SlideShare a Scribd company logo
1 of 17
Download to read offline
Data Center Automation

      Presented by:
      ZoNIX Systems
   www.ZoNIXSystems.com




    Confidential Document
Today’s IT State

        Nearly 72% of IT staff
         perform maintenance &
         support tasks



                                            Only 28% are assigned to
                                            participate in strategic
                                            initiatives


6-Sep-10                  Confidential Document                         2
Typical System Lifecycle




                                                  Fixes
           Installation    Configuration
                                                  Patches
                                                  Audits




6-Sep-10                  Confidential Document             3
Occurrence, Recurrence, Idempotence
               Configure the
             System (Web, DB.
                 App, etc.)
                                                                   System
               Apply Security                                      Crash?
              Policies, Satisfy
             Compliance Needs

                                                 System
                                                Error OR      System Monitoring
                 Are there                     Migration?
                   more
                systems to
                configure?
                                            System Fully
                                          Configured and is
                                             Compliant


6-Sep-10                          Confidential Document                           4
What lies in there?
          Systems need to be configured
          More the systems, more is the work
          Bad configuration can be worst than no configuration
          Temporary changes become permanent
          Changes are meant to forget
          Users are created, deleted and recreated
          Software is installed, uninstalled and reinstalled
          Need to log into the system one-by-one and configure
          Need for compliance and identical configuration, policies
          Change Auditing is a nightmare



6-Sep-10                       Confidential Document                   5
What Happens Without Automation?




6-Sep-10               Confidential Document   6
Test Your IT Infrastructure, Ask your Administrator…

       How many changes were made in 100 servers in last 3
        months?
       Install this software or change a parameter in a file on 500
        servers within 10mins?
       Recover 5 crashed servers in 10mins?
       Cut down IT man power – handle 300 servers with a single
        resource?
       Have consistent configuration throughout the organization
        on 500 servers?
       Show the configuration file that was changed on 10th
        December 2002, 20th January 2005 and 25th December
        2009?

6-Sep-10                          Confidential Document                7
Current Business Challenges
       Increasing IT demands
       Complex IT Infrastructure
       Ever changing technology landscape
           • Hardware/Software upgrades
           • Adoption of new technologies
           • Training needs
       High dependency on human resources
       Difficult knowledge transfer during staff attrition
       Compliance Enforcement and Management


6-Sep-10                    Confidential Document             8
Current Technology Challenges
       Template based software configuration across data center
       Enforcing change management for all the IT resources
       Multiple ownerships for same IT resource to facilitate 24X7
        support
       Human driven machines are more error prone
       Difficult and time consuming recovery procedures
       Rolling out software configuration changes or new software
        across an entire organization, groups, individual resources
       Single window IT support console
       Under-achieved SLAs



6-Sep-10                    Confidential Document                     9
Solution – Puppet
       Centralized configuration management for entire data center
       Template based software configurations – Applicable to
        individual resource, resource groups and organization wide
        resources
       Quick recovery of the crashed system by using master
        configurations stored in the automation framework
       Version controlled configuration files
       Dashboard to show configuration changes with historical
        reports
       Single console to manage entire data center – No need to login
        to individual servers
       Improved SLAs


6-Sep-10                     Confidential Document                       10
What can we automate?
       Software Installation
       Patch Management
       Software Configuration (Web, DB, App, etc.)
       Security Policies
       Change Management
       User/Group Management
       Day-to-day tasks (Commands, Scripts, Scheduled tasks,
        Log Management)
       Disaster Recovery
       Auditing


6-Sep-10                  Confidential Document                 11
Business Benefits
       Policy compliance (SOX, SAS70, ISO 27001,
        etc.)
       Better Change Management (ITIL)
       Lower human dependencies
       More servers per administrator
       Shift of human resource focus towards
        strategic planning
       Reduced Errors – Complete peace of mind
       Experience the Automated world

6-Sep-10                 Confidential Document      12
Who is already using Puppet?
       Following organizations are few out of the long list who utilized the data
        center automation framework to benefit their businesses.




