Skip to main content

Home/ Arquitectura?/ Group items tagged resource-managers

Rss Feed Group items tagged

Pablo Lalloni

Introduction - Terraform - 2 views

  •  
    "Terraform is a tool for building, changing, and versioning infrastructure safely and efficiently. Terraform can manage existing and popular service providers as well as custom in-house solutions. Configuration files describe to Terraform the components needed to run a single application or your entire datacenter. Terraform generates an execution plan describing what it will do to reach the desired state, and then executes it to build the described infrastructure. As the configuration changes, Terraform is able to determine what changed and create incremental execution plans which can be applied. The infrastructure Terraform can manage includes low-level components such as compute instances, storage, and networking, as well as high-level components such as DNS entries, SaaS features, etc. The key features of Terraform are: Infrastructure as Code: Infrastructure is described using a high-level configuration syntax. This allows a blueprint of your datacenter to be versioned and treated as you would any other code. Additionally, infrastructure can be shared and re-used. Execution Plans: Terraform has a "planning" step where it generates an execution plan. The execution plan shows what Terraform will do when you call apply. This lets you avoid any surprises when Terraform manipulates infrastructure. Resource Graph: Terraform builds a graph of all your resources, and parallelizes the creation and modification of any non-dependent resources. Because of this, Terraform builds infrastructure as efficiently as possible, and operators get insight into dependencies in their infrastructure. Change Automation: Complex changesets can be applied to your infrastructure with minimal human interaction. With the previously mentioned execution plan and resource graph, you know exactly what Terraform will change and in what order, avoiding many possible human errors."
Pablo Lalloni

AWS | Amazon EC2 Container Service | Container Management - 0 views

  •  
    "Amazon EC2 Container Service (ECS) is a highly scalable, high performance container management service that supports Docker containers and allows you to easily run applications on a managed cluster of Amazon EC2 instances. Amazon ECS eliminates the need for you to install, operate, and scale your own cluster management infrastructure. With simple API calls, you can launch and stop container-enabled applications, query the complete state of your cluster, and access many familiar features like security groups, Elastic Load Balancing, EBS volumes, and IAM roles. You can use Amazon ECS to schedule the placement of containers across your cluster based on your resource needs and availability requirements. You can also integrate your own scheduler or third-party schedulers to meet business or application specific requirements."
Pablo Lalloni

Arquillian - 1 views

  •  
    Arquillian brings the test to the runtime so you don't have to manage the runtime from the test (or the build). Arquillian eliminates this burden by covering all aspects of test execution, which includes: Managing the lifecycle of the container (or containers) Bundling the test case, dependent classes and resources into a ShrinkWrap archive (or archives) Deploying the archive (or archives) to the container (or containers) Enriching the test case by providing dependency injection and other declarative services Executing the tests inside (or against) the container Capturing the results and returning them to the test runner for reporting
Pablo Lalloni

Getting Started With OpenAM - 0 views

  • OpenAM centralizes authentication by using a variety of authentication modules. Authentication modules connect to identity repositories that store identities and provide authentication services. The identity repositories can be implemented as LDAP directories, relational databases, RADIUS, Windows authentication, one-time password services, other standards-based access management systems and much more.
  • OpenAM centralizes authorization by letting you use OpenAM to manage access policies separate from applications and resources. Instead of building access policy into a web application, you install a policy agent with the web application to request policy decisions from OpenAM. This way you can avoid issues that could arise when developers must embed policy decisions into their applications. With OpenAM, if policy changes or an issue is found after the application is deployed, you have only to change the policy definition in OpenAM, not deploy a new version of the application. OpenAM makes the authorization decisions, and policy agents enforce the decisions on OpenAM's behalf.
  •  
    "OpenAM centralizes authentication by using a variety of authentication modules. Authentication modules connect to identity repositories that store identities and provide authentication services. The identity repositories can be implemented as LDAP directories, relational databases, RADIUS, Windows authentication, one-time password services, other standards-based access management systems and much more."
Pablo Lalloni

Clocker - Creating a Docker Cloud with Apache Brooklyn « Cloudsoft - 0 views

  •  
    "Clocker features: Automatically create and manage multiple Docker hosts in cloud infrastructure Intelligent container placement, providing: resilience fault tolerance easy scaling maximum resource utilisation of hosts maximum application performance Use of any public or private cloud as the underlying infrastructure for Docker Hosts Deployment of existing Brooklyn/CAMP blueprints to Docker locations, without modification."
Pablo Lalloni

http://resources.idgenterprise.com/original/AST-0137772_WebSphere_Portal_Version_8.0_Re... - 0 views

  •  
    IBM WebSphere Portal and Web Content Manager Version 8.0.0.1 Reviewer's guide
Pablo Lalloni

DRBL - 2 views

  •  
    DRBL (Diskless Remote Boot in Linux) is a solution to managing the deployment of the GNU/Linux operating system across many clients. Imagine the time required to install GNU/Linux on 40, 30, or even 10 client machines individually! DRBL allows for the configuration all of your client computers by installing just one server machine. DRBL provides a diskless or systemless environment for client machines. It works on Debian, Ubuntu, Mandriva, Red Hat, Fedora, CentOS and SuSE. DRBL uses distributed hardware resources and makes it possible for clients to fully access local hardware.
Pablo Lalloni

http://resources.idgenterprise.com/original/AST-0124388_FINAL_High-Tech_Companies_Grow_... - 1 views

  •  
    High-Tech Companies Grow Quickly and Efficiently with eSignatures
munyeco

OpenAM Administration Guide - 0 views

  • An authentication service confirms the identity of a user or a client application.
  • OpenAM is most frequently used to protect web-accessible resources. Users browse to a protected web application page. An agent installed on the server with the web application redirects the user to OpenAM for access management. OpenAM determines who the user is, and whether the user has the right to access the protected page. OpenAM then redirects the user back to the protected page, with authorization credentials that can be verified by the agent. The agent allows OpenAM authorized users access the page.
1 - 11 of 11
Showing 20 items per page