Chapter 2 - Workstation Management
Chapter 2 - Workstation Management
Chapter 2
Workstation
Management
Chapter 2 Objectives
Discuss workstation issues that are
important to customers.
Discuss fundamental strategies related to
workstation hardware.
Determine strategies for installing an OS
that influences the machine’s life.
Define fleet service required for hardware
and software.
Determine fleet logistic for high-level
process.
ITT 420
Chapter 2 Outline
Workstation Architecture
Workstation Hardware Strategies
Workstation Software Life Cycle
OS Installation Strategies
Workstation Service Definition
Workstation Fleet Logistics
Workstation Standardization
Workstation Architecture
Workstation Architecture
Workstations are computers used by
people. Whether it is a desktop PC in an
office or a laptop computer carried from
place to place, workstations are the
computers people use to get work done.
Workstation Architecture
Workstation Architecture
The experiences people have when using
their workstations are determined by
design decisions you make as the system
administrator. Issues that are important
to customers are:
Locality: Is the workstation available where and
when it is needed?
Reliability: Is the workstation reliable or does it
lock up or crash frequently?
Productivity: Can the customer work with
minimal obstruction?
User agency: Do the users have agency or
control over their environment?
Current-ness: How much lag time is there
between when new features ship and when they
are installed and ready to use on the machine?
Workstation Architecture
Fungibility
Workstations should be a fungible
resource: Any one unit should be able
to substitute for any other.
The ability to log into any workstation
improves access locality.
Computers break. If a person is tied to a
particular machine, he or she is unable to
work until the computer is fixed.
But there is limit on how close we can get
a fungible system such as:
There will be variations in hardware.
There will be variations in login access.
Variation in Applications and software
installed.
Workstation Architecture
Fungibility
Workstation Architecture
Fungibility
Lastly, having all data be stored
remotely and accessed over a network
requires network access. However,
network access is not always available
to laptops or other mobile devices, nor
to workstations when used in a remote
area or disaster areas.
The primary elements of a workstation
architecture are the hardware itself,
the operating system(s), network
configuration, the accounts and
authorization system, data storage,
host security, and logging.
Workstation Architecture
Hardware
There are laptops and desktops, mobile
devices and tablets, and other physical
form factors to choose from.
There is also the decision between
physical workstations and virtual
workstations
whether the workstation is provided by
the company or if some kind of bring
your own device (BYOD) strategy is
employed.
Workstation Architecture
Operating System
As part of our workstation architecture, we can
provide a single operating system or many.
Linux has both different vendors and versions
within those vendors. For example, RedHat,
Ubuntu, Debian, CoreOS, and other vendors
make Linux distributions (“distros”) by
packaging the Linux kernel with different sets of
applications, utilities, and enhancements.
Similarly, Microsoft and Apple have server and
workstation variations of each operating system.
Standardizing on exactly one operating system
good at all aspects of the one supported
operating system.
Workstation Architecture
Network Configuration
Workstations are generally connected to a
network by either wired (Ethernet) or
wireless (WiFi) technologies.
Architecturally speaking, the decision to be
made here is whether network configuration
is hardcoded (stored on the machine itself)
or dynamic (provided by the network).
Network configuration parameters:
include the machine’s IP address,
subnet mask,
default gateway,
DNS servers
Workstation Architecture
Network Configuration
Dynamic Configuration
the machine asks the network what its
configuration parameters should be via Dynamic
Host Configuration Protocol (DHCP) service.
(DHCP server or router) Static and dynamic Ip
address
IPv6 has the additional possibility of using a
system called Neighbor Discovery (ND)
Dynamic configuration permits network
configurations to be controlled centrally.
The ability to centrally control configurations is
key to being able to efficiently manage large
numbers of machines.
Otherwise, one would have to visit every machine
for even the most minor change.
Workstation Architecture
Network Configuration
Applicability
Storing a static configuration on a host makes it
less generic. It can plug into only the one subnet
it was configured for.
Desktop PC users benefit from dynamic network
configuration because it reduces the skill required
to deploy or move their PC.
Dynamic configuration is also less error prone.
Expecting a user to manually type an IP address,
subnet mask, and default gateway accurately is
overly optimistic.
Workstation Architecture
Network Configuration
Hardcoded Configuration
the configuration parameters are stored on the machine
itself.
A hardcoded configuration has the benefit that it works
whether the DHCP server is available or not.
Servers generally use static configurations so as to
minimize their external dependencies.
Hybrid Configuration
Servers can also have a hybrid configuration, where the
network parameters are defined in local files, but the
server periodically checks the network parameters via
DHCP.
This technique uses the DHCP INFORM request.
This approach combines the ease of managing a large-
scale installation with the benefit of removing the boot-
time dependence on DHCP for critical servers.
Workstation Architecture
Data Storage
The user of a workstation needs to store
information, or state.
There are three fundamental ways to configure
storage:
Local: All data files are stored locally
Stateless: No locally unique data. Users’ files are
stored remotely on a network server. The local disk is
used only for the OS, temporary files, and caches.
