Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Networking

How Do You Create Config Files Automatically? 113

An anonymous reader writes "When deploying new server/servergroup/cluster to your IT infrastructure, deployment (simplified) consist of following steps: OS installation: to do it over network, boot server must be configured for this new server/servergroup/cluster; configuration/package management: configuration server has to be aware of the newcomer(s); monitoring and alerting: monitoring software must be reconfigured; and performance metrics: a tool for collecting data must be reconfigured. There are many excellent software solutions for those particular jobs, say configuration management (Puppet, Chef, cfengine, bcfg2), monitoring hosts and services (Nagios, Zabbix, OpenNMS, Zenoss, etc) and performance metrics (Ganglia, etc.). But each of these tools has to be configured independently or at least configuration has to be generated. What tools do you use to achieve this? For example, when you have to deploy a new server, how do you create configs for, let's say, PXE boot server, Puppet, Nagios and Ganglia, at once?"
Censorship

Afghan Student Gets 20 Years For Blasphemy 618

Invisible Pink Unicorn writes "Despite nationwide public support for his initial death sentence, a three-judge appeals court has reduced the sentence of Sayed Parwez Kambakhsh to 20 years in prison. Kambakhsh was charged with circulating an article on women's rights that he found online. From the article: 'Family members have said Kambakhsh was beaten and threatened with death until he signed a confession and that local journalists who expressed support for him were warned they would be arrested if they persisted.'"
Privacy

"Anonymous" Hacks Palin's Private Email 1733

netbuzz writes "'Anonymous,' best known for its jousts with Scientology, has apparently hacked Sarah Palin's private Yahoo email account. Contents, including sample emails, an index, and family photos, have been posted by Wikileaks, which calls them evidence that the GOP vice presidential candidate has improperly used private email to shield government business from public scrutiny." Note that there is no easy way to tell if the material on Wikileaks is genuine or a hoax. Update by J : Genuine.

Slashdot Top Deals

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...