Workshop: Know Before You Push 'Go': Using the Beaker Acceptance Test Framewo...Puppet
This document provides an overview of testing Puppet modules using Beaker and related tools. It demonstrates generating a test Puppet module, installing necessary tools like Bundler and the Puppet module skeleton, and running the initial tests. The document recommends further resources for learning more about Beaker and testing Puppet code.
Continuous Infrastructure: Modern Puppet for the Jenkins Project - PuppetConf...Puppet
This document summarizes Tyler Croy's presentation on managing the Jenkins infrastructure using Puppet. It describes how the infrastructure evolved from an unmanaged setup at Sun/Oracle to using masterless Puppet and eventually Puppet Enterprise. Key aspects covered include managing services, hardware, code layout, testing, and deployment process. Special thanks are given to Puppet Labs for their support of the project.
Steamlining your puppet development workflowTomas Doran
The document discusses ways to streamline a Puppet development workflow including using revision control, running Puppet in noop or automatic mode, moving changes slowly through testing and using branches, reporting on changes, and implementing testing strategies like unit testing with rspec-puppet and integration testing with serverspec. It also recommends tools like Foreman, Norman, Puppetfile, and Jenkins to improve testing and deployment.
Building and Testing from Scratch a Puppet Environment with Docker - PuppetCo...Puppet
This document discusses using Docker containers to build and test Puppet code. It describes setting up a Docker container to mimic a production environment by specifying hostname, custom facts, and operating system. Tests can be run on this container to validate Puppet code works as expected before deploying changes. Future enhancements proposed include supporting more operating systems and Puppet versions, linking multiple test nodes, and using an existing Puppet master.
Test-Driven Infrastructure with Ansible, Test Kitchen, Serverspec and RSpecMartin Etmajer
The goal of Continuous Delivery is, briefly, to get features into your users' or customers' hands as quickly and confidently as possible. In order to succeed, Development and Operations teams need to align and come up with both working and deployable software in short, regular intervals. Chef, Puppet, Ansible & Co. enable teams to code up application runtime environments, but alone do not allow for building quality into their processes. In this presentation I will show how you can apply the "Red, Green, Refactor Cycle" of Test-Driven Development and combine it with your configuration management or orchestration tool of choice in order to come up with better infrastructure that can automatically be tested using Ansible, Test Kitchen, Docker, Serverspec and RSpec.
The document outlines an 90 minute introduction to Ansible using Docker. It discusses setting up the environment with Docker, using ad-hoc commands and playbooks to automate tasks like installing Apache and configuring variables. Exercises demonstrate inventory management, templating configurations with Jinja2, and other core Ansible concepts. The document provides an overview but does not cover more advanced topics like dynamic inventory, roles, writing custom modules, or Ansible Tower.
The document discusses continuous infrastructure testing using ServerSpec to test servers through SSH access. ServerSpec allows writing tests that validate a server's actual state by describing resources like users, packages, services, files and processes and making assertions about their configuration and properties. The tests can be run via Rake and automated through Jenkins to continuously test external managed infrastructure. A demo is given of ServerSpec tests that validate properties of users, packages, services and files.
London Hashicorp Meetup #8 - Testing Programmable Infrastructure By Matt LongOpenCredo
This document discusses testing programmable infrastructure. It describes testing different aspects of infrastructure including a cloud broker and Kubernetes cluster. It recommends applying software development testing practices like unit testing, integration testing, and acceptance testing to infrastructure code and configuration. Various tools are presented for different types of infrastructure testing including Serverspec, Bats, Goss, Terraform_validate, and using Test Kitchen with Inspec. The document emphasizes that testing is important for infrastructure but often overlooked, and that testers and operations teams should work together to address new challenges in testing programmable systems.
Workshop: Know Before You Push 'Go': Using the Beaker Acceptance Test Framewo...Puppet
This document provides an overview of testing Puppet modules using Beaker and related tools. It demonstrates generating a test Puppet module, installing necessary tools like Bundler and the Puppet module skeleton, and running the initial tests. The document recommends further resources for learning more about Beaker and testing Puppet code.
Continuous Infrastructure: Modern Puppet for the Jenkins Project - PuppetConf...Puppet
This document summarizes Tyler Croy's presentation on managing the Jenkins infrastructure using Puppet. It describes how the infrastructure evolved from an unmanaged setup at Sun/Oracle to using masterless Puppet and eventually Puppet Enterprise. Key aspects covered include managing services, hardware, code layout, testing, and deployment process. Special thanks are given to Puppet Labs for their support of the project.
Steamlining your puppet development workflowTomas Doran
The document discusses ways to streamline a Puppet development workflow including using revision control, running Puppet in noop or automatic mode, moving changes slowly through testing and using branches, reporting on changes, and implementing testing strategies like unit testing with rspec-puppet and integration testing with serverspec. It also recommends tools like Foreman, Norman, Puppetfile, and Jenkins to improve testing and deployment.
Building and Testing from Scratch a Puppet Environment with Docker - PuppetCo...Puppet
This document discusses using Docker containers to build and test Puppet code. It describes setting up a Docker container to mimic a production environment by specifying hostname, custom facts, and operating system. Tests can be run on this container to validate Puppet code works as expected before deploying changes. Future enhancements proposed include supporting more operating systems and Puppet versions, linking multiple test nodes, and using an existing Puppet master.
Test-Driven Infrastructure with Ansible, Test Kitchen, Serverspec and RSpecMartin Etmajer
The goal of Continuous Delivery is, briefly, to get features into your users' or customers' hands as quickly and confidently as possible. In order to succeed, Development and Operations teams need to align and come up with both working and deployable software in short, regular intervals. Chef, Puppet, Ansible & Co. enable teams to code up application runtime environments, but alone do not allow for building quality into their processes. In this presentation I will show how you can apply the "Red, Green, Refactor Cycle" of Test-Driven Development and combine it with your configuration management or orchestration tool of choice in order to come up with better infrastructure that can automatically be tested using Ansible, Test Kitchen, Docker, Serverspec and RSpec.