Diskless: No local disk storage. The operating
system and user data are stored on a remote disk
over a network using protocols such as iSCSI or NFS.
Workstation Architecture
Data Storage
A big part of creating generic, fungible
workstations is to make them stateless. This
can be done a couple of ways:
Remote file storage: The client accesses storage
from a remote server as a “network disk” or other
mechanism that makes the files appear as if they
were local, but actually accesses them from another
server behind the scenes. Examples include NFS,
popular on Unix/Linux systems, and SMB, popular in
Microsoft Windows.
Network-synced or cloud storage: The user’s files
are stored locally but copied to a network service as
soon as possible. Examples of this include Dropbox,
Microsoft OneDrive, and Apple’s iCloud Drive.
Workstation Architecture
OS Updates
As long as software is being actively supported by
the vendor, there will always be updates, often
called patches, that add new features, fix
bugs, and close security holes.
We can install updates manually or automatically.
Manually means a person visits each machine and
gives the commands to install the updates,
possibly rebooting the machine if that is required.
workstation architecture should take the following
considerations into account regarding updates:
Centrally control which patches are distributed when.
Test updates before they are deployed.
Users should be able to delay an update
SAs should have the ability to stop all updates if a
problem is detected
Workstation Architecture
Security
Theft
Ifa laptop is lost or stolen, the first priority is to
make sure that whoever possesses the device
cannot access the contents.
Laptop tracking software periodically announces
the machine’s IP address to a service that helps
you track its location.
Another way to protect access to the information
on the hard drive is to use full disk encryption
(FDE).
The users’ accounts are disabled until passwords
and security credentials can be reset.
Workstation Architecture
Security
Malware
Malware is software created to insert itself on a
machine to subvert the security of the system.
Anti-malware software comes in two general
categories:
Antivirus software/blacklisting: Detects malicious software
by watching for specific banned software, or detecting
particularly bad behavior.
Application control software/whitelisting: Uses a whitelist
of permitted software and prevents all other software from
running.
A network firewall is a software-enforced policy
that determines network access to and from a
host.
Workstation Architecture
Security
Malware
Any kind of security defense software should have
the following qualities:
Centralized control: Security defense software should be
configured and controlled from a central point.
Centralized reporting: There should be a central
dashboard that reports the statuses of all machines.
Silent updating: The software should update silently. It
does not need to pop up a window
Hidden from view: The user should be able to determine
that the software is activated
Negligible performance impact: Anti-malware software
can have a significant impact on the performance of the
machine.
Workstation Architecture
Logging
A workstation architecture needs to make
workstations error observable.
This is done by logging events and making this
information accessible.
Microsoft Windows calls this the event log
Unix/Linux systems call it the system log, or
syslog.
There are many log analysis tools such as
Logstash and Splunk that store and interpret
log information.
Workstation Hardware
Strategies
Physical Workstations
Laptop Versus Desktop
Desktops are generally more expandable. They have slots
for add-on cards and video processor cards, and sockets
for additional memory.
Laptops are generally more expensive than comparable
desktop models. A laptop’s mobility requires it to be more
rugged because people drop, bang, and otherwise
mistreat these machines.
Laptops are easier to support because people can bring
their laptop to a helpdesk rather than requiring an IT
technician to visit their desk.
Vendor Selection
Minimize the number of vendors used to reduce
complexity and support cost.
Having multiple vendors permits price competition but
incurs a bigger support cost.
Workstation Hardware
Strategies
Physical Workstations
Product Line Selection
Most vendors have multiple product lines. Choose based on
lowest initial cost or purchase price, lowest total cost of
ownership (TCO), and emphasize performance.
Lowest Initial Cost
The lowest initial purchase price is achieved by sacrificing the
features that would make the machine less expensive.
For example, a fixed configuration makes the initial purchase
price lower but future expansion may require replacing the entire
machine
Total Cost of Ownership
Total cost of ownership refers to all costs related to the machine
for its lifetime.
business with a large fleet can lower its TCO by minimizing the
variations in hardware.
Performance
includes features required by engineering applications such as
computer-aided design (CAD) and computer-aided engineering
(CAE), which require high-end graphics, vector processing, and
heavy-duty computation.
Workstation Hardware
Strategies
Non-Persistent VDI?
The advantages of non-persistent VDIs are as follows:
• It is easy for administrators to patch and update the image
• It minimizes storage and backup requirements for the OS
image.
• It simplifies deploying company-wide applications to all end
users.
• It improves security since users can’t alter desktop settings
Persistent VDI?
The advantages of persistent VDIs are as follows:
They ease customization.
They provide an easier transition for users.
Support is similar to desktops.
Persistent VDI?
The advantages of persistent VDIs are as follows:
They ease customization.
They provide an easier transition for users.
Support is similar to desktops.
