SlideShare a Scribd company logo
1 of 9
Download to read offline
Getting Started
with
Configuration Management
gabriel m schuyler | @gabe_sky
Gabe
I'm Gabe. I'm a Professional Services Puppet.

Enough rope to hang yourself -- "get started"

Sysadmin -- or at least understand the work.

Hands: Have CM? Have R/W? Actually written to it? Nope.
Sven
The perfect cup of coffee.
We've all accidentally made one, but could we answer "how'd you
do that?"

He has concise and specific instructions.

Allows for variants. e.g. strong, smooth, chocolatey.

It has measurable results. How does it taste?
Systems
How do you make "one more like this?"

It starts with basic resources like packages, files, services, users and
groups.

Specialized resources like mount points, zfs volumes, IIS application
pools.

The different way they're set up per machine, environment, location.
So, how do we manage this?

Well, people ask me, "how does Puppet compare to the competition"
...
.sh
.ps1
.bak
.gabe-pre-ntp-move20141027
w2k-dev-golden.template
The actual competition:

Your terrible, uncommented scripts with a bus number of one. (or
even zero.)

Copying a backup of the file you're about to hand edit.

Golden images at point-in-time, but which don't maintain a desired
state.
Chad
They pair me with a junior, so they can learn the desired states.

I need more "front-end web servers." (Role)

So that's "base security, common tools and mounts, web
stuff." (Profile)

And "base security" means ssh, motd, xinetd, &c (Components)
Spelunking
The answers to his questions are all over the place.

Spread across wikis, scripts, post-its.

Can you just copy what a similar machine has?

Tribal knowledge and ad-hoc procedures don't transfer well.

It needs to be repeatable, and give me confidence that I truly have
"one more like that one."
Connecting
Plus how do these pieces work together?

Understanding the dependencies make us senior.

Happily, automated CM, illuminates those dependencies, by
specifying it in code.

Chad can see the connections through what's sometimes called
"executable documentation."
Hammering
Tooling, used wrong, says "when all I have is a hammer, every
problem is a nail."

The flip side is "hammers work on all kinds of nails." (Or, you know,
try to use a shoe/stapler.)

Automated CM gets us all using the same language to describe the
infrastructure.

It's easier to hire more "Puppet people," than to hire more "sven's io
tuning script written in Go because he wanted to try it people."
Hammers
Pick any tool.

Use "learning" pages, and virtual machines, to decide.

It's the practice that counts, not the hammer.
Build
Now we're getting on the road to repeatable infrastructure.

"make one more" doesn't require experts.

Autoscaling, system rebuilds, OS upgrades.

The seniors can concentrate on real stuff, not just fires.
Okay, so let's talk about the practices that are going to make you
happy.
Truth
To keep your sanity, it's useful to have a "single source of truth."

Need to look something up .. you know were. (Not wiki, scripts,
Sven's head, repeat.)

Change it in one spot, it propagates.
History
("You know Elphaba, where I come from, we believe all sorts of things
that aren't true. We call it 'history.'")

Any automated CM tool will require source control by its own nature.

Borrow what your developers use, or whatever those learning pages/
systems were using.

"What changed?" Now you'll know who, when, and what have
changed. Just like developers' code.
Futures
Different environments can be applying the desired state from
different points in (source code) time.

Production uses particular package versions, config files, &c.

Dev uses xyz. And production will use xyz on Tuesday.
Now
All automated CM has some function for discovery and
orchestration.

Heartbleed, shellshock .. what version of bash do my production
front-end web servers have right now?

Upgrade all non-production machines xyz right now.

Now, be careful. The temptation with these tools is to just run
scripts, ad-hoc, like ssh in a for loop.

Instead, have the discipline to update your CM, and then kick off
These are the biggest benefits of using automated CM.

I have a clear idea of how to replicate any type of system, here.

And because we're speaking a common language, Chad can see
how.

When things break, I can easily answer "what changed?" Just like
the developers do.

So where do I start?
Ready
Start to scribble down the simplest, most common, boring
configuration things that annoy you now.

Dig up your host-naming scheme. This will help identify the different
"types" of systems you have.

