I've got a nice solution for this called IPcheck Server Monitor from Paessler (http://www.paessler.com/products/ipcheck/?link=menu).  It is buggy however from the standpoint of the interface, though they have been continually improving and fixing it.  It has nice notification features such as dependencies.  I monitor from a separate network from the servers themselves, giving a good impression of what my customers experience.

I kind of feel tied down to monitoring and then researching, and then resolving issues.  For instance, in the last 24 hours I had the following happen:

    - Customer's mail server IP changed without notifying us, causing lots of spooled messages.
    - One person sent about 150 MB of E-mail (separate large messages) to a MailPure protected account
       and that slowed down our responsiveness on all services (HTTP and POP3 also affected.  No fix can
       be applied for this except for limiting as the traffic was legit, just unusually bursty.
    - Customer's remote Web server misbehaving and delivered 10,000 messages to their own account through
       our gateway.  No immediate issues, but it bears watching for potential escalation that could threaten our
       performance.

I'm spending a lot of time with this stuff on a regular basis and want to be a bit more proactive so that I don't need to feel tied down.  Almost all issues can be controlled by rate limiting, though some require extensive granularity to achieve sufficient protection.  QOS is also at issue since I stay away from doing inexpensive services, concentrating on value-added, and many of my customers do expect more.

Right now I'm fine, but the more I grow, the more often these things will occur and I think it's time to put something else in place that can stop issues from potentially affecting every service/customer.

Matt



Darin Cox wrote:
Best solution is monitoring.  Without creating a system of dedicated circuits to each customer you can't guarantee one customer will not adversely affect another.  Rate-limiting at the switch (or software "switch") will help, but still means a smaller pipe for everyone else...and doesn't help with multiple customers misbehaving.
 
With appropriate SNMP or RMON monitoring, however, you can be notified as soon as traffic goes beyond a given threshold and react accordingly.

Darin.
 
 
----- Original Message -----
From: Matt
Sent: Wednesday, February 16, 2005 3:18 PM
Subject: Re: [Declude.JunkMail] OT: Switch to control bandwidth

I just wanted to follow up on this thread.  First, thanks for all of the suggestions.  Here's a summary of what caught my eye.
1) There are some decent choices out there, and seemingly a 3COM SuperStack 3 3226 comes at a nice price point (around $500) and allows limiting per port at 1 Mbps increments and also does 7 custom levels of protocol prioritization.  This was suggested to me off-list.  It seems like a good thing for colocation since you don't care for more granularity among your customers, they can choose to do with their bandwidth what they wish.  I'm not into colocation yet and this probably falls short of my needs otherwise.

2) I was also intrigued by the NetEqualizer product, which seems to be a the commercial version of an open source project called Linux Bandwidth Arbitrator (www.bandwidtharbitrator.com).  This might very well offer functionality beyond all of the switches, but offers more complication in setup and management unless you go with the for-profit version.  This is of course not a switch, but that's ok since cheap switches can be placed behind it.

3) Cisco is of course a popular choice, but I'm not a fan of their ridiculous licensing schemes for the software and high prices.  Used, these things come fairly cheap, but they are the 'Outlook' of routers and switches, and the most likely to be targeted by exploits.  For that reason, I am probably going to migrate away from anything Cisco once I outgrow what I already have.  I may change my mind however.

4) I don't think I need a firewall, or don't want to deal with the expense and limitations of it (concurrent sessions, etc.).  I have so few ports open that I'm fine with router level protection and this is exclusively a DMZ with no client computers behind it.

Despite what these products offer, I still think that the switches generally come up short of being a perfect solution to my needs (that of a Web hosting/E-mail provider).  I essentially have 5 services that I need to support across 3 machines; HTTP, FTP, DNS, SMTP, and POP3.  It seems that by just simply bandwidth limiting a port, I won't be able to slow down but a portion of the problematic bandwidth and there can be other issues caused by that (such as limiting all HTTP because of one site that is getting hammered).  It would be best to limit HTTP by IP instead of by port.  I haven't tested it out yet, but it may be that IIS will actually work when limiting in Windows 2003 unlike 2k, and that may solve my issue on that front at least.  FTP may or may not be covered by the same, I'm not sure yet.

It seems however that some of the worst issues are coming from fairly unique situations and specific IP addresses.  Conditions like E-mail loops can not only bring down a mail server, but also bring down a whole network if all of your bandwidth is used.  This of course can also affect POP3 service. If a customer does a mass mailing with huge images sourced from their site, the bandwidth could also bring us down without limits.  I even had a customer send 144 messages out the other day with a 2.5 MB attachment, and if you do the math, you will find that this was 400 MB of bandwidth that IMail naturally attempts to deliver ASAP.  I've also noted that IMail doesn't do well with response times under heavy bandwidth load even if the CPU is fine while other services on the same box have far less latency.  This affects the quality of service to my customers, and I like things to be responsive.

So what I am really looking for is some way to protect Web hosting clients from another Web hosting client's issue, protect POP3 service from having the bandwidth bogarted by some SMTP loop, or FTP, or HTTP, etc.  Since everyone shares the same MX records, and the same outgoing SMTP and POP3, it's hard to find decent separation unless I get down to the IP level and start limiting things based on at least the destination IP if not the source IP also.  To do anything less would seem to be somewhat futile because I would continue to have sporadic issues with the most problematic things which can be long-lived to the point that they are resolved/blocked (DOS or loops for instance).

I kind of get the feeling that a hardware based solution living in a switch or firewall of some sort might not be appropriate because it would be too expensive for me to justify.  It seems that a Linux solution such as Bandwidth Arbitrator/NetEqualizer would need to be added in order to properly achieve the level of granularity that I desire without enormous cost.

I have another qualification for this.  I wish to spend less that $1,000 and have my network be survivable with a failure of this device.  If I was using a switch based solution, I would need two switches for redundancy (though maybe a backup cheap switch).  A firewall/router would likely be prohibitively expensive if you went for redundancy.  An in-line Linux solution could however be simply bypassed in the event of an outage, though it would need to be very stable and probably won't be as stable as a good switch...

Does anyone have any feelings on this, and maybe some pointers to other in-line software solutions that might fit the bill?

Thanks,

Matt





Markus Gufler wrote:
It 
might even be nice to do this on a per-IP basis instead of a 
per-port basis, though that's not absolutely necessary.  
Since this is a Web hosting segment and our bandwidth is 
naturally limited going out, and very little intra-DMZ 
traffic exists, something that is 10/100 is all that is necessary.
    

Maybe give a look to a Fortinet 50 or 60-series Firewall. You can manage
guaranted & max traffic and also priorize certain protocols. The price
shouldn't be higher then a manageable switch with traffic shapping
capabilities.

If you want to monitor each switch port with SNMP unfortunately the cheap
Syslink Switch has no SNMP support. At the moment I look for different
solutions. Certain Cisco Catalyst switches looks promising but also the good
old HP ProCurve 2512/2524.

Markus

---
[This E-mail was scanned for viruses by Declude Virus (http://www.declude.com)]

---
This E-mail came from the Declude.JunkMail mailing list.  To
unsubscribe, just send an E-mail to [EMAIL PROTECTED], and
type "unsubscribe Declude.JunkMail".  The archives can be found
at http://www.mail-archive.com.


  

-- 
=====================================================
MailPure custom filters for Declude JunkMail Pro.
http://www.mailpure.com/software/
=====================================================

-- 
=====================================================
MailPure custom filters for Declude JunkMail Pro.
http://www.mailpure.com/software/
=====================================================

Reply via email to