自拍偷在线精品自拍偷,亚洲欧美中文日韩v在线观看不卡

自動化運維平臺puppet的高級應(yīng)用

運維 系統(tǒng)運維 自動化
到目前為止,資源申報、定義類、聲明類等所有功能都只能一個manifest文件中實現(xiàn),但這卻非有效的基于puppet管理IT資源架構(gòu)的方式。實踐中,一般需要把manifest文件分解成易于理解的結(jié)構(gòu)……

[[117453]]

一、模板的應(yīng)用

到目前為止,資源申報、定義類、聲明類等所有功能都只能一個manifest文件中實現(xiàn),但這卻非有效的基于puppet管理IT資源架構(gòu)的方式。實踐中,一般需要把manifest文件分解成易于理解的結(jié)構(gòu),例如將類文件、配置文件甚至包括后面講提到的模板文件等分類存放,并且通過某種機(jī)制在必要時將他們整合起來。這種機(jī)制即成為“模板”,它有助于結(jié)構(gòu)化、層次化的方式使用puppet,而puppet則基于“模塊自動裝載器”完成模塊裝載

從另一個角度來說,模板實際上就是一個按約定的、預(yù)定義的機(jī)構(gòu)存放了多個文件或子目錄的目錄,目錄里的這些文件或子目錄必須遵循其命名規(guī)范。puppet會按照這種規(guī)范在特定位置查找所需的模塊文件,不過,這些特定目錄頁可以通過puppet的配置參數(shù)modulepath定義

只要在某模塊中定于了一個類,就可以在任何manifest文件中使用它,puppet會自動去查找并裝載包含了這個類的定義的manifest文件任意使用它們。于是,基于模塊機(jī)制的puppet的主manifest文件就可以變得很小,也更易懂并能基于策略進(jìn)行定制

模塊目錄的結(jié)構(gòu)

在puppet中,模塊本身用一個目錄來表示,其需要存放于puppet的modulepath參數(shù)所定義的目錄中,如/etc/puppet/modules。模塊目錄名稱必須與模塊名稱相同,需要遵循特定的組織結(jié)構(gòu)

  • MODULE NAME
  • manifests
  • init.pp
  • files
  • templates
  • lib
  • tests
  • spec

MODULE NAME:模塊名稱,也即模塊目錄名稱:模塊只能以小寫字母開頭,可以包含小寫字母、數(shù)字和下劃線,但不能使用“main”和“settings”作為模塊名

manifests目錄:包含當(dāng)前模塊的所有manifest文件:每個manifest文件包含了一個類或一個定義的類型,此文件訪問路徑格式為“Modulename::[SubDirectoryName::]ManifestFileName”

init.pp:只能包含一個單獨的類定義,且類的名稱必須與模塊名稱相同

files目錄:包含了一組靜態(tài)的文件,這些文件可被站點下載使用:每個文件的訪問路徑都遵循puppet:///modules/MODELE_NAME/filename路徑格式

lib目錄:插件目錄,常用于自定義fact及自定義資源類型等

templates目錄:存儲了manifest用到的模板文件,其訪問路徑遵循template(‘ModulesName/TemplateName’)格式,后綴名應(yīng)該為.erb,關(guān)于模板文件詳細(xì)信息,后文有介紹

tests目錄:當(dāng)前模板的使用幫助或使用范例文件,類似如何聲明當(dāng)前模板中的類及定義的類型等

spec目錄:類似于tests目錄的功能,只不過,其是為lib目錄定義的各插件提供使用范例的

  1. [root@node1 ~]# mkdir -p /etc/puppet/modules/nginx/{manifests,files,templates,lib}
  2. [root@node1 ~]# cd /etc/puppet/modules/nginx/
  3. [root@node1 nginx]# cd manifests/
  4. [root@node1 manifests]# vi init.pp
  5. class nginx {
  6. package {'nginx':
  7. ensure => installed,
  8. name => nginx,
  9. }
  10. }
  11. [root@node1 manifests]# vi web.pp
  12. class nginx::web inherits nginx {
  13. service {'nginx':
  14. ensure => true,
  15. enable => true,
  16. name => nginx,
  17. require => Package['nginx'],
  18. }
  19. file{'web.conf':
  20. ensure =>file,
  21. source => "puppet:///modules/nginx/web.conf",
  22. path => '/etc/nginx/nginx.conf',
  23. notify => Service['nginx'],
  24. require => Package['nginx']
  25. }
  26. }
  27. [root@node1 manifests]# puppet apply -e 'include nginx::web'
  28. notice: /Stage[main]/Nginx/Package[nginx]/ensure: created
  29. notice: /Stage[main]/Nginx::Web/File[web.conf]/content: content changed '{md5}d9dfc198c249bb4ac341198a752b9458' to '{md5}33d2119b71f717ef4b981e9364530a39'
  30. notice: /Stage[main]/Nginx::Web/Service[nginx]/ensure: ensure changed 'stopped' to 'running'
  31. notice: Finished catalog run in 8.07 seconds
  32. [root@node1 manifests]# grep work /etc/nginx/nginx.conf
  33. worker_processes 2;