Identify the tribal, wiki pages, script repositories.
Set
Set up source code control and "social coding" tools. (Think: code
review before PR merging.)

Set permissions and "ownership" of systems to start, but aim to
later remove these at cumbaya time.

Agree on a style guide. Involve all departments.

Add your chosen CM tool to provisioning and start-up scripts. (noop
is always a possibility, if you're timid.)
Toddle
Set up your logging/reporting for maximum visibility. (Visibility, not
verbosity)

Don't try to learn two things at once. Learn your CM system first,
then configure wacky things.

Start by picking one small, well-known component to automate.

Search for pre-existing code on the forge/kitchen/hades.

Repeat -- relax, you can always run in noop mode.
Cheer
Everyone loves metrics, especially managers. (Remember ITIL? Ick.)

Be prepared with metrics and stories. "This used to waste X hours
per week of my time." "This used to need Sven's help to get done."
"Now we can reproduce production issues from any point in time,
and show diffs!" "Now, the developers are testing their code, on
systems that look exactly like production."
Reflect
To sum up. Make a great cup of coffee.

Care about the quality of the final product.

Write concise and measurable instructions, in a common language.
Any type of system is easy to reproduce without magic, or experts.

Version history of our uniform language, says what changed when.
And in order to succeed, we're going to need to have measurable
results.
Q
"Ask me your questions, bridge-keeper, I'm not afraid!"

Possible demos: `puppet resource` of package and service .. then
add to site.pp for a node.

`puppet module search ntp` then add to a node and run agent, then
change servers =>, run agent again.
Getting Started
with
Configuration Management
gabriel m schuyler | @gabe_sky

More Related Content

Viewers also liked

Viewers also liked (7)

Life balance and productivity
Life balance and productivityLife balance and productivity
Life balance and productivity
 
Migrating Puppet 3 to 4 -- Code Changes
Migrating Puppet 3 to 4 -- Code ChangesMigrating Puppet 3 to 4 -- Code Changes
Migrating Puppet 3 to 4 -- Code Changes
 
Identity Guard Review
Identity Guard ReviewIdentity Guard Review
Identity Guard Review
 
Manual de copasst
Manual de copasstManual de copasst
Manual de copasst
 
20150709 - Americas Industrial Services
20150709 - Americas Industrial Services20150709 - Americas Industrial Services
20150709 - Americas Industrial Services
 
LifeLock
LifeLockLifeLock
LifeLock
 
Ahsan Ali
Ahsan AliAhsan Ali
Ahsan Ali
 

Similar to IC3 -- Configuration Management 101

3stages Wdn08 V3
3stages Wdn08 V33stages Wdn08 V3
3stages Wdn08 V3Boris Mann
 
Puppet for SysAdmins
Puppet for SysAdminsPuppet for SysAdmins
Puppet for SysAdminsPuppet
 
Resisting The Feature Creature
Resisting The Feature CreatureResisting The Feature Creature
Resisting The Feature CreatureChristian Heilmann
 
Planning JavaScript and Ajax for larger teams
Planning JavaScript and Ajax for larger teamsPlanning JavaScript and Ajax for larger teams
Planning JavaScript and Ajax for larger teamsChristian Heilmann
 
DevOps introduction with ansible, vagrant, and docker
DevOps introduction with ansible, vagrant, and dockerDevOps introduction with ansible, vagrant, and docker
DevOps introduction with ansible, vagrant, and dockerMark Stillwell
 
How to Build Tools for Data Scientists That Don't Suck
How to Build Tools for Data Scientists That Don't SuckHow to Build Tools for Data Scientists That Don't Suck
How to Build Tools for Data Scientists That Don't SuckDiana Tkachenko
 
Javaland 2017: "You´ll do microservices now". Now what?
Javaland 2017: "You´ll do microservices now". Now what?Javaland 2017: "You´ll do microservices now". Now what?
Javaland 2017: "You´ll do microservices now". Now what?André Goliath
 
Future proofing design work with Web components
Future proofing design work with Web componentsFuture proofing design work with Web components
Future proofing design work with Web componentsbtopro
 
Automation and machine learning in the enterprise
Automation and machine learning in the enterpriseAutomation and machine learning in the enterprise
Automation and machine learning in the enterprisealphydan
 