6-Sep-10                         Confidential Document                               13
Supported Platforms
       Linux                                          BSD
           •   CentOS                                          FreeBSD 4.7 and later
           •   Debian 3.1 and later                            OpenBSD 4.1 and later
           •   Fedora Core 2-6
           •   Fedora 7 and later
           •   Gentoo Linux                            Other Unix
           •   Mandriva Corporate Server 4                     Macintosh OS X
           •   RHEL 3 and later                                Sun Solaris 2.6
           •   Oracle Linux                                    Sun Solaris 7 and later
           •   SuSE Linux 8 and later
           •   Ubuntu 7.04 and later




6-Sep-10                            Confidential Document                                 14
How does it work?




6-Sep-10                Confidential Document   15
What do we offer?




6-Sep-10                Confidential Document   16
Contact Us

                              ZoNIX Systems
                              H-87, First Floor, Sector-63
                              Noida-201301
                              Ph. 91-120-649-5554
                              Email. info@ZoNIXSystems.com
                              Web. www.ZoNIXSystems.com


                                           Follow Us




      Community Linux Club, A ZoNIX Systems Initiative: http://linuxclub.ZoNIXSystems.com



6-Sep-10                           Confidential Document                                17

More Related Content

Similar to Data Center Automation and Configuration Management with Puppet

10 tips for hardening your system
10 tips for hardening your system10 tips for hardening your system
10 tips for hardening your systemRevital Lapidot
 
10 tips for hardening your system
10 tips for hardening your system10 tips for hardening your system
10 tips for hardening your systemRevital Lapidot
 
Presentation desktops for the cloud the view rollout
Presentation   desktops for the cloud the view rolloutPresentation   desktops for the cloud the view rollout
Presentation desktops for the cloud the view rolloutsolarisyourep
 
Presentation desktops for the cloud the view rollout
Presentation   desktops for the cloud the view rolloutPresentation   desktops for the cloud the view rollout
Presentation desktops for the cloud the view rolloutxKinAnx
 
Building Toward an Open and Extensible Autonomous Computing Platform Utilizi...
Building Toward an Open and Extensible  Autonomous Computing Platform Utilizi...Building Toward an Open and Extensible  Autonomous Computing Platform Utilizi...
Building Toward an Open and Extensible Autonomous Computing Platform Utilizi...Phil Cryer
 
Run Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateRun Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateNovell
 
Run Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateRun Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateNovell
 
Run Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateRun Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateNovell
 
Run Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateRun Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateNovell
 
Run Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateRun Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateNovell
 
IBM Systems Director offers Heterogeneous Management of all IBM (plus other s...
IBM Systems Director offers Heterogeneous Management of all IBM (plus other s...IBM Systems Director offers Heterogeneous Management of all IBM (plus other s...
IBM Systems Director offers Heterogeneous Management of all IBM (plus other s...IBM India Smarter Computing
 
IT Network Asset Discovery & Inventory
IT Network Asset Discovery & InventoryIT Network Asset Discovery & Inventory
IT Network Asset Discovery & Inventoryikirmer
 
Adhila_CV_DevOps_Linux_Profile
Adhila_CV_DevOps_Linux_ProfileAdhila_CV_DevOps_Linux_Profile
Adhila_CV_DevOps_Linux_ProfileAdhila Ansari
 
Dev ops and_infrastructure_immunology_v0.4
Dev ops and_infrastructure_immunology_v0.4Dev ops and_infrastructure_immunology_v0.4
Dev ops and_infrastructure_immunology_v0.4Julie Tsai
 
Katia frye resume 2016 no address
Katia frye resume 2016   no addressKatia frye resume 2016   no address
Katia frye resume 2016 no addressKatia Frye
 
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. DImperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. Dscoopnewsgroup
 
