ºÝºÝߣshows by User: petems / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: petems / Mon, 03 Feb 2020 15:49:25 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: petems Head in the Clouds: Testing Infra as Code - Config Management 2020 /petems/head-in-the-clouds-testing-infra-as-code-config-management-2020 headinthecloudstestinginfraascode-configmanagement2020-200203154926
Infrastructure-as-code has been one of the key concepts within DevOps to allow the benefits of a full development cycle for infrastructure and allow better visibility of the operations process. However, when we're writing and applying this IaC, we're often interacting with disparate systems, often geographically dispersed and with very different API's and responses. To further complicate things, different teams also have different concerns: Will this break prod? Will this cost too much? Will this comply with our policies? We'll be discussing the different kinds of testing that organisations are doing, what tools are right for each job, and how to keep the various teams happy. To do that, we'll be giving some examples with most of the popular IaC tools, where policy fits in and even covering where testing blurs the lines with observability.]]>

Infrastructure-as-code has been one of the key concepts within DevOps to allow the benefits of a full development cycle for infrastructure and allow better visibility of the operations process. However, when we're writing and applying this IaC, we're often interacting with disparate systems, often geographically dispersed and with very different API's and responses. To further complicate things, different teams also have different concerns: Will this break prod? Will this cost too much? Will this comply with our policies? We'll be discussing the different kinds of testing that organisations are doing, what tools are right for each job, and how to keep the various teams happy. To do that, we'll be giving some examples with most of the popular IaC tools, where policy fits in and even covering where testing blurs the lines with observability.]]>
Mon, 03 Feb 2020 15:49:25 GMT /petems/head-in-the-clouds-testing-infra-as-code-config-management-2020 petems@slideshare.net(petems) Head in the Clouds: Testing Infra as Code - Config Management 2020 petems Infrastructure-as-code has been one of the key concepts within DevOps to allow the benefits of a full development cycle for infrastructure and allow better visibility of the operations process. However, when we're writing and applying this IaC, we're often interacting with disparate systems, often geographically dispersed and with very different API's and responses. To further complicate things, different teams also have different concerns: Will this break prod? Will this cost too much? Will this comply with our policies? We'll be discussing the different kinds of testing that organisations are doing, what tools are right for each job, and how to keep the various teams happy. To do that, we'll be giving some examples with most of the popular IaC tools, where policy fits in and even covering where testing blurs the lines with observability. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/headinthecloudstestinginfraascode-configmanagement2020-200203154926-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Infrastructure-as-code has been one of the key concepts within DevOps to allow the benefits of a full development cycle for infrastructure and allow better visibility of the operations process. However, when we&#39;re writing and applying this IaC, we&#39;re often interacting with disparate systems, often geographically dispersed and with very different API&#39;s and responses. To further complicate things, different teams also have different concerns: Will this break prod? Will this cost too much? Will this comply with our policies? We&#39;ll be discussing the different kinds of testing that organisations are doing, what tools are right for each job, and how to keep the various teams happy. To do that, we&#39;ll be giving some examples with most of the popular IaC tools, where policy fits in and even covering where testing blurs the lines with observability.
Head in the Clouds: Testing Infra as Code - Config Management 2020 from Peter Souter
]]>
479 0 https://cdn.slidesharecdn.com/ss_thumbnails/headinthecloudstestinginfraascode-configmanagement2020-200203154926-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
I don't know what I'm Doing: A newbie guide for Golang for DevOps /slideshow/i-dont-know-what-im-doing-a-newbie-guide-for-golang-for-devops/130592493 idontknowwhatimdoinganewbieguideforgolangfordevops-190205132544
Cfgmgmgtcamp 2019]]>

Cfgmgmgtcamp 2019]]>
Tue, 05 Feb 2019 13:25:44 GMT /slideshow/i-dont-know-what-im-doing-a-newbie-guide-for-golang-for-devops/130592493 petems@slideshare.net(petems) I don't know what I'm Doing: A newbie guide for Golang for DevOps petems Cfgmgmgtcamp 2019 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/idontknowwhatimdoinganewbieguideforgolangfordevops-190205132544-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cfgmgmgtcamp 2019
I don't know what I'm Doing: A newbie guide for Golang for DevOps from Peter Souter
]]>
491 1 https://cdn.slidesharecdn.com/ss_thumbnails/idontknowwhatimdoinganewbieguideforgolangfordevops-190205132544-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Consul Connect - EPAM SEC - 22nd september 2018 /petems/consul-connect-epam-sec-22nd-september-2018 consulconnect-epambelarus-22ndseptember2018-181221015250
A service mesh is necessary for organizations adopting microservices and dynamic cloud-native infrastructure. Traditional host-based network security must be replaced with modern service-based security to accommodate the highly dynamic nature of modern runtime environments. In this talk, we will look at Connect a significant new feature in Consul that provides secure service-to-service communication with automatic TLS encryption and identity-based authorization. We will look at the features of Connect, how to enable Connect in an existing Consul cluster and how easy it is to secure service-to-service communication using Connect. ]]>

