Revisiting Unix principles for modern system automation Martin Krafft

Slides:



Advertisements
Similar presentations
1 CHEP 2000, Roberto Barbera Roberto Barbera (*) Grid monitoring with NAGIOS WP3-INFN Meeting, Naples, (*) Work in collaboration with.
Advertisements

Using Kerberos the fundamentals. Computer/Network Security needs: Authentication Who is requesting access Authorization What user is allowed to do Auditing.
A Java Architecture for the Internet of Things Noel Poore, Architect Pete St. Pierre, Product Manager Java Platform Group, Internet of Things September.
@stack72 POWERSHELL – THE NEWEST CONFIGURATION ROCKSTAR.
October 22, 2002Serguei A. Mokhov, 1 Intro to Internet-services from Security Standpoint, Part II SOEN321-Information-Systems Security.
Lime is… …an interactive visual analysis tool connected to Dynamics NAV Graphical representation of NAV data in your browser Real-time visualization of.
1 PLuSH – Mesh Tree Fast and Robust Wide-Area Remote Execution Mikhail Afanasyev ‧ Jose Garcia ‧ Brian Lum.
IPlant Collaborative Tools and Services Workshop iPlant Collaborative Tools and Services Workshop Overview of Atmosphere.
Reproducible Environment for Scientific Applications (Lab session) Tak-Lon (Stephen) Wu.
Telnet/SSH: Connecting to Hosts Internet Technology1.
Windows.Net Programming Series Preview. Course Schedule CourseDate Microsoft.Net Fundamentals 01/13/2014 Microsoft Windows/Web Fundamentals 01/20/2014.
4/20/2017 7:57 PM.
Configuration Management System
Sponsored by the National Science Foundation Configuration Management For Experimenters Sarah Edwards, GPO Max Ott, NICTA.
AUTO- CONFIGURATION IN CLOUD 1. Why we need automate something? What we need to automate? How we can do that? Scripting languages vs Frameworks Most popular.
MobSched: An Optimizable Scheduler for Mobile Cloud Computing S. SindiaS. GaoB. Black A.LimV. D. AgrawalP. Agrawal Auburn University, Auburn, AL 45 th.
between a business and an external organisation between individuals within a business between individuals and organisations.
GrIDS -- A Graph Based Intrusion Detection System For Large Networks Paper by S. Staniford-Chen et. al.
Shell Protocols Elly Bornstein Hiral Patel Pranav Patel Priyank Desai Swar Shah.
GRM + Mercury in P-GRADE Monitoring of P-GRADE applications in the Grid using GRM and Mercury.
Debugging and Profiling GMAO Models with Allinea’s DDT/MAP Georgios Britzolakis April 30, 2015.
Management for IP-based Applications Mike Fisher BTexaCT Research
The FI-WARE Project – Base Platform for Future Service Infrastructures FI-WARE Interface to the network and Devices Chapter.
Secure Active Network Prototypes Sandra Murphy TIS Labs at Network Associates March 16,1999.
Network Monitor By Zhenhong Zhao. What is the Network Monitor? The Network Monitor is a tool that gets information off of the host on the LAN. – Enumerating.
Routing integrity in a world of Bandwidth on Demand Dave Wilson DW238-RIPE
GeniDesktop : The GEMINI Portal (and more) Hussam Nasir University of Kentucky.
1 Panda Perimetral Management Console. 2 Panda Perimetral Management Console Centralized management from the cloud The Perimetral Console, short for Panda.
Optimal Pipeline Using Perforce, Jenkins & Puppet Nitin Pathak Works on
Enterprise JavaBeans 3.0. What is EJB 3.0 -Reusable server-side component framework-technology -Designed to support building demanding enterprise – level.
Java Monitoring Java monitoring using Glassfish, JMX, Glassbox and JConsole by Greg Heithaus.
Sponsored by the National Science Foundation Today’s Exercise.
Speaker:Chiang Hong-Ren An Investigation and Implementation of Botnet Detection Schemes.
Sensor Network 2 06T0007 Hiroshi OHSUGA. Outline Applications –Health Application –Home Application Communication Architecture Conclusion.
CERN AI Config Management 16/07/15 AI for INFN visit2 Overview for INFN visit.
Automating Legacy Network Devices
Computing Facilities CERN IT Department CH-1211 Geneva 23 Switzerland t CF Cluman: Advanced Cluster Management for Large-scale Infrastructures.
Ansible and Ansible Tower 1 A simple IT automation platform November 2015 Leandro Fernandez and Blaž Zupanc.
Cloud Installation & Configuration Management. Outline  Definitions  Tools, “Comparison”  References.
Information Initiative Center, Hokkaido University North 11, West 5, Sapporo , Japan Tel, Fax: General.
IPlant Collaborative Tools and Services Workshop iPlant Collaborative Tools and Services Workshop Overview of Atmosphere.
Introduction to Ansible
Passwords Passwords are unpleasant Hard to remember Remember a couple
If it’s not automated, it’s broken!
Pulling the Galaxy’s Strings
Introduction to Ansible
Configuration and Monitoring
@ Bucharest DevOps Hacker Meetup
Modernize Your Operations
MANAGE AWS INFRASTRUCTURE AS CODE USING TERRAFORM
Tools and Services Workshop Overview of Atmosphere
Drupal VM and Docker4Drupal For Drupal Development Platform
Drupal VM and Docker4Drupal as Consistent Drupal Development Platform
free Cisco Dumps Real Exam Questions Answers
Intro to Config Management Using Salt Open Source
Ansible and Zabbix Rushikesh Prabhune (Software Technical Consultant)
Securing Cloud-Native Applications Jason Schmitt CEO
Scaling Experiments.
Simplified Development Toolkit
Introduction to Ansible
Presented By - Avinash Pawar
GBIF CESP Workshop, Madrid 2018 Dave Martin
In this session… Introduce what we’re talking about
Introduction to Operating Systems
Configuration Management at its peak with
rvGAHP – Push-Based Job Submission Using Reverse SSH Connections
SCCM in hybrid world Predrag Jelesijević Microsoft 7/6/ :17 AM
Oracle 1z0-928 Oracle Cloud Platform Big Data Management 2018 Associate.
ONAP Architecture Principle Review
Software Development Tools Computer Aided Software Engineering
Presentation transcript:

Revisiting Unix principles for modern system automation Martin Krafft

Just because the Cloud is all hip and stuff doesn't mean that you need to reinvent the wheel all the time thank you very much.

reclass inventory management Parametrise knowledge about your hosts Parameter merging up hierarchies (i.e. how LDAP/X.500 got it wrong) Supports Puppet, Ansible, Salt; adapters easy to write Currently working, but development stalled http://reclass.pantsfullofunix.net

SSH “botnet” Persistent connections between nodes (spoke, bouncers, mesh?) Run sysadmin stuff on the “botnet” Focus on transport. Do that well. Provide interfaces. Be Unix-y.

“OSI Stack“ of system automation Enactment Policy Authentication Transport Encryption Topology Inventory (reclass) Resilience

Transport feature comparisons cfengine Puppet Chef Salt Ansible Authentication NIH SSH Encryption NIH (TLS) NIH (crap) Topology Pull Pull or hope Push Resilience Good Fair Hope-based n/a

Transport Unix style Do one thing and do it well Topology independent: push and pull Plain interfaces, so usable by other tools that do e.g. Monitoring Data collection, asset management Remote execution, policy enforcement

Live demo

ssh://git@github.com/madduck/retrans Thanks! Martin Krafft <madduck@debian.org>