The Setup Behind Microsoft.com 412
Toreo asesino writes "Jeff Alexander gives an insight into how Microsoft runs its main sites. Interesting details include having no firewall, having to manage 650 GB of IIS logs every day, and the use of their yet unreleased Windows Server 2008 in a production environment.
Mostly how they run it (Score:5, Funny)
Re: (Score:3, Funny)
I thought that was the QA process. Then again I can imagine Microsoft using chair names as the code names to their products:
- Cogswell
- Caquetoire
- Glastonbury
- Morris
And no I don't know chair names by heart. I am computer geek, not a chair geek, since that would be Balmer
source: http://en.wikipedia.org/wiki/List_of_chairs [wikipedia.org]
Re:Mostly how they run it (Score:4, Funny)
Beta in production environment. (Score:2, Funny)
So even MS has given up on Vista.
Re:Beta in production environment. (Score:5, Informative)
Vista as a server (?) (Score:3, Interesting)
At least this is true with the version I'm testing - June 2007 CTP (Community Technology Preview). I expect in later versions this will be obscured.
Re:Beta in production environment. (Score:5, Informative)
Re: (Score:3, Informative)
Re: (Score:3, Informative)
You can debate the drawbacks and benefits of having so many versions, but XP was never intended to be a substantial server.
Re: (Score:3, Informative)
Re: (Score:3, Interesting)
"Home" is really more of a "Workstation lite", with a lot of the workstation features disabled
Alternately, you can think of "Home" as the successor to Windows ME, with an NT kernel. I'll try to do this schematically (WKS = Workstation, SVR = Server, and some other weird abbreviations used to make the alignment work):
In reality, things are a lot more complicated, because there are other editions, Win 2K Advanced Server, x64 editions, and God knows how many variants of Vista. (Maybe "Vista Business" is a better fit than "Ultimate" above too.) In addition, a lot of people who were or would have been in the 95/98 line moved to the "Pro" line for XP. But, for most people, things probably progressed as indicated.
While that is more or less true, consider that tere are really only three main OS Codebases in Microsoft now. Windows NT (non server, the current offering is various form of Vista, as well as XP until they discontinue it). Windows server (a very close relative to the NT series, but optimized for server environments, and multi-processor usage.) Those two code bases are close enough that they share binaries (when on the same architecure) and they could even be used for the opposite purposes with only minor
Re:Beta in production environment. (Score:5, Funny)
Re:Beta in production environment. (Score:5, Funny)
Gotta give credit to MS for eating their own dog food...
Allow incoming connection on port 80? Confirm/deny
Re:Beta in production environment. (Score:5, Interesting)
That said, the choice to use longhorn server in production isn't actually a bad one. It's really, REALLY stable. I keep hearing (from people both inside and outside the company) that it's more stable than 2003 is (and 2003 has the benefits of multiple service packs). It's also a lot more configurable about what it runs, and how much of it it enables when it's installed. I wouldn't bet the entire stable on it, but I'd be willing to put money on it getting a place.
All in all, it's pretty sweet, if you look at it from the sysadmin perspective. Also, the stuff you can setup when you couple it with vista is really nice (from a security standpoint, particularly). That said, some of that functionality is being backported to XP with SP3 or whatever.
Re: (Score:3, Interesting)
Re:Beta in production environment. (Score:5, Insightful)
Dude, if you can't hack that right now, how are you dealing with unix instead?
If any platform's based on a standard of bizarre naming due to space saving stupidity, that's it. Far more so than windows. Infact, name any mature platform that's based on reasonable standards for it's underlying API's and structure.
Didn't think you could. While it's true that things like the FHS are helping on the unix side, try telling an oldschool developer like oracle that they need to follow it. They'll laugh. and laugh.
and laugh.
Windows is in much the same position. At least
ash
Re:Beta in production environment. (Score:5, Insightful)
Because at least Unix has conventions.
