Bestand wählen
Merken

Cooking with AWS - July 12, 2016

Zitierlink des Filmsegments
Embed Code

Automatisierte Medienanalyse

Beta
Erkannte Entitäten
Sprachtranskript
right cool so this is cooking with AWS my name is josh work in Amazon Web Services
as mentioned we're very tight time frames the training pretty quickly so this is my dating profile here on upper solutions architecturally at Amazon Web Services a cover DevOps partners like shelf of anyone here today
so just look at all run through the agenda when they talk about how this topic I go so for summer briefly introduce and talk about every a chef in the partnership and Caroline here today are a cover a couple ways that you can take advantage of using innovative services to help improve your usage of shaft on interview us all of which are and for each of these are kind of introduce a use case all talk a little bit about the aid of a services the news that we're all on the same page and nanomedicine demo mitotic about 20 minutes a demo 10 slides because looking at slides is too boring alright so it was chef for
organized into a couple minutes talk about why I'm here today I promise I only have a couple of sales pitch slides and then we'll get to the good stuff the the OK with
that represent you Duchess three-step guide for running a successful company Our coincidentally Amazon Web Services helps your business do all 3 of these things so it appears helps you trade capital expense for variable expenses will understand probably the value proposition the clouds you can not pay for IT resources as you need them when you need them the also helps to reduce the need to do capacity planning and procurement for our resources like storage and compute instead of waiting yeah weeks or months for procurement and wrecking stacking you just get it instantly of how you can deploy to our 13 regions or 35 availability zones with just launched India a few weeks ago and minutes and so on so of maintaining this errors in infrastructure all the born stuff you can focus on where your company does best to differentiate it is also the very robust platform of over 70 services now and something that customers tell me all demonic events like this is they absolutely love our pace of innovation and so what I mean by that is last year 2015 along we really 722 new features and services so their there right 722 by this year 2016 as of April right over the 200 marks or a continuing that and so it's what you do is innovative sort of like speed and again believe it or not it was to reduce risk thinks you are over 50 compliance certifications in everything that goes in of all of us involved in obtaining those like best practices and procedures in architecture lessons we make that even most security-sensitive customers require so everybody gets the benefit of these which is awesome and of course the new tools and functionality and things like encryption and network security identity management and initially security professionals behind all that the the OK had is we
believe cloud is the new normal so what what I mean by close in normal but to start outside of the US like interested Netflix's Spotify in we have our customers of all shapes and sizes literally in every industry running every imaginable were could you possibly think of a particular was single large trend of big enterprise companies moving in migrating to italy Austrian going all in on the and so public within the screen there other well clear attention choose the bottom 1 that's a quote by Rob Alexander the CAR capital 1 he says we work closely with AWS to develop a security model which we believe enables us to operate more securely in a public cloud the McKenna induces that's me that's pretty powerful statement again a estimate of how close in
OK so we ask yourself why you you're wise areas here also again only shuffle very important partner to EWS customers like you guys at you chef in areas are also extremely important to us as from here today talk about a few things that can help our mutual customers the and I someone quick slide
spend on information about migration because I think this is particularly important of so 1st thing I'll call your attention to the nearest marketplace so if you're not familiar with this which is an online store that makes super simple for customers defined purchase and deploy solutions into the iterates accounts such as Chef Server shift applied so it's a really easy it's a chef blessed installation it you're going on using automatic during your standard US account automatically which is really handy I will so there is quick start which is like a template and documentation helps you chips are up and running this is more of a bring your own license model so if you don't want the going to British donor Nerida account you can continue to use existing shop licences of and we also partnered with fast robot to create kind of a handy little guidance and simple cookbooks for getting up and running on it US quickly which the course we have any results works which is are manage configuration management server power by none other than chef and then finally I just wanna leave 1 last approach upon their and if you do a migration and let's say a new show customers well migrating interview please write your cookbooks 1st if you migrate your workloads and install shop cookbooks you really just a toy store here the cookbooks 1st signature migration on 1 OK now we made it for
