Docker Daily Operations Guide (editor)
March 13, 2019
This document records specifications on installing, configuring and managing Docker systems and agents, as well as providing guidance on the Docker application itself. My role in this project was to help assemble the DOG and edit the initial draft.
Windows Daily Operations Guide (author)
December 1, 2018
This document pulls together several groups of Windows administrators, from the basic operating system administrators, to specialists in Citrix and GIS. This DOG provides guidelines for administering servers in a cloud environment, especially the obtuse layers of security that make administration challenging.
Information is secured and not available for public viewing.
GPFS Daily Operations Guide (editor)
June 1, 2017
This document focuses on the GPFS servers and management of GPFS services. The document is originally written by IBM. Additional notes written by myself and GPFS specialists are provided through footnotes to the original text, or added content in the Appendix.
Information is secured and not available for public viewing.
Key Distribution Center (editor)
March 14, 2017
The Forest Service network utilizes a Key Distribution Center to manage Kerberos keys for some of the systems. The DOG is largely written by IBM. Additional notes written by myself and KDC specialists are provided through footnotes to the original text, or added content in the Appendix.
Information is secured and not available for public viewing.
LPAR Operations Guide (editor)
March 17, 2017
No, it has nothing to do with golf. LPAR is an accronym used by IBM to describe it's virtual machine. It is a logical partition. A vast portion of the document is IBM documentation. Additional notes written by myself and LPAR specialists are provided through footnotes to the original text, or added content in the Appendix.
AIX Notes (author)
November 1, 2016
Something that brings it all together, from IBM's AIX Daily Operations Guide to the added contributions of people experienced in running AIX systems.
Information is secured and not available for public viewing.
-- Read more
June 1, 2016
This DOG explores new ground for the Forest Service, detailing how Performance and Capacity are measured, monitoring tools, analysis and affecting change and improvements in data center operations.
Developing procedures that pertain to the Hosting Services team, ranging from how incidents are handled to demand and capacity management.
Information is secured and not available for public viewing.
Provides procedures for handling processes specific to security applications, as well as a technical discussion of those applications.
Information is secured and not available for public viewing.
Provides procedures for the setup and administration of Blade Centers and RSA's of standalone IBM systems.
Information is secured and not available for public viewing.
June 20, 2015
Provides a template by which developers and application managers can record procedures for installing, diagnosing and further developing applications.
Check out Welcome to DOGland.
Provides procedures for troubleshooting GPFS issues on Linux systems that are GPFS clients, as well as monitoring specifications. Document was initially
written by Dave Strehle.
Information is secured and not available for public viewing.
Provides procedures for handling incidents at the USDA Virtual Data Center (third-party cloud party provider). Currently in draft, portions are used by the
Data Center.
Information is secured and not available for public viewing.
The largest technical publication I have been involved with, provides extensive information on the management of Linux systems at the data center, covering
the full range of procedures and technical information on every aspect of the Linux operating system. Included are sections on how Linux systems are monitored.
Information is secured and not available for public viewing.
Provides specifications on what tools are used to monitor Linux systems, incident management, and threshold specifications.
Information is secured and not available for public viewing.
Provides procedures for monitoring USFS systems at a third party cloud provider (USDA's Virtual Data Center). Currently in draft mode.
Information is secured and not available for public viewing.
Provides tips for utilizing PuTTY for Linux and AIX administrators, as well as specific instructions on how to make PuTTY function with the USDA two-factor
authentication process.
Material can be provided after USFS-specific information is vetted.
Provides tips on how to utilize WinSCP FTP sessions, including specific instructions on how to integrate WinSCP with the USDA two-factor authentication process.
Material can be provided after USFS-specific information is vetted.
US Forest Service Region 10 Computer Center
March 4, 2014
Provides procedures for managing the regional computer center in regards to security, physical operations and system management. Evolving primarily from USFS security audits, this document incorporates many of the elements in the CISSP.
Material is designed only for USFS, but general guidelines can be provided upon request.