ITE v5.0 - Chapter 5
ITE v5.0 - Chapter 5ITE v5.0 - Chapter 5
ITE v5.0 - Chapter 5Irsandi Hasan
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討Timothy Chen
 
Windows 7 for IT Professionals
Windows 7 for IT ProfessionalsWindows 7 for IT Professionals
Windows 7 for IT ProfessionalsRishu Mehra
 

Similar to Data Center Automation and Configuration Management with Puppet (20)

10 tips for hardening your system
10 tips for hardening your system10 tips for hardening your system
10 tips for hardening your system
 
10 tips for hardening your system
10 tips for hardening your system10 tips for hardening your system
10 tips for hardening your system
 
Uyuni, the movie
Uyuni, the movieUyuni, the movie
Uyuni, the movie
 
Presentation desktops for the cloud the view rollout
Presentation   desktops for the cloud the view rolloutPresentation   desktops for the cloud the view rollout
Presentation desktops for the cloud the view rollout
 
Presentation desktops for the cloud the view rollout
Presentation   desktops for the cloud the view rolloutPresentation   desktops for the cloud the view rollout
Presentation desktops for the cloud the view rollout
 
Building Toward an Open and Extensible Autonomous Computing Platform Utilizi...
Building Toward an Open and Extensible  Autonomous Computing Platform Utilizi...Building Toward an Open and Extensible  Autonomous Computing Platform Utilizi...
Building Toward an Open and Extensible Autonomous Computing Platform Utilizi...
 
Run Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateRun Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin Orchestrate
 
Run Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateRun Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin Orchestrate
 
Run Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateRun Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin Orchestrate
 
Run Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateRun Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin Orchestrate
 
Run Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateRun Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin Orchestrate
 
IBM Systems Director offers Heterogeneous Management of all IBM (plus other s...
IBM Systems Director offers Heterogeneous Management of all IBM (plus other s...IBM Systems Director offers Heterogeneous Management of all IBM (plus other s...
IBM Systems Director offers Heterogeneous Management of all IBM (plus other s...
 
IT Network Asset Discovery & Inventory
IT Network Asset Discovery & InventoryIT Network Asset Discovery & Inventory
IT Network Asset Discovery & Inventory
 
Adhila_CV_DevOps_Linux_Profile
Adhila_CV_DevOps_Linux_ProfileAdhila_CV_DevOps_Linux_Profile
Adhila_CV_DevOps_Linux_Profile
 
Dev ops and_infrastructure_immunology_v0.4
Dev ops and_infrastructure_immunology_v0.4Dev ops and_infrastructure_immunology_v0.4
Dev ops and_infrastructure_immunology_v0.4
 
Katia frye resume 2016 no address
Katia frye resume 2016   no addressKatia frye resume 2016   no address
Katia frye resume 2016 no address
 
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. DImperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
 
ITE v5.0 - Chapter 5
ITE v5.0 - Chapter 5ITE v5.0 - Chapter 5
ITE v5.0 - Chapter 5
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討
 
Windows 7 for IT Professionals
Windows 7 for IT ProfessionalsWindows 7 for IT Professionals
Windows 7 for IT Professionals
 