準(zhǔn)備nginx配置文件,并有意修改nginx的配置文件

  1. [root@node1 ~]# cp /etc/nginx/nginx.conf /etc/puppet/modules/nginx/files/web.conf
  2. [root@node1 ~]# grep worker_processes /etc/puppet/modules/nginx/files/web.conf
  3. worker_processes 2;

可以看到我們的配置執(zhí)行成功

使用模板配置文件

語法:<%= Ruby Expression %>:替代為表達(dá)式的值,在使用表達(dá)式時應(yīng)該使用@引用

<% ruby code %>:僅執(zhí)行代碼,不做任何替換,常用于條件判斷或循環(huán)語句、設(shè)定變量以及在輸出之前對數(shù)據(jù)進(jìn)行處理

<%# commit %>:注釋信息

<%%: 輸出<%

%%>:輸出%>

如上面的案例,在使用模板后

  1. [root@node1 manifests]# cp /etc/puppet/modules/nginx/files/web.conf /etc/puppet/modules/nginx/templates/conf.erb
  2. [root@node1 manifests]# grep work /etc/puppet/modules/nginx/templates/conf.erb
  3. worker_processes <%= @processorcount %>;
  4. 表示nginx的線程數(shù)按照cpu的個數(shù)來啟動
  5. 類應(yīng)該改為如下所示
  6. class nginx::web inherits nginx {
  7. service {'nginx':
  8. ensure => true,
  9. enable => true,
  10. name => nginx,
  11. require => Package['nginx'],
  12. }
  13. file{'web.conf':
  14. ensure =>file,
  15. content =>template('nginx/conf.erb'),
  16. path => '/etc/nginx/nginx.conf',
  17. notify => Service['nginx'],
  18. require => Package['nginx']
  19. }
  20. }
  21. [root@node1 manifests]# puppet apply -e 'include nginx::web'
  22. notice: /Stage[main]/Nginx/Package[nginx]/ensure: created
  23. notice: /Stage[main]/Nginx::Web/Service[nginx]/ensure: ensure changed 'stopped' to 'running'
  24. notice: Finished catalog run in 8.25 seconds
  25. [root@node1 manifests]# grep work /etc/nginx/nginx.conf
  26. worker_processes 1;

#p#

二、master/agent

應(yīng)用場景:

統(tǒng)一資源管理軟件

統(tǒng)一配置系統(tǒng)優(yōu)化參數(shù)

定期檢測服務(wù)器是否運行

主機(jī)上的軟件配置合理的屬性

1.安裝

前提:配置實用epel的yum源,而后使用yum命令安裝即可

環(huán)境規(guī)劃

192.168.1.201 puppet-server端

192.168.1.202 puppet-agent端

安裝部署puppet服務(wù)器端

  1. [root@node1 manifests]# yum install puppet-server

安裝部署puppet客戶端

  1. [root@node2 ~]# yum install puppet -y

2.解析雙方主機(jī)

解析雙方主機(jī),可以使用DNS和hosts文件,由于本處實驗的緣故,故使用的為/etc/hosts文件來解析雙方主機(jī)

建議的主機(jī)命名方式:

角色名-運營商-機(jī)房名-機(jī)器ip.域名

  1. [root@node1 manifests]# cat /etc/hosts
  2. 127.0.0.1 localhost localhost.localdomain localhost4 localhost4.localdomain4
  3. ::1 localhost localhost.localdomain localhost6 localhost6.localdomain6
  4. 172.16.0.1 server.magelinux.com server
  5. 192.168.1.201 node1.wangfeng7399.com node1
  6. 192.168.1.202 node2.wangfeng7399.com node2
  7. 192.168.1.203 node3.wangfeng7399.com node3
  8. 192.168.1.204 node4.wangfeng7399.com node4

