Unix, Linux, DevOps , Cloud computing and BigData Knowledge-Base

0

DevOps Series – Automation with Puppet – Part3

Puppet – Commercial Versus Open Source Puppet has an enterprise version that costs money, and a free version. A few differences between them are outlined in below table Feature Open source Enterprise Puppet Console graphical user interface No Yes Puppet?supported modules No Yes Role-based access control...

0

DevOps Series – Automation with Puppet – Part2

What Is Configuration Management? Configuration management is a broad term, that relates to products and software. In the information technology/ operations world, configuration management can imply OS configuration, application management and deployment, and product management. Configuration management can be defined as the process that maintains consistency...

0

Devops series – Automation with Puppet – Part1

 Overview If you are managing more than a dozen Linux systems, configuration management is a must. Without configuration management, updating system configuration files and deploying applications can become very challenging. This crash course is about using Puppet configuration management software to deploy and support Linux systems in...

0

Bash Scripting – Redirecting output in scripts

You can use the STDOUT and STDERR file descriptors in your scripts to produce output in multiple locations simply by redirecting the appropriate file descriptors. There are two methods for redirecting output in the script: Temporarily redirecting each line Permanently redirecting all commands in the script...

1

RHEL6 Installation and Security Bench Marking Recommendations – Part8

Configuring System Information and Warning Banners Presenting a warning message prior to the normal user login may assist the prosecution of trespassers on the computer system. Changing some of these login banners also has the side effect of hiding OS version information and other detailed system...

0

RHEL6 Installation and Security Bench Marking Recommendations – Part7

Configuring User Accounts and Environment This section provides guidance on setting up secure defaults for system and user accounts and their environment. Guidance for monitoring these settings and others that may change over time is provided in Section 10 System Maintenance.

Follow

Get every new post delivered to your Inbox

Join other followers

Page 2931 of 2989