This is the use of free time to write the CMDB project, the function is relatively simple, we are interested can add my friends to develop together,: LJCMNXSupport Asset Management, host management, Bastion Machine management, network management, contract management several major modulesCode path:Https://github.com/lijiecm/rainbowIf there is a use, the function is required, you can put the functions you need to write, reasonable words, I meet as soon
This specification is formulated to ensure that the underlying data, such as system name, app name, SLB name, ECS name, and so on, is standardized in the CMDB.1, the name can only be composed of letters and numbers, not with underscores, dots and other special characters.For example: Appfinweb, Appsendmessageservice, AppAdmin2 are the correct naming methods. Fin_web, Fin.web is the wrong naming method.2, the first letter to uppercase, if there are mul
Tags: python CMDBI. Overview of the CMDBThe composition of the CMDB mainly has the background management, the central control machine, the server.Background management is divided into the background management page and the central control machine Exchange data API.Users through the Background Management page input host information, the control machine through the API to obtain the IP list, the control machine according to the IP to obtain the correspo
650) this.width=650; "src=" http://s1.51cto.com/wyfs02/M00/89/DC/wKioL1ggFeHDYLSKAABksSjGocc705.jpg "style=" height : auto;vertical-align:middle;border:0px; "title=" 0.jpg "alt=" Wkiol1ggfehdylskaabkssjgocc705.jpg "/>In recent years, domestic and foreign CMDB failure cases abound, few successes, some questioned the CMDB is dead? but a variety of business scenarios show that the current data center operation
The CMDB crawls service information in many ways, using automated tools Saltstack, Ansible, puppet, or using other modules to directly SSH remote connections to fetch server information. Here is a record of using the Ansible API interface to invoke the Setup module fetch.Experiment using two machines
Ip
System
Software
192.168.93.137
Centos6.5_x64
Ansible 1.9.4
192.168.93.128
Cento
Tags: system software server information hardware recordsThe CMDB crawls service information in many ways, using automated tools Saltstack, Ansible, puppet, or using other modules to directly SSH remote connections to fetch server information. Here is a record of using the Ansible API interface to invoke the Setup module fetch.Experiment using two machines
Ip
System
Software
192.168.93.137
Centos6.5_x64
Created on June 6, 2017 @author: louts1th Session Work 10minutesDisplay page, only login to display, not logged in will pop up a login box, is a masking layer2nd Course Automation Road and CMBD status 22minutes cmdb: automatic installation configuration management system cmdb Operations Asset Management System (all systems need to call the information here)--the core is located highchats echats
Description:in order to standardize the management of intranet server user password information, a set of CMDB system is deployed to manage it. First, environmental needs:For an introduction to the installation environment, a detailed description of the CMDB installation manual is also presented here:Hardware Environment :
CPU generally can
Memory Minimum is 2G
Minimum storage space is 60G
The prototype of the CMDB started on the 25 th has basically been completed in the second draft.
The first draft is purely a data structure design. Manually add data for mental verification. The first draft only configures the modeling data structure, and does not involve the configuration instance.
The second draft is a prototype verification of the data structure and Preliminary Exploration of the required technology. The process has been repeated s
'): # No processing when there's no error happend Data_set = {' asset_id ': self.asset_obj.id, ' Nam E ': Nic_item.get (' name '), ' SN ': nic_item.get (' sn '), ' macaddress ': NI C_item.get (' macaddress '), ' IPAddress ': Nic_item.get (' IPAddress '), ' B Onding ': nic_item.get (' bonding '), ' This network card is bound, is the client detection, my server side just detects this field ' ' Model ': nic_item.get (' Mo Del '), ' netmask ': Nic_item.get (' netmask '),} obj = Models. NIC (**data_
attack, but do not rule out the hacker speed faster than our speed, may wish to send the data to do a layer of encryption, and then the hacker's Internet speed early submitted to the server, also can not?Code area:############# #客户端 ############# #import requestsimport timeimport hashlibdef MD5 (ARG): MD5 = HASHLIB.MD5 () Md5.update (Arg.encode (' Utf-8 ')) return md5.hexdigest () key = ' asdfghjklmnbvcxz ' CTime = str (time.time ()) Client_ str = '%s|%s '% (key, ctime) CLIENT_MD5_STR
Tags: import ASI auto EXE mode init start Art ini1.start.py Script.run (): Executes the Run function--2.script.py Run Method--3. Judging mode (Agent/sshsalt)--4. Execute the agent/sshsalt--> in client.py5. Perform the exec_plugin corresponding to the/src/plugins/__init__.py in the respectiveMethod (__AGENT/__SALT/__SSH), __init__.py calls the configuration file in the settings.py, the Exec_plugin () method splits the modules and classes in the settings.py and executes eachplugins/directory of ba
Goal 1. Rebuild the current implementation
Code, Clear the model-instance from the architecture. 2. Take the complex configuration model as an example to implement configuration model = instantiation, impact analysis, and other operations. 3. Configuration Management introduction status,
Online --> checkout for change --> check in for review --> change online --> online check after going online --> online third, no... lazy. Restructuring this time is a lot easier, basically all in one breath.
Tags: Salt CMDB configuration Management Library650) this.width=650; "src=" http://s4.51cto.com/wyfs02/M01/89/C6/wKioL1gcPdCwZdLOAAHwf6ylcaQ035.jpg "style=" height : auto;vertical-align:middle;border:0px; "title=" banner.jpg "alt=" wkiol1gcpdcwzdloaahwf6ylcaq035.jpg "/>"With the development of the Internet + new situation, more and more enterprises are stepping into the dual state (stability-sensitive dual state) It era, the information environment is
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.