A service mesh is necessary for organizations adopting microservices and dynamic cloud-native infrastructure. Traditional host-based network security must be replaced with modern service-based security to accommodate the highly dynamic nature of modern runtime environments. In this talk, we will look at Connect a significant new feature in Consul that provides secure service-to-service communication with automatic TLS encryption and identity-based authorization. We will look at the features of Connect, how to enable Connect in an existing Consul cluster and how easy it is to secure service-to-service communication using Connect. ]]>
Fri, 21 Dec 2018 01:52:50 GMT /petems/consul-connect-epam-sec-22nd-september-2018 petems@slideshare.net(petems) Consul Connect - EPAM SEC - 22nd september 2018 petems A service mesh is necessary for organizations adopting microservices and dynamic cloud-native infrastructure. Traditional host-based network security must be replaced with modern service-based security to accommodate the highly dynamic nature of modern runtime environments. In this talk, we will look at Connect a significant new feature in Consul that provides secure service-to-service communication with automatic TLS encryption and identity-based authorization. We will look at the features of Connect, how to enable Connect in an existing Consul cluster and how easy it is to secure service-to-service communication using Connect. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/consulconnect-epambelarus-22ndseptember2018-181221015250-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A service mesh is necessary for organizations adopting microservices and dynamic cloud-native infrastructure. Traditional host-based network security must be replaced with modern service-based security to accommodate the highly dynamic nature of modern runtime environments. In this talk, we will look at Connect a significant new feature in Consul that provides secure service-to-service communication with automatic TLS encryption and identity-based authorization. We will look at the features of Connect, how to enable Connect in an existing Consul cluster and how easy it is to secure service-to-service communication using Connect.
Consul Connect - EPAM SEC - 22nd september 2018 from Peter Souter
]]>
368 1 https://cdn.slidesharecdn.com/ss_thumbnails/consulconnect-epambelarus-22ndseptember2018-181221015250-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Monitoring a Vault and Consul cluster - 24th May 2018 /slideshow/monitoring-a-vault-and-consul-cluster-24th-may-2018/126405987 londonhug-monitoringavaultandconsulcluster-24thmay2018-181221015249
Vault is an open source solution for identity and secrets management. Vault is well suited for both public cloud and private datacenter usage, but a common challenge is securely running Vault and accessing secrets in public cloud. This talk will show how to securely run Vault in the cloud, and be able to access those secrets securely from multiple differing cloud platforms. Additionally, the Vault 0.10 release is right around the corner and includes some major changes to improve the lives of both beginners and advanced users of Vault. We’ll spend some time looking at the latest features in Vault, and use these throughout the talk.]]>

Vault is an open source solution for identity and secrets management. Vault is well suited for both public cloud and private datacenter usage, but a common challenge is securely running Vault and accessing secrets in public cloud. This talk will show how to securely run Vault in the cloud, and be able to access those secrets securely from multiple differing cloud platforms. Additionally, the Vault 0.10 release is right around the corner and includes some major changes to improve the lives of both beginners and advanced users of Vault. We’ll spend some time looking at the latest features in Vault, and use these throughout the talk.]]>
Fri, 21 Dec 2018 01:52:49 GMT /slideshow/monitoring-a-vault-and-consul-cluster-24th-may-2018/126405987 petems@slideshare.net(petems) Monitoring a Vault and Consul cluster - 24th May 2018 petems Vault is an open source solution for identity and secrets management. Vault is well suited for both public cloud and private datacenter usage, but a common challenge is securely running Vault and accessing secrets in public cloud. This talk will show how to securely run Vault in the cloud, and be able to access those secrets securely from multiple differing cloud platforms. Additionally, the Vault 0.10 release is right around the corner and includes some major changes to improve the lives of both beginners and advanced users of Vault. We’ll spend some time looking at the latest features in Vault, and use these throughout the talk. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/londonhug-monitoringavaultandconsulcluster-24thmay2018-181221015249-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Vault is an open source solution for identity and secrets management. Vault is well suited for both public cloud and private datacenter usage, but a common challenge is securely running Vault and accessing secrets in public cloud. This talk will show how to securely run Vault in the cloud, and be able to access those secrets securely from multiple differing cloud platforms. Additionally, the Vault 0.10 release is right around the corner and includes some major changes to improve the lives of both beginners and advanced users of Vault. We’ll spend some time looking at the latest features in Vault, and use these throughout the talk.
Monitoring a Vault and Consul cluster - 24th May 2018 from Peter Souter
]]>
773 1 https://cdn.slidesharecdn.com/ss_thumbnails/londonhug-monitoringavaultandconsulcluster-24thmay2018-181221015249-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Maintaining Layer 8 /petems/maintaining-layer-8-75196679 maintaininglayer81-170419222251
Your most important piece of equipment is yourself so we will talk us through the basics of good ergonomics at our desks and how he has put this into practice throughout his career.]]>

