists in expected location • AMP configuration file exist with server host • AMP Service/Daemon not running (Restart agent) • Inventory.xml exists and is less than 3.5 times the configured frequency (Restart agent) • ampport=port exists in amp_auto.conf (Restart agent) • Logs netstat output relevant to ampagent connection AMPWatchDog
  • 19. Dell World 2014 • Agent by default will accept http connection if https can not be established with K1 • Uses OpenSSL 1.0.1h with Heartbleed addressed • Agent is not affected by the POODLE vulnerability • Only publicly signed certificates honored • The signing root authority must be included in the curl certificate bundle (cacert.pem in agent data directory, exported from Mozilla) • Different SSL options to set in amp.conf • sslrequired: Agent will not fall back to http if https can not be established • verifyssl: Agent will verify the server certificate, implied sslrequired • TLS will be on by default in the future Agent Security
  • 20. Dell World 2014 • What are the basic stuff to look for when suspecting agent issues? • Turn on Debug=true • Is agent running? • Is the KAgent.log being updated? (under users directory) • Is the agent connected? DNS issues? Use FQDN when possible. Can you resolve the host and telnet to port 52230? • Agent is 32 bits, remember that for any registry/file system OS redirections • Test agent functionalities by running runkbot 2 0 • Windows: c:Program Files (x86)DellKACErunkbot 2 0 • Mac: /Library/Application Support/Dell/KACE/bin/runkbot 2 0 • Linux: /opt/dell/kace/bin/runkbot 2 0 • Are there crash dumps? • Windows: c:ProgramDataDellKACE*.dmp • Mac: Console Trouble Shooting
  • 21. Dell World 2014 • Eliminate possible system conflicts (disable firewall, turn off AV program, etc.) • Look at the log file in the KACE data folder • Win XP: “C:Documents and SettingsAll UsersDellKACEuser • Vista and Win 7: C:ProgramDataDellKACEuser • Mac: /Library/Application Support/Dell/KACE/data/user • Linux: /var/dell/kace/user • Verify valid amp.conf file, and regenerate it if needed using AMPTools • AMPTools resetconf host=kbox7.acme.com • Verify existence of valid kbots_cache/kbots.xml files and supporting script xml files Debugging Tips
  • 22. Dell World 2014 • Verify K1000 host name resolves using browser or command line • ping kbox7.acme.com • telnet kbox7.acme.com 52230 • Enable debugging by running “AMPTools debug=true” which will set debug value in amp.conf and restart the agent. • Alternatively, you can temporarily enable debugging on Windows without restarting the agent using “sc control ampagent 199” (This only enables debug for AMPAgent, not all binaries) Debugging Tips (continued)
  • 23. Dell World 2014 • HexDump • Setting HEX_DMP environment variable before starting AMPAgent will cause AMPAgent to log the exact informtion it tries to send and receive over the wire. • HeartBeat o [Smurf_write_SYNC ] ------------------------------------------------------------- ------------------- [Smurf_write_SYNC ] 00000000 00 00 00 01 05 ..... [Smurf_write_SYNC ] 00000005 ---------------------------------------------- ----------------------- • Agent connection string o [Smurf_write_SYNC ] ------------------------------------------------------------- ------------------- o [Smurf_write_SYNC ] 00000000 00 00 00 01 02 00 06 00 00 00 21 36 34 34 35 46 ..........!6445F o [Smurf_write_SYNC ] 00000010 45 42 34 34 34 33 37 34 36 33 31 41 30 33 39 35 EB444374631A0395 o [Smurf_write_SYNC ] 00000020 30 42 31 31 32 34 39 37 34 31 41 00 00 00 00 0a 0B11249741A..... o [Smurf_write_SYNC ] 00000030 30 2c 32 2c 34 2c 36 2c 35 00 00 00 00 6b 76 65 0,2,4,6,5....kve Debugging Tips (continued)
  • 24. Dell World 2014 • Basic information to collect when observed crashes • Collect crash dumps or crash call stack • Windows 2008/Vista and newer: HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsWindows Error ReportingLocalDumps • Mac: Agent crashes will show under System Diagnostic Report in Console. Collect the crash call stack. • Collect agent version • Collect agent log in debug mode • All the information are important in order to debug and simulate the failure successfully. Need the agent version in order to match the crash dump up with the debug symbols. Crashes Diagnostics
  • 25. Dell World User Forum Q & A
  • 26. Dell World User Forum Thank you.