Configuration and change management with Bcfg2
A database lets you retrieve configuration information from more data sources. For example, you could automatically generate the DHCP, DNS, and NIS configuration data from a source such as a directory service. The example in Listing 5 shows how TCheetah on Debian configures the network interfaces in /etc/network/interfaces on the basis of data from a PostgreSQL database.
01 #from Bcfg2.Server.dbconnection import DBPgConnection 02 #silent result = DBPgConnection().execute( 03 "SELECT ip, netmask, broadcast, gateway \ 04 FROM hosts \ 05 WHERE hostname = '%s'" % $self.metadata.hostname) 06 07 auto eth0 08 iface eth0 inet static 09 address $result 10 netmask $result 11 broadcast $result 11 gateway $result
Configurations do not just apply to file entries. System services must be configured to reflect the runlevels. The Service generator reads the administrative information in Svcmgr/services.xml to discover how to configure, say, the NTP service.
To do so, the server references the service referred to as <service name= 'ntpd' /> in the matching bundle.
Then, services.xml is used to specify whether or not the client should start the service:
<Services priority='0'> <Service name='ntpd' status='on' /> </Services>
The generator converts these details to tangible configurations and sends them to the client, which then applies distribution-specific methods to enable or disable the service.
Bcfg2 does not replace the package manager, but it can have the effect of shifting more control from the package manager to the system administrator, who can use Bcfg2 to specify which version of which individual package the tool installs. XML files manage information about the available packages and synchronize the details with the installation server package selection. Multiple installation servers allow administrators to assign different priorities – for example, for security updates.
The Bcfg2 client compares global and local package versions and upgrades or downgrades accordingly. Administrators can freeze special versions by assigning them the highest priority.
Other generators configure directories, symlinks, and many other element types. Some more experienced administrators will appreciate the ability to use plugins to bind Python functions to the generators provided with the Bcfg2 distribution.
Buy this article as PDF
Mozilla’s script blocker add-on could be putting malware sites on the whitelist.
The Internet community officially banishes the notoriously unsafe Secure Sockets Layer protocol.
Popular desktop environment continues the Gnome 2 legacy – with new support for the Gnome 3 toolkit.
The Obama White House has issued a memorandum telling all US government agencies they must use HTTPS for all websites and web communication.
New program will dial up security for the Firefox browser.
Red Hat's community distro embraces the cloud.
New partnership will bring more and better CS training to US schools
Criminals offer online help over Tor network
Sophisticated malware is still present on Joomla and WordPress sites around the world.
Future versions of Ubuntu's code service will support the popular Git version control system used with Linux and other open source projects.