Your most important piece of equipment is yourself so we will talk us through the basics of good ergonomics at our desks and how he has put this into practice throughout his career.]]>
Wed, 19 Apr 2017 22:22:51 GMT /petems/maintaining-layer-8-75196679 petems@slideshare.net(petems) Maintaining Layer 8 petems Your most important piece of equipment is yourself so we will talk us through the basics of good ergonomics at our desks and how he has put this into practice throughout his career. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/maintaininglayer81-170419222251-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Your most important piece of equipment is yourself so we will talk us through the basics of good ergonomics at our desks and how he has put this into practice throughout his career.
Maintaining Layer 8 from Peter Souter
]]>
493 8 https://cdn.slidesharecdn.com/ss_thumbnails/maintaininglayer81-170419222251-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Knee deep in the undef - Tales from refactoring old Puppet codebases /slideshow/knee-deep-in-the-undef-tales-from-refactoring-old-puppet-codebases/71872627 kneedeepintheundef-talesfromrefactoringoldpuppetcodebases-170207171032
As Puppet pushes into it’s second decade of reign, there are several organisations out there that have been using Puppet for a long time. Sometimes, even since the beginning! With the EOL announcement Puppet 3.X release, we’ve had a number of customers approach us to help with their upgrade. Normally the upgrade itself is fairly, it’s the code base that gives the biggest challenge, especially those with over 3 years of organic growth. So let’s spread the word of common anti-patterns and issues that can come back to bite you We’ll be talking about how Hiera is both the best and worst thing to happen to Puppet, marvel at how people were happily running 0.2 Puppet in production and what hacky solutions that seemed good at the time will come back to bite you! By the end of this, you’ll hopefully have learnt how to make sure that your Puppet code is defensively coded to to make sure your Puppet code base is healthy for the next decade!]]>