What every C++ programmer should know about modern compilers (w/ comments, AC...
What every C++ programmer should know about modern compilers (w/ comments, AC...What every C++ programmer should know about modern compilers (w/ comments, AC...
What every C++ programmer should know about modern compilers (w/ comments, AC...Sławomir Zborowski
 
SiestaTime - Defcon27 Red Team Village
SiestaTime - Defcon27 Red Team VillageSiestaTime - Defcon27 Red Team Village
SiestaTime - Defcon27 Red Team VillageAlvaro Folgado Rueda
 
Beginners guide-to-coding-updated
Beginners guide-to-coding-updatedBeginners guide-to-coding-updated
Beginners guide-to-coding-updatedSaidLezzar
 
Herding cats in the Cloud
Herding cats in the CloudHerding cats in the Cloud
Herding cats in the CloudDewey Sasser
 
Transcript: Lamp stack of manufacturing - Make:HIW
Transcript: Lamp stack of manufacturing - Make:HIWTranscript: Lamp stack of manufacturing - Make:HIW
Transcript: Lamp stack of manufacturing - Make:HIWNick Pinkston
 
devops, platforms and devops platforms
devops, platforms and devops platformsdevops, platforms and devops platforms
devops, platforms and devops platformsVMware Tanzu
 
devops, platforms and devops platforms
devops, platforms and devops platformsdevops, platforms and devops platforms
devops, platforms and devops platformsAndrew Shafer
 

Similar to IC3 -- Configuration Management 101 (20)

3stages Wdn08 V3
3stages Wdn08 V33stages Wdn08 V3
3stages Wdn08 V3
 
Puppet for SysAdmins
Puppet for SysAdminsPuppet for SysAdmins
Puppet for SysAdmins
 
Resisting The Feature Creature
Resisting The Feature CreatureResisting The Feature Creature
Resisting The Feature Creature
 
Planning JavaScript and Ajax for larger teams
Planning JavaScript and Ajax for larger teamsPlanning JavaScript and Ajax for larger teams
Planning JavaScript and Ajax for larger teams
 
DevOps introduction with ansible, vagrant, and docker
DevOps introduction with ansible, vagrant, and dockerDevOps introduction with ansible, vagrant, and docker
DevOps introduction with ansible, vagrant, and docker
 
How to Build Tools for Data Scientists That Don't Suck
How to Build Tools for Data Scientists That Don't SuckHow to Build Tools for Data Scientists That Don't Suck
How to Build Tools for Data Scientists That Don't Suck
 
Javaland 2017: "You´ll do microservices now". Now what?
Javaland 2017: "You´ll do microservices now". Now what?Javaland 2017: "You´ll do microservices now". Now what?
Javaland 2017: "You´ll do microservices now". Now what?
 
Future proofing design work with Web components
Future proofing design work with Web componentsFuture proofing design work with Web components
Future proofing design work with Web components
 
Automation and machine learning in the enterprise
Automation and machine learning in the enterpriseAutomation and machine learning in the enterprise
Automation and machine learning in the enterprise
 
What every C++ programmer should know about modern compilers (w/ comments, AC...
What every C++ programmer should know about modern compilers (w/ comments, AC...What every C++ programmer should know about modern compilers (w/ comments, AC...
What every C++ programmer should know about modern compilers (w/ comments, AC...
 
SiestaTime - Defcon27 Red Team Village
SiestaTime - Defcon27 Red Team VillageSiestaTime - Defcon27 Red Team Village
SiestaTime - Defcon27 Red Team Village
 
Making software
Making softwareMaking software
Making software
 
Developer Efficiency
Developer EfficiencyDeveloper Efficiency
Developer Efficiency
 
Beginners guide-to-coding-updated
Beginners guide-to-coding-updatedBeginners guide-to-coding-updated
Beginners guide-to-coding-updated
 
Agile mobile first
Agile mobile firstAgile mobile first
Agile mobile first
 
Micro services
Micro servicesMicro services
Micro services
 
Herding cats in the Cloud
Herding cats in the CloudHerding cats in the Cloud
Herding cats in the Cloud
 