3.啟動

1)啟動puppet服務(wù)器端

收起啟動puppet守護(hù)進(jìn)程時,其會自動進(jìn)行運行環(huán)境的初始化,例如創(chuàng)建一個本地CA及服務(wù)器端相關(guān)的證書和密鑰等。初始化操作完成后,puppet就會監(jiān)聽指定的套接字并等待客戶端的連接請求。默認(rèn)情況下,其證書和密鑰等文件位于/var/lib/puppet/ssl目錄中

出于調(diào)試的目的,建議***啟動puppet服務(wù)進(jìn)程可以以非守護(hù)進(jìn)程方式進(jìn)行,并讓其輸出詳細(xì)信息以便于觀察初始化過程,如下所示,其逐步展示了創(chuàng)建本地主叫向CA申請證書、獲得證書以及CA移除證書簽署請求的過程等,而后啟動服務(wù)進(jìn)程并準(zhǔn)備接受各agent端的連接請求

  1. [root@node1 manifests]# puppet master --no-daemonize --debug
  2. [root@node1 manifests]# puppet master --no-daemonize --debug
  3. debug: Failed to load library 'rubygems' for feature 'rubygems'
  4. debug: Puppet::Type::User::ProviderDirectoryservice: file /usr/bin/dscl does not exist
  5. debug: Puppet::Type::User::ProviderPw: file pw does not exist
  6. debug: Puppet::Type::User::ProviderUser_role_add: file roledel does not exist
  7. debug: Puppet::Type::User::ProviderLdap: true value when expecting false
  8. debug: /File[/var/lib/puppet/facts]: Autorequiring File[/var/lib/puppet]
  9. debug: /File[/var/lib/puppet/ssl/certs/ca.pem]: Autorequiring File[/var/lib/puppet/ssl/certs]
  10. debug: /File[/etc/puppet/manifests]: Autorequiring File[/etc/puppet]
  11. debug: /File[/var/lib/puppet/bucket]: Autorequiring File[/var/lib/puppet]
  12. debug: /File[/var/lib/puppet/ssl/private_keys/node1.wangfeng7399.com.pem]: Autorequiring File[/var/lib/puppet/ssl/private_keys]
  13. debug: /File[/var/lib/puppet/ssl/private_keys]: Autorequiring File[/var/lib/puppet/ssl]
  14. debug: /File[/var/lib/puppet/server_data]: Autorequiring File[/var/lib/puppet]
  15. debug: /File[/var/lib/puppet/rrd]: Autorequiring File[/var/lib/puppet]
  16. debug: /File[/etc/puppet/puppet.conf]: Autorequiring File[/etc/puppet]
  17. debug: /File[/var/lib/puppet/ssl/crl.pem]: Autorequiring File[/var/lib/puppet/ssl]
  18. debug: /File[/etc/puppet/auth.conf]: Autorequiring File[/etc/puppet]
  19. debug: /File[/var/lib/puppet/ssl/private]: Autorequiring File[/var/lib/puppet/ssl]
  20. debug: /File[/var/lib/puppet/ssl/public_keys/node1.wangfeng7399.com.pem]: Autorequiring File[/var/lib/puppet/ssl/public_keys]
  21. debug: /File[/etc/puppet/fileserver.conf]: Autorequiring File[/etc/puppet]
  22. debug: /File[/var/lib/puppet/ssl/certs/node1.wangfeng7399.com.pem]: Autorequiring File[/var/lib/puppet/ssl/certs]
  23. debug: /File[/var/lib/puppet/yaml]: Autorequiring File[/var/lib/puppet]
  24. debug: /File[/var/lib/puppet/state]: Autorequiring File[/var/lib/puppet]
  25. debug: /File[/var/lib/puppet/lib]: Autorequiring File[/var/lib/puppet]