As Puppet pushes into it’s second decade of reign, there are several organisations out there that have been using Puppet for a long time. Sometimes, even since the beginning! With the EOL announcement Puppet 3.X release, we’ve had a number of customers approach us to help with their upgrade. Normally the upgrade itself is fairly, it’s the code base that gives the biggest challenge, especially those with over 3 years of organic growth. So let’s spread the word of common anti-patterns and issues that can come back to bite you We’ll be talking about how Hiera is both the best and worst thing to happen to Puppet, marvel at how people were happily running 0.2 Puppet in production and what hacky solutions that seemed good at the time will come back to bite you! By the end of this, you’ll hopefully have learnt how to make sure that your Puppet code is defensively coded to to make sure your Puppet code base is healthy for the next decade!]]>
Tue, 07 Feb 2017 17:10:32 GMT /slideshow/knee-deep-in-the-undef-tales-from-refactoring-old-puppet-codebases/71872627 petems@slideshare.net(petems) Knee deep in the undef - Tales from refactoring old Puppet codebases petems As Puppet pushes into it’s second decade of reign, there are several organisations out there that have been using Puppet for a long time. Sometimes, even since the beginning! With the EOL announcement Puppet 3.X release, we’ve had a number of customers approach us to help with their upgrade. Normally the upgrade itself is fairly, it’s the code base that gives the biggest challenge, especially those with over 3 years of organic growth. So let’s spread the word of common anti-patterns and issues that can come back to bite you We’ll be talking about how Hiera is both the best and worst thing to happen to Puppet, marvel at how people were happily running 0.2 Puppet in production and what hacky solutions that seemed good at the time will come back to bite you! By the end of this, you’ll hopefully have learnt how to make sure that your Puppet code is defensively coded to to make sure your Puppet code base is healthy for the next decade! <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/kneedeepintheundef-talesfromrefactoringoldpuppetcodebases-170207171032-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> As Puppet pushes into it’s second decade of reign, there are several organisations out there that have been using Puppet for a long time. Sometimes, even since the beginning! With the EOL announcement Puppet 3.X release, we’ve had a number of customers approach us to help with their upgrade. Normally the upgrade itself is fairly, it’s the code base that gives the biggest challenge, especially those with over 3 years of organic growth. So let’s spread the word of common anti-patterns and issues that can come back to bite you We’ll be talking about how Hiera is both the best and worst thing to happen to Puppet, marvel at how people were happily running 0.2 Puppet in production and what hacky solutions that seemed good at the time will come back to bite you! By the end of this, you’ll hopefully have learnt how to make sure that your Puppet code is defensively coded to to make sure your Puppet code base is healthy for the next decade!
Knee deep in the undef - Tales from refactoring old Puppet codebases from Peter Souter
]]>
590 6 https://cdn.slidesharecdn.com/ss_thumbnails/kneedeepintheundef-talesfromrefactoringoldpuppetcodebases-170207171032-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Compliance and auditing with Puppet /slideshow/compliance-and-auditing-with-puppet/71863486 complianceandauditingwithpuppet1-170207135948
If you work with or at a Telco, Financial Institution or a Government entity, you probably already know about compliance and the various acronyms and headaches it can bring. How can we make this less of a painful process? Well, if you think about it: compliance is a set of rules that someone has given you to enforce and prove that they're being enforced. What is Puppet? A series of rules for systems that need to be enforced. So compliance is the perfect use-case for configuration management.]]>

If you work with or at a Telco, Financial Institution or a Government entity, you probably already know about compliance and the various acronyms and headaches it can bring. How can we make this less of a painful process? Well, if you think about it: compliance is a set of rules that someone has given you to enforce and prove that they're being enforced. What is Puppet? A series of rules for systems that need to be enforced. So compliance is the perfect use-case for configuration management.]]>
Tue, 07 Feb 2017 13:59:47 GMT /slideshow/compliance-and-auditing-with-puppet/71863486 petems@slideshare.net(petems) Compliance and auditing with Puppet petems If you work with or at a Telco, Financial Institution or a Government entity, you probably already know about compliance and the various acronyms and headaches it can bring. How can we make this less of a painful process? Well, if you think about it: compliance is a set of rules that someone has given you to enforce and prove that they're being enforced. What is Puppet? A series of rules for systems that need to be enforced. So compliance is the perfect use-case for configuration management. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/complianceandauditingwithpuppet1-170207135948-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> If you work with or at a Telco, Financial Institution or a Government entity, you probably already know about compliance and the various acronyms and headaches it can bring. How can we make this less of a painful process? Well, if you think about it: compliance is a set of rules that someone has given you to enforce and prove that they&#39;re being enforced. What is Puppet? A series of rules for systems that need to be enforced. So compliance is the perfect use-case for configuration management.
Compliance and auditing with Puppet from Peter Souter
]]>
3879 4 https://cdn.slidesharecdn.com/ss_thumbnails/complianceandauditingwithpuppet1-170207135948-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Lock it down /slideshow/lock-it-down/57735553 lockitdown-160201142959
Puppet is an awesome tool to automate the configuration of your infrastructure, but it's also a potential attack vector. In this talk, we'll discuss some common patterns and changes you can make to harden your Puppet infrastructure, from the basic good practises such as data abstraction in modules, to some advanced customisation you might need in a high-security setup.]]>