all that's orthogonal my 1st use case of how we can use some of the resources to do us all kind of like a known problem around uh the and let's automatically cleaning up terminated AWS instances in your ships so most people are probably in this from familiar with auto-scaling on US so if you're not familiar with auto-scaling 0 spilling group space what auto-scaling on interview us and other pop providers in a similar fashion alighted are still upper down parts of the infrastructure dynamically based on some kind of policy or rules set so for example let's say you have a website you have a group a server that when your website traps increasing 981 automatically scale and you can set up a policy that says like my head exome idealization on a scale no traffic subsides I can say shrink back in so we we lose those servers on and so the problem is which of server and terminated it automatically go way for you to know this is like a manual clean-up step that you have to do ship servers you might have noticed knows hang around working of chef enterprises consuming licenses to use just a couple of years services we catch on and so the service very useful for
this a gamma dumb Alderson walking through this eyes areas slander Amazon CloudWatch events in areas key management OK
it a slender real quick show of hands who has either who served land 1st was to while also who's actually used it may be something in production a case about half the people there is a In my opinion 100 per cent comfortable saying if you walk away from anything with the session it's you should go play when the more because it really is the call so it's it's totally in my opinion change the way we think about computing and so just it kind a real quick talk about it it's whether you can think about it the way for you to run code without managing any kind of service infrastructures figure that right you literally don't have to worry about managing any kind of underlying underlying infrastructure you upload your code the service the service handle scaling it hails high-availability everything around managing maintaining that and they can CA code automatically triggered from a few different sources already their services and you can also call it directly as he can you know from any web or mobile application can is called when the function to so in our case for the purposes of all this alright and function pipeline that removes a node from the ship server automatically a surrogate are 1 instance that's OK and help us do that
really Amazon CloudWatch events of supply what events is also 1 of my new favorite services mostly due to the ability to use it in conjunction with land and so what CloudWatch events allows you to do is create a simple rule that matches an event and then routed to 1 or more targets also event can be something like an API call to another service either through a RESTful API Iranis decay working be something like an instance state change also maybe 1 instance goes from running to terminated and a target can be something like an arsonist topic in SQS queue or of the function so as promised starting recall % now we use watch events to create a rule that when a time instance exterminated will far off when the function at your actual cleanup and title together and make sure we do the
securely were in use AWS key management service for kms parliament the hard thing about encryption is really Nanjing keys and so what can masses cement service that makes it easy for you to create and control your encryption keys used to encrypt indeed cryptid nothing it's starting kms is just simply a key management service and certain user to encrypt a copy of a private key or private certificate that to authenticate worship server so each time function its call will go ahead and decrypt on a flying kms animal securely authenticate 2 ships
OK posters them OK so as a mentioned
right this in Python so supports 3 languages today us we for Python no JS in java for java there can be any JVM-based language like closure scholar such a thing each supported language we also have any of its STK associated with those in several other languages but with lambda and the box you will get support for the STK of the language of your choice so in my case news but of 3 piling will show while there so important about a 3 SDK and also you can import third-party modules or other libraries to with your currency that is limited to the code that you write or the article that's available to you package everything up as uploaded the land all your libraries everything you need a dependency they're all there you might be a listing on left-hand side garbage dependencies with this including up I chef the written and maintained by co Granger and of no might happen be here but if is thank you so much for that so using pi shelf along with those some important a few things and to setting up a few local variables to be used here the 1st function is log of and this is most interesting to some debugging stuff but the 1st interesting function like 0 here's this bit instance ID and this is important because the way CloudWatch events works as it passes adjacent object with a bunch of metadata in it to whatever your targets so in this case when I get my land the function fired off by CogWatch watch events so many adjacent object 1 2 things and including an instance ID and I have an attribute much of server with that instance ideas that when the crew mashups around to find a new to deleted the of annex interesting function here is this get Pam answer this is gonna do you might call became SGD crypt my encrypted certificate so that we can securely authenticate and so this is dead symbol set up so a misreading unencrypted file actors encryptor followed I went out the 64 encoded school back then OK so here on the setting up of about 3 client calling him a service the Hong Kong is the Ducrot method and passing in that encryptors shifted literally that's it returns the decrypted secret back to me superior but then this handle function this is like people remain basically you can think it think about it as well and so in Maine all really doing is employing a shepherd API using pi shelf