Transcript: Lamp stack of manufacturing - Make:HIW
Transcript: Lamp stack of manufacturing - Make:HIWTranscript: Lamp stack of manufacturing - Make:HIW
Transcript: Lamp stack of manufacturing - Make:HIW
 
devops, platforms and devops platforms
devops, platforms and devops platformsdevops, platforms and devops platforms
devops, platforms and devops platforms
 
devops, platforms and devops platforms
devops, platforms and devops platformsdevops, platforms and devops platforms
devops, platforms and devops platforms
 

More from Gabriel Schuyler

2024 Kernelcon Attack and Defense of AI.pdf
2024 Kernelcon Attack and Defense of AI.pdf2024 Kernelcon Attack and Defense of AI.pdf
2024 Kernelcon Attack and Defense of AI.pdfGabriel Schuyler
 
2023 BSides ATX Trending Attack and Defense.pdf
2023 BSides ATX Trending Attack and Defense.pdf2023 BSides ATX Trending Attack and Defense.pdf
2023 BSides ATX Trending Attack and Defense.pdfGabriel Schuyler
 
Trends in Cloud Security Attack & Defense
Trends in Cloud Security Attack & DefenseTrends in Cloud Security Attack & Defense
Trends in Cloud Security Attack & DefenseGabriel Schuyler
 
Pancakes Con 4 Trends in Cloud Security & Fun Facts about Real Clouds
Pancakes Con 4 Trends in Cloud Security & Fun Facts about Real CloudsPancakes Con 4 Trends in Cloud Security & Fun Facts about Real Clouds
Pancakes Con 4 Trends in Cloud Security & Fun Facts about Real CloudsGabriel Schuyler
 
Automating Security Tests in Development with Docker
Automating Security Tests in Development with DockerAutomating Security Tests in Development with Docker
Automating Security Tests in Development with DockerGabriel Schuyler
 
2022 GrrCON Shifting Right with Policy as Code.pdf
2022 GrrCON Shifting Right with Policy as Code.pdf2022 GrrCON Shifting Right with Policy as Code.pdf
2022 GrrCON Shifting Right with Policy as Code.pdfGabriel Schuyler
 
Texas Cyber Summit 2022: Challenges Securing Cloud-Native.pdf
Texas Cyber Summit 2022: Challenges Securing Cloud-Native.pdfTexas Cyber Summit 2022: Challenges Securing Cloud-Native.pdf
Texas Cyber Summit 2022: Challenges Securing Cloud-Native.pdfGabriel Schuyler
 
Dog Days of Devops 2022: Policy as Code
Dog Days of Devops 2022: Policy as CodeDog Days of Devops 2022: Policy as Code
Dog Days of Devops 2022: Policy as CodeGabriel Schuyler
 
fwd:cloudsec 2022: Shifting right with policy-as-code
fwd:cloudsec 2022: Shifting right with policy-as-codefwd:cloudsec 2022: Shifting right with policy-as-code
fwd:cloudsec 2022: Shifting right with policy-as-codeGabriel Schuyler
 
Hope 2022: Just Enough RFID Cloning to be Dangerous
Hope 2022: Just Enough RFID Cloning to be DangerousHope 2022: Just Enough RFID Cloning to be Dangerous
Hope 2022: Just Enough RFID Cloning to be DangerousGabriel Schuyler
 
Kernel Con 2022: Securing Cloud Native Workloads
Kernel Con 2022: Securing Cloud Native WorkloadsKernel Con 2022: Securing Cloud Native Workloads
Kernel Con 2022: Securing Cloud Native WorkloadsGabriel Schuyler
 
ShmooCon 2022: RFID Key Cloning for Angry Bikers
ShmooCon 2022: RFID Key Cloning for Angry BikersShmooCon 2022: RFID Key Cloning for Angry Bikers
ShmooCon 2022: RFID Key Cloning for Angry BikersGabriel Schuyler
 

More from Gabriel Schuyler (13)

2024 Kernelcon Attack and Defense of AI.pdf
2024 Kernelcon Attack and Defense of AI.pdf2024 Kernelcon Attack and Defense of AI.pdf
2024 Kernelcon Attack and Defense of AI.pdf
 