The document outlines an 90 minute introduction to Ansible using Docker. It discusses setting up the environment with Docker, using ad-hoc commands and playbooks to automate tasks like installing Apache and configuring variables. Exercises demonstrate inventory management, templating configurations with Jinja2, and other core Ansible concepts. The document provides an overview but does not cover more advanced topics like dynamic inventory, roles, writing custom modules, or Ansible Tower.
The document discusses continuous infrastructure testing using ServerSpec to test servers through SSH access. ServerSpec allows writing tests that validate a server's actual state by describing resources like users, packages, services, files and processes and making assertions about their configuration and properties. The tests can be run via Rake and automated through Jenkins to continuously test external managed infrastructure. A demo is given of ServerSpec tests that validate properties of users, packages, services and files.
London Hashicorp Meetup #8 - Testing Programmable Infrastructure By Matt LongOpenCredo
This document discusses testing programmable infrastructure. It describes testing different aspects of infrastructure including a cloud broker and Kubernetes cluster. It recommends applying software development testing practices like unit testing, integration testing, and acceptance testing to infrastructure code and configuration. Various tools are presented for different types of infrastructure testing including Serverspec, Bats, Goss, Terraform_validate, and using Test Kitchen with Inspec. The document emphasizes that testing is important for infrastructure but often overlooked, and that testers and operations teams should work together to address new challenges in testing programmable systems.
How Puppet Enables the Use of Lightweight Virtualized Containers - PuppetConf...Puppet
The document summarizes how Puppet can be used to enable lightweight virtualized containers by configuring applications and their dependencies into immutable container images during the build process. It compares deploying a Jenkins application with LDAP authentication on virtual machines versus containers. It discusses challenges with service resources in containers and provides solutions like overriding service resources or using multi-process images with systemd to build immutable Puppet-configured application images.
Infrastructure testing with Jenkins, Puppet and Vagrant - Agile Testing Days ...Carlos Sanchez
Extend Continuous Integration to automatically test your infrastructure.
Continuous Integration can be extended to test deployments and production environments, in a Continuous Delivery cycle, using infrastructure-as-code tools like Puppet, allowing to manage multiple servers and their configurations, and test the infrastructure the same way continuous integration tools do with developers’ code.
Puppet is an infrastructure-as-code tool that allows easy and automated provisioning of servers, defining the packages, configuration, services, … in code. Enabling DevOps culture, tools like Puppet help drive Agile development all the way to operations and systems administration, and along with continuous integration tools like Jenkins, it is a key piece to accomplish repeatability and continuous delivery, automating the operations side during development, QA or production, and enabling testing of systems configuration.
Using Vagrant, a command line automation layer for VirtualBox, we can easily spin off virtual machines with the same configuration as production servers, run our test suite, and tear them down afterwards.
We will show how to set up automated testing of an application and associated infrastructure and configurations, creating on demand virtual machines for testing, as part of your continuous integration process.
This document discusses Docker containers and how they compare to virtual machines and configuration management tools like Puppet. It provides an overview of Docker, including how to build Docker images using Dockerfiles. It then compares Dockerfiles to shell scripts and configuration management, noting advantages and disadvantages of each. The document suggests using Puppet to install Docker and build Docker images, but not running Puppet inside containers. It provides examples of building Docker images that use Puppet for configuration.
Test Driven Development with Puppet - PuppetConf 2014Puppet
The document discusses test driven development (TDD) approaches for Puppet modules. It recommends writing tests before code using tools like RSpec and guard. The document provides examples of unit testing Puppet code and definitions using rspec-puppet. It also discusses acceptance testing Puppet code and modules using Beaker against real systems. Overall, the document promotes writing tests for Puppet code to ensure quality and prevent regressions across different operating systems and versions.
Mukta Aphale presented at ChefConf 2015. She discussed her background transitioning from developer to DevOps architect. She contributed to Chef development and created several Chef knife plugins. Aphale also discussed using Docker and Chef together to automate container management and deployment. She showed how to build a Docker image using Chef recipes and push it to a registry for deployment using Chef push jobs.
The document discusses using Docker containers and Puppet to compartmentalize services running on a personal server. Previously, many services like Postfix, Dovecot, DNS, etc. were running on the server with no isolation. The approach taken was to define Puppet profiles for each service, build Docker containers from those profiles, and run the containers independently with their own isolated environments. This improves security, ease of development and deployment, and allows immutable infrastructure by replacing containers instead of changing server configurations. Challenges discussed include Docker bugs, inconsistent Debian packages, and future plans to add HAProxy and a container registry.
Continuous Delivery in Enterprise Environments using Docker, Ansible and JenkinsMarcel Birkner
The document discusses using Docker, Ansible and Jenkins for continuous delivery in enterprise environments. It provides examples of using these tools to automate infrastructure provisioning, application deployment and management. It also highlights best practices like automating everything, using Docker for stable and environment independent application containers, and addressing typical challenges in enterprise environments like proxies and security.
Many IT operations teams are used to managing infrastructure manually or with simple one-off scripts. This manual work and lack of verifiable behavior results in many issues and in uncertainty. In software development, Test Driven Development (TDD) is well recognized for improving design, increasing code quality, and allowing refactoring and better knowledge sharing.
Similar benefits can be gained in infrastructure projects when infrastructure is treated as code, driving that code development with tests. Configuration management tools such as Chef and Puppet allow infrastructure to be easily described as code and provide a complete support to introduce and run tests. This can allow development and operations teams to collaborate and confidently deliver working infrastructure code.