passing in my adequate cryptic credentials and some other parameters like much server I'm getting my instance I do from the J events I'm searching for that instance ID in the ship's server if I find it I deleted if I don't find it I do nothing and I move on of the land of free tears acts extremely generous you get a million invocations free per month so this is extremely cheap to set up as well valence something consul request this is what the way the Council looks like how you see it has 4 tabs across top actually looking at a function that already exists the 1st is code so is actually in browser code editor you don't see right now on this 1 because again I have a bunch of third-party models in their and stuff in so when you have more than 1 following x don't get access to the brother editor I'm going to show you what 1 looks like if you do I in properties because the screens quite stretch from but assisted simply dismay nice syntax highlighting pretty basic now of a lot of frills but it does work it's functional contestants and the browsers water particles it can only go back open in my when the function by the next of this configuration so again this rate picture a runtime to know just stop at pi Python on a new sign I am roller identity and access management role this is our permissions solar system 3 this allows you to really fine grained access to and a function just like you used to doing with pretty much every other service today it'll and function exactly what has access to all the resources of his 2 things no 1 can a description of course based on Advanced Settings so you might be wondering how much compute power to act to give it away and functions so the cheese you sign amount of memory to your land function you'll notice on there's no tabard there's no drop-down box for a computer on a working capacity of the 2 so those come proportional to the amount of memory you actually give you and the function so for example there's 128 megabytes is the lowest anomaly can give with 1 . 5 gigabytes being the most because of the 64 megabyte increments so if I get my function by the until megabytes of memory omega Morse compute power I'll show you in just a moment how you can actually go about sizing you in the functions will better ladies and built-in tools to do that and then there's a timeout values I believe the lack lenders 5 minutes now b consider appropriate time right there and if knew the PC supports a maybe a function is a talk to a resource uh in an RDF databases and PC or some other E C 2 instance and you see this is where you would set by eliminating c OK triggers this is how you win the function gets invoked the cashier multiple triggers for a land of functions there's more than 1 way you can invoke it you see here that I have a close watch events trigger set up already and there's other trees you can add their like for example maybe 1 of call and anytime a dynamo DB receives an update or any time in S 3 bucket has an object placed inside of it you can wrong and the function so there's a few other things on there were adding more more support for other data services
OK finally monitoring the considered a little miring here you can see the location can I get a little In a chart of their duration but really the cool thing had to pay attention to is there's a isALink and therefore you logs in CloudWatch the club watches that is our service that strings logs from various services to their inside the box with land idled along stream of anything you and it does capturing all the standard out standard and really actually at the top this is a very convenient at the end of every single LambdaRank run my because not assume it was just a little the at the end of every single Lamarana it's nice information about the and you see exactly how long ran so in this case the red for 1101 . 2 5 ms and use 31 megabytes of memory so this is again how you can sisal and a little bit more appropriately but they did 256 it's hitting 256 intake like 40 seconds run quality pilot Bob so this is a nice way to actually look at the I the looking crimewatch watch events we in a so how watch events this is the Council for we see a different rules that the I have 3 set up there including 1 for the chef no cleanup but let's create a new 1 so you can actually see how it goes so it's a super simple you can events inside the event drop down instance they change unification so again maybe entering the terminated state schedule schedule is also heads Lolita crime job he can replace worker nodes in job nodes with when the functions really cool the interviews API calls so again any almost any API call cross any other service you can trigger when the function in response to reduce do something else using my watch events the course scaling so just pick a state change us like specific state and terminated and so this is any so any instance at all that hits the term the and then the target you see we have when the function as topic SQS queue can use a stream and built in target but the target is a little they it's basically just synonymous with CloudWatch watch alarm so we could pick when the function and the lot function or did you also know so you can do multiple targets you can run things in parallel from my what events which is pretty and the OK next I'll talk about can real quick and this guy do a brief demo height actually encrypted decrypt something using a master key so that we can this Council there actually is no consonant can yet to go to I am more identity and access management in the Council very those in the bottom left this is in Kripke's encryption keys to just click that and that's kinase right so many creaky who's gonna college chef can't 2016 demo you can get a description to screen new customer master key but the 1st thing you do is assign