官术网_书友最值得收藏!

Chapter 1. Puppet as a Security Tool

Imagine you're sitting at home one day after a long day of work. Suddenly, you get a phone call that a new security vulnerability was found and all 300 of your servers will need to be patched. How would you handle it?

With Puppet, finding which one of your servers was vulnerable would be an easier task than doing so by hand. Furthermore, with a little additional work, you could ensure that every one of your servers is running a newer nonvulnerable version of the Puppet package.

In this chapter, we will touch on the following concepts:

  • What is Puppet?
  • Declarative versus imperative systems
  • The Puppet client-server model
  • Other components of the Puppet ecosystem used for security
  • Installing Puppet
  • How Puppet fits into a security role

Once this is complete, we will build the environment we'll use to run examples in this book and then run our first example.

Much of the information in this chapter is presented as a guide to what we will accomplish later on in this book.

主站蜘蛛池模板: 措勤县| 南安市| 莎车县| 华宁县| 通山县| 陇川县| 湘乡市| 鄂托克前旗| 清河县| 富锦市| 松桃| 龙口市| 花莲县| 东莞市| 静海县| 湖北省| 前郭尔| 呼伦贝尔市| 五寨县| 隆尧县| 壤塘县| 吴忠市| 获嘉县| 蓬莱市| 中牟县| 云南省| 大名县| 杂多县| 徐闻县| 安庆市| 深水埗区| 上饶市| 贵州省| 沙田区| 西充县| 上饶县| 平乐县| 福安市| 库尔勒市| 静海县| 荔浦县|