Books & Videos

Table of Contents

  1. Getting Started

    1. Chapter 1 Introduction

      1. What Is MCollective?
      2. Why Parallel Execution?
      3. How MCollective Works
      4. Why Use MCollective
      5. How to Fail with MCollective
      6. Time to Get Started
    2. Chapter 2 Installation

      1. Requirements
      2. Where to Install
      3. Passwords and Keys
      4. Puppet Labs Repository
      5. Configuring ActiveMQ
      6. Installing Servers
      7. Creating a Client
      8. Installing from Source
      9. Testing Your Installation
      10. Troubleshooting
    3. Chapter 3 Command-Line Client

      1. Configuration File
      2. Connector
      3. Facts
      4. Inventory
      5. Discovery
      6. Filters
      7. Limits
      8. Output
      9. Classes
      10. Bash Completion
    4. Chapter 4 Web Clients

      1. Puppet Enterprise
      2. mcomaster
    5. Chapter 5 Agent and Client Plugins

      1. Connector Plugins
      2. Installing Agents from Packages
      3. Installing Agents from Source
      4. Notify mcollectived
      5. Disabling Agents
      6. Using Client Plugins
      7. Finding Community Plugins
      8. Recommended Plugins
    6. Chapter 6 Maintenance

      1. Time Sync
      2. Keeping Sessions Alive
      3. Activating Changes
      4. Server Statistics
      5. Logging
      6. Monitoring Servers
    7. Chapter 7 Configuration Management

      1. Puppet
      2. Chef
    8. Chapter 8 Controlling Puppet Agent

      1. Install the Puppet Agent
      2. Checking Puppet Status
      3. Controlling the Puppet Daemon
      4. Invoking Ad Hoc Puppet Runs
      5. Manipulating Puppet Resource Types
    9. Chapter 9 Waking the Chef

      1. Install the Chef Agent
      2. Checking Chef Status
      3. Invoking Ad Hoc Chef Client Runs
  2. Complex Installations

    1. Chapter 10 Middleware Configuration

      1. Messaging Brokers
      2. Network Security
      3. IPv6 Dual-Stack Environments
      4. ActiveMQ Config Structure
      5. Detailed Configuration Review
      6. ActiveMQ Clusters
      7. Large-Scale Broker Configurations
    2. Chapter 11 Middleware Security

      1. Anonymous TLS
      2. CA-Verified TLS Servers
      3. Validate keyStore and trustStore
      4. CA-Verified TLS Clients
      5. Conclusion
    3. Chapter 12 Creating Collectives

      1. Deciding When to Create More
      2. Collectives != Clustering
      3. Configuration Traffic
      4. Localizing Traffic
      5. Limiting Access
      6. Conclusion
    4. Chapter 13 MCollective Security

      1. How Authentication Works
      2. Pre-Shared Key Authentication
      3. SSL Authentication
      4. RSA Authentication AES Encryption
      5. SSHKey Authentication
      6. Authorization
      7. Auditing
      8. Conclusion
    5. Chapter 14 Challenges of Worldwide Parallelism

  3. Custom Plugins

    1. Chapter 15 Building an Agent

      1. SimpleRPC Framework
      2. Start with a Baseline
      3. Validate Input
      4. Send Replies
      5. Define an Agent DDL
      6. Read Config Files
      7. Install Your Agent
      8. Testing the Agent
    2. Chapter 16 Extending the Agent

      1. Executing Scripts
      2. Executing Commands
      3. Accessing Facts, Agents, and Classes
      4. Results and Exceptions
      5. Logging
    3. Chapter 17 Creating a Client Application

      1. Baseline Client
      2. Client Filters
      3. Results and Exceptions
      4. Install Your Client
    4. Chapter 18 Processing Multiple Actions

    5. Chapter 19 Making a Standalone Client

      1. Baseline Client Program
      2. Running Your Program
    6. Chapter 20 Creating Other Plugins

      1. Authorization Plugins
      2. Facts Plugins
    7. Chapter 21 Processing Registration Data

      1. Registration Agent
      2. Registration Collector
      3. Registration and SSL Security
    8. Chapter 22 Collecting Responses

      1. Create a Listener
      2. Submit reply-to
      3. Process Responses
    9. Chapter 23 Running MCollective Without Root

    10. Chapter 24 Downloading the Code

  4. Putting It All Together

    1. Chapter 25 Use Best Practices

      1. Make Use of Configuration Management
      2. Choose the Best Discovery Method
      3. Authorize and Audit Each Request
    2. Chapter 26 Grow Your Deployment

      1. Consider the Strings Analogy
      2. Utilize Support Resources
      3. Read Blogs