Subject:
   Re: [lopsa-tech] Version controlling permission sensitive files
   From:
   "Edward Ned Harvey (lopser)" <lop...@nedharvey.com>
   Date:
   04/22/2013 10:29 PM

   To:
   Tom Limoncelli <t...@whatexit.org>
   CC:
   "t...@lopsa.org" <t...@lopsa.org>



   Thanks everyone for your help.  Fact is, I'm a consultant.  The client is a 
web hosting company where I typically work 2-4 hours per month, to apply 
security patches and so forth.  I provide them with systems that are acceptably 
secure and stable, and documented such that any competent basic level sysadmin 
could review and understand without me.  In other words, the customer 
deliverable is a lowest-common-denominator process for managing a small number 
of servers.

   Configuration management isn't in the cards.  But a backup or snapshot or versioning destination of some 
kind, where they can perform "ls" and "cat" and "diff" are goals well within 
their reach.  The customer does not demand that I educate them on configuration management - the customer 
demands that I make systems good enough and simple enough for their use.  For the numerous people here 
swearing by configuration management despite me saying it's not the right solution in this case:  Tell it to 
the customer.


Sounds like a problem with the usability of the tech. File system snapshots are a good example of something that's easy for end users to understand and use (change to home\snapshot\yesterday and see yesterday's files). I agree that CM software is not there yet, I think that most of the posters here are not saying getting that level of usability a goal, not where we are today. They're advocating improving the usability until it is easy as the current manual methods. There certainly is a level where it is hard to articulate to end users the cost of the extra time to set stuff up.

From a functionality standpoint it's great, now it needs to be ubiquitous and as easy or easier than the other methods of building a system. You could argue that with any best practice the folks who get the most benefit out of it are the ones who don't understand the underlying reasons why it's important specifically because they do not understand the underlying reasons (and times when there are valid exceptions). CM is no different in this way than encryption or storage architecture etc.

My dream job is getting end to end config management set up where a "customer" selects what they want and it's auto-built from a repo with any customizations checked into a host specific branch, monitoring is added for any of the customization and the whole shebang managed via source control. Configuration changes would be managed just like code releases and the monitoring would be good enough (from a service availability and a performance point of view) to verify that the changes had the expected impact.

At least I have a goal...




Please be advised that this email may contain confidential information. If you are not the intended recipient, please notify us by email by replying to the sender and delete this message. The sender disclaims that the content of this email constitutes an offer to enter into, or the acceptance of, any agreement; provided that the foregoing does not invalidate the binding effect of any digital or other electronic reproduction of a manual signature that is included in any attachment.

_______________________________________________
Tech mailing list
Tech@lists.lopsa.org
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to