SlideShare a Scribd company logo
Normation – CC-BY-SA
normation.com
Including existing systems
in configuration
management
Nicolas CHARLES nch@normation.com
@nico_charles
Normation – CC-BY-SA
normation.com
Issue
Most systems are still not automatically managed
● Configuration Management has recently become mainstream
● It's not yet an habit
● A lot of running systems predate configuration management
● Lack of upgrade paths (dependency to dead applications)
● Systems cannot be modified (lost knowledge)
● Systems with stale errors no-one can fix
Normation – CC-BY-SA
normation.com
Issue
Most systems are still not automatically managed
● Configuration Management has recently become mainstream
● It's not yet an habit
● A lot of running systems predate configuration management
● Lack of upgrade paths (dependency to dead applications)
● Systems cannot be modified (lost knowledge)
● Systems with stale errors no-one can fix
Why couldn't we benefit from cfgmgmt on these systems?
Normation – CC-BY-SA
normation.com
Why Rudder?
Rudder is very well suited for this use-case
● Support a lot of different OSes and heterogeneous systems
● Audit mode
● Web Interface
● API to add and extract data
Normation – CC-BY-SA
normation.com
Identifying systems
First, identify the systems and their role(s)
● It can be harder than expected
● Some systems may be known only by sub-parts of the team
● Roles may be unknown from most
● Select those in scope for cfgmgmt
● Having an up-to-date CMDB, Wiki, spreadsheet… helps a lot
Make a list of these systems
● In a spreadsheet
Normation – CC-BY-SA
normation.com
Identifying systems
Normation – CC-BY-SA
normation.com
Inventory systems
Make an inventory of all theses systems
● During maintenance windows, install Rudder agent
● Inventory will be sent to Rudder server
● Extract them with the API into the spreadsheet
● Set these nodes in Audit mode in Rudder
● Validate the roles
● Based on installed software and running processes
● Based on naming convention, networks
● Based on previous knowledge (expectation may not match reality)
Normation – CC-BY-SA
normation.com
Inventory systems
Normation – CC-BY-SA
normation.com
Group the systems
Multidimensional approach for grouping systems
● Per roles
● Nodes with same role ought to have 'identical' config
● Per security level
● Hardening, access rules, authorizations
● Per generation of system installation
● Installation procedures, best practices and know-how evolved over
time
● Per OS
● Per system type (physical server, embedded device, ...)
Normation – CC-BY-SA
normation.com
Group the systems
Extract common rules
● Based on documented procedures, available know-how, expectations
● List them in the spreadsheet, with
● Detailed Description
● Groups they should apply to
● Status in Rudder: implemented and compliant
Normation – CC-BY-SA
normation.com
Group the systems
Normation – CC-BY-SA
normation.com
Audit the rules
Configure the Rules and Directives in Rudder
● Use same names in Spreadsheet and in Rudder
● Rules and Directives in Audit mode
● Get compliance result
● Extract data using the API
Normation – CC-BY-SA
normation.com
Audit the rules
Normation – CC-BY-SA
normation.com
Audit the rules
Normation – CC-BY-SA
normation.com
Non compliance
For every non-compliance listed
● Is it expected?
● Should it be remediated?
● Yes, and it's straightforward – switch from Audit mode to Enforce
● May need to split in two Rules: one in Audit mode, one in
Enforce, and switch nodes from one Rule to another during
each maintenance windows
● Yes, but need to be done manually – correct manually on the
node during maintenance windows
● Yes, but risky: assess the expected risk/benefits
● Maybe some exceptions will be implemented
Normation – CC-BY-SA
normation.com
Validation
Validate your rules
● Spawn new systems (at least one per group)
● Check they become fully functional
● Detect rogue “live” parameters (like sysctl modified by hand)
● Ensure repeatability
Normation – CC-BY-SA
normation.com
Time estimate
Rough time estimates
● Identify systems: several hours per team members
● You may need to interview all teams members.
● Hidden benefit: explain to all of them the goal, and boost
acceptation of configuration management
● Agents install: 10 minutes to 1 hour per batch
● Deploy repository for each site, remote install, get inventories
● Role validation: minutes to days per role
● Review procedures, check what is on systems
● Logical system grouping:
● Depends on number of roles, exceptions, generations.
Normation – CC-BY-SA
normation.com
Time estimate
Rough time estimates
● Create spreadsheet: 4h to several days
● Depends on your skill, and amount of data to store there
● Rule creation:
● Couple of minutes to hours depending on complexity
● Measure compliance: 5 minutes – hours per rule
● Check what is not compliant, and document it
● Remediation plan:
● Very fast to “rewrite a procedure from scratch”
● Expect surprise
● Discover forgotten systems
● Discover major compliance issues
Normation – CC-BY-SA
normation.com
Time estimate
There will be delays
● Deal with maintenance windows
● Deal with freeze (August in France, December)
● Decisions on non-compliance remediation are not always easy
● Need to involve stakeholders
Normation – CC-BY-SA
normation.com
What are the benefits?
Standard configuration management benefits
● Awarness on the IT
● Improved reliability
● Improved productivity
Normation – CC-BY-SA
normation.com
What are the benefits?
More specific to this case
● Less outages due to stale errors
● Less outages thanks to uniformity
● Improved RTO
● Reduced surface of vulnerability
● A base to evolve your IT
Normation – CC-BY-SA
normation.com
Questions ?
Nicolas CHARLES nch@normation.com
@nico_charles

