官术网_书友最值得收藏!

Chapter 1. Puppet as a Security Tool

Imagine you're sitting at home one day after a long day of work. Suddenly, you get a phone call that a new security vulnerability was found and all 300 of your servers will need to be patched. How would you handle it?

With Puppet, finding which one of your servers was vulnerable would be an easier task than doing so by hand. Furthermore, with a little additional work, you could ensure that every one of your servers is running a newer nonvulnerable version of the Puppet package.

In this chapter, we will touch on the following concepts:

  • What is Puppet?
  • Declarative versus imperative systems
  • The Puppet client-server model
  • Other components of the Puppet ecosystem used for security
  • Installing Puppet
  • How Puppet fits into a security role

Once this is complete, we will build the environment we'll use to run examples in this book and then run our first example.

Much of the information in this chapter is presented as a guide to what we will accomplish later on in this book.

主站蜘蛛池模板: 恩平市| 肃宁县| 衡山县| 永登县| 蓝田县| 汝城县| 荣成市| 蕲春县| 永安市| 汽车| 香格里拉县| 逊克县| 上虞市| 庄浪县| 夹江县| 岱山县| 华亭县| 高雄市| 璧山县| 新乐市| 内乡县| 伊通| 罗田县| 社会| 上饶市| 佛学| 济源市| 无极县| 舒城县| 咸宁市| 冕宁县| 革吉县| 博白县| 马公市| 石家庄市| 佳木斯市| 新巴尔虎右旗| 临湘市| 菏泽市| 姜堰市| 巴林左旗|