Really? Ok, lets open up C:\Windows on one of our Windows servers. Hmmm a folder named "$hf_mig$". I suppose you know what that means or what convention that follows? Or C:\Windows\adam. Kinda looks like it might be some directory tools. Maybe ADAM = Active Directory AdMinistration? What's that doing there anyway? I could keep going down the list. I suppose there is a very good reason why there are
First of all, I was only talking about superficial organization. And if you want to see something nice, have a look at OS X some time. Not only is the System (/System) well organized, but most applications are neatly self contained in
I could give fuck-all what Oracle thinks. My Debian systems are very well organized, thank you very much. I don't find desktop wallpapers in
-matthew
Re:Beta in production environment. (Score:5, Interesting)
Conventions are a nice way of saying "that's the way it's always been, so that's the way it stays." Windows has similar problems left over from legacy, going all the way back to CP/M. Yes, this sucks, but so does some conventions in unixland. Just ask a Solaris 10 admin how much it sucks when your upstream vendor breaks decades-long convention.
Really? Ok, lets open up C:\Windows on one of our Windows servers. Hmmm a folder named "$hf_mig$". I suppose you know what that means or what convention that follows? Or C:\Windows\adam. Kinda looks like it might be some directory tools. Maybe ADAM = Active Directory AdMinistration? What's that doing there anyway? I could keep going down the list. I suppose there is a very good reason why there are
You're not looking in the right place. Microsoft, love it or hate it, worked out a long time ago that 'filename' and 'metadata' aren't necessarily the same thing. The filename and path are just handy locational indexes, and don't necessarily need to mean *anything*. Sure, a DLL can, and often, for newer stuff, IS far longer than 8.3, but it wasn't until later versions of NT (3.5/4.0, I don't remember my history too well) that support for it kicked in well enough, and there's some legacy stuff around. You don't break legacy just because it's fun. Microsoft gets this right, even if they had to tread over it a fair bit in vista, and add some nasty hacks to deal with most of the fallout.
Anyway, as I was saying, you're not looking in the right place. Case study: C:\windows\system32\apss.dll: Microsoft(r) InfoTech Storage System Library.
Problem solved. (it's not at all difficult to use something like powershell (or possibly other tools) to just print this out in a souped up version of ls with a little scripting, I might add, just like I can do a few similar scripting tricks on my debian system to tell you who owns the copyright to 90% of
Want another one?
c:\windows\System32\bitsigd.dll: Background Intelligent Transfer Service IGD Support
Oh look, another one, fully named.
Of course, this starts to fall down when the file doesn't contain metadata, but that's a problem for, say, XML schema files in
First of all, I was only talking about superficial organization. And if you want to see something nice, have a look at OS X some time. Not only is the System (/System) well organized, but most applications are neatly self contained in
Yes. I do.
I will admit that the mac platform is neatly arranged, but their QA seems to have gone to the toilet right now. A place that windows' QA has emerged from rather nicely, I should mention.
As for random stuff appearing in random places, try dealing with commercial software. Even on linux, the developers will put shit in strange places. Open
Re: (Score:3, Interesting)
But you can have both... Metadata and reasonably named "locational indexes". Is it so strange to think that people, particularly administrators, might want to have some idea what a file does and why it is there just be noting its "locational i
Re: (Score:3, Insightful)
Actually, I prefer a custom coded OS with a revision testing regimen that would make most developers and system engineers cry and a lack of bells and whistles. But what do I know, I only work in a division that supports life support systems.
Re:Beta in production environment. (Score:5, Funny)
Re:Beta in production environment. (Score:4, Insightful)
Re: (Score:3, Interesting)
Firewall Schmirewall (Score:5, Funny)
Microsoft servers are notorious for their invulnerability.
Re:Firewall Schmirewall (Score:5, Informative)
But generally.. (Score:5, Insightful)
Cisco Guards for DoS detection and automated response
What in the world do *you* perceive the difference being between a 'firewall' and a router blocking ports based on source and destination being compared with a set of rules (aka ACLs)? Generally, firewall rules *can* get more complex than that, but mere port blocking by an intermediate router has been considered a firewall, even if it doesn't log violating or accepted packets, even if it doesn't have complex rules about connection state. Even if it doesn't have the word 'firewall' emblazened on the chassis somewhere.
Re:But generally.. (Score:5, Informative)
And no, I don't see any need to firewall a web farm either.
Re: (Score:3, Interesting)
Re:But generally.. (Score:4, Informative)
Re:Firewall Schmirewall (Score:5, Insightful)
Ah, the little children. Do you know what the first firewalls were? Routers with access lists. Anything that blocks anything from going to one place from another is a firewall. Port blocking is a firewall, and there exists no firewall I know of that can't be configured to do nothing other than port blocking. You don't have to inspect packets, track flows, or any of those other things to be a firewall, all you have to do is offer some means of restricting traffic. And blocking ports does that.
