Evaluating Methods to Maintain
System Stability and Security
When Reversing Changes Made by
Configuration and System
Management Tools in UNIX
Environments
Slide 5
Slide 5 text
Who of You Maintains One or More
Servers?
Slide 6
Slide 6 text
Who of You Uses Configuration or
System Management Tools?
Slide 7
Slide 7 text
Who of You Has a Backup Restore
Plan to Recover After a Fault?
Slide 8
Slide 8 text
How Long Do You Think It Takes, Until
a 400 Million USD Company With
20 Billion USD Daily Trades Is Bankrupt?
Slide 9
Slide 9 text
Classification of Configuration
Management
Slide 10
Slide 10 text
1.
No systematic Configuration Management
Slide 11
Slide 11 text
2.
Divergent Configuration Management
Slide 12
Slide 12 text
3.
Convergent Configuration Management
Slide 13
Slide 13 text
4.
Congruent Configuration Management
Slide 14
Slide 14 text
Classification of IT Resources
Slide 15
Slide 15 text
No content
Slide 16
Slide 16 text
No content
Slide 17
Slide 17 text
No content
Slide 18
Slide 18 text
No content
Slide 19
Slide 19 text
No content
Slide 20
Slide 20 text
No content
Slide 21
Slide 21 text
No content
Slide 22
Slide 22 text
No content
Slide 23
Slide 23 text
Rules Derived From Classification
Slide 24
Slide 24 text
Rule 3:
Estimate Downtime and Check
Dependencies
Slide 25
Slide 25 text
Rule 6:
Use Environment-Wide Unique
Identifiers
Slide 26
Slide 26 text
Rule 7:
Review Depending Resources
Slide 27
Slide 27 text
Rule 9:
Prune Files and Folders With Package
Manager
Slide 28
Slide 28 text
Example:
Restoring VM Backups
Slide 29
Slide 29 text
Bankrupt In 45 Minutes?!
“Knightmare: A DevOps Cautionary Tale” by Doug Seven