Member: Wei-Jie Hsiao 、 Hui-Hsiung Chung Advisor: Quicy Wu Date: Mar.23 1.

Slides:



Advertisements
Similar presentations
M. Muztaba Fuad Masters in Computer Science Department of Computer Science Adelaide University Supervised By Dr. Michael J. Oudshoorn Associate Professor.
Advertisements

1 Dynamic DNS. 2 Module - Dynamic DNS ♦ Overview The domain names and IP addresses of hosts and the devices may change for many reasons. This module focuses.
Chapter One The Essence of UNIX.
Managing Your Network Environment © 2004 Cisco Systems, Inc. All rights reserved. Managing Cisco IOS Devices INTRO v2.0—9-1.
Windows Monitoring Yancy Ribbens
ITE PC v4.0 Chapter 1 1 Operating Systems Computer Networks– 2.
Chapter Apache Installation in Linux- Mandrake. Acknowledgment The following information has been obtained directly from
Useful Tools for Testing
Guide To UNIX Using Linux Third Edition
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Installing software on personal computer
1 Chapter Overview Introduction to Windows XP Professional Printing Setting Up Network Printers Connecting to Network Printers Configuring Network Printers.
Copyright © 2014 EMC Corporation. All Rights Reserved. Exporting NFS File Systems to UNIX/ESXi Upon completion of this module, you should be able to: Export.
Printer Installation Ben Wu A&S IT 09/18/2007. Outline  Preparation  Local Printer Installation  Network Printer Installation  Printer Sharing  Other.
1 Network File System. 2 Network Services A Linux system starts some services at boot time and allow other services to be started up when necessary. These.
APACHE SERVER By Innovationframes.com »
Lecture 8 Configuring a Printer-using Magic Filter Introduction to IP Addressing.
1 SAMBA. 2 Module - SAMBA ♦ Overview The presence of diverse machines in the network environment is natural. So their interoperability is critical. This.
 2000 Deitel & Associates, Inc. All rights reserved. Chapter 24 – Web Servers (PWS, IIS, Apache, Jigsaw) Outline 24.1Introduction 24.2Microsoft Personal.
M. Taimoor Khan * Java Server Pages (JSP) is a server-side programming technology that enables the creation of dynamic,
Squiggle Lan Messenger.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Two Deploying Windows Servers.
Help session: Unix basics Keith 9/9/2011. Login in Unix lab  User name: ug0xx Password: ece321 (initial)  The password will not be displayed on the.
Building service testbeds on FIRE D5.2.5 Virtual Cluster on Federated Cloud Demonstration Kit August 2012 Version 1.0 Copyright © 2012 CESGA. All rights.
Configuration Management with Cfengine Steven Kreuzer NYC BSD Users Group July 2008.
Troubleshooting. Why Troubleshoot? What Can Go Wrong? –Misconfigured zone –Misconfigured server –Misconfigured host –Misconfigured network.
Sponsored by the National Science Foundation Configuration Management For Experimenters: Ansible Hands-On Sarah Edwards, GPO.
Understanding the CORBA Model. What is CORBA?  The Common Object Request Broker Architecture (CORBA) allows distributed applications to interoperate.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 7: Domain Name System.
CIS 450 – Network Security Chapter 16 – Covering the Tracks.
Samba Advanced System Administration Course James Lwali University computing Centre Ltd, University of Dar es salaam,
Unix System Administration Chuck Hauser
By Rashid Khan Lesson 10-From Here to There: Remote Installation of the Windows XP Professional Client.
FTP Server and FTP Commands By Nanda Ganesan, Ph.D. © Nanda Ganesan, All Rights Reserved.
Day 11 SAMBA NFS Logs Managing Users. SAMBA Implements the ability for a Linux machine to communicate with and act like a Windows file server. –Implements.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
Chapter Two Exploring the UNIX File System and File Security.
Chapter 5.4 DISTRIBUTED PROCESS IMPLEMENTAION Prepared by: Karthik V Puttaparthi
Lesson 9-Setting and Using Permissions. Overview Describing file permissions. Using execute permissions with a file. Changing file permissions using mnemonics.
CGI Common Gateway Interface. CGI is the scheme to interface other programs to the Web Server.
Lab 2: TCP /IP communication Southern Methodist University Bryan Rodriguez.
Guide to Linux Installation and Administration, 2e1 Chapter 11 Using Advanced Administration Techniques.
General rules 1. Rule: 2. Rule: 3. Rule: 10. Rule: Ask questions ……………………. 11. Rule: I do not know your skill. If I tell you things you know, please stop.
Oracle Data Integrator Agents. 8-2 Understanding Agents.
Experiment Management System CSE 423 Aaron Kloc Jordan Harstad Robert Sorensen Robert Trevino Nicolas Tjioe Status Report Presentation Industry Mentor:
Cyber Security Review, April 23-24, 2002, 0 Operated by the Southeastern Universities Research Association for the U.S. Depart. Of Energy Thomas Jefferson.
How to use mrtg to monitor traffic on your wireless and wired network a bella mia company.
Linux Operations and Administration
Linux Operations and Administration
VIRTUAL HOSTING WITH PureFTPd And MYSQL (Quota And Bandwidth Management) BY Odoh Kenneth Emeka Sun Yu Patrick Appiah.
Lecture 02 File and File system. Topics Describe the layout of a Linux file system Display and set paths Describe the most important files, including.
Microsoft ® Official Course Module 6 Managing Software Distribution and Deployment by Using Packages and Programs.
Tutorial on setting up Zebra: A Z39.50 Server ARD Prasad DRTC Indian Statistical Institute Bangalore.
9/21/04 James Gallagher Server-Side: The Basics This part of the workshop contains an overview of the two servers which OPeNDAP has developed. One uses.
Embedded Software Design Week II Linux Intro Linux Kernel.
Troubleshooting. Why Troubleshoot? What Can Go Wrong? –Misconfigured zone –Misconfigured server –Misconfigured host –Misconfigured network.
1 Example security systems n Kerberos n Secure shell.
Backing Up Your System With rsnapshot
Useful Tools for Testing
Chapter 9 Router Configuration (Ospf, Rip) Webmin, usermin Team viewer
ETL Job Scheduler Job Database Server User Interface Scheduler
How to use mrtg to monitor traffic on your wireless and wired network
Lab 1 introduction, debrief
Networking for Home and Small Businesses – Chapter 2
Privilege Separation in Condor
CUPS Print Services.
Networking for Home and Small Businesses – Chapter 2
Operating System Hardening
Presentation transcript:

Member: Wei-Jie Hsiao 、 Hui-Hsiung Chung Advisor: Quicy Wu Date: Mar.23 1

Outline  Getting an Overview of cfengine  Learning the Basic Setup 2

Getting an Overview of cfengine  Cfengine is software you can use to automate changes on UNIX (and UNIX- like) systems.  It is a high- level language that describes system state, not a general- purpose programming language such as Perl or a shell. 3

Getting an Overview of cfengine(cont.)  Cfengine can use Several ways to management the systems as follows: Setup the network interface Edit the system files Edit the permission to access files Delete the unused flies 4

The Components of cfengine: Cfagent Cfservd Cfexecd Cfkey cfrun 5

cfagnet  The autonomous configuration agent (the heart of the framework). This command can be run manually (on demand),cfexecd on a regular basis, and/or by cfservd when triggered by a remote cfrun invocation. The necessary and sufficient condition for using cfengine is to run cfagent somehow. 6

Cfservd  The file- transfer and remote- activation daemon. You must run this on any cfengine file servers and on any system where you would like to execute cfagent remotely. 7

Cfexecd  Generates public/private key pairs and needs to be run only once on every host. 8

cfkey  The execution and reporting daemon. You run this either as a daemon or as a regular cron job. In either case, it handles running _b]cajp and reporting its output. 9

cfrun  You can run this command from a remote system that will contact the clients (through cfservd) and tell them to execute cfagent. 10

Learning the Basic Setup  Setting Up the Network Before starting with cfengine, you should make sure your network is properly prepared. Using cfengine with dynamic IP addresses is difficult because cfengine utilizes two- way authentication during network communications.  Running Necessary Processes In the simplest setup, you can use cfengine by running _b]cajp on each system manually. You will, however, benefit more from running one or two daemons on each system.  Creating Basic Configuration Files You need to place your configuration files in the master configuration directory on the configuration server (as we’ll explain in the next section). These common files will be used in their exact original form on every server in your network. 11

Learning the Basic Setup  Download the Cfengine from here or any other website and install it.  Example: Step1: ○ $ tar zxf cfengine-2.x.x.tar.gz ○ $ cd./cfengine-2.x.x ○ $./configure ○ $ make ○ $ sudo make install 12

Learning the Basic Setup(cont.)  Then create the working directly as follows: Step2: ○ # mkdir /var/cfengine ○ # mkdir /var/cfengine/bin ○ # mkdir /var/cfengine/inputs 13

Learning the Basic Setup(cont.)  Copy the binary code of cfengine to working directly Step3: ○ # cp /usr/local/sbin/cfagent /var/cfengine/bin ○ # cp /usr/local/sbin/cfexecd /var/cfengine/bin ○ # cp /usr/local/sbin/cfservd /var/cfengine/bin ○ # chown -R root:0 /var/cfengine ○ # chmod -R 755 /var/cfengine 14

Learning the Basic Setup(cont.)  The first time we use the cfengine # /usr/local/sbin/cfkey # /var/cfengine/bin/cfagent cfengine::/bin/echo Dange: Danger, Will Robinson!  Then we can check whether the cfengine is successfully working or not #/var/cfengine/inputs/cfagent.conf control: actionsequence = ( shellcommands ) shellcommands: “/bin/echo Danger, Will Robinson!” 15

Thanks for listening!! 16