More Related Content

PPT
Nagios
PDF
Rudder: what's new and what's next? Roadmap, vision and thoughts
PDF
RUDDER - Continuous Configuration (configuration management + continuous aud...
PDF
Trevor McDonald - Nagios XI Under The Hood
PPTX
ModSecurity and NGINX: Tuning the OWASP Core Rule Set
PDF
Dave Williams - Nagios Log Server - Practical Experience
PDF
Nagios Conference 2013 - John Sellens - Monitoring Remote Locations with Nagios
PPTX
Cloud-based Virtualization for Test Automation
Nagios
Rudder: what's new and what's next? Roadmap, vision and thoughts
RUDDER - Continuous Configuration (configuration management + continuous aud...
Trevor McDonald - Nagios XI Under The Hood
ModSecurity and NGINX: Tuning the OWASP Core Rule Set
Dave Williams - Nagios Log Server - Practical Experience
Nagios Conference 2013 - John Sellens - Monitoring Remote Locations with Nagios
Cloud-based Virtualization for Test Automation

What's hot (20)

PDF
Monitor Your Business
PPTX
ChinaNetCloud Online Lecture:Something About Tshark
ODP
Nagios Conference 2014 - Mike Weber - Nagios Rapid Deployment Options
PPTX
ModSecurity and NGINX: Tuning the OWASP Core Rule Set - EMEA (Updated)
PPTX
Nagios Conference 2014 - Jim Prins - Passive Monitoring with Nagios
PPTX
Addressing DHCP and DNS scalability issues in OpenStack Neutron
PPT
EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...
PPTX
Nagios intro
ODP
Nagios Conference 2014 - Shamas Demoret - An Overview of Nagios Solutions
PDF
Nagios Conference 2012 - Scott Wilkerson - Passive Monitoring Solutions For R...
PDF
Alexei Vladishev - Zabbix - Monitoring Solution for Everyone
PPT
Presentation iv implementasi 802x eap tls peap mscha pv2
PDF
IPv6 at CSCS
PDF
图文详解安装Net backup 6.5备份恢复oracle 10g rac 数据库
ODP
PostgreSQL: Welcome To Total Security
PPT
Linux16 RPM
PPTX
Nagios Conference 2014 - Luis Contreras - Monitoring SAP System with Nagios Core
PPTX
Nagios Conference 2014 - Tanja Lewit - Nagios and Kentix System Partners - Cr...
ODP
Nagios Conference 2013 - Eric Stanley and Andy Brist - API and Nagios
PPS
Linux16 RPM
Monitor Your Business
ChinaNetCloud Online Lecture:Something About Tshark
Nagios Conference 2014 - Mike Weber - Nagios Rapid Deployment Options
ModSecurity and NGINX: Tuning the OWASP Core Rule Set - EMEA (Updated)
Nagios Conference 2014 - Jim Prins - Passive Monitoring with Nagios
Addressing DHCP and DNS scalability issues in OpenStack Neutron
EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...
Nagios intro
Nagios Conference 2014 - Shamas Demoret - An Overview of Nagios Solutions
Nagios Conference 2012 - Scott Wilkerson - Passive Monitoring Solutions For R...
Alexei Vladishev - Zabbix - Monitoring Solution for Everyone
Presentation iv implementasi 802x eap tls peap mscha pv2
IPv6 at CSCS
图文详解安装Net backup 6.5备份恢复oracle 10g rac 数据库
PostgreSQL: Welcome To Total Security
Linux16 RPM
Nagios Conference 2014 - Luis Contreras - Monitoring SAP System with Nagios Core
Nagios Conference 2014 - Tanja Lewit - Nagios and Kentix System Partners - Cr...
Nagios Conference 2013 - Eric Stanley and Andy Brist - API and Nagios
Linux16 RPM
Ad