2023 BSides ATX Trending Attack and Defense.pdf
2023 BSides ATX Trending Attack and Defense.pdf2023 BSides ATX Trending Attack and Defense.pdf
2023 BSides ATX Trending Attack and Defense.pdf
 
Trends in Cloud Security Attack & Defense
Trends in Cloud Security Attack & DefenseTrends in Cloud Security Attack & Defense
Trends in Cloud Security Attack & Defense
 
Pancakes Con 4 Trends in Cloud Security & Fun Facts about Real Clouds
Pancakes Con 4 Trends in Cloud Security & Fun Facts about Real CloudsPancakes Con 4 Trends in Cloud Security & Fun Facts about Real Clouds
Pancakes Con 4 Trends in Cloud Security & Fun Facts about Real Clouds
 
Automating Security Tests in Development with Docker
Automating Security Tests in Development with DockerAutomating Security Tests in Development with Docker
Automating Security Tests in Development with Docker
 
2022 GrrCON Shifting Right with Policy as Code.pdf
2022 GrrCON Shifting Right with Policy as Code.pdf2022 GrrCON Shifting Right with Policy as Code.pdf
2022 GrrCON Shifting Right with Policy as Code.pdf
 
Texas Cyber Summit 2022: Challenges Securing Cloud-Native.pdf
Texas Cyber Summit 2022: Challenges Securing Cloud-Native.pdfTexas Cyber Summit 2022: Challenges Securing Cloud-Native.pdf
Texas Cyber Summit 2022: Challenges Securing Cloud-Native.pdf
 
Dog Days of Devops 2022: Policy as Code
Dog Days of Devops 2022: Policy as CodeDog Days of Devops 2022: Policy as Code
Dog Days of Devops 2022: Policy as Code
 
fwd:cloudsec 2022: Shifting right with policy-as-code
fwd:cloudsec 2022: Shifting right with policy-as-codefwd:cloudsec 2022: Shifting right with policy-as-code
fwd:cloudsec 2022: Shifting right with policy-as-code
 
Hope 2022: Just Enough RFID Cloning to be Dangerous
Hope 2022: Just Enough RFID Cloning to be DangerousHope 2022: Just Enough RFID Cloning to be Dangerous
Hope 2022: Just Enough RFID Cloning to be Dangerous
 
Kernel Con 2022: Securing Cloud Native Workloads
Kernel Con 2022: Securing Cloud Native WorkloadsKernel Con 2022: Securing Cloud Native Workloads
Kernel Con 2022: Securing Cloud Native Workloads
 
ShmooCon 2022: RFID Key Cloning for Angry Bikers
ShmooCon 2022: RFID Key Cloning for Angry BikersShmooCon 2022: RFID Key Cloning for Angry Bikers
ShmooCon 2022: RFID Key Cloning for Angry Bikers
 
Cybersecurity in 2022
Cybersecurity in 2022Cybersecurity in 2022
Cybersecurity in 2022
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