Recently uploaded

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 

Data Center Automation and Configuration Management with Puppet

  • 1. Data Center Automation Presented by: ZoNIX Systems www.ZoNIXSystems.com Confidential Document
  • 2. Today’s IT State  Nearly 72% of IT staff perform maintenance & support tasks Only 28% are assigned to participate in strategic initiatives 6-Sep-10 Confidential Document 2
  • 3. Typical System Lifecycle Fixes Installation Configuration Patches Audits 6-Sep-10 Confidential Document 3
  • 4. Occurrence, Recurrence, Idempotence Configure the System (Web, DB. App, etc.) System Apply Security Crash? Policies, Satisfy Compliance Needs System Error OR System Monitoring Are there Migration? more systems to configure? System Fully Configured and is Compliant 6-Sep-10 Confidential Document 4
  • 5. What lies in there?  Systems need to be configured  More the systems, more is the work  Bad configuration can be worst than no configuration  Temporary changes become permanent  Changes are meant to forget  Users are created, deleted and recreated  Software is installed, uninstalled and reinstalled  Need to log into the system one-by-one and configure  Need for compliance and identical configuration, policies  Change Auditing is a nightmare 6-Sep-10 Confidential Document 5
  • 6. What Happens Without Automation? 6-Sep-10 Confidential Document 6
  • 7. Test Your IT Infrastructure, Ask your Administrator…  How many changes were made in 100 servers in last 3 months?  Install this software or change a parameter in a file on 500 servers within 10mins?  Recover 5 crashed servers in 10mins?  Cut down IT man power – handle 300 servers with a single resource?  Have consistent configuration throughout the organization on 500 servers?  Show the configuration file that was changed on 10th December 2002, 20th January 2005 and 25th December 2009? 6-Sep-10 Confidential Document 7
  • 8. Current Business Challenges  Increasing IT demands  Complex IT Infrastructure  Ever changing technology landscape • Hardware/Software upgrades • Adoption of new technologies • Training needs  High dependency on human resources  Difficult knowledge transfer during staff attrition  Compliance Enforcement and Management 6-Sep-10 Confidential Document 8
  • 9. Current Technology Challenges  Template based software configuration across data center  Enforcing change management for all the IT resources  Multiple ownerships for same IT resource to facilitate 24X7 support  Human driven machines are more error prone  Difficult and time consuming recovery procedures  Rolling out software configuration changes or new software across an entire organization, groups, individual resources  Single window IT support console  Under-achieved SLAs 6-Sep-10 Confidential Document 9
  • 10. Solution – Puppet  Centralized configuration management for entire data center  Template based software configurations – Applicable to individual resource, resource groups and organization wide resources  Quick recovery of the crashed system by using master configurations stored in the automation framework  Version controlled configuration files  Dashboard to show configuration changes with historical reports  Single console to manage entire data center – No need to login to individual servers  Improved SLAs 6-Sep-10 Confidential Document 10
  • 11. What can we automate?  Software Installation  Patch Management  Software Configuration (Web, DB, App, etc.)  Security Policies  Change Management  User/Group Management  Day-to-day tasks (Commands, Scripts, Scheduled tasks, Log Management)  Disaster Recovery  Auditing 6-Sep-10 Confidential Document 11
  • 12. Business Benefits  Policy compliance (SOX, SAS70, ISO 27001, etc.)  Better Change Management (ITIL)  Lower human dependencies  More servers per administrator  Shift of human resource focus towards strategic planning  Reduced Errors – Complete peace of mind  Experience the Automated world 6-Sep-10 Confidential Document 12
  • 13. Who is already using Puppet?  Following organizations are few out of the long list who utilized the data center automation framework to benefit their businesses. 6-Sep-10 Confidential Document 13
  • 14. Supported Platforms  Linux  BSD • CentOS  FreeBSD 4.7 and later • Debian 3.1 and later  OpenBSD 4.1 and later • Fedora Core 2-6 • Fedora 7 and later • Gentoo Linux  Other Unix • Mandriva Corporate Server 4  Macintosh OS X • RHEL 3 and later  Sun Solaris 2.6 • Oracle Linux  Sun Solaris 7 and later • SuSE Linux 8 and later • Ubuntu 7.04 and later 6-Sep-10 Confidential Document 14
  • 15. How does it work? 6-Sep-10 Confidential Document 15
  • 16. What do we offer? 6-Sep-10 Confidential Document 16
  • 17. Contact Us ZoNIX Systems H-87, First Floor, Sector-63 Noida-201301 Ph. 91-120-649-5554 Email. info@ZoNIXSystems.com Web. www.ZoNIXSystems.com Follow Us Community Linux Club, A ZoNIX Systems Initiative: http://linuxclub.ZoNIXSystems.com 6-Sep-10 Confidential Document 17