Similar to Automating the manual - feedback on including existing systems in configuration management (20)

PDF
OSDC 2015: Benoit Peccatte | Sharing IT automation benefits in a team with Ru...
PDF
Rudder - Getting everyone on board the configuration management express!
PDF
OSDC 2014: Jonathan Clarke - Rudder
PDF
Configuration management 101 - A tale of disaster recovery using CFEngine 3
PPTX
Network Configuration Management - Mumbai Seminar
PDF
Configuration management benefits for everyone - Rudder @ FLOSSUK Spring Conf...
DOCX
Configuration Management Report
PPTX
Configuration Management and Deployment
PPTX
Why Configuration Management Matters
PPTX
SAP TechEd 2013 session Tec118 managing your-environment
PPTX
Leveraging Change Control for Security
PDF
Puppet automated config_mgmt
PPTX
Configuration Management: What, Why, and How?
PPT
Ravi Scm Final
PPTX
SecureIoT Compliance Auditing Service
PPTX
Resource Monitoring and Management II
PDF
Interfacing infrastructure-as-code with non-expert users
PDF
O'Reilly Security - Continuous Auditing For Effective Compliance with Rudder
PPT
software configuratiom management role n resposnbilities
PDF
AUTOMATED POLICY COMPLIANCE AND CHANGE DETECTION MANAGED SERVICE IN DATA NETW...
OSDC 2015: Benoit Peccatte | Sharing IT automation benefits in a team with Ru...
Rudder - Getting everyone on board the configuration management express!
OSDC 2014: Jonathan Clarke - Rudder
Configuration management 101 - A tale of disaster recovery using CFEngine 3
Network Configuration Management - Mumbai Seminar
Configuration management benefits for everyone - Rudder @ FLOSSUK Spring Conf...
Configuration Management Report
Configuration Management and Deployment
Why Configuration Management Matters
SAP TechEd 2013 session Tec118 managing your-environment
Leveraging Change Control for Security
Puppet automated config_mgmt
Configuration Management: What, Why, and How?
Ravi Scm Final
SecureIoT Compliance Auditing Service
Resource Monitoring and Management II
Interfacing infrastructure-as-code with non-expert users
O'Reilly Security - Continuous Auditing For Effective Compliance with Rudder
software configuratiom management role n resposnbilities
AUTOMATED POLICY COMPLIANCE AND CHANGE DETECTION MANAGED SERVICE IN DATA NETW...
Ad

More from RUDDER (20)

PDF
What if configuration management didn't need to be lvl60 in dev?
PDF
Servers compliance: audit, remediation, proof
PDF
OSIS 2019 - Qu’apporte l’observabilité à la gestion de configuration ?
PDF
OW2Con - Configurations, do you prove yours?
PDF
The new plugin ecosystem in RUDDER 5.0
PDF
What uses for observing operations of Configuration Management?
PDF
UX challenges of a UI-centric config management tool
PDF
What happened in RUDDER in 2018 and what’s next?
PDF
What is RUDDER and when should I use it?
PDF
Fosdem - Configurations do you prove yours?
PDF
L'audit en continu : clé de la conformité démontrable (#POSS 2018)
PDF
Fiabilité et conformité continues en production avec Rudder (#BBOOST 2018)
PDF
Stay up - voyage d'un éditeur de logiciels libres
PDF
How we scaled Rudder to 10k, and the road to 50k
PDF
What's new and what's next in Rudder
PDF
Poss 2017 : gestion des configurations et mise en conformité chez un service ...
PDF
Poss 2017 - la continuité, arme secrète de la gestion du si - cas concret de ...
PDF
POSS 2017 : Comment automatiser son infrastructure quand... on a pas le temps...
PDF
DevOps D-Day 2017 - Gestion des configurations et mise en conformité chez un ...
PDF
RUDDER - Continuous Configuration (configuration management + continuous audi...
What if configuration management didn't need to be lvl60 in dev?
Servers compliance: audit, remediation, proof
OSIS 2019 - Qu’apporte l’observabilité à la gestion de configuration ?
OW2Con - Configurations, do you prove yours?
The new plugin ecosystem in RUDDER 5.0
What uses for observing operations of Configuration Management?
UX challenges of a UI-centric config management tool
What happened in RUDDER in 2018 and what’s next?
What is RUDDER and when should I use it?
Fosdem - Configurations do you prove yours?
L'audit en continu : clé de la conformité démontrable (#POSS 2018)
Fiabilité et conformité continues en production avec Rudder (#BBOOST 2018)
Stay up - voyage d'un éditeur de logiciels libres
How we scaled Rudder to 10k, and the road to 50k
What's new and what's next in Rudder
Poss 2017 : gestion des configurations et mise en conformité chez un service ...
Poss 2017 - la continuité, arme secrète de la gestion du si - cas concret de ...
POSS 2017 : Comment automatiser son infrastructure quand... on a pas le temps...
DevOps D-Day 2017 - Gestion des configurations et mise en conformité chez un ...
RUDDER - Continuous Configuration (configuration management + continuous audi...

