Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Title Page
Copyright Page
Dedication
About the Authors
About the Technical Reviewer
Acknowledgements
Introduction
CHAPTER 1 - Introducing the Basics of Automation
Do You Need Automation?
What Will You Gain?
What Do System Administrators Do?
Methodology: Get It Right from the Start!
Dealing with Users and Administrators
Who Owns the Systems?
Defining Policy
CHAPTER 2 - Applying Practical Automation
Seeing Everything As a File
Understanding the Procedure Before Automating It
Exploring an Example Automation
CHAPTER 3 - Using SSH to Automate System Administration Securely
Learning the Basics of Using SSH
Enhancing Security with SSH
Using Public-Key Authentication
Using ssh-agent
Restricting RSA Authentication
Using SSH for Common Accounts
CHAPTER 4 - Configuring Systems with cfengine
Getting an Overview of cfengine
Learning the Basic Setup
Debugging cfengine
Creating Sections in cfagent.conf
Using cfrun
Looking Forward to Cfengine 3
Using cfengine in the Real World
CHAPTER 5 - Bootstrapping a New Infrastructure
Installing the Central cfengine Host
Setting Up the cfengine Master Repository
Creating the cfengine Config Files
Ready for Action
CHAPTER 6 - Setting Up Automated Installation
Introducing the Example Environment
The Proper Foundation
CHAPTER 7 - Automating a New System Infrastructure
Implementing Time Synchronization
Incorporating DNS
Taking Control of User Account Files
Routing Mail
Looking Back
CHAPTER 8 - Deploying Your First Application
Deploying and Configuring the Apache Web Server
Sharing Data Between Systems
NFS and rsync and cfengine, Oh My!
CHAPTER 9 - Generating Reports and Analyzing Logs
Reporting on cfengine Status
Doing General syslog Log Analysis
Seeing the Light
CHAPTER 10 - Monitoring
Nagios
Ganglia
Now You Can Rest Easy
CHAPTER 11 - Infrastructure Enhancement
Cfengine Version Control with Subversion
Backups
Enhancement Is an Understatement
CHAPTER 12 - Improving System Security
Security Enhancement with cfengine
Using the Lightweight Directory Access Protocol
Security with Kerberos
Implementing Host-Based Firewalls
Enabling Sudo at Our Example Site
Security Is a Journey, Not a Destination
APPENDIX A - Introducing the Basic Tools
APPENDIX B - Writing cfengine Modules
Index
← Prev
Back
Next →
← Prev
Back
Next →