Occurrence, Recurrence, Idempotence
System (Web, DB.
Apply Security Crash?
Error OR System Monitoring
Are there Migration?
Configured and is
6-Sep-10 Confidential Document 4
What lies in there?
Systems need to be configured
More the systems, more is the work
Bad configuration can be worst than no configuration
Temporary changes become permanent
Changes are meant to forget
Users are created, deleted and recreated
Software is installed, uninstalled and reinstalled
Need to log into the system one-by-one and configure
Need for compliance and identical configuration, policies
Change Auditing is a nightmare
6-Sep-10 Confidential Document 5
What Happens Without Automation?
6-Sep-10 Confidential Document 6
Test Your IT Infrastructure, Ask your Administrator…
How many changes were made in 100 servers in last 3
Install this software or change a parameter in a file on 500
servers within 10mins?
Recover 5 crashed servers in 10mins?
Cut down IT man power – handle 300 servers with a single
Have consistent configuration throughout the organization
on 500 servers?
Show the configuration file that was changed on 10th
December 2002, 20th January 2005 and 25th December
6-Sep-10 Confidential Document 7
Current Business Challenges
Increasing IT demands
Complex IT Infrastructure
Ever changing technology landscape
• Hardware/Software upgrades
• Adoption of new technologies
• Training needs
High dependency on human resources
Difficult knowledge transfer during staff attrition
Compliance Enforcement and Management
6-Sep-10 Confidential Document 8
Current Technology Challenges
Template based software configuration across data center
Enforcing change management for all the IT resources
Multiple ownerships for same IT resource to facilitate 24X7
Human driven machines are more error prone
Difficult and time consuming recovery procedures
Rolling out software configuration changes or new software
across an entire organization, groups, individual resources
Single window IT support console
6-Sep-10 Confidential Document 9
Solution – Puppet
Centralized configuration management for entire data center
Template based software configurations – Applicable to
individual resource, resource groups and organization wide
Quick recovery of the crashed system by using master
configurations stored in the automation framework
Version controlled configuration files
Dashboard to show configuration changes with historical
Single console to manage entire data center – No need to login
to individual servers
6-Sep-10 Confidential Document 10
Policy compliance (SOX, SAS70, ISO 27001,
Better Change Management (ITIL)
Lower human dependencies
More servers per administrator
Shift of human resource focus towards
Reduced Errors – Complete peace of mind
Experience the Automated world
6-Sep-10 Confidential Document 12
Who is already using Puppet?
Following organizations are few out of the long list who utilized the data
center automation framework to benefit their businesses.
6-Sep-10 Confidential Document 13
• CentOS FreeBSD 4.7 and later
• Debian 3.1 and later OpenBSD 4.1 and later
• Fedora Core 2-6
• Fedora 7 and later
• Gentoo Linux Other Unix
• Mandriva Corporate Server 4 Macintosh OS X
• RHEL 3 and later Sun Solaris 2.6
• Oracle Linux Sun Solaris 7 and later
• SuSE Linux 8 and later
• Ubuntu 7.04 and later
6-Sep-10 Confidential Document 14
How does it work?
6-Sep-10 Confidential Document 15
What do we offer?
6-Sep-10 Confidential Document 16
H-87, First Floor, Sector-63
Community Linux Club, A ZoNIX Systems Initiative: http://linuxclub.ZoNIXSystems.com
6-Sep-10 Confidential Document 17