Description
After this step in the series you'll be able to continue from any machine, anywhere, even a Chromebook!
We finished the previous step, Install OpenERP using a SaltStack state file, with OpenERP up and running in a Salt minion. Inappropriately for a production-grade service, we installed it in a disposable pay-by-the-hour virtual machine.
We finished the previous step, Install OpenERP using a SaltStack state file, with OpenERP up and running in a Salt minion. Inappropriately for a production-grade service, we installed it in a disposable pay-by-the-hour virtual machine.
On the other hand, for occasionally required services such as a Salt master, pay-by-the-hour VMs like iwstack.com's are a boon for several reasons: cost and security.
I have a very lightweight VM (384MB) with a minuscule virtual disk for my administrative work.  It's dead for most of its life.  When I need to work on a client's machines -- off site back up, for example -- I attach their admin virtual disk to my little admin VM, boot it up, do my housekeeping work, like saving a backup copy, and kill it again.
I used to use SSH for that work, but really regretted it one day when a client had an emergency and I was hours away from access to any copy of my SSH private key.
Now, my SysAdmin work day involves :
- Logging into iwStack.com
 - Booting up my admin VM
 - Logging into the GateOne terminal of the admin VM using my Google ID
 - Finding all my old terminal sessions up, running and logged back in
 - Dusting the shelves and mopping the floor
 - Killing my admin VM
 - Logging out of iwStack.com
 
Here's the video:
Tasks performed
- Make the Master also be it's own minion, check that both daemons are running and have the Master accept the Minion's keys
 - Finalize the Salt state stack for GateOne, link it into Salt's path and then run it
 - Start up GateOne
 - Access GateOne by IP address in the browser.
 - Fix the missing "origin" in GateOne's configuration
 - Restart GateOne, and gain clear anonymous access to it
 - Ensure we are already logged in to Google
 - Switch the "auth" configuration parameter from "none" to "google"
 - Restart GateOne, and get automatically redirected to Google's confirmation page
 - Confirm our trust in the GateOne page
 - Gain clear authenticated access to GateOne
 - Use GateOne's identity manager to create an SSH key pair.
 - Ensure SSH is intalled and that a .ssh directory exists with correct permissions
 - Add the public key to tour authorized keys file
 - Open an SSH session with the server, authenticate with SSH keys instead of UID/PWD
 
No comments:
Post a Comment