  26. debug: /File[/var/lib/puppet/ssl]: Autorequiring File[/var/lib/puppet]
  27. debug: /File[/var/log/puppet/masterhttp.log]: Autorequiring File[/var/log/puppet]
  28. debug: /File[/var/lib/puppet/ssl/certificate_requests]: Autorequiring File[/var/lib/puppet/ssl]
  29. debug: /File[/var/lib/puppet/ssl/certs]: Autorequiring File[/var/lib/puppet/ssl]
  30. debug: /File[/var/lib/puppet/reports]: Autorequiring File[/var/lib/puppet]
  31. debug: /File[/var/lib/puppet/ssl/public_keys]: Autorequiring File[/var/lib/puppet/ssl]
  32. debug: /File[/var/lib/puppet/ssl/public_keys/node1.wangfeng7399.com.pem]/mode: mode changed '0640' to '0644'
  33. debug: /File[/var/lib/puppet/ssl/private_keys/node1.wangfeng7399.com.pem]/mode: mode changed '0640' to '0600'
  34. debug: /File[/var/lib/puppet/ssl/certs/node1.wangfeng7399.com.pem]/mode: mode changed '0640' to '0644'
  35. debug: Finishing transaction 70240930059560
  36. debug: /File[/var/lib/puppet/ssl/ca/serial]: Autorequiring File[/var/lib/puppet/ssl/ca]
  37. debug: /File[/var/lib/puppet/ssl/ca/inventory.txt]: Autorequiring File[/var/lib/puppet/ssl/ca]
  38. debug: /File[/var/lib/puppet/ssl/ca/private]: Autorequiring File[/var/lib/puppet/ssl/ca]
  39. debug: /File[/var/lib/puppet/ssl/ca/private/ca.pass]: Autorequiring File[/var/lib/puppet/ssl/ca/private]
  40. debug: /File[/var/lib/puppet/ssl/ca/signed]: Autorequiring File[/var/lib/puppet/ssl/ca]
  41. debug: /File[/var/lib/puppet/ssl/ca/requests]: Autorequiring File[/var/lib/puppet/ssl/ca]
  42. debug: /File[/var/lib/puppet/ssl/ca/ca_key.pem]: Autorequiring File[/var/lib/puppet/ssl/ca]
  43. debug: /File[/var/lib/puppet/ssl/ca/ca_pub.pem]: Autorequiring File[/var/lib/puppet/ssl/ca]
  44. debug: /File[/var/lib/puppet/ssl/ca/ca_crt.pem]: Autorequiring File[/var/lib/puppet/ssl/ca]
  45. debug: /File[/var/lib/puppet/ssl/ca/ca_crl.pem]: Autorequiring File[/var/lib/puppet/ssl/ca]
  46. debug: /File[/var/lib/puppet/ssl/ca/ca_crt.pem]/mode: mode changed '0640' to '0660'
  47. debug: /File[/var/lib/puppet/ssl/ca/ca_crl.pem]/mode: mode changed '0644' to '0664'
  48. debug: /File[/var/lib/puppet/ssl/ca/ca_key.pem]/mode: mode changed '0640' to '0660'
  49. debug: /File[/var/lib/puppet/ssl/ca/private/ca.pass]/mode: mode changed '0640' to '0660'
  50. debug: Finishing transaction 70240928434340
  51. debug: Using cached certificate for ca
  52. debug: Using cached certificate for ca
  53. debug: Using cached certificate for node1.wangfeng7399.com
  54. notice: Starting Puppet master version 2.7.25