some administrative permissions to the key basically who has access to modify permissions to a key and do things like check out the auditing of associated and roles there might have been role of the next step which looks suspiciously like the 1st step is actual usage so this is the user role that has the ability to encrypt in decrepit so this would be like an application for example and and best practices in the real world you wanna make sure you have a different role or user for every application that we're limiting the blast radius if you do have a key complement just keep that in mind just selected user here quick next had shoots out the I am policy just look at no it finish so crates Mikey and then once the consul loads seizure of demo so quick on that and I read a bunch information back here the summary we see the same bigger names on resource name the key idea up there again a key pulsory commodify it you consider to automatically rotate every year which is pretty nice and then ordered so once it's use taxi see the audit trail exactly you use who called encryption who call decryption that's exactly what's doing which is OK so copy the key here and I go over to my handy dandy cheat sheet some stuff in here this is where users and taking out really long commands OK so the 1st man in run some using the AWS CLI tools for it was that by the way as of this calling in crypt command here in passing a few flags like region because that's where the the reader where my keys in other key ID solidus paste a plain text file so a could admissions plain text file To says hello chef can't 2016 with a lot of excitement I can see so loops at the stratum right so far and then incur command on that plain text file is a packages on response and 1 of the keys in the responses cyphertext blog and so this is encrypted in base 64 encoded representation of that plaintext balances fellowship the now if we go back over and grabbed my next cheated command section do so this time instead of just don't be up to the string matching the right to encrypted file so this is a binary file focus of Spokane estimate txt it's a bunch of garbage in there now that's my my encrypted file my hello shove come from and so the last thing I'll do is now decrypted and the style passing that encrypted binary files some calling came as the crypt again the region the cyphertext blog which again is a binary file and a couple other flags and they're actually don't the output to the screen base 64 decoded so we can read it there you go so hellish of countries 16 so 1 interesting thing to note is you'll notice some idea could command I did not pass in a key idea that's because the key idea is actually embedded in the encrypted file so just 1 quick thing in the OK cool so we walk through all the parts not see their actions by here's my Chef Server new refreshing here a plane tricks on you I for nodes in there there's 2 windows boxes into Amazon Linux instances the governor my consul here refreshed nurse OK so here's my to Linux boxes I will terminate them and again this doesn't have to be manually terminate could be auto-scaling that terminated or know something else the provisions any any reason at all these ants get terminated by this process kicks off so again to recap or have a watch event that gets fired and trigger when the function is actually to learn a function that invoked because those 2 instances that were deleted each will have the instance ID with energies on object to my land a functional gravitons instance ID FIL color can canister decrepit my encrypted certificate and authenticate to shut server securely find the node and right so hopefully in that 5 seconds of talking is of now transition terminated the let's take a look at the Council but without 1 that the choice situations nestor now Ch parents once promised transition from running to terminated the the consider both gonna and OK well 1 of them's not to reading yet since postal transitioning don't take my word for it a promising works this is again like demo goal of them again actually before a diverse icassp in mind back of an experiment I'm using terraformed to two-digit provisioning and I think the users tactical terraform the ritual but that's long right to back to this the good
OK so likable resources here for you guys so I believe the slides will be made available after this for you guys to go look so don't forget to write this down our take a picture of the phone others that you have repo with all the code everything that I just walk through in some samples and nice documentation as well the blog post again walks so this is the this'll pride of 4 years a couple people taking pictures or give you 2 seconds because right next thing
is weren't about using Amazon E C 2 Run command which but how many people have used or heard around and they got what I expected OK but is actually pretty sweet Service and I
think of Windows users in particular you guys really out like this so run command is powered by an agent that runs on a server the instances and as the name implies you can use this to run scripts or commands on Linux and Windows servers without the need to SSH or have any when are and access to those instances so you need no remote access for those that's that's kind of magical part all you can also known all run command on your on-premises instances this is as of about 2 weeks ago so as long as ROS is supported there's a few flavors of Linux and Windows you can actually stole the Run command agent on your on-premises instances per servers in the manners into the same exact it of US Consul you would use for his E C 2 instances the API as decays everything so and so recommend is kind of an interesting solution for again running the brain commands on servers we may not have remote access you when I move away from managing remote access you can use it to really replace us and things you normally use knife to run for so I'll show you demonstrate how works and I'll talk about maybe some possible use cases for OK so it's