Puppet is an awesome tool to automate the configuration of your infrastructure, but it's also a potential attack vector. In this talk, we'll discuss some common patterns and changes you can make to harden your Puppet infrastructure, from the basic good practises such as data abstraction in modules, to some advanced customisation you might need in a high-security setup.]]>
Mon, 01 Feb 2016 14:29:59 GMT /slideshow/lock-it-down/57735553 petems@slideshare.net(petems) Lock it down petems Puppet is an awesome tool to automate the configuration of your infrastructure, but it's also a potential attack vector. In this talk, we'll discuss some common patterns and changes you can make to harden your Puppet infrastructure, from the basic good practises such as data abstraction in modules, to some advanced customisation you might need in a high-security setup. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/lockitdown-160201142959-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Puppet is an awesome tool to automate the configuration of your infrastructure, but it&#39;s also a potential attack vector. In this talk, we&#39;ll discuss some common patterns and changes you can make to harden your Puppet infrastructure, from the basic good practises such as data abstraction in modules, to some advanced customisation you might need in a high-security setup.
Lock it down from Peter Souter
]]>
1058 5 https://cdn.slidesharecdn.com/ss_thumbnails/lockitdown-160201142959-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Hardening Your Config Management - Security and Attack Vectors in Config Management /slideshow/hardening-your-config-management-security-and-attack-vectors-in-config-management/57700256 hardeningyourconfigmanagement-160131140001
Configuration management is a great tool for helping with hardening and securing servers. But with any addition of new technology comes a new attack vector: Who watches the watchers? Security is painful. Luckily the invention of configuration management tools has made this process easier, by allowing repeatable configuration for common hardening. However there comes a catch-22: How do we harden the configuration management itself? When you have a tool that enables you to change systems at a fundamental level, it's a fairly tempting target for malicious agents, and one that would cause a lot of problems if compromised. We'll be discussing some general patterns we can use to mitigate these problems: - Whitelisting "master" API's - Encrypting sensitive data - Adding a security element to code review And we'll talk about some application specific options for some of most popular tools out there, such as Puppet, Chef, Ansible, cfengine and Salt.]]>

Configuration management is a great tool for helping with hardening and securing servers. But with any addition of new technology comes a new attack vector: Who watches the watchers? Security is painful. Luckily the invention of configuration management tools has made this process easier, by allowing repeatable configuration for common hardening. However there comes a catch-22: How do we harden the configuration management itself? When you have a tool that enables you to change systems at a fundamental level, it's a fairly tempting target for malicious agents, and one that would cause a lot of problems if compromised. We'll be discussing some general patterns we can use to mitigate these problems: - Whitelisting "master" API's - Encrypting sensitive data - Adding a security element to code review And we'll talk about some application specific options for some of most popular tools out there, such as Puppet, Chef, Ansible, cfengine and Salt.]]>
Sun, 31 Jan 2016 14:00:01 GMT /slideshow/hardening-your-config-management-security-and-attack-vectors-in-config-management/57700256 petems@slideshare.net(petems) Hardening Your Config Management - Security and Attack Vectors in Config Management petems Configuration management is a great tool for helping with hardening and securing servers. But with any addition of new technology comes a new attack vector: Who watches the watchers? Security is painful. Luckily the invention of configuration management tools has made this process easier, by allowing repeatable configuration for common hardening. However there comes a catch-22: How do we harden the configuration management itself? When you have a tool that enables you to change systems at a fundamental level, it's a fairly tempting target for malicious agents, and one that would cause a lot of problems if compromised. We'll be discussing some general patterns we can use to mitigate these problems: - Whitelisting "master" API's - Encrypting sensitive data - Adding a security element to code review And we'll talk about some application specific options for some of most popular tools out there, such as Puppet, Chef, Ansible, cfengine and Salt. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/hardeningyourconfigmanagement-160131140001-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Configuration management is a great tool for helping with hardening and securing servers. But with any addition of new technology comes a new attack vector: Who watches the watchers? Security is painful. Luckily the invention of configuration management tools has made this process easier, by allowing repeatable configuration for common hardening. However there comes a catch-22: How do we harden the configuration management itself? When you have a tool that enables you to change systems at a fundamental level, it&#39;s a fairly tempting target for malicious agents, and one that would cause a lot of problems if compromised. We&#39;ll be discussing some general patterns we can use to mitigate these problems: - Whitelisting &quot;master&quot; API&#39;s - Encrypting sensitive data - Adding a security element to code review And we&#39;ll talk about some application specific options for some of most popular tools out there, such as Puppet, Chef, Ansible, cfengine and Salt.
Hardening Your Config Management - Security and Attack Vectors in Config Management from Peter Souter
]]>
1022 8 https://cdn.slidesharecdn.com/ss_thumbnails/hardeningyourconfigmanagement-160131140001-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Puppet module anti patterns /slideshow/puppet-module-anti-patterns/39388973 puppetmoduleantipatterns-140922134047-phpapp02
A lightning talk I gave at Puppetconf 2014 about module anti-patterns! :)]]>

