Hi
user
Admin Login:
Username:
Password:
Name:
How to use Puppet like an Adult
--client
lca
--show
lca2013
--room MCC5 1632 --force
Next: 1 Transcendent Memory: Not Just for Virtualization Anymore!
show more...
Marks
Author(s):
Ben Kero,Daniel Maher
Location
MCC5
Date
jan Thu 31
Days Raw Files
Start
11:35
First Raw Start
error-in-template
Duration
0:45:00
Offset
None
End
12:20
Last Raw End
Chapters
Total cuts_time
None min.
http://lca2013.linux.org.au/schedule/30149/view_talk
raw-playlist
raw-mp4-playlist
encoded-files-playlist
mp4
svg
png
assets
release.pdf
How_to_use_Puppet_like_an_Adult.json
logs
Admin:
episode
episode list
cut list
raw files day
marks day
marks day
image_files
State:
---------
borked
edit
encode
push to queue
post
richard
review 1
email
review 2
make public
tweet
to-miror
conf
done
Locked:
clear this to unlock
Locked by:
user/process that locked.
Start:
initially scheduled time from master, adjusted to match reality
Duration:
length in hh:mm:ss
Name:
Video Title (shows in video search results)
Emails:
email(s) of the presenter(s)
Released:
Unknown
Yes
No
has someone authorised pubication
Normalise:
Channelcopy:
m=mono, 01=copy left to right, 10=right to left, 00=ignore.
Thumbnail:
filename.png
Description:
Puppet is an immensely powerful tool for system administration, but with great power comes great responsibility, and it’s not always obvious how to structure your configurations. There are many different ways to accomplish similar goals, and this malleability has given rise to a plethora of different design and architecture principles - some of which are good, and many of which are bad. In this talk, Ben and Dan will explain the guiding principles of responsible Puppet design and architecture, walking you through real-world examples in order to illustrate solid methodological approaches, and illuminate Puppet administrators of all skill levels. As an added bonus, we will also show you how Puppet can be integrated into automated deployment and continuous integration platforms - an increasingly important component of today’s development and operational landscape. This talk will include such topics as: - The separation of data and logic: How not to commit such Puppet sins as hardcoding credentials, paths, and other sensitive variables into your modules. - External data sources: There are a variety of ways to interface Puppet with other data sources, including Heira, puppet-db, extlookup, dilly, and more. - The tiered manifest approach: Leveraging different granularity levels for fine-grained control. - Module-writing best practices: Why it’s important for modules to be as generic as possible, and how to deal with differing environments and edge cases. - Explicit sanity preservation: Verifying the validity of the incoming values. - The importance of useful log output: Puppet has mature logging facilities built-in. Use them to get useful output in your dashboard, in email digests, and running manually triggered Puppet runs. - Recommended (and enforced) style guides: Machine-readable manifests are good, but human-readable manifests are better. - A comparison of visualisation tools: Everybody loves charts and graphs. Dashboards, reports aggregators, and automated metrics for the pointy-haired boss in your life.
markdown
Comment:
production notes
Rf filename:
root is .../show/dv/location/, example: 2013-03-13/13:13:30.dv
Sequence:
get this:
check and save to add this
Veyepar
Video Eyeball Processor and Review