superserver 1 way maintain OK so 1st thing I'll show you is the Run command council us a few things that you I don't have is wrong command council
so there's a few things you can see on there there is a a command ID the instance ID the commands that run on and then a document name I can select the status requested they always kind of stuff also 1st they'll talk about is the document names so this is kind of run command terminology for the set direction a run on instance so that every document that it's 1 contains a set of commands and so there's documents a diverse provides you can write your own documents as well and so we click on a command you can see the a description here and in this paper is because the screen most but this output tab as well and so you can see exactly what happened you could view output yeah nice little snippet of some standard on standard error we consider commanded I saw the show you a command documents and documents urges J. son of files for simple that is a couple required keys 1 of which is schema version I believe 1 . 2 is the only scheme version right now and all these sort of parameters everything's documented on our sites all top touch on everything that's possible but just a few things that I have here costing of a description for a document and its parameters if think of parameters like variables basically and it'll come in handy in Desdemona shows the consul neurotic command Cecom pre-populated with some default so I should call to you this this document this 1 command document is for use on it Linux Linux server to install chef-client officially bootstrap chef-client elixir so announcing the version that I want chef-client install a bucket with some files in there like my client be in and a certificate actually up into 2 should serve for the 1st time the initial run list mashup environment of a good stuff the you see at the bottom runtime configured key and really most interesting thing here is is command I came here which the list but these are all the commands and I wanna run and so you can see in here showing up here you can see understanding several things in making a directory and grants and things from S 3 you'll see things here between the handlebars their moustaches the curly braces whatever you like to call them those are my parameters my variables and so they have be grabbing things grabbing on the truck installer and taking it off with an initial run OK to actually run command now is go back the consul he did you also do this through the appears in such a blustery the consul so the 1st thing you did is your command document were selected as I mentioned there's several documents we give you have a box but stuff around Windows installing updates joining in AD domain that is also 1 there's a generic 1 for links to this running a shell script you can pick and I also mentioned you can crayon documents and share them and you can do that either publicly or privately so if you have multiple AWS accounts you conditions between those accounts for you can open it up all for anybody to install the now pick my Chef Linux install shockwave and then target instances you automatically get a list of instances that you can run this command on and so this this list that they give you back is anything that has the wrong many is installed on it and matches the OS of a document that you selected so this case is getting Linux and says with the agent In is my parameters so here I could change any of these pre-populated them for a speed of demo just stick in there and then there's a timeout you'll notice is also has 3 book in here so I showed you that output tab earlier that's actually a truncated outputs to get like I forget how many characters that is but if you want full outputs and so this is useful if you when it crash dumps stack traces anything like that make she including S 3 bucket whenever you're running the command and so this lecture give you the full or the everything that comes out into groups in by like a Run command and hatch and then by instance ideas so it's organized for you so pick 1 analysis is again this is gonna go out it's going talk to each agent on each of those 2 Linux servers I selected agents kagome pull down the document that are specified in annex to the document locally of so why have 3 servers mashups rationally up to but once this run the should not have 5 guess or maybe a lot for a full induction of burning and so it's cyclic severe finished so I have 5 OK so I'm I to news servers and there you can see if I sorted by last checking which actually can do this if it is to to advance a few seconds densities remind you alliances as part of a front OK how we doing on time 10 minutes left OK so I had a demo to show using 1 actually do this 1st all talk about couple use cases for uncomment now switch over
Ch the OK the so a couple
ideas of from command again I have a repo of the stuff they should you yesterday and a demo so for free to go to that including some the wrong command document so you can use a samples in the canister well a good stuff couple things you might use chef on earth servant command for which they're interesting us chef volts to automatically refresher regenerate secrets when skilled instances come out so I know this kind of pain point now frost going around shuffle so you might use run command in conjunction again with landing by what events to do that I may run Chef inspect if you're not a chef compliance user he contributors with 1 command of maybe 1 rescue a group of nodes at a certain time or just generally again anything we don't necessarily have SSH or went on axis OK so we actually have a giveaway for Amazon echo and I have a little demo of using run commands with the echo but I have time for it so I'm gonna leave this here we're gonna walk around the today with root and work on the rumor tickets rather the 1 in honor Raphael editors mutated ticket I will figure out how organ trail it later if you have questions or you wanna see the Run command echo demo just stop by the end of this period I will be there all day today knowledge tomorrow so sorry let's do questions after only because we have Frank from connected on stage now and talk about how the net uses it Iverson
