官术网_书友最值得收藏!

Chapter 1. Puppet as a Security Tool

Imagine you're sitting at home one day after a long day of work. Suddenly, you get a phone call that a new security vulnerability was found and all 300 of your servers will need to be patched. How would you handle it?

With Puppet, finding which one of your servers was vulnerable would be an easier task than doing so by hand. Furthermore, with a little additional work, you could ensure that every one of your servers is running a newer nonvulnerable version of the Puppet package.

In this chapter, we will touch on the following concepts:

  • What is Puppet?
  • Declarative versus imperative systems
  • The Puppet client-server model
  • Other components of the Puppet ecosystem used for security
  • Installing Puppet
  • How Puppet fits into a security role

Once this is complete, we will build the environment we'll use to run examples in this book and then run our first example.

Much of the information in this chapter is presented as a guide to what we will accomplish later on in this book.

主站蜘蛛池模板: 化隆| 和田市| 珲春市| 大宁县| 颍上县| 巴林左旗| 涪陵区| 平凉市| 东安县| 湄潭县| 连平县| 栖霞市| 涡阳县| 清镇市| 旅游| 南川市| 台湾省| 颍上县| 武定县| 定南县| 手游| 静宁县| 瓦房店市| 什邡市| 石狮市| 广汉市| 朝阳市| 镇巴县| 乐亭县| 蓝田县| 洛隆县| 徐闻县| 玉环县| 稷山县| 象山县| 奇台县| 灌南县| 蕉岭县| 儋州市| 浪卡子县| 荥阳市|