Re: (Score:3, Informative)
Firewall is not an synonym for stateful filter like you imply later on in this thread. For some data to support my statement, the firewall entry at wikipedia [wikipedia.org] says:
"A firewall is a dedicated appliance, or software running on another computer, which inspects network traffic passing through it, an
Re:Firewall Schmirewall (Score:5, Informative)
"...At this point we still don't use firewalls for MS.COM..."
and then
"Router ACLs are in place to block unnecessary ports"
blocking unnecessary ports is a firewall feature (IMHO ?)
Anyway it looks quite impressive. I still don't understand how to handle 650 GB of logs
Re:Firewall Schmirewall (Score:5, Funny)
Re:Firewall Schmirewall (Score:5, Funny)
Well geez.. in that case I sure hope they do regular backups of
Re: (Score:3, Funny)
Re:Firewall Schmirewall (Score:4, Funny)
$
Works fine for me. Are you sure you're not confusing
Re: (Score:3, Funny)
Re:Firewall Schmirewall (Score:4, Informative)
Re: (Score:2)
Re: (Score:2)
http://www.tech-faq.com/firewall.shtml [tech-faq.com]
Re: (Score:2)
Re: (Score:3, Interesting)
My question is why are the logs in ASCII text format? When all you want is say the IP [4 bytes], time of day [4 bytes], URI, referrer and return code [do you really care about their browser strings? You are MS after all, just assume it's IE].
Storing an IP as text requires on average 15 bytes, so right there you can shave off 11 bytes with a binary IP. Time of day is worse, a date+time string is like 25 chars. Doe
Re:Firewall Schmirewall (Score:5, Informative)
Logging in fixed format is not more efficient than variable format text files (unless we're talking about transactions but we're not). Let's assume you're logging the basics: IP address, Timestamp, Return code, URI and we'll look at logging in fixed format then variable format.
Every record will require 63 bytes and we'll round up to 64 for proper word alignment). So, if we log 1000 messages, we will consume 64,000 bytes total.
Ok. Now for text logging with space delimiters. We have 3 options below, each requiring slightly less space than the previous. We'll run totals for each.
16 + 15 + 2 + 50 + 1 = 84 bytes * 1000 = 84,000 bytes
16 + 11 + 2 + 50 + 1 = 80 bytes * 1000 = 80,000 bytes
12 + 10 + 1 + 50 + 1 = 74 bytes * 1000 = 74,000 bytes
Wow. Fixed binary format kicks variable text format's ass. Wrong. This assumes the URI (or message) block will always occupy 50 bytes. It will not. Let's go right down the middle and assume it averages 25 bytes and we'll recalculate.
16 + 15 + 2 + 25 + 1 = 59 bytes * 1000 = 59,000 bytes
16 + 11 + 2 + 25 + 1 = 55 bytes * 1000 = 55,000 bytes
12 + 10 + 1 + 25 + 1 = 49 bytes * 1000 = 49,000 bytes
Variable text format almost always beats fixed binary format for logging. That's why Microsoft (and the rest of the world) stores log files as text. Plus, it's far easier to manage and debug when you can slice and dice the files with standard command line tools.
One more thing. I know what you might be thinking. We're logging URLS, which will probably consume the majority of the 50 byte allotment. Most developers will calculate an average width size and double it, so no matter what we'll still be filling about 50% of the message section.
Last point. If I were to use your example, the savings with text logging would even be greater. 2 URLS would be stored, both consuming about 50% of their data block. IP address, timestamp, URI, Referrer URI, Return Code. There's also a bunch of other little optimizations you can do such as storing the domain, year, month, and day in the filename rather than in the data or dropping the least significant byte in the HTTP return code.
Re: (Score:3, Interesting)
Fixed binary
Variable text
Re:Firewall Schmirewall (Score:5, Funny)
Re: (Score:2)
-theGreater.
Re: (Score:3, Insightful)
If it walks like a duck and quacks like a duck...
Microsoft brainwashing (Score:2, Insightful)
Windows and IIS...rock solid and secure! www.microsoft.com is on Windows Server 2008/IIS7, MSDN/TechNet are migrating to Win2k8/IIS7, and update.microsoft.com is on Windows Server 2003/IIS6. We do all the normal shut-off-unused-services practices that line up with MS published security guidance and we utilize GFS images to ensure standardized builds of systems.