The document discusses the modern developer toolbox and outlines various tools that developers can use for development environments, testing, debugging, profiling, deployment, logging, and monitoring of applications. It provides recommendations for setting up development environments on different operating systems and with tools like Vagrant, Docker, Ansible, and Homebrew. It also discusses PHP installation and editors/IDEs to use. Testing with PHPUnit, Behat, and Jenkins is covered as well as debugging with XDebug, profiling with XHProf, and deployment with Ansible, Capistrano and other options. Logging with Monolog, Logstash and Kibana is also summarized along with monitoring metrics with StatsD, Graphite and Grafana.
Testing for Ops: Going Beyond the Manifest - PuppetConf 2013Puppet
"Testing for Ops: Going Beyond the Manifest" by Christopher Webber, Infrastructure Engineer, Demand Media.
Presentation Overview: This talk aims to show the value of rspec-puppet for those who come from a more Ops-centric background. The focus will be on using tests to go beyond just rewriting manifests in rspec. Instead the focus will be on scenarios like: - Are the baseline security measures in place? - Do the differences between dev and prod get reflected? - Are the config elements that are core to the application present? In addition, tests will help to be a place to help document the oddities of our configurations and ensuring that minor changes don't result in catastrophe.
Speaker Bio: After beginning his career at UC Riverside supporting enterprise operations and bioinformatics research, Chris is now rocking being an infrastructure engineer at Demand Media in Santa Monica. He currently supports large high-traffic sites like eHow.com, LiveSTRONG.com, and Cracked.com. Chris enjoys attending local meetups, writing new Puppet modules, and creating small tools to make his team's lives a little easier. Find him on Twitter as @cwebber.
Ansible new paradigms for orchestrationPaolo Tonin
- Ansible provides a simple way to automate application deployment, server configuration management, and provisioning using SSH. It uses YAML files called playbooks to define tasks that are executed across multiple servers.
- Playbooks allow users to define infrastructure as code and configure servers in an idempotent way. They contain ordered lists of tasks that can install packages, copy files, start services, and more using simple YAML syntax.
- Ansible is agentless and communicates to servers over SSH, requiring only Python to be installed on managed nodes. It has a wide range of core modules and supports provisioning on cloud platforms like AWS.
Orchestration? You Don't Need Orchestration. What You Want is Choreography.Julian Dunn
This document discusses the differences between orchestration and choreography in configuration management. Orchestration involves a central orchestrator executing ordered operations on independent machines, while choreography involves autonomous actors that make and verify promises to each other to achieve a desired state. The document argues that choreography is preferable because it avoids single points of failure, enables more autonomy between systems, and allows for better coordination across a fleet with less reliance on external real-time state systems.
Bootstrapping Puppet and Application Deployment - PuppetConf 2013Puppet
"Bootstrapping Puppet and Application Deployment" by Robert de Macedo Soares, Application Security Engineer, BusinessWire.
Presentation Overview: A dive into the problems faced when first launching Puppet across existing, heterogeneous servers, outlining possible solutions using our experience as an example. In addition, this session will touch on application management and deployment using subversion and rake tasks, what works and what is a little rough around the edges.
Speaker Bio: Robert is an engineer who has spent the past several years attempting to automate away the need for the work that he does. Focusing on server automation and security work for BusinessWire, Robert also develops web services such as tee.ms, a chat service, and designs and develops games. Trism, which he co-designed, was nominated for Cellular Game of the Year by the Academy of Interactive Arts & Sciences in the 2009 Interactive Achievement Awards.
Symfony Live NYC 2014 - Rock Solid Deployment of Symfony AppsPablo Godel
Web applications are becoming increasingly more complex, so deployment is not just transferring files with FTP anymore. We will go over the different challenges and how to deploy our PHP applications effectively, safely and consistently with the latest tools and techniques. We will also look at tools that complement deployment with management, configuration and monitoring.
Test-Driven Infrastructure with Puppet, Test Kitchen, Serverspec and RSpecMartin Etmajer
The goal of Continuous Delivery is, briefly, to get features into your users' or customers' hands as quickly and confidently as possible. In order to succeed, Development and Operations teams need to align and come up with both working and deployable software in short, regular intervals. Chef, Puppet, Ansible & Co. enable teams to code up application runtime environments, but alone do not allow for building quality into their processes. In this presentation I will show how you can apply the "Red, Green, Refactor Cycle" of Test-Driven Development and combine it with your configuration management or orchestration tool of choice in order to come up with better infrastructure that can automatically be tested using Puppet, Test Kitchen, Docker, Serverspec and RSpec.
John Minnihan argues that Ansible and Docker have made configuration tools like Chef and Puppet unnecessary. He claims that Ansible is easier to use than Chef and Puppet since it is agentless and only requires SSH, and that Docker containers are immutable and reusable, avoiding complex client arrangements. Minnihan asserts that people are frustrated with the work involved in maintaining Chef and Puppet and prefer the simplicity of Ansible and Docker's approach to infrastructure as code.
This document discusses using Chef configuration management with Docker containers. It describes using Chef at both the build stage and runtime stage of containers. At build time, Chef can configure and install applications into an image. At runtime, Chef can further configure running containers based on environment variables. Combining Chef and Docker provides immutable infrastructure, faster deployments, and testable configurations.
The document discusses automated infrastructure testing. It explains that infrastructure testing involves automating the testing of code, infrastructure as code, and deployed infrastructure. This is done through unit, functional, integration and monitoring tests. The document recommends collaborating with operations and building thorough monitoring and analytics. Automating tests helps ensure battle tested code and infrastructure health. Cloud infrastructure also requires more testing across providers. Lessons include starting with most time consuming tasks and understanding domain concepts.
This document provides an overview and agenda for an introductory training course on testing infrastructure automation code with Chef and its tools. The agenda includes an overview of Chef, discussing resources, describing policies with recipes and cookbooks, using a sandbox for testing, verifying node state, getting faster feedback, writing clean code, and wrapping up. Hands-on labs are emphasized for learning Chef through practice. Questions are encouraged throughout, and breaks will be taken as needed.
