Configuration File Manipulation with Configuration Management Tools
نویسنده
چکیده
Manipulating and defining content of configuration files is one of the central tasks of configuration management tools. This is important to ensure a desired and correct behavior of computer systems. However, often considered very simple, this task can turn out to be very challenging. Configuration management tools provide different strategies for content manipulation of files, hence an administrator should think twice to choose the best strategy for a specific task. This paper will explore different approaches of automatic configuration file manipulation with the help of configuration management tools. We will take a close look at the configuration management tool Puppet, as is offers various different approaches to tackle content manipulation. We will also explore similarities and differences of approaches by comparing it with other configuration management tools. This should aid system administrators who have to deal with configuration files and will assist in choosing the "best" strategy for a specific configuration task.
منابع مشابه
An Analysis of UNIX System Configuration
Management of operating system configuration files files is an essential part of UNIX systems administration. It is particularly difficult in environments with a large number of computers. This paper presents a study of UNIX configuration file management. It compares existing systems and tools from the literature, presents several case studies of configuration file management in practice, exami...
متن کاملRefactoring-aware Software Configuration Management
Refactoring tools allow programmers to change source code much quicker than before. However, the complexity of these changes cause versioning tools that operate at a file level to lose the history of components. This problem can be solved by semantic, operation-based SCM with persistent IDs. We propose that versioning tools be aware of the program entities and the refactoring operations. Molhad...
متن کاملProbabilistic Automated Language Learning for Configuration Files
Software failures resulting from configuration errors have become commonplace as modern software systems grow increasingly large and more complex. The lack of language constructs in configuration files, such as types and grammars, has directed the focus of a configuration file verification towards building post-failure error diagnosis tools. In addition, the existing tools are generally languag...
متن کاملConfiguration Tools: Working Together
Since the LISA conferences began, the character of a typical ‘‘large installation’’ has changed greatly. Most large sites tended to consist of a comparatively small number of handcrafted ‘‘servers’’ supporting a larger number of very similar ‘‘clients’’ (which would usually be configured with the aid of some automatic tool). A modern large site involves a more complex mesh of services, often wi...
متن کاملResilient Configuration of Distribution System versus False Data Injection Attacks Against State Estimation
State estimation is used in power systems to estimate grid variables based on meter measurements. Unfortunately, power grids are vulnerable to cyber-attacks. Reducing cyber-attacks against state estimation is necessary to ensure power system safe and reliable operation. False data injection (FDI) is a type of cyber-attack that tampers with measurements. This paper proposes network reconfigurati...
متن کامل