A lightning talk I gave at Puppetconf 2014 about module anti-patterns! :)]]>
Mon, 22 Sep 2014 13:40:47 GMT /slideshow/puppet-module-anti-patterns/39388973 petems@slideshare.net(petems) Puppet module anti patterns petems A lightning talk I gave at Puppetconf 2014 about module anti-patterns! :) <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/puppetmoduleantipatterns-140922134047-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A lightning talk I gave at Puppetconf 2014 about module anti-patterns! :)
Puppet module anti patterns from Peter Souter
]]>
785 2 https://cdn.slidesharecdn.com/ss_thumbnails/puppetmoduleantipatterns-140922134047-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Little Puppet Tools To Make Your Life Better /slideshow/little-puppet-tools-to-make-your-life-better/38028234 makeyourlifebetter-140815105054-phpapp02
A short talk I gave at the first Puppet User Group in London about three tools I made to make my Puppet life easier: * puppet-install-shell * vagrant-puppet-install * puppet-doc-lint]]>

A short talk I gave at the first Puppet User Group in London about three tools I made to make my Puppet life easier: * puppet-install-shell * vagrant-puppet-install * puppet-doc-lint]]>
Fri, 15 Aug 2014 10:50:54 GMT /slideshow/little-puppet-tools-to-make-your-life-better/38028234 petems@slideshare.net(petems) Little Puppet Tools To Make Your Life Better petems A short talk I gave at the first Puppet User Group in London about three tools I made to make my Puppet life easier: * puppet-install-shell * vagrant-puppet-install * puppet-doc-lint <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/makeyourlifebetter-140815105054-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A short talk I gave at the first Puppet User Group in London about three tools I made to make my Puppet life easier: * puppet-install-shell * vagrant-puppet-install * puppet-doc-lint
Little Puppet Tools To Make Your Life Better from Peter Souter
]]>
536 3 https://cdn.slidesharecdn.com/ss_thumbnails/makeyourlifebetter-140815105054-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Testing servers like software /slideshow/testing-servers-like-software/38028094 testingserverslikesoftware-140815104629-phpapp02
It's easy enough to test the correctness of the infracode we write with unit-tests and parsers, but testing it does what it's supposed to do in the enviornment itself is a little more challenging. In this talk, I'm going to talk about some of the tools and approaches to use to test your configuration automation tool of choice.]]>

It's easy enough to test the correctness of the infracode we write with unit-tests and parsers, but testing it does what it's supposed to do in the enviornment itself is a little more challenging. In this talk, I'm going to talk about some of the tools and approaches to use to test your configuration automation tool of choice.]]>
Fri, 15 Aug 2014 10:46:29 GMT /slideshow/testing-servers-like-software/38028094 petems@slideshare.net(petems) Testing servers like software petems It's easy enough to test the correctness of the infracode we write with unit-tests and parsers, but testing it does what it's supposed to do in the enviornment itself is a little more challenging. In this talk, I'm going to talk about some of the tools and approaches to use to test your configuration automation tool of choice. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/testingserverslikesoftware-140815104629-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> It&#39;s easy enough to test the correctness of the infracode we write with unit-tests and parsers, but testing it does what it&#39;s supposed to do in the enviornment itself is a little more challenging. In this talk, I&#39;m going to talk about some of the tools and approaches to use to test your configuration automation tool of choice.
Testing servers like software from Peter Souter
]]>
991 5 https://cdn.slidesharecdn.com/ss_thumbnails/testingserverslikesoftware-140815104629-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-petems-48x48.jpg?cb=1580744956 I'm a developer, operations engineer and consultant with over 5 years’ experience designing, maintaining and testing systems across a variety of platforms with a focus on enabling a DevOps culture. I've have worked on numerous projects in multiple companies, and has a wide knowledge of automated operations configuration and setting up application environments within multiple cloud providers. petersouter.co.uk https://cdn.slidesharecdn.com/ss_thumbnails/headinthecloudstestinginfraascode-configmanagement2020-200203154926-thumbnail.jpg?width=320&height=320&fit=bounds petems/head-in-the-clouds-testing-infra-as-code-config-management-2020 Head in the Clouds: Te... https://cdn.slidesharecdn.com/ss_thumbnails/idontknowwhatimdoinganewbieguideforgolangfordevops-190205132544-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/i-dont-know-what-im-doing-a-newbie-guide-for-golang-for-devops/130592493 I don&#39;t know what I&#39;m ... https://cdn.slidesharecdn.com/ss_thumbnails/consulconnect-epambelarus-22ndseptember2018-181221015250-thumbnail.jpg?width=320&height=320&fit=bounds petems/consul-connect-epam-sec-22nd-september-2018 Consul Connect - EPAM ...