使用puppet master --genconfig可以查看服務(wù)器端的配置信息,建議將其輸出到/etc/puppet/puppet.conf中

  1. [root@node1 ~]# puppet master --genconfig >> /etc/puppet/puppet.conf

注意:如果此前曾以其主機(jī)名或各種原因啟動過puppet客戶端過程并完成過初始化,其證書文件將無法符合本次啟動的需要:此時,需要先情況/var/lib/puppet/ssl目錄方可完成后續(xù)的初始化操作

如上述的測試啟動沒有問題,可終止當(dāng)前的啟動后將其以守護(hù)進(jìn)程方式啟動

  1. [root@node1 ~]# service puppetmaster start
  2. Starting puppetmaster: [ OK ]
  3. [root@node1 ~]# chkconfig puppetmaster on

2)啟動puppet客戶端

puppet agent在***啟動時,會想起指定的puppet server申請證書,并完成后續(xù)連接請求,同樣的理由,處于測試的目的,接入當(dāng)前puppet集群中的***agent節(jié)點可以以非守護(hù)進(jìn)程的方式運行,以觀察其初始化過程

  1. [root@node2 ~]# puppet agent --server=node1.wangfeng7399.com --no-daemonize --debug
  2. info: Creating a new SSL key for node2.wangfeng7399.com
  3. info: Caching certificate for ca
  4. info: Creating a new SSL certificate request for node2.wangfeng7399.com
  5. info: Certificate Request fingerprint (md5): BC:B2:36:9F:B5:78:CD:60:1E:72:9A:D5:88:DE:4B:57

此時,在puppet服務(wù)器端使用puppet cert命令管理客戶端的證書請求,其--list選項能夠查看等待簽署證書的客戶端列表,而--sign選項可用于為指定節(jié)點簽署證書,如果要一次性地多個節(jié)點證書申請進(jìn)行簽署可以使用--all選項

  1. [root@node1 ~]# puppet cert --list
  2. "node2.wangfeng7399.com" (BC:B2:36:9F:B5:78:CD:60:1E:72:9A:D5:88:DE:4B:57)
  3. [root@node1 ~]# puppet cert --sign node2.wangfeng7399.com
  4. notice: Signed certificate request for node2.wangfeng7399.com
  5. notice: Removing file Puppet::SSL::CertificateRequest node2.wangfeng7399.com at '/var/lib/puppet/ssl/ca/requests/node2.wangfeng7399.com.pem'

一旦agent節(jié)點收到簽署過的證書,其將會顯示如下信息

  1. info: Caching certificate for node2.wangfeng7399.com
  2. notice: Starting Puppet client version 2.7.25

確保上述agent相關(guān)操作不存在問題后,便可以將--server選項指定的信息存儲與agent的配置文件中,并以服務(wù)的方式啟動puppet agent了。其配置文件為/etc/puppet/puppet.conf,配置完整既可以期待能夠puppet

  1. [root@node2 ~]# echo "server=node1.wangfeng7399.com" >> /etc/puppet/puppet.conf
  2. [root@node2 ~]# service puppet start
  3. Starting puppet: [ OK ]
  4. [root@node2 ~]# chkconfig puppet on

#p#

4.授權(quán)訪問

在puppet服務(wù)器端的/etc/puppet/manifests/中創(chuàng)建site.pp,在master/agent時,所有節(jié)點清單文件入口文件為site.pp

  1. node node2.wangfeng7399.com {
  2. incldue nginx::web
  3. }

建議:一類節(jié)點使用一個清單文件,所有清單文件都在site.pp中使用improt包含進(jìn)來,清單文件修改后應(yīng)重啟文件

5.自動簽發(fā)證書

可以設(shè)置master自動簽發(fā)所有的證書,我們只需要在/etc/puppet目錄下創(chuàng)建autosign.conf文件即可

  1. [root@node1 ~]# echo "*.wangfeng7399.com" > /etc/puppet/autosign.conf

這樣就會對所有來自magedu.conf的機(jī)器的請求自動簽署證書

6.puppet kick功能實現(xiàn)

puppet客戶端默認(rèn)每30分鐘很服務(wù)器通訊一次,但是有時,我們希望服務(wù)器能夠給客戶端緊急推送一些人物,于是就有了puppet kick(puppet 2.6以前叫puppetrun)

1)編輯客戶端配置文件/etc/puppet/puppet.conf在[agent]端中添加如下

  1. root@node2 ~]# echo "listen=true" >> /etc/puppet/puppet.conf
  2. [root@node2 puppet]# ss -tnl
  3. State Recv-Q Send-Q Local Address:Port Peer Address:Port
  4. LISTEN 0 5 *:8139 *:*

2)在客戶端編輯或創(chuàng)建新文件/etc/puppet/namespaceauth.conf,包含下面內(nèi)容

  1. [puppetrunner]
  2. allow *.wangfeng7399.com

3)在客戶端編輯文件auth.conf,添加如下內(nèi)容

  1. path /run
  2. method save
  3. auth any
  4. allow *.wangfeng7399.com

4)推送方法,在服務(wù)器端運行命令

  1. [root@node1 puppet]# puppet kick -p 10 node2.wangfeng7399.com
  2. Triggering node2.wangfeng7399.com
  3. Getting status
  4. status is success
  5. node2.wangfeng7399.com finished with exit code 0
  6. Finished

查看node2

  1. [root@node2 puppet]# rpm -q nginx
  2. nginx-1.0.15-5.el6.x86_64
  3. [root@node2 puppet]# grep work /etc/nginx/nginx.conf
  4. worker_processes 1;

