Configuration and change management with Bcfg2
The powerful Bcfg2 provides a sophisticated environment for centralized configuration management.
The experts at the department of mathematics and computer science at the Argonne National Laboratory  were so unhappy about having to configure their numerous computer systems manually that they started an internal research project, dubbed Bcfg2 , that they later released under the BSD license.
Bcfg2 provides a sophisticated system for describing and deploying complete client configurations. This flexible tool uses a comprehensive XML format to describe the configurations, and RPC to communicate with the clients.
Experts will find Bcfg2 easy to extend, but the learning curve is steep – the program uses a powerful, abstract approach.
Bcfg2 supports various platforms, including openSUSE, Fedora, Gentoo, and Debian, as well as their many derivatives. The tool also runs on FreeBSD, AIX, Solaris, and Mac OS X through the use of the developer's distribution-independent Encap packages  on top of the ready-to-run client and server packages. As an alternative, you can check out the openSUSE Build Service , which offers the package for a number of other platforms.
To manage specifications, Bcfg2 uses a server that communicates with a fairly lean counterpart on the client. To install both the server and the client, which comprises just a couple of lines of Python code, you can use the package manager for your distribution.
To get the client to request updates from the server at regular intervals, you need to create a crontab entry. Alternatively, you can run Bcfg2 as a background process. In that case, the server can actively contact the agent.
Settings on managed systems are configured at the Bcfg2 server. For each client, the server stores a description, which it generates from a central specif-ication.
At the highest level, Bcfg2 works with profiles that describe classes of identical computers, such as desktop systems or web servers. Each managed machine has exactly one profile.
Specific logical system areas within the profile are organized into groups, such as office software or network settings. The groups, which can be nested recursively, let administrators organize configuration specifications in a meaningful way.
Each group in turn is made up of an arbitrary number of bundles with scope that typically extends to a single software product, such as Postfix, OpenOffice, or the nameswitch mechanism.
Profiles, groups, and bundles are defined in the metadata/groups.xml file (see Listing 1).
Bundle and Subgroup Definitions
01 <Groups> 02 <Group name='desktop' profile='true'> 03 <Bundle name='motd' /> 04 <Bundle name='networking' /> 05 <Group name='office-workstation' /> 06 <Group name='debian-stable' /> 07 </Group> 08 09 <Group name='webserver' profile='true'> 10 <Group name='apache' /> 11 <Bundle name='networking' /> 12 <!-- ... --!> 13 </Group> 14 15 <Group name='office-workstation'> 16 <Group name='gnome-desktop' /> 17 <!-- ... --!> 18 </Group> 19 20 <Group name='debian-stable' 21 toolset='debian' /> 22 </Groups>
Buy this article as PDF
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.
A first cousin of the recent Heartbleed attack affects EAP-based wireless and peer-to-peer authentication.
FOSS community acts to protect freedom of choice for laptop devices.