and we'll have a whole lot of time but again I will be at the booth all day today all day tomorrow but ask me any questions you want about anything I talked about or anything else right so what the French MIT fjk
they basis and Franklin Hansen unmanned around the Platform as a Service Delivery Team Internet and were responsible for putting together all the platform Tools Inc. integrations was chef areas for all or internal will uh you not familiar with the net uh where national and local newspaper and media brand of our national brand name is yesterday which is think most folks are are the most familiar with that if you don't having been a newspaper in here and I want a little about
how using a PC to an Amazon general and that's largely for our infrastructure testing pipeline can we deliver a little over 500 cookbooks continuously Internet and those are all based on the same pipeline service out all the time so that the most obvious tools I think our are the chefs in approach of server and supermarket I we maintain internal supermarket so that our users can stay in sync for their internal testing without having access back to the actual shift server itself on all of our CI pipeline is built on Jenkinson Jenkins itself is tied to a whole suite of tools which we use which are all cover some of the actual partners reading as well some of our internal tools on the partners rubbish they are easy to and using that much different ways and the most common is it helps if something was a provision a box we do that need easy to enact its bootstrapped and but also it is the underlying image that gets built for kitchen 2 runs at it's what Jake itself is running on a lot of the underlying sources and these are effective for Jan repositories to shorten the time it takes to damage chevrons for local testing reason very and those images are generated using an chefs 0 managed by the Jenkins I want that packer for publishing our images from EC to back to our internal infrastructure and scalar which is our cloud management platforms scalar sits and from more clouds to to allow users to self service at creating of structure and instruction that again without and getting our actual Chef Server keys or I and resources to talk a little about what we're testing on we care about several different things that we care about style both from a shaft perspective and from every perspective and we care about unit testing integration testing we stay very close to releases on real food critic for testing that we got a few rules that we care about food critic and that we don't don't actually fail on 1 of those is to avoid repetition of resource declarations so just as something comes up there has been an issue for us so pretty much everything else we fail or infrastructure on the rule copies is very much the same way we tried stays close can which can be pretty obnoxious sometimes as a recap changes on the cover from us and that really the only thing we we can set a globally as are lined on from unit testing perspective and we really try and strive for hydrogen coverages our as our test rollout on the that's subjective and based on what you're actually testing from a context and so it really falls down periods and is the same for sure respect I'm really trying to figure out which not really code-coverage but understanding what the purpose of the cookbook is an an are you actually testing the use cases that you going apply on the other thing we've been working on it is building and honor practices we worked with security teams to test using service back similar configurations for things like SSH D and firewall and as he likes and we started looking inspected transition that on that's something that's pretty new to us that so the coming
glue all these pieces together with built up a lot of internal chain this is this is borrowed code from other folks and stuff that's been built internally by our team and won the most important things that's been helpful for us is our skeleton skeleton for us as a way to wrap the shift I cookbook command and so allows us to build a framework for the spec testing and the style it's not on there we drop a rate file an hour . real copying will file just all the pieces so that developers can stay in sync with what we consider a good cookbook a connected on and some part of that is a is a missionary file on that we for us as our common way test on using bundle exec to manage our DMEs they're used and rank foul calls through each to those binaries for testing and just gives a common way for us to do that and it helps us paralyze the tests and easy to use and we we had a very large problem with once we got that to scale test cookbooks it takes for ever to get changes and so we have a lot of cookbooks with other dependencies and as we go through that chained update on we found that paralyzing a test suite and easy to have significantly cut down enough time build and we're also using a cookbook called kitchen test helper kids just offer has a couple different things that were doing the most useful for us had been storing node attributes from Marcia from so that means we were doing service that tests we can use the