These are my links for 26 Mar 2016 through 29 Mar 2016:
- Painless Immutable Infrastructure with Ansible and AWS | Radify Blog – […] In our blog posts Reducing Infrustration and Immutable Demo Nodes, we talk about our approach to immutable infrastructure and the benefits we have seen from employing this approach. In this article, we explore a practical project example so you can get up and running with immutable infrastructure in less than an hour! […]
- pearofducks/ansible-vim: A vim plugin for syntax highlighting Ansible’s common filetypes – A vim plugin for syntax highlighting Ansible’s common filetypes
- Provisioning EC2 Hosts with Ansible | Allan Denot – Looking to build EC2 hosts with more consistency? Using Ansible you can easily provision EC2 hosts and put some logic on it to adjust EC2 parameters based on the type of host you are building.
The easiest way to start is to create a playbook calling the ec2 module with the parameters you want to pass to AWS to create your host. In this post I will show a little more scalable way to do this, where the parameters are variables and you can easily have multiple types of hosts sharing the same playbook and role.
These are my links for 24 Mar 2016 through 25 Mar 2016:
- Coderwall | Dump all variables – For debugging purposes it can be useful to not just dump hostvars but also all other variables and group information. You can do this using a jinja template which you could include in a debug task
- Using Ansible to create AWS instances | Tivix – Ansible is a great tool for enhancing productivity. With a vast array of modules to choose from, it can save you a lot of time by automating away common tasks. At Tivix we use it for single-command deployment, with the most common destination being Amazon EC2 instances created beforehand. Since Ansible is capable of managing EC2 resources, we can improve this setup by making a playbook to create an instance for us.
- Home | OpenSCAP portal – The OpenSCAP ecosystem provides multiple tools to assist administrators and auditors with assessment, measurement and enforcement of security baselines. We maintain great flexibility and interoperability, reducing costs of performing security audits.
The OpenSCAP project provides a wide variety of hardening guides and configuration baselines developed by the open source community, ensuring that you can choose a security policy which best suits the needs of your organization, regardless of its size.
SCAP is U.S. standard maintained by National Institute of Standards and Technology (NIST). The OpenSCAP project is a collection of open source tools for implementing and enforcing this standard, and has been awarded the SCAP 1.2 certification by NIST in 2014.
- Wazuh | Augmenting OSSEC Host IDS – Wazuh contributes to Open Source Security developing and integrating new modules to extend OSSEC capabilities and functionality.
These are my links for 1 Mar 2016 through 8 Mar 2016:
- ansiblecookbook.com – This books should become a reference for how doing cool things in your daily business with Ansible, things you can not find in the official docs.
- Ansible Cheat Sheet | Wall-Skills.com – Ansible is the cool, new kid on the block that is IT automation. So, just in case you need an Ansible Cheat Sheet, we’ve got you covered
- zorangagic/awsinfo – Daily Inventory of all AWS resources in excel format
- High availability clustering on AWS | Zoran’s Blog – How do we keep legacy applications highly available on AWS? I have already written about this previously and there are many good alternatives with the upcoming Cloudwatch instance recovery the easiest to implement. Yet Cloudwatch instance recovery or autoscaling group with min=1,max=1 still requires failure to be detected (1-2 mins) and new instance to be booted up (2-3 mins). If the application can not tolerate outage of 3-5 minutes then high availability clustering may be a good alternative
- jordansissel/pleaserun: An attempt to abstract this “init” script madness. – Pleaserun is a tool to generate startup scripts for the wasteland of sorrow that is process launchers.
These are my links for 9 Dic 2015 through 10 Dic 2015:
- Dynamic multi-point VPN with OpenNHRP powered linux hub – This post aims to explain how to configure a dynamic multi-point site-to-site VPN over IPSEC between CISCO routers and a Linux machine using the NHRP protocol. […] To support the NHRP protocol I used OpenNHRP, an open-source implementation of the NHRP protocol. To bring up the IPSec tunnels, I used racoon with pre-shared key based authentication.
- portableR – portableR is a version of R statistics that have all their static libraries within the same folder, this lets run in x86_64 VMs. This project is aimed to run in web servers to build microservices (AWS Lambda) that require R to process data, png chart generation, etc.