錯誤信息,慘痛的教訓(xùn),客戶端一致在報這個錯誤

  1. err: Could not retrieve catalog from remote server: SSL_connect returned=1 errno=0 state=SSLv3 read server certificate B: certificate verify failed: [certificate is not yet valid for /CN=Puppet CA: node1.wangfeng7399.com]
  2. warning: Not using cache on failed catalog
  3. err: Could not retrieve catalog; skipping run
  4. debug: report supports formats: b64_zlib_yaml pson raw yaml; using pson
  5. err: Could not send report: SSL_connect returned=1 errno=0 state=SSLv3 read server certificate B: certificate verify failed: [certificate is not yet valid for /CN=Puppet CA: node1.wangfeng7399.com]

解決方法:

兩臺服務(wù)器需要時間同步

7.安裝配置puppet-dashboard

1)安裝

  1. [root@node1 puppet]# rpm -ivh http://yum.puppetlabs.com/puppetlabs-release-el-6.noarch.rpm //安裝官方通過的yum倉庫
  2. [root@node1 puppet]# yum install puppet-dashboard -y
  3. [root@node1 puppet]# yum install mysql-server mysql -y

2)數(shù)據(jù)庫授權(quán)

  1. mysql> create database dashboard character set utf8;
  2. Query OK, 1 row affected (0.00 sec)
  3. mysql> grant all on dashboard.* to 'dbuser'@'192.168.1.%' identified by 'wangfeng7399';
  4. Query OK, 0 rows affected (0.00 sec)
  5. mysql> flush privileges;
  6. Query OK, 0 rows affected (0.00 sec)

3)修改配置文件,dashboard的配置文件為/usr/share/puppet-dashboard/config/database.yml,修改如下參數(shù)

  1. production:
  2. host:192.168.1.201
  3. database: dashboard
  4. username: dbuser
  5. password:wangfeng7399
  6. encoding: utf8
  7. adapter: mysql

為dashboard導(dǎo)入依賴的數(shù)據(jù)表

  1. [root@node1 config]# gem install rake
  2. [root@node1 puppet]# cd /usr/share/puppet-dashboard/config
  3. [root@node1 config]# rake gems::refresh_specs
  4. [root@node1 config]# rake RAILS_ENV=production db:migrate

啟動服務(wù)

  1. [root@node1 config]# service puppet-dashboard start
  2. Starting Puppet Dashboard: => Booting WEBrick
  3. => Rails 2.3.17 application starting on http://0.0.0.0:3000
  4. [ OK ]

4)配置puppet服務(wù)器和客戶端

服務(wù)器端配置

在puppetmaster的配置文件中添加如下內(nèi)容

  1. reports = store, http
  2. reporturl = http://192.168.1.201:3000/reports/upload
  3. 在[master]中添加

客戶端配置

  1. report=true
  2. 在[agent]中添加

配置完成后重啟puppet

5)測試

wKiom1N3ymDjIlBlAAKgVwMFy8Y726.jpg

還可以在頁面中添加節(jié)點和類文件

終于完成了,一個時間不同步弄了2小時才找出錯誤

原文鏈接:http://wangfeng7399.blog.51cto.com/3518031/1413038

責(zé)任編輯:牛小雨 來源: 51CTO
相關(guān)推薦

2012-05-05 21:43:27

puppet自動化運維

2013-04-16 14:55:21

自動化運維Puppet實戰(zhàn)

2012-05-05 21:28:44

2012-05-05 21:22:40

2012-05-05 21:48:43

puppet自動化運維

2012-05-05 22:27:46

puppet自動化運維

2012-05-04 19:45:30

puppet自動化運維

2012-05-05 21:03:35

puppet自動化運維

2012-05-05 22:10:13

puppet自動化運維

2012-10-22 14:54:48

2014-08-04 10:10:35

IT運維自動化運維

2017-10-13 13:14:35

互聯(lián)網(wǎng)

2018-06-23 07:31:05

2012-11-16 09:16:26

自動化運維

2017-12-21 09:46:53

運維自動化技術(shù)

2015-10-08 10:55:23

云服務(wù)自動化運維 ANSIBLE

2012-11-20 17:22:57

2013-12-19 15:52:08

自動化運維自動化運維工具Puppet

2024-06-11 10:41:14

2014-03-04 10:33:45

IT運維華三
點贊
收藏

51CTO技術(shù)棧公眾號