attribute from the cookbook itself to validate for installing a package version I don't have to hard the version I can say use the node attribute that I'm expecting to validate that's on there which is really helpful for things like the remote server spec testing to validate images and the other thing it does is moved our data bag knocking out of files inside the cookbooks into activities in the amplifier for kitchen and this allows us to override a lot easier and have a whole bunch of different data values to be used when we're marking home much of platforms outside of the tools that were bundling with octagons pipeline and we also have a script that validates good practices for us on how to deploy those cookbooks and kind the bureaucracy of running continues to point for us is how a managing versions are you maintaining a change a lot so that others can consume your version changes and make sure that their Jared tickets for us in the commits as big thing for us to tie back to 1st order what where the change came from and we also like dozens of using Windows to clean up instances they get left behind and in our case rattling off the shelf so because they're part of our kitchen easy to run so they're being giving it which of 0 and we still make sure that if we have a field kitchen run or if Jenkins slave goes offline that we don't leave a bunch of instances hanging around and for us to have to deal with so that was the turning land a script that runs hourly looking for untagged instances in our case and and cleaning of ones that we know there are no longer part of structure so depends you a
better idea of our workflow but we got 3 different pipelines and we have an image pipelined cookbook pipeline application pipeline all of them work a little bit together on as in each of the each of the artifacts for most pipelines usage each other so when we get to the end the image pipeline we're producing imageable for virtual box is testing locally as well as easy to image far production infrastructure and their use the testing the cookbook pipeline what we get to the Cookbook pipeline where we end up with cookbooks are valid for us to go back and validate whether new base images worked on when we get through the end of the base image around we create that in scalar with that node and make sure that we can actually power base Linux cookbooks on top of those images again to validate that what we've come up with has created a bug somewhere else system and our consumers have maintained their application pipeline much the same way so we have entirely disposable infrastructure cannot so all things we've deployed in the cloud can be destroyed at any time we just building back up again and that's that's been incredibly important for for how a maintaining chef in US to kind of hold that together force on and that having had the part of the pipeline as they move through means that they're running chef on every single point and they're running our kitchen provisioning and is to provisioning on every single point so I get just a couple
minutes left and just you on 2 questions are but still around fire the if you're are
Web Services
Rechenschieber
Systemprogrammierung
Auswahlaxiom
Dienst <Informatik>
Bit
Demo <Programm>
Wellenpaket
Rahmenproblem
Systemverwaltung
Profil <Aerodynamik>
Web Site
Homepage
Überlagerung <Mathematik>
Lineares Funktional
Digitales Zertifikat
Datennetz
Computersicherheit
Automatische Handlungsplanung
Kanalkapazität
Aussage <Mathematik>
Zeitzone
Ereignishorizont
Quick-Sort
Algorithmische Programmiersprache
Dialekt
Rechenschieber
Dienst <Informatik>
Variable
Chiffrierung
Fokalpunkt
Identitätsverwaltung
Elektronischer Programmführer
Computerarchitektur
Speicher <Informatik>
Streuungsdiagramm
Fehlermeldung
Streuungsdiagramm
Schätzwert
Befehl <Informatik>
Shape <Informatik>
Transformation <Mathematik>
Informationsmanager
Computersicherheit
Dualitätssatz
Datenmodell
Einfache Genauigkeit
Migration <Informatik>
Unternehmensarchitektur
Rechenschieber
Service provider
Informationsmodellierung
Twitter <Softwareplattform>
Flächeninhalt
Datennetz
Minimum
Computersicherheit
Ordnungsreduktion
Unternehmensarchitektur
Streuungsdiagramm
Normalvektor
Touchscreen
Resultante
Server
Web Site
Gruppenkeim
Iteration
Service provider
Raum-Zeit
Informationsmodellierung
Web Services
Datenmanagement
Migration <Informatik>
Vererbungshierarchie
Installation <Informatik>
Speicher <Informatik>
Schreib-Lese-Kopf
Verschiebungsoperator
Leistung <Physik>
Schreiben <Datenverarbeitung>
Zentrische Streckung
Template
Stichprobe
Ideal <Mathematik>
Schlussregel
Elektronische Unterschrift
EINKAUF <Programm>
Roboter
Beanspruchung
Dienst <Informatik>
Konfigurationsverwaltung
Mereologie
Server
Information
Unternehmensarchitektur
Standardabweichung
Instantiierung
Web Services
Lineares Funktional
App <Programm>
Datenmanagement
Systemaufruf
Quellcode
Computerunterstütztes Verfahren
Biprodukt
Ereignishorizont
Code
Benutzerbeteiligung
Knotenmenge
Dienst <Informatik>
Datenmanagement
Web Services
Flächeninhalt
Reelle Zahl
Server
Gammafunktion
Ereignishorizont
Lambda-Kalkül
Schlüsselverwaltung
Instantiierung
Web Services
Public-Key-Kryptosystem
NP-hartes Problem
Lineares Funktional
Digitales Zertifikat
Schlüsselverwaltung
REST <Informatik>
Ruhmasse
Systemaufruf
Schlussregel
Ereignishorizont
Schlussregel
Dienst <Informatik>
Datenmanagement
Web Services
Chiffrierung
Funktion <Mathematik>
Server
Authentifikation
Warteschlange
Ereignishorizont
Schlüsselverwaltung
Phasenumwandlung
Instantiierung
Mashup <Internet>
Bit
Momentenproblem
Freeware
Browser
Applet
Formale Sprache
Familie <Mathematik>
Computer
Steuerwerk
Netzwerktopologie
Metadaten
Deskriptive Statistik
Client
Web Services
Vorzeichen <Mathematik>
Auswahlaxiom
Parametersystem
Lineares Funktional
Kategorie <Mathematik>
Datenhaltung
