Description
After this step in the series you'll be able to continue from any machine, anywhere, even a Chromebook!
We finished the previous step, Install OpenERP using a SaltStack state file, with OpenERP up and running in a Salt minion. Inappropriately for a production-grade service, we installed it in a disposable pay-by-the-hour virtual machine.
We finished the previous step, Install OpenERP using a SaltStack state file, with OpenERP up and running in a Salt minion. Inappropriately for a production-grade service, we installed it in a disposable pay-by-the-hour virtual machine.
On the other hand, for occasionally required services such as a Salt master, pay-by-the-hour VMs like iwstack.com's are a boon for several reasons: cost and security.
I have a very lightweight VM (384MB) with a minuscule virtual disk for my administrative work. It's dead for most of its life. When I need to work on a client's machines -- off site back up, for example -- I attach their admin virtual disk to my little admin VM, boot it up, do my housekeeping work, like saving a backup copy, and kill it again.
I used to use SSH for that work, but really regretted it one day when a client had an emergency and I was hours away from access to any copy of my SSH private key.
Now, my SysAdmin work day involves :
- Logging into iwStack.com
- Booting up my admin VM
- Logging into the GateOne terminal of the admin VM using my Google ID
- Finding all my old terminal sessions up, running and logged back in
- Dusting the shelves and mopping the floor
- Killing my admin VM
- Logging out of iwStack.com
Here's the video:
Tasks performed
- Make the Master also be it's own minion, check that both daemons are running and have the Master accept the Minion's keys
- Finalize the Salt state stack for GateOne, link it into Salt's path and then run it
- Start up GateOne
- Access GateOne by IP address in the browser.
- Fix the missing "origin" in GateOne's configuration
- Restart GateOne, and gain clear anonymous access to it
- Ensure we are already logged in to Google
- Switch the "auth" configuration parameter from "none" to "google"
- Restart GateOne, and get automatically redirected to Google's confirmation page
- Confirm our trust in the GateOne page
- Gain clear authenticated access to GateOne
- Use GateOne's identity manager to create an SSH key pair.
- Ensure SSH is intalled and that a .ssh directory exists with correct permissions
- Add the public key to tour authorized keys file
- Open an SSH session with the server, authenticate with SSH keys instead of UID/PWD
No comments:
Post a Comment