This is an approximately 90-minute InSpec workshop covering basic InSpec resources and profiles and applying them to Linux Hardening. Delivered at DevSecCon 2017 in London, October 20, 2017
How Puppet Enables the Use of Lightweight Virtualized Containers - PuppetConf...Puppet
The document summarizes how Puppet can be used to enable lightweight virtualized containers by configuring applications and their dependencies into immutable container images during the build process. It compares deploying a Jenkins application with LDAP authentication on virtual machines versus containers. It discusses challenges with service resources in containers and provides solutions like overriding service resources or using multi-process images with systemd to build immutable Puppet-configured application images.
Infrastructure testing with Jenkins, Puppet and Vagrant - Agile Testing Days ...Carlos Sanchez
Extend Continuous Integration to automatically test your infrastructure.
Continuous Integration can be extended to test deployments and production environments, in a Continuous Delivery cycle, using infrastructure-as-code tools like Puppet, allowing to manage multiple servers and their configurations, and test the infrastructure the same way continuous integration tools do with developers’ code.
Puppet is an infrastructure-as-code tool that allows easy and automated provisioning of servers, defining the packages, configuration, services, … in code. Enabling DevOps culture, tools like Puppet help drive Agile development all the way to operations and systems administration, and along with continuous integration tools like Jenkins, it is a key piece to accomplish repeatability and continuous delivery, automating the operations side during development, QA or production, and enabling testing of systems configuration.
Using Vagrant, a command line automation layer for VirtualBox, we can easily spin off virtual machines with the same configuration as production servers, run our test suite, and tear them down afterwards.
We will show how to set up automated testing of an application and associated infrastructure and configurations, creating on demand virtual machines for testing, as part of your continuous integration process.
This document discusses Docker containers and how they compare to virtual machines and configuration management tools like Puppet. It provides an overview of Docker, including how to build Docker images using Dockerfiles. It then compares Dockerfiles to shell scripts and configuration management, noting advantages and disadvantages of each. The document suggests using Puppet to install Docker and build Docker images, but not running Puppet inside containers. It provides examples of building Docker images that use Puppet for configuration.
Test Driven Development with Puppet - PuppetConf 2014Puppet
The document discusses test driven development (TDD) approaches for Puppet modules. It recommends writing tests before code using tools like RSpec and guard. The document provides examples of unit testing Puppet code and definitions using rspec-puppet. It also discusses acceptance testing Puppet code and modules using Beaker against real systems. Overall, the document promotes writing tests for Puppet code to ensure quality and prevent regressions across different operating systems and versions.
Mukta Aphale presented at ChefConf 2015. She discussed her background transitioning from developer to DevOps architect. She contributed to Chef development and created several Chef knife plugins. Aphale also discussed using Docker and Chef together to automate container management and deployment. She showed how to build a Docker image using Chef recipes and push it to a registry for deployment using Chef push jobs.
The document discusses using Docker containers and Puppet to compartmentalize services running on a personal server. Previously, many services like Postfix, Dovecot, DNS, etc. were running on the server with no isolation. The approach taken was to define Puppet profiles for each service, build Docker containers from those profiles, and run the containers independently with their own isolated environments. This improves security, ease of development and deployment, and allows immutable infrastructure by replacing containers instead of changing server configurations. Challenges discussed include Docker bugs, inconsistent Debian packages, and future plans to add HAProxy and a container registry.
Continuous Delivery in Enterprise Environments using Docker, Ansible and JenkinsMarcel Birkner
The document discusses using Docker, Ansible and Jenkins for continuous delivery in enterprise environments. It provides examples of using these tools to automate infrastructure provisioning, application deployment and management. It also highlights best practices like automating everything, using Docker for stable and environment independent application containers, and addressing typical challenges in enterprise environments like proxies and security.
Many IT operations teams are used to managing infrastructure manually or with simple one-off scripts. This manual work and lack of verifiable behavior results in many issues and in uncertainty. In software development, Test Driven Development (TDD) is well recognized for improving design, increasing code quality, and allowing refactoring and better knowledge sharing.
Similar benefits can be gained in infrastructure projects when infrastructure is treated as code, driving that code development with tests. Configuration management tools such as Chef and Puppet allow infrastructure to be easily described as code and provide a complete support to introduce and run tests. This can allow development and operations teams to collaborate and confidently deliver working infrastructure code.
The document discusses the modern developer toolbox and outlines various tools that developers can use for development environments, testing, debugging, profiling, deployment, logging, and monitoring of applications. It provides recommendations for setting up development environments on different operating systems and with tools like Vagrant, Docker, Ansible, and Homebrew. It also discusses PHP installation and editors/IDEs to use. Testing with PHPUnit, Behat, and Jenkins is covered as well as debugging with XDebug, profiling with XHProf, and deployment with Ansible, Capistrano and other options. Logging with Monolog, Logstash and Kibana is also summarized along with monitoring metrics with StatsD, Graphite and Grafana.
Testing for Ops: Going Beyond the Manifest - PuppetConf 2013Puppet
"Testing for Ops: Going Beyond the Manifest" by Christopher Webber, Infrastructure Engineer, Demand Media.
Presentation Overview: This talk aims to show the value of rspec-puppet for those who come from a more Ops-centric background. The focus will be on using tests to go beyond just rewriting manifests in rspec. Instead the focus will be on scenarios like: - Are the baseline security measures in place? - Do the differences between dev and prod get reflected? - Are the config elements that are core to the application present? In addition, tests will help to be a place to help document the oddities of our configurations and ensuring that minor changes don't result in catastrophe.
Speaker Bio: After beginning his career at UC Riverside supporting enterprise operations and bioinformatics research, Chris is now rocking being an infrastructure engineer at Demand Media in Santa Monica. He currently supports large high-traffic sites like eHow.com, LiveSTRONG.com, and Cracked.com. Chris enjoys attending local meetups, writing new Puppet modules, and creating small tools to make his team's lives a little easier. Find him on Twitter as @cwebber.