This guy is brainwashed. There should be no unused services turned on by default! Admins shouldn't have to shutoff unused services -- they shouldn't be enabled unless necessary. Also, rock solid and secure? Uh, didn't I read an article not too long ago about how the update.microsoft.com site was broken into?
Re:Microsoft brainwashing (Score:5, Informative)
Uh, didn't I read an article not too long ago about how the update.microsoft.com site was broken into?
Link, please?
Re:Microsoft brainwashing (Score:5, Funny)
Link, please?
Re: (Score:2)
Re:Microsoft brainwashing (Score:4, Informative)
Re: (Score:3, Informative)
But don't believe me though, go install Server 2003 R2 yourself. IIS either isn't installed unless you specify, or it comes locked down to server ONLY static content. (I know that latter part is the default IIS setup, because I had to go turn everything I needed on).
Re: (Score:3, Informative)
Wow, you got (Score:3, Insightful) for smugly saying "Link please?"? Here's a link for ya Google. Learn to look things up for yourself instead of acting like a smug bastard when someone points out the obvious.
"Link, please?" used in that context is a shortened form of "I've looked around, and can't find the slightest reference to what you mentioned; but rather than assume that you made it up, I am going to give you the benefit of the doubt and assume that it merely, for whatever reason, wasn't well publicised. Thus, would care you to supply any proof of your claim?"
I can't vel (BTW, on an related note, burden of proof is on the person who makes the claim. This follows by necessity from the impossibility o
Re: (Score:2)
They use router ACLs to drop connections to unused ports, router ACLs cause significant performance hits unless your running really high end kit with hardware firewall service modules. Really, if a port is unused it should be closed, and thus rejected by the target machine.
Also if they're using router ACLs to filter ports, that *is* a firewall, albeit a fairly crude one.
Re: (Score:2)
He looks like a man enjoying his job to me.
"update.microsoft.com"
Devil's advocate would say:
If Windows Servers are so insecure
And microsoft.com is one of the busiest web sites in the world
Then one major security breach in (+)ten years would mean that there is a pretty good IT team behind. (Which was a Ddos attack if I remind well...It used to be lethal for any architecture at that time)
Re: (Score:2)
Re: (Score:3, Insightful)
Re: (Score:3, Insightful)
Re: (Score:2)
Eating dogfood is good (Score:5, Insightful)
Re: (Score:3, Insightful)
((rereading thread))
Care to point that out? I'd say most people would be happy that they are using their own product in a critical environment.
Re: (Score:2)
Re:Eating dogfood is good (Score:5, Informative)
Nevermind that the UI for 2008 is roughly the same as 2003, only with a more extensive (yet still looking clean and fairly spartan with the eyecandy) set of configuration utilities for roles and features. Just wish I could say the same for the control panel.
As for the 'research' panel... okay, I work here at microsoft, and I own my own copies of office at home, and I have no idea what that is. Of course, I'm hardly an office power user.
You can bet your bottom dollar that office 2007 is all that's in use around most of the company. As is vista, although it tends to be a mixture of vista, xp and 2003/2008 in most offices, usually for a variety of legacy reasons (maintenance of older projects, testing, etc)
I've got all but XP myself, but only because I haven't needed it to do my job.
Re: (Score:2)
Also, the summary is a little deceiving - although they don't have a firewall they are using the ACL on the router... so it's not like they've just plugged their web server directly into the interwebs - they do have some protection.
No a firewall, but... (Score:2, Insightful)
Priceless... (Score:4, Funny)
Server to run it on: ~$2000
Beta testing Microsofts new server 2008 in a production environment: Priceless
Re:Priceless... (Score:4, Insightful)
Ever tried to bookmark something on that site? (Score:2)
I wonder if its on purpose (to avoid bookmarking) or just bad design.
HBI? (Score:2)
HBI Health and Biomedical Information
HBI Healthcare Building Ideas (magazine)
HBI Home Builders Institute
HBI Home Business Institute
HBI Horizontal Blanking Interval (television)
HBI Hot Beef Injection (band)
HBI Hot Briquetted Iron (plant or facility)
HBI Hubbard Broadcasting Inc.
