Hi mark<br><br>On 8/30/07, <b class="gmail_sendername">Mark Hahn</b> <<a href="mailto:email@example.com">firstname.lastname@example.org</a>> wrote:<div><span class="gmail_quote"></span><blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">
> There is a big push where i work to use commercial monitoring, and service<br><br>I'm terribly sorry. this is a sign that accountants have eaten<br>the brains of your IT heads.</blockquote><div><br>It is more the ITIL standards, and Commercial vendor lobbying, our accountants are clueless :)
<br></div><br><blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">HPC clusters are normally a horde of clones. no configuration change<br>is applied individually to a node, but rather applied en-mass.
<br>reimaging nodes is not a huge big deal, for instance (and a non-event<br>if you use nfs-root - definitely a good idea in some cases.)<br></blockquote></div><br>True The only frequent changes are user account modification, mounted nfs files, and scheduler configurations files if log level need to be altered. I can just write a script or use a file integrity checker to check these. The problem is that the department that is asking us to implement configuration change monitoring based on a security audit items want more than that, want to know if a service was modified, and was that according to an agreed policy or not.? I was thinking maybe if i can estabilsh some baselines through ganglia, and log monitoring probably using SEC, I could advise a solution, and the alerting probably could be done using SEC/GroundWorks/Zenoss