Systemaufruf
Bitrate
Ereignishorizont
Texteditor
Dienst <Informatik>
Generator <Informatik>
Menge
Festspeicher
Ablöseblase
Server
Lambda-Kalkül
Instantiierung
Algebraisch abgeschlossener Körper
Quader
Wasserdampftafel
Abgeschlossene Menge
Code
Variable
Informationsmodellierung
Programmbibliothek
Konfigurationsraum
Demo <Programm>
Attributierte Grammatik
Leistung <Physik>
Touchscreen
Rechenzeit
Kanalkapazität
Mailing-Liste
Symboltabelle
Elektronische Publikation
Modul
Programmfehler
Objekt <Kategorie>
Identitätsverwaltung
Bit
Demo <Programm>
Prozess <Physik>
Web log
Selbstrepräsentation
Chiffre
Kartesische Koordinaten
Extrempunkt
Login
Streaming <Kommunikationstechnik>
Deskriptive Statistik
Web Services
Prozess <Informatik>
Kryptologie
Fahne <Mathematik>
Primzahlzwillinge
Bildschirmfenster
Minimum
Auswahlaxiom
Metropolitan area network
Funktion <Mathematik>
Lineares Funktional
Schießverfahren
Systemaufruf
Ereignishorizont
Scheduling
Dienst <Informatik>
Chiffrierung
Einheit <Mathematik>
Rechter Winkel
Festspeicher
Server
Garbentheorie
URL
Information
Schlüsselverwaltung
Aggregatzustand
Instantiierung
Standardabweichung
Zeichenkette
Ebene
Subtraktion
Quader
Gruppenoperation
Term
Loop
Knotenmenge
Weg <Topologie>
Binärdaten
Endogene Variable
Vererbungshierarchie
Warteschlange
Demo <Programm>
Touchscreen
Schätzwert
Radius
Digitales Zertifikat
Zwei
Einfache Genauigkeit
Schlussregel
Elektronische Publikation
Fokalpunkt
Objekt <Kategorie>
Energiedichte
Last
Mereologie
Identitätsverwaltung
Authentifikation
Wort <Informatik>
Kantenfärbung
Rechenschieber
Web log
Zwei
Stichprobenumfang
Code
Task
Mereologie
Bildschirmfenster
Server
Systemplattform
Skript <Programm>
Prozessautomation
Demo <Programm>
Instantiierung
Maschinenschreiben
Mashup <Internet>
Web Site
Demo <Programm>
Statistische Schlussweise
Nabel <Mathematik>
Quader
Versionsverwaltung
Stichprobenfehler
Richtung
Deskriptive Statistik
Variable
Multiplikation
Domain-Name
Bildschirmfenster
Skript <Programm>
Installation <Informatik>
Default
Demo <Programm>
Analysis
Touchscreen
Funktion <Mathematik>
Parametersystem
Digitales Zertifikat
Sichtenkonzept
Default
Zwei
Rechenzeit
Nummerung
Mailing-Liste
Elektronische Publikation
Binder <Informatik>
Quick-Sort
Dichte <Physik>
Zeichenkette
Menge
Konditionszahl
Mereologie
Server
Speicherabzug
Ablaufverfolgung
Versionsverwaltung
Schlüsselverwaltung
Verzeichnisdienst
Programmierumgebung
Standardabweichung
Instantiierung
Demo <Programm>
Punkt
Selbst organisierendes System
Güte der Anpassung
Gruppenkeim
Kartesische Koordinaten
Knotenmenge
Frequenz
Ereignishorizont
Texteditor
Knotenmenge
Weg <Topologie>
Gruppenkeim
Spannungsmessung <Mechanik>
Stichprobenumfang
Wurzel <Mathematik>
Ereignishorizont
Repository <Informatik>
Instantiierung
Stellenring
Komponententest
Desintegration <Mathematik>
Dokumentenserver
Datenmanagement
Aggregatzustand
Synchronisierung
IT infrastructure library
Skalarfeld
Internetworking
Spezialrechner
Web Services
Datenmanagement
Softwaretest
Verschiebungsoperator
Softwaretest
Web Services
Suite <Programmpaket>
Synchronisierung
Dokumentenserver
Computersicherheit
Stellenring
Ähnlichkeitsgeometrie
Quellcode
Frequenz
Einheit <Mathematik>
Deklarative Programmiersprache
Server
Schlüsselverwaltung
Server
Quader
Firewall
Multimedia
Gruppenoperation
Mathematisierung
Systemplattform
Kontextbezogenes System
Überlagerung <Mathematik>
Unternehmensarchitektur
Hypermedia
Service provider
Perspektive
Reelle Zahl
Datenstruktur
Konfigurationsraum
Bildgebendes Verfahren
Streuungsdiagramm
Systemplattform
Schlussregel
Integral
Flächeninhalt
Hypermedia
Basisvektor
Streuungsdiagramm
Bit
Punkt
Versionsverwaltung
Kartesische Koordinaten
Binärcode
Synchronisierung
Skalarfeld
Eins
Skeleton <Programmierung>
Web Services
Datenmanagement
Bildschirmfenster
Speicherabzug
Skript <Programm>
Lambda-Kalkül
Kette <Mathematik>
Verschiebungsoperator
Softwaretest
Suite <Programmpaket>
Zentrische Streckung
Achtort
Systemaufruf
Bitrate
Biprodukt
Arithmetisches Mittel
Verkettung <Informatik>
Datenfeld
Suite <Programmpaket>
Server
Ordnung <Mathematik>
Versionsverwaltung
Faserbündel
Instantiierung
Subtraktion
Server
Quader
Mathematisierung
Framework <Informatik>
Code
Knotenmenge
Rangstatistik
Skript <Programm>
Softwareentwickler
Datenstruktur
Bildgebendes Verfahren
Attributierte Grammatik
Leistung <Physik>
Physikalisches System
Elektronische Publikation
Programmfehler
Mereologie
Attributierte Grammatik
Streuungsdiagramm

Metadaten

Formale Metadaten

Titel Cooking with AWS - July 12, 2016
Serientitel ChefConf 2016
Autor Campbell, Josh
Lizenz CC-Namensnennung - Weitergabe unter gleichen Bedingungen 3.0 Unported:
Sie dürfen das Werk bzw. den Inhalt zu jedem legalen und nicht-kommerziellen Zweck nutzen, verändern und in unveränderter oder veränderter Form vervielfältigen, verbreiten und öffentlich zugänglich machen, sofern Sie den Namen des Autors/Rechteinhabers in der von ihm festgelegten Weise nennen und das Werk bzw. diesen Inhalt auch in veränderter Form nur unter den Bedingungen dieser Lizenz weitergeben.
DOI 10.5446/34626
Herausgeber Confreaks, LLC
Erscheinungsjahr 2016
Sprache Englisch

Inhaltliche Metadaten

Fachgebiet Informatik
Abstract Looking for some ways to spice up your Chef usage on AWS? In this session we'll show you how to leverage services like AWS Lambda, AWS Key Management Service (KMS), Amazon CloudWatch Events, and Amazon EC2 Run Command with Chef. We'll introduce the AWS services and demo how they can be used to better manage your Chef nodes. Gannett, a leading media company and publisher of USA Today, will also join us to talk about how they build, test, and deliver over 400 cookbooks on AWS. They'll talk tools and process for building AMI's and managing 1,000 Jenkins jobs to continuously deliver their Chef environment.

Ähnliche Filme

Loading...
Feedback