Recently uploaded (20)

PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Electronic commerce courselecture one. Pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPT
Teaching material agriculture food technology
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Machine Learning_overview_presentation.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
The AUB Centre for AI in Media Proposal.docx
Electronic commerce courselecture one. Pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
MIND Revenue Release Quarter 2 2025 Press Release
Empathic Computing: Creating Shared Understanding
Big Data Technologies - Introduction.pptx
Programs and apps: productivity, graphics, security and other tools
“AI and Expert System Decision Support & Business Intelligence Systems”
Advanced methodologies resolving dimensionality complications for autism neur...
Teaching material agriculture food technology
Per capita expenditure prediction using model stacking based on satellite ima...
Dropbox Q2 2025 Financial Results & Investor Presentation
Mobile App Security Testing_ A Comprehensive Guide.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Machine Learning_overview_presentation.pptx

Automating the manual - feedback on including existing systems in configuration management

  • 1. Normation – CC-BY-SA normation.com Including existing systems in configuration management Nicolas CHARLES nch@normation.com @nico_charles
  • 2. Normation – CC-BY-SA normation.com Issue Most systems are still not automatically managed ● Configuration Management has recently become mainstream ● It's not yet an habit ● A lot of running systems predate configuration management ● Lack of upgrade paths (dependency to dead applications) ● Systems cannot be modified (lost knowledge) ● Systems with stale errors no-one can fix
  • 3. Normation – CC-BY-SA normation.com Issue Most systems are still not automatically managed ● Configuration Management has recently become mainstream ● It's not yet an habit ● A lot of running systems predate configuration management ● Lack of upgrade paths (dependency to dead applications) ● Systems cannot be modified (lost knowledge) ● Systems with stale errors no-one can fix Why couldn't we benefit from cfgmgmt on these systems?
  • 4. Normation – CC-BY-SA normation.com Why Rudder? Rudder is very well suited for this use-case ● Support a lot of different OSes and heterogeneous systems ● Audit mode ● Web Interface ● API to add and extract data
  • 5. Normation – CC-BY-SA normation.com Identifying systems First, identify the systems and their role(s) ● It can be harder than expected ● Some systems may be known only by sub-parts of the team ● Roles may be unknown from most ● Select those in scope for cfgmgmt ● Having an up-to-date CMDB, Wiki, spreadsheet… helps a lot Make a list of these systems ● In a spreadsheet
  • 7. Normation – CC-BY-SA normation.com Inventory systems Make an inventory of all theses systems ● During maintenance windows, install Rudder agent ● Inventory will be sent to Rudder server ● Extract them with the API into the spreadsheet ● Set these nodes in Audit mode in Rudder ● Validate the roles ● Based on installed software and running processes ● Based on naming convention, networks ● Based on previous knowledge (expectation may not match reality)
  • 9. Normation – CC-BY-SA normation.com Group the systems Multidimensional approach for grouping systems ● Per roles ● Nodes with same role ought to have 'identical' config ● Per security level ● Hardening, access rules, authorizations ● Per generation of system installation ● Installation procedures, best practices and know-how evolved over time ● Per OS ● Per system type (physical server, embedded device, ...)
  • 10