Background Standard Unix filesystem permissions are less complex than Windows file system permissions and Linux ACLs. Though, this lacks flexibility which is sometimes needed, In many cases it can be leveraged as an advantage. Often the complexity of ACLs can allow administrators to create file system permissions which are cumbersome to audit and document. The
Background Recently, I started a project at (www.eyemg.com) to migrate from VMWare to KVM. Our standard server deployment is based on RHEL5 running on HP DL380 hardware. Given our hardware/software deployment, it made sense to align ourselves with Red Hat’s offering of KVM. We are able to achieve feature parity with VMware server while adding
Background This script was developed last year to give a quick and dirty analysis of the Snort alert log. In typical fashion, it’s is far from perfect, but approximately right is better than absolutely wrong. Obviously, the intersects could be combined in new and creative ways, this is just one that works for us. Also,
Background Building a feature complete centralized logging system that provided the ability to trouble shoot problems and pro-actively find new issues before they became service outages was a top priority when I first started at (www.eyemg.com). I call it feature complete because it has successfully done both for us without spending too much time of
Fedora 13 is out and with it Petit is available to be installed through the fedora repository. That means it can be installed easily through yum, like so.
yum install petit
I would like to thank Sandro â€œredâ€ Mathys for helping me get petit into Fedora 13. Now I have to work on getting it in Debian/Ubuntu.
Background Python is an open source programming language which is growing in popularity and PyOhio is an annual conference for Python programmers in and around Ohio. I first attended PyOhio in 2009. I was immediately impressed with the quality of all of the talks that I attended. I was also impressed with the intellectual environment,
Background Automated deployment is obviously not new, but until this point, there was not much push in the open source world. Recently, the idea of DevOps or Ops 2.0 is gaining ground. We are starting to think of our deployment and provisioning methods more like software engineers. We are developing tools to help us provision
Background Scripting & Automation has been a goal since the beginning of Unix and, let me state, that I believe that it is possible to achieve a Fully Automated Provisioning system in our production environments. In fact, I think it is essential that we develop fully automated provisioning systems to keep up with the rate
This conference came across my Radar a couple of weeks ago and they just released the session descriptions. Afew of the sessions look pretty interesting from a sys admin perspective. AD, LDAP, and SSO in Splunk Logging at TB Scale Using Splunk to monitor Business Transactions Check out more here: Slunk .Conf 2010
I got turned onto this conference a while back because I saw that Thomas A. Limoncelli was going to be there. He was the co-author of “The Practice of system and Network Administration” Also the talk by Eben M. Haber sounds extremely interesting. The Lopsa NJ group is one to keep an eye on. Key