IC3 -- Configuration Management 101

  • 1. Getting Started with Configuration Management gabriel m schuyler | @gabe_sky Gabe I'm Gabe. I'm a Professional Services Puppet. Enough rope to hang yourself -- "get started" Sysadmin -- or at least understand the work. Hands: Have CM? Have R/W? Actually written to it? Nope.
  • 2. Sven The perfect cup of coffee. We've all accidentally made one, but could we answer "how'd you do that?" He has concise and specific instructions. Allows for variants. e.g. strong, smooth, chocolatey. It has measurable results. How does it taste? Systems How do you make "one more like this?" It starts with basic resources like packages, files, services, users and groups. Specialized resources like mount points, zfs volumes, IIS application pools. The different way they're set up per machine, environment, location. So, how do we manage this? Well, people ask me, "how does Puppet compare to the competition" ...
  • 3. .sh .ps1 .bak .gabe-pre-ntp-move20141027 w2k-dev-golden.template The actual competition: Your terrible, uncommented scripts with a bus number of one. (or even zero.) Copying a backup of the file you're about to hand edit. Golden images at point-in-time, but which don't maintain a desired state. Chad They pair me with a junior, so they can learn the desired states. I need more "front-end web servers." (Role) So that's "base security, common tools and mounts, web stuff." (Profile) And "base security" means ssh, motd, xinetd, &c (Components) Spelunking The answers to his questions are all over the place. Spread across wikis, scripts, post-its. Can you just copy what a similar machine has? Tribal knowledge and ad-hoc procedures don't transfer well. It needs to be repeatable, and give me confidence that I truly have "one more like that one."
  • 4. Connecting Plus how do these pieces work together? Understanding the dependencies make us senior. Happily, automated CM, illuminates those dependencies, by specifying it in code. Chad can see the connections through what's sometimes called "executable documentation." Hammering Tooling, used wrong, says "when all I have is a hammer, every problem is a nail." The flip side is "hammers work on all kinds of nails." (Or, you know, try to use a shoe/stapler.) Automated CM gets us all using the same language to describe the infrastructure. It's easier to hire more "Puppet people," than to hire more "sven's io tuning script written in Go because he wanted to try it people." Hammers Pick any tool. Use "learning" pages, and virtual machines, to decide. It's the practice that counts, not the hammer.
  • 5. Build Now we're getting on the road to repeatable infrastructure. "make one more" doesn't require experts. Autoscaling, system rebuilds, OS upgrades. The seniors can concentrate on real stuff, not just fires. Okay, so let's talk about the practices that are going to make you happy. Truth To keep your sanity, it's useful to have a "single source of truth." Need to look something up .. you know were. (Not wiki, scripts, Sven's head, repeat.) Change it in one spot, it propagates.
  • 6. History ("You know Elphaba, where I come from, we believe all sorts of things that aren't true. We call it 'history.'") Any automated CM tool will require source control by its own nature. Borrow what your developers use, or whatever those learning pages/ systems were using. "What changed?" Now you'll know who, when, and what have changed. Just like developers' code. Futures Different environments can be applying the desired state from different points in (source code) time. Production uses particular package versions, config files, &c. Dev uses xyz. And production will use xyz on Tuesday. Now All automated CM has some function for discovery and orchestration. Heartbleed, shellshock .. what version of bash do my production front-end web servers have right now? Upgrade all non-production machines xyz right now. Now, be careful. The temptation with these tools is to just run scripts, ad-hoc, like ssh in a for loop. Instead, have the discipline to update your CM, and then kick off
  • 7. These are the biggest benefits of using automated CM. I have a clear idea of how to replicate any type of system, here. And because we're speaking a common language, Chad can see how. When things break, I can easily answer "what changed?" Just like the developers do. So where do I start? Ready Start to scribble down the simplest, most common, boring configuration things that annoy you now. Dig up your host-naming scheme. This will help identify the different "types" of systems you have. Identify the tribal, wiki pages, script repositories. Set Set up source code control and "social coding" tools. (Think: code review before PR merging.) Set permissions and "ownership" of systems to start, but aim to later remove these at cumbaya time. Agree on a style guide. Involve all departments. Add your chosen CM tool to provisioning and start-up scripts. (noop is always a possibility, if you're timid.)
  • 8. Toddle Set up your logging/reporting for maximum visibility. (Visibility, not verbosity) Don't try to learn two things at once. Learn your CM system first, then configure wacky things. Start by picking one small, well-known component to automate. Search for pre-existing code on the forge/kitchen/hades. Repeat -- relax, you can always run in noop mode. Cheer Everyone loves metrics, especially managers. (Remember ITIL? Ick.) Be prepared with metrics and stories. "This used to waste X hours per week of my time." "This used to need Sven's help to get done." "Now we can reproduce production issues from any point in time, and show diffs!" "Now, the developers are testing their code, on systems that look exactly like production." Reflect To sum up. Make a great cup of coffee. Care about the quality of the final product. Write concise and measurable instructions, in a common language. Any type of system is easy to reproduce without magic, or experts. Version history of our uniform language, says what changed when. And in order to succeed, we're going to need to have measurable results.
  • 9. Q "Ask me your questions, bridge-keeper, I'm not afraid!" Possible demos: `puppet resource` of package and service .. then add to site.pp for a node. `puppet module search ntp` then add to a node and run agent, then change servers =>, run agent again. Getting Started with Configuration Management gabriel m schuyler | @gabe_sky