MDM Features:
Deny access unless approved anti-malware software is in use
Perform end-to-end encryption on all communication
ability to remotely wipe the device
OS Installation
The OS installation process erases any existing
operating system and installs a new one
Installation is best achieved through automation.
Workstation Software
Life Cycle
OS Configuration
After installation, many subsystems and components
need to be configured. Configuration technique as follows:
Carefully
An automated update system has the potential to
cause massive damage.
You must have a process around it to make sure
that risk is managed.
Create a well-defined release candidate that will be
distributed to all hosts.
Roll out the change to a small group first
Establish success criteria for an iteration.
Workstation Software
Life Cycle
Disposal
The last stage of life for a machine is disposal. Tasks related to
disposal fall mainly in three categories: accounting, technical, and
physical.
Accounting:
Remove the machine from capital inventory.
Write off any calculated depreciation.
Remove the machine from any hardware maintenance contracts.
Technical (decommissioning):
Move or decommission any remaining services.
Transfer any data to other hosts or long-term backup media such as
tape.
Remove the machine from monitoring systems.
Technical (data security):
Physically disconnect the machine from the network, or perform the
virtual machine equivalent.
Reset any onboard management systems to the factory defaults.
Securely erase all disk, SSD, or other storage.
Physical:
Disconnect any remaining cables.
Remove the machine from the rack.
OS Installation
Strategies
OS Installation Strategies
There are many strategies for installing an OS, from
fully manually to fully automated.
The lack of automation meant that setting up each new
machine took days
Consistency Is More Important Than Perfection
If a customer has multiple machines, each
unexpected difference is an unpleasant surprise.
Consistency makes your team look much more
professional.
Inconsistency also creates inefficiencies for your
team.
A small misconfiguration can cause a big problem.
Manual OS and application installation will always
result in some kind of inconsistency
OS Installation
Strategies
Installation Strategies
Installation of the OS and initial applications can be
done by automation, cloning, or manually
Automation
All modern OS vendors provide a mechanism to automate OS
installation.
Microsoft Windows has Microsoft Deployment Toolkit (MDT)
RedHat Linux has KickStart, Debian has Debconf
All of these have the same basic components: They have a way
of booting over the network from an installation server.
An automated installation process does not require a long
installation checklist, but some documentation is needed.
OS Installation
Strategies
Installation Strategies
Cloning
One machine is installed and configured as desired, and a snapshot of that
machine’s disk is saved somewhere.
The original machine is known as the golden host and the snapshot is
called the golden image.
An early product was called Ghost. Clonezilla and FOG (Free and Open
Ghost) are now popular open source alternatives.
Disadvantages of Cloning
First, if the hardware of the new machine is significantly different
from that of the old machine, you have to make a separate
master image.
In addition, cloning hides history.
Automated Image Creation
Many of these disadvantages can be mitigated or eliminated by
automating the creation of the golden image in a way that can be
reproduced easily
Packer and Vagrant are two such systems
Hybrid Cloning and Automation
The golden image is used to establish a minimal OS install and
the remaining configuration is achieved through other
automation, such as the software distribution system
OS Installation
Strategies
Installation Strategies
Manual
The most basic, and least preferable, way to install and configure
an operating system is manually.
Manual configuration may include installing applications,
enabling or disabling various features and options, and so
on.
manual installation results in inconsistently configured
machines.
Only done when an operating system is new and the
automation has not yet been created.
Another situation is if the site is so small that new
machines are installed too infrequently to justify creating
such automation.
another situation is when the machine is that of a remote
employee with limited bandwidth.
OS Installation
Strategies
Refresh Cycles
There needs to be an orderly way of identifying older
hardware and replacing it. Hardware eventually become
obsolete.
Choosing an Approach
Generational
Workstations are installed in large groups, each called a generation.
Hiring Date
Another strategy for refresh cycles is based on hiring date.
Departmental
each department creates its own strategy and policy. Some
departments will do a good job but most will not.
Short-Sighted Approaches
These decisions include foregoing upgrades for multiple years, ignoring
the corporate hardware standards,
or buying models that have a deceptively low initial purchase price.
Workstation Service
Definition
Configuration Management
Database
The configuration management database (CMDB) is a
system that stores information about all machines in a
fleet.
The CMDB stores information about a machine—its
name, serial number, who uses it, which operating
system is deployed in it, and so on.
It also stores desired state
Workstation Fleet
Logistics
Workstation Standardization
How does one take an organization from a mix of
workstation configurations to a unified standard?
This is surprisingly difficult. People resist change.
Key Points in Workstation standardization:
• Involve customers early. Involve customers early in
the planning stages to gather requirements and to help
identify the project’s justification.
• Release early and iterate. Expose a small group to the
new platform first, fix problems, and then repeat with larger
and larger groups.
• Have a transition interval. Maintain the old and new
systems at the same time. Do not expect to convert
everyone at the same time.
• Ratchet. Move in only one direction, toward the goal.
Adopt a strategy that prevents regressions.
• Don’t let it last forever. Set a cut-off date at which
point legacy machines lose access.
End of chapter 2