Wikipedia: Page does not exist.
Re:HBI? (Score:4, Funny)
Re: (Score:3, Funny)
Re:HBI? (Score:4, Insightful)
Swimming in acronym soup... (Score:5, Funny)
HBI?
GFS (is the G for "Ghost")?
NBI?
NLB?
ACE?
TIA
Re:Swimming in acronym soup... (Score:4, Interesting)
Re:Swimming in acronym soup... (Score:5, Informative)
HBI: High Business Impact. Social Security numbers
NLB: Network Load Balancer.
AV: AntiVirus.
DoS: Denial of Service
IIS: Internet Information Services. 'httpd' for Windows.
What happened to Akamai Linux? (Score:3, Interesting)
Perhaps the only ones who can do it "right" (Score:5, Insightful)
That said, with their closed source and closed-doors policy to revealing details about the inner workings of the OS, _Microsoft_ may be the only company that can successfully deploy a 100% Microsoft powered solution. How many registry changes, service daemon modifications, and other tweaks have been made to get their config running this way? The world may never know. It's probably impossible for the consumer world to ever have that level on knowledge about the Windows environment, and thus run it at peak security levels. For most consumers and businesses, a Linux OS with properly implemented firewalls is much more secure than an out-of-the-box Windows deployment and router ACLs.
akamai (Score:4, Informative)
it's one reason why why doing a lookup on Microsoft servers, it often shows that they are running Linux. It's also another reason why people point out that Linux is more scalable because even Microsoft can't eat it's own dogfood.
Misleading Summary. Total Propaganda (Score:4, Informative)
2. I get into discussions where tech guys spew traffic numbers and I'm never impressed. It creates issues if you want to actually do something with the data which I doubt they do much beyond running the usual marketing metrics. Until you actually shoot for 99.99 service uptime, you begin to comprehend the challenge it is (on any platform) the traffic itself is not the challenge.
3. I'm very interested in reading what their hardware budget is like. I get excellent performance out of Linux compared to server 2003 boxes on similar compaq dl380's.
Now there's a best practice (Score:3, Funny)
Now there's a best practice that other corporations should follow - the use of test software in a production environment.
this is what I get (Score:3, Funny)
"We are currently unable to serve your request
We apologize, but an error occurred and your request could not be completed.
This error has been logged. If you have additional information that you believe may have caused this error please report the problem here.
"
I think that gives a good demonstration of how they run their site...
Re:Supporting (Score:5, Insightful)
Re:Supporting (Score:5, Insightful)
Re: (Score:2)
Re: (Score:3, Funny)
I think that we can forgive him - it seems to be his job description.
Re: (Score:2)
Re: (Score:2)
Re:Supporting (Score:5, Informative)
Re: (Score:3, Informative)
The thing that causes the confusion is if you do an nmap -O, and it guesses the host operating system to be Linux despite running IIS on the web server.
Re: (Score:3, Informative)
http://news.netcraft.com/archives/2003/08/17/wwwmicrosoftcom_runs_linux_up_to_a_point_.html [netcraft.com]
Re: (Score:2, Funny)
Re:Supporting (Score:4, Funny)
Talc [wikipedia.org] is technically a rock...
Re: (Score:2)
They are doing one of 2 things:
1) Trapping all the nasties to figure out what's out there and make their product better
OR
2) Trapping all the nasties to figure out what's out there and sell another solution to protect you
3)
4) Profit!
Come to think of it if you select number 2 you can go straight to 4.
Re:Microsoft and logs do not compute (Score:4, Insightful)
Re: (Score:2)
Packet inspection is the key to his comments here, I think.
Re: (Score:2)
http://en.wikipedia.org/wiki/Firewall
Re: (Score:2)
Dufus indeed... (Score:3, Insightful)
Re: (Score:2, Flamebait)
2. Router ACLs are in place to block unnecessary ports
Right-o ! Shows what a brainwashed, single-minded dim he is. Doesn't say "(Microsoft) Firewall v.0.38.2a" on the shrink-wrapped package; and voilà, isn't (a firewall). That's how they keep the masses unwashed and in admiration. (But I digress.)
Actually, the whole thing is a disgrace, but what to expect
2. We have ~650GB/day of IIS logs [...] Just IIS logs are a challenge without trying to parse another ~650GB of firewall logs.
Why