-
Recent Posts
- Case Study: Incorporating Disruptive Technologies into Existing Products (part 3)
- Case Study: Incorporating Disruptive Technologies into Existing Products (part 2)
- Case Study: Incorporating Disruptive Technologies into Existing Products (part 1)
- Incorporating Disruptive Technologies into Existing Products
- Investing in Disruptive Technologies
Articles
Major articles in chronological order:
Archives
- May 2020
- April 2020
- March 2020
- February 2020
- December 2019
- November 2019
- October 2017
- August 2017
- July 2017
- November 2016
- July 2016
- June 2016
- August 2015
- July 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
- December 2013
- November 2013
- October 2013
- September 2013
- August 2013
- July 2013
- June 2013
- May 2013
Categories
Category Archives: System Management
Manualizing System Management
Since the last article talked about Automating System Management, let’s look at Manualizing System Management. By this we mean enabling a human to perform system management tasks. Why would we want to do this? There are several reasons. At a … Continue reading
Posted in System Management
Leave a comment
Automating System Management
The future of system management is automation. As the number of systems and virtual machines being managed continues to grow, and the complexity of distributed applications increases, automation is the only way to keep things running smoothly. Specifically, we need … Continue reading
Posted in System Management
Leave a comment
Using LMI Commands
The LMI CLI command processor is invoked by entering “LMI”. You can use it to enter either a single command or multiple commands. Entering “LMI” with no arguments puts you into interactive mode until you enter CTRL-D to exit the … Continue reading
Posted in System Management
Leave a comment
Update: LMIShell for RHEL 7 Beta
Key characteristics of an Enterprise Linux like Red Hat Enterprise Linux are long term support and stable interfaces. The OpenLMI Providers are designed to be stable, which allowed them to be included in the RHEL 7 Beta. On the other … Continue reading
Posted in System Management
1 Comment
OpenLMI on RHEL 7 Beta
Getting Started OpenLMI is under active development, and its first public release on Red Hat Enterprise Linux is with the Red Hat Enterprise Linux 7 Beta. Install OpenLMI Install OpenLMI can be installed by installing the openlmi package. This is … Continue reading
Posted in System Management
1 Comment
OpenLMI Certificate Lessons
I was playing with OpenLMI – I mean, testing OpenLMI – on my home network, and learned that I need to upgrade my local setup. I don’t have a local nameserver, and have fallen into the (bad) habit of not … Continue reading
Posted in System Management
Leave a comment
Installing OpenLMI and LMIShell
Getting Started The best place to start is with Fedora 20. OpenLMI is under active development, and there have been significant changes since the earlier releases in F18 and F19. These instructions were tested against the Fedora 20 final beta. … Continue reading
Posted in System Management
9 Comments
Introducing LMIShell – the OpenLMI Client
Our discussions so far have focused on the OpenLMI agents and infrastructure on managed systems. This makes sense, as the management infrastructure has to be in place before any client applications can use it. The client side has not been … Continue reading
Posted in System Management
Leave a comment
OpenLMI vs. Puppet
A common question is “what is the difference between OpenLMI and a configuration management system like Puppet or Chef?” This is often asked with the implication that these are competitive approaches and you don’t need both. The two approaches are … Continue reading
Posted in System Management
4 Comments
Configuring SSL Certificates for OpenLMI
Managing systems with OpenLMI requires authentication at two levels: First, all communications between managed systems and client systems must go over a secure connection. Second, valid account login information must be presented to the managed system to perform operations using … Continue reading
Posted in System Management
Leave a comment