Ansible new paradigms for orchestrationPaolo Tonin
- Ansible provides a simple way to automate application deployment, server configuration management, and provisioning using SSH. It uses YAML files called playbooks to define tasks that are executed across multiple servers.
- Playbooks allow users to define infrastructure as code and configure servers in an idempotent way. They contain ordered lists of tasks that can install packages, copy files, start services, and more using simple YAML syntax.
- Ansible is agentless and communicates to servers over SSH, requiring only Python to be installed on managed nodes. It has a wide range of core modules and supports provisioning on cloud platforms like AWS.
Orchestration? You Don't Need Orchestration. What You Want is Choreography.Julian Dunn
This document discusses the differences between orchestration and choreography in configuration management. Orchestration involves a central orchestrator executing ordered operations on independent machines, while choreography involves autonomous actors that make and verify promises to each other to achieve a desired state. The document argues that choreography is preferable because it avoids single points of failure, enables more autonomy between systems, and allows for better coordination across a fleet with less reliance on external real-time state systems.
Bootstrapping Puppet and Application Deployment - PuppetConf 2013Puppet
"Bootstrapping Puppet and Application Deployment" by Robert de Macedo Soares, Application Security Engineer, BusinessWire.
Presentation Overview: A dive into the problems faced when first launching Puppet across existing, heterogeneous servers, outlining possible solutions using our experience as an example. In addition, this session will touch on application management and deployment using subversion and rake tasks, what works and what is a little rough around the edges.
Speaker Bio: Robert is an engineer who has spent the past several years attempting to automate away the need for the work that he does. Focusing on server automation and security work for BusinessWire, Robert also develops web services such as tee.ms, a chat service, and designs and develops games. Trism, which he co-designed, was nominated for Cellular Game of the Year by the Academy of Interactive Arts & Sciences in the 2009 Interactive Achievement Awards.
Symfony Live NYC 2014 - Rock Solid Deployment of Symfony AppsPablo Godel
Web applications are becoming increasingly more complex, so deployment is not just transferring files with FTP anymore. We will go over the different challenges and how to deploy our PHP applications effectively, safely and consistently with the latest tools and techniques. We will also look at tools that complement deployment with management, configuration and monitoring.
Test-Driven Infrastructure with Puppet, Test Kitchen, Serverspec and RSpecMartin Etmajer
The goal of Continuous Delivery is, briefly, to get features into your users' or customers' hands as quickly and confidently as possible. In order to succeed, Development and Operations teams need to align and come up with both working and deployable software in short, regular intervals. Chef, Puppet, Ansible & Co. enable teams to code up application runtime environments, but alone do not allow for building quality into their processes. In this presentation I will show how you can apply the "Red, Green, Refactor Cycle" of Test-Driven Development and combine it with your configuration management or orchestration tool of choice in order to come up with better infrastructure that can automatically be tested using Puppet, Test Kitchen, Docker, Serverspec and RSpec.
John Minnihan argues that Ansible and Docker have made configuration tools like Chef and Puppet unnecessary. He claims that Ansible is easier to use than Chef and Puppet since it is agentless and only requires SSH, and that Docker containers are immutable and reusable, avoiding complex client arrangements. Minnihan asserts that people are frustrated with the work involved in maintaining Chef and Puppet and prefer the simplicity of Ansible and Docker's approach to infrastructure as code.
This document discusses using Chef configuration management with Docker containers. It describes using Chef at both the build stage and runtime stage of containers. At build time, Chef can configure and install applications into an image. At runtime, Chef can further configure running containers based on environment variables. Combining Chef and Docker provides immutable infrastructure, faster deployments, and testable configurations.
The document discusses automated infrastructure testing. It explains that infrastructure testing involves automating the testing of code, infrastructure as code, and deployed infrastructure. This is done through unit, functional, integration and monitoring tests. The document recommends collaborating with operations and building thorough monitoring and analytics. Automating tests helps ensure battle tested code and infrastructure health. Cloud infrastructure also requires more testing across providers. Lessons include starting with most time consuming tasks and understanding domain concepts.
This document provides an overview and agenda for an introductory training course on testing infrastructure automation code with Chef and its tools. The agenda includes an overview of Chef, discussing resources, describing policies with recipes and cookbooks, using a sandbox for testing, verifying node state, getting faster feedback, writing clean code, and wrapping up. Hands-on labs are emphasized for learning Chef through practice. Questions are encouraged throughout, and breaks will be taken as needed.
This is an approximately 90-minute InSpec workshop covering basic InSpec resources and profiles and applying them to Linux Hardening. Delivered at DevSecCon 2017 in London, October 20, 2017
DevSecCon London 2017: Inspec workshop by Mandi WallsDevSecCon
This document discusses using InSpec to build security into workflows. InSpec is a human-readable specification language for testing security and compliance requirements. It includes resources for common services, files, and configurations that can be used to verify requirements. InSpec profiles allow packaging and sharing test sets and can be run locally or against remote targets. The document demonstrates writing an InSpec test, running it against targets, and integrating InSpec tests with configuration management using Chef to remediate failures.
InSpec is a tool that allows users to write security and compliance tests as human-readable code (or "profiles") that can be run on systems to check configurations and identify issues. Profiles can test for things like required SSH settings, file permissions, and package/patch levels. Profiles are run using the InSpec command line tool and can test local systems or remote targets like Linux servers. When profiles detect failures, they return non-zero exit codes to fail automation jobs. This allows InSpec to integrate with configuration management and infrastructure as code tools for continuous compliance monitoring.
1. Belvedere is a platform that aims to standardize environments from development to production by using the same OS image everywhere, convention-based configuration, and moving environment-specific configurations to environment variables.
2. Key aspects of Belvedere include using a single OS image built once then transformed for different environments, moving configurations to environment variables populated before app startup, and using short CNAMEs that resolve differently in each environment.
3. Benefits are finding problems earlier, familiarizing developers with production-like systems, and promoting images between environments easily with minimal manual steps.
InSpec is an open-source testing framework that allows users to write security and compliance tests. Tests can be written to check configurations, files, and other infrastructure attributes. InSpec includes built-in resources that make it easy to test common services and configurations. Tests are written in a human-readable format and can be executed locally or remotely on servers. InSpec integrates with tools like Chef and Test Kitchen to allow testing as part of development and deployment workflows. The document provides examples of using InSpec to test SSH configuration and other attributes based on security requirements.
Ricardo Schmidt gave a presentation on Ansible, an open source tool for configuration management, application deployment, provisioning, and orchestration. He explained that Ansible is fast, clear, complete, and secure. It uses SSH to connect to nodes agentlessly without requiring additional firewall rules or open ports. Key components include the inventory to define hosts and groups, modules to run tasks on nodes, and playbooks to orchestrate tasks across multiple hosts. The presentation demonstrated Ansible's capabilities through examples and a demo of its core features.
Nagios Conference 2014 - Mike Merideth - The Art and Zen of Managing Nagios w...Nagios
Mike Merideth's presentation on The Art and Zen of Managing Nagios with Puppet.
The presentation was given during the Nagios World Conference North America held Oct 13th - Oct 16th, 2014 in Saint Paul, MN. For more information on the conference (including photos and videos), visit: http://go.nagios.com/conference
This document discusses automated deployment strategies for web applications. It recommends using source code control and branching features to keep the codebase organized. Database migrations and configuration management allow deployment to different environments. Tools like Phing can automate the deployment process through tasks like exporting code, uploading files, and database migrations. Rollbacks are important and can be facilitated by changing symlinks or deleting deployed directories. Overall, automated deployment prevents mistakes and makes rollbacks easy.
Practical introduction to dev ops with chefLeanDog
The document provides an introduction to DevOps using Chef. It discusses configuration management and deployment automation. It introduces key Chef concepts like nodes, resources, recipes and cookbooks. It demonstrates using Chef recipes to configure a sample Ubuntu application server with Apache, Python, Django and PostgreSQL. The recipes install packages, create a virtualenv, install dependencies and configure the application using Chef resources and Ruby code.
Compliance Automation with InSpec - Chef NYC Meetup - April 2017adamleff
Presented at the Chef NYC meetup on April 20, 2017, this presentation reviews how to automate compliance scanning and reporting with InSpec by Chef and wrapped up with a hands-on workshop.
Adding Security and Compliance to Your Workflow with InSpecMandi Walls
This document provides an overview of InSpec, which is a tool for creating automated tests for compliance and security. InSpec allows users to write tests in a human-readable language to check systems for vulnerabilities or configuration issues. It can test infrastructure locally or remotely. Profiles can be created to package and share test suites. InSpec integrates with tools like Test Kitchen and can be included in development workflows to continuously test systems.
1. The document discusses running ASP.NET 5 applications on a Raspberry Pi 2 and using Docker.
2. It provides steps for installing .NET Core, ASP.NET 5, and other prerequisites on the Raspberry Pi, and includes examples of building and running a simple ASP.NET app.
3. It also covers using Docker to build an image for an ASP.NET app, including defining a Dockerfile and building/running the image to host the app in a container.
- Puppet is an open source configuration management tool that allows systems to be declared and configured in code.
- It provides a declarative language to describe system configuration and resources to manage packages, files, services, and other common configuration elements.
- Puppet helps ensure all systems are consistently configured, allows scaling to manage many systems, and provides change management for system modifications.
Configuration Management in the Cloud - Cloud Phoenix Meetup Feb 2014Miguel Zuniga
This document discusses configuration management tools Puppet and Chef in the cloud. It provides an overview of what configuration management is and why it is more painful in cloud environments where resources are dynamic. It then covers using infrastructure as code and discusses Puppet and Chef architectures, code examples, and how to use them in a masterless configuration in the cloud. Key aspects covered include using repositories to manage code, rebuilding on failure, and dynamically updating config files using knife to search inventory in Chef.
InSpec Workshop at Velocity London 2018Mandi Walls
InSpec is an open-source testing framework that allows users to test and enforce security configurations and compliance for infrastructure code. It uses human-readable tests and resources to check configurations and generate reports. Users can write InSpec tests and profiles to test systems locally or remotely, address security issues, and integrate testing into development workflows using tools like Test Kitchen.
A story of how we went about packaging perl and all of the dependencies that our project has.
Where we were before, the chosen path, and the end result.
The pitfalls and a view on the pros and cons of the previous state of affairs versus the pros/cons of the end result.
Similar to Portland PUG April 2014: Beaker 101: Acceptance Test Everything (20)
Puppet camp2021 testing modules and controlrepoPuppet
This document discusses testing Puppet code when using modules versus a control repository. It recommends starting with simple syntax and unit tests using PDK or rspec-puppet for modules, and using OnceOver for testing control repositories, as it is specially designed for this purpose. OnceOver allows defining classes, nodes, and a test matrix to run syntax, unit, and acceptance tests across different configurations. Moving from simple to more complex testing approaches like acceptance tests is suggested. PDK and OnceOver both have limitations for testing across operating systems that may require customizing spec tests. Infrastructure for running acceptance tests in VMs or containers is also discussed.
This document appears to be for a PuppetCamp 2021 presentation by Corey Osman of NWOPS, LLC. It includes information about Corey Osman and NWOPS, as well as sections on efficient development, presentation content, demo main points, Git strategies including single branch and environment branch strategies, and workflow improvements. Contact information is provided at the bottom.
The document discusses operational verification and how Puppet is working on a new module to provide more confidence in infrastructure health. It introduces the concept of adding check resources to catalogs to validate configurations and service health directly during Puppet runs. Examples are provided of how this could detect issues earlier than current methods. Next steps outlined include integrating checks into more resource types, fixing reporting, integrating into modules, and gathering feedback. This allows testing and monitoring to converge by embedding checks within configurations.
This document provides tips and tricks for using Puppet with VS Code, including links to settings examples and recommended extensions to install like Gitlens, Remote Development Pack, Puppet Extension, Ruby, YAML Extension, and PowerShell Extension. It also mentions there will be a demo.
- The document discusses various patterns and techniques the author has found useful when working with Puppet modules over 10+ years, including some that may be considered unorthodox or anti-patterns by some.
- Key topics covered include optimization of reusable modules, custom data types, Bolt tasks and plans, external facts, Hiera classification, ensuring resources for presence/absence, application abstraction with Tiny Puppet, and class-based noop management.
- The author argues that some established patterns like roles and profiles can evolve to be more flexible, and that running production nodes in noop mode with controls may be preferable to fully enforcing on all nodes.
Applying Roles and Profiles method to compliance codePuppet
This document discusses adapting the roles and profiles design pattern to writing compliance code in Puppet modules. It begins by noting the challenges of writing compliance code, such as it touching many parts of nodes and leading to sprawling code. It then provides an overview of the roles and profiles pattern, which uses simple "front-end" roles/interfaces and more complex "back-end" profiles/implementations. The rest of the document discusses how to apply this pattern when authoring Puppet modules for compliance - including creating interface and implementation classes, using Hiera for configuration, and tools for reducing boilerplate code. It aims to provide a maintainable structure and simplify adapting to new compliance frameworks or requirements.
This document discusses Kinney Group's Puppet compliance framework for automating STIG compliance and reporting. It notes that customers often implement compliance Puppet code poorly or lack appropriate Puppet knowledge. The framework aims to standardize compliance modules that are data-driven and customizable. It addresses challenges like conflicting modules and keeping compliance current after implementation. The framework generates automated STIG checklists and plans future integration with Puppet Enterprise and Splunk for continued compliance reporting. Kinney Group cites practical experience implementing the framework for various military and government customers.
Enforce compliance policy with model-driven automationPuppet
This document discusses model-driven automation for enforcing compliance. It begins with an overview of compliance benchmarks and the CIS benchmarks. It then discusses implementing benchmarks, common challenges around configuration drift and lack of visibility, and how to define compliance policy as code. The key points are that automation is essential for compliance at scale; a model-driven approach defines how a system should be configured and uses desired-state enforcement to keep systems compliant; and defining compliance policy as code, managing it with source control, and automating it with CI/CD helps achieve continuous compliance.
This document discusses how organizations can move from a reactive approach to compliance to a proactive approach using automation. It notes that over 50% of CIOs cite security and compliance as a barrier to IT modernization. Puppet offers an end-to-end compliance solution that allows organizations to automatically eliminate configuration drift, enforce compliance at scale across operating systems and environments, and define policy as code. The solution helps organizations improve compliance from 50% to over 90% compliant. The document argues that taking a proactive automation approach to compliance can turn it into a competitive advantage by improving speed and innovation.
Automating it management with Puppet + ServiceNowPuppet
As the leading IT Service Management and IT Operations Management platform in the marketplace, ServiceNow is used by many organizations to address everything from self service IT requests to Change, Incident and Problem Management. The strength of the platform is in the workflows and processes that are built around the shared data model, represented in the CMDB. This provides the ‘single source of truth’ for the organization.
Puppet Enterprise is a leading automation platform focused on the IT Configuration Management and Compliance space. Puppet Enterprise has a unique perspective on the state of systems being managed, constantly being updated and kept accurate as part of the regular Puppet operation. Puppet Enterprise is the automation engine ensuring that the environment stays consistent and in compliance.
In this webinar, we will explore how to maximize the value of both solutions, with Puppet Enterprise automating the actions required to drive a change, and ServiceNow governing the process around that change, from definition to approval. We will introduce and demonstrate several published integration points between the two solutions, in the areas of Self-Service Infrastructure, Enriched Change Management and Automated Incident Registration.
This document promotes Puppet as a tool for hardening Windows environments. It states that Puppet can be used to harden Windows with one line of code, detect drift from desired configurations, report on missing or changing requirements, reverse engineer existing configurations, secure IIS, and export configurations to the cloud. Benefits of Puppet mentioned include hardening Windows environments, finding drift for investigation, easily passing audits, compliance reporting, easy exceptions, and exporting configurations. It also directs users to Puppet Forge modules for securing Windows and IIS.
Simplified Patch Management with Puppet - Oct. 2020Puppet
Does your company struggle with patching systems? If so, you’re not alone — most organizations have attempted to solve this issue by cobbling together multiple tools, processes, and different teams, which can make an already complicated issue worse.
Puppet helps keep hosts healthy, secure and compliant by replacing time-consuming and error prone patching processes with Puppet’s automated patching solution.
Join this webinar to learn how to do the following with Puppet:
Eliminate manual patching processes with pre-built patching automation for Windows and Linux systems.
Gain visibility into patching status across your estate regardless of OS with new patching solution from the PE console.
Ensure your systems are compliant and patched in a healthy state
How Puppet Enterprise makes patch management easy across your Windows and Linux operating systems.
Presented by: Margaret Lee, Product Manager, Puppet, and Ajay Sridhar, Sr. Sales Engineer, Puppet.
The document discusses how Puppet can be used to accelerate adoption of Microsoft Azure. It describes lift and shift migration of on-premises workloads to Azure virtual machines. It also covers infrastructure as code using Puppet and Terraform for provisioning, configuration management using Puppet Bolt, and implementing immutable infrastructure patterns on Azure. Integrations with Azure services like Key Vault, Blob Storage and metadata service are presented. Patch management and inventory of Azure resources with Puppet are also summarized.
This document discusses using Puppet Catalog Diff to analyze the impact of changes between Puppet environments or catalogs. It provides the command line usage and options for Puppet Catalog Diff. It also discusses how to integrate Puppet Catalog Diff into CI/CD pipelines for automated impact analysis when merging code changes. Additional resources like GitHub projects and Dev.to posts are provided for learning more about diffing Puppet environments and catalogs.
ServiceNow and Puppet- better together, Kevin ReeuwijkPuppet
ServiceNow and Puppet can be integrated in four key areas: 1) Self-service infrastructure allows non-Puppet experts to control infrastructure through a ServiceNow interface; 2) Enriched change management automatically generates ServiceNow change requests from Puppet changes and populates them with impact details; 3) Automated incident registration forwards details of configuration drift corrections in Puppet to ServiceNow to create incidents; and 4) Up-to-date asset management would periodically upload Puppet inventory data to ServiceNow to keep the CMDB accurate without disruptive discovery runs.
This document discusses how Puppet Relay uses Tekton pipelines to orchestrate containerized workflows. It provides an overview of how Tekton fits into the Relay architecture, with Tekton controllers managing taskrun pods to execute workflow steps defined in YAML. Triggers can initiate workflows based on events, with reusable and composable steps for tasks like provisioning infrastructure or clearing resources. Relay also includes features for parameters, secrets, outputs, and approvals to customize workflows. An ecosystem of open source integrations provides sample workflows and steps for common use cases.
100% Puppet Cloud Deployment of Legacy SoftwarePuppet
This document discusses deploying legacy software into the AWS cloud using Puppet. It proposes modeling AWS resources like security groups, autoscaling groups, and launch configurations as Puppet resources. This would allow Puppet to provision the underlying AWS infrastructure and configure servers launched in autoscaling groups. It acknowledges challenges around server reboots but suggests they can be addressed. In summary, it argues custom Puppet resources can easily model AWS resources and using Puppet to configure autoscaling servers is possible despite some challenges around rebooting servers during deployment.
This document discusses a partnership between Republic Polytechnic's School of Infocomm and Puppet to promote DevOps practices. It introduces several people involved with the partnership and outlines their mission to prepare more IT companies and individuals for jobs in the DevOps field through training courses. The document describes some short courses offered on DevOps topics and using the Puppet and Microsoft Azure platforms. It provides an example of how Republic Polytechnic has automated infrastructure configuration using Puppet to save time and reduce errors. There is a request at the end for readers to register their interest in DevOps by completing a survey.
This document discusses continuous compliance and DevSecOps best practices followed by financial services organizations.
Continuous compliance is defined as an ongoing process of proactive risk management that delivers predictable, transparent, and cost-effective compliance results. It involves continuously monitoring compliance controls, providing real-time alerts for failures and remediation recommendations, and maintaining up-to-date policies. Best practices for continuous compliance discussed include defining CIS controls and benchmarks, achieving transparent compliance dashboards and automated fixes for breaches.
DevSecOps is introduced as bringing security earlier in the application development lifecycle to minimize vulnerabilities. It aims to make everyone accountable for security. Challenges discussed include security teams struggling to keep up with DevOps pace and
The Dynamic Duo of Puppet and Vault tame SSL Certificates, Nick MaludyPuppet
The document discusses using Puppet and Vault together to dynamically manage SSL certificates. Puppet can use the vault_cert resource to request signed certificates from Vault and configure services to use the certificates. On Windows, some additional logic is needed to retrieve certificates' thumbprints and bind services to certificates using those thumbprints. This approach provides automated certificate renewal and distribution across platforms.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
3. What is Beaker?
• A black box acceptance testing tool.
• Provisions, configures and manages hosts
under test.
• Executes test files written in Ruby with
Beaker DSL functions and procedures.
4. DSL?
Domain-specific Language
The Beaker DSL is an extension to Ruby for
PuppetLabs specific testing steps. Test files
have access to all of Ruby plus these
additional functions & procedures.
6. The Workflow
1. Provision hosts for testing
2. Validate & configure test hosts
3. Run provided test files on hosts
4. Report test results
5. Teardown test hosts
7. Command Line Basics
• --hosts file
o to describe your test hosts
• --log-level debug
o for more messaging
• --preserve-hosts [mode]
o policy for cleaning up hosts post-testing
o one of always, onfail, never
• --no-provision
o use hosts that are already up and ready
• --parse-only
o read all parameters, environment variables and config options and
report the final Beaker configuration
13. Roles, what are they?
• master, agent, dashboard, database,
default
• user defined!
Provide shortcuts to access machines that
have particular responsibilities.
14. Beaker DSL - your helpful friend
• Installation
o install_pe, upgrade_pe, install_puppet
• File
o scp_to, scp_from
• Command execution
o on, shell, puppet, facter, hiera, fact_on
• Lots more!
15. Let’s look at tests!
test_name “my test”
step “first, say hello everywhere”
hosts.each do | host |
on host, “echo hello”
end
step “second, say hello on the master”
result = on master, “echo hello”
step “third, check our command output”
assert_equal(result.stdout, “hello”)
16. test_name "/etc/init.d/pe-mcollective restart check"
confine :except, :platform => 'solaris'
confine :except, :platform => 'windows'
confine :except, :platform => 'aix'
step "Make sure the service restarts properly"
hosts.each do |host|
# Commands to execute on the target system.
restart_command = "bash -c [[ -x /etc/init.d/pe-mcollective ]] && /etc/init.d/pe-
mcollective restart'"
process_count_check = "bash -c '[[ $(ps auxww | grep [m]collectived | wc -l) -eq 1
]]'"
# Restart once
on(host, restart_command) { assert_equal(0, exit_code) }
# Restart again
on(host, restart_command) { assert_equal(0, exit_code) }
# Check to make sure only one process is running
on(host, process_count_check) { assert_equal(0, exit_code) }
end
17. Coming up Next
- more hypervisors!
- a ‘pooling api’ to sit between Beaker and
the cloud
- creation of a ‘best practices’ guide
- more and better documentation
18. What we haven’t talked about
beaker-RSpec
• A shim between RSpec and Beaker that
allows for Rspec-style test construction
with full access to the Beaker DSL
• Used for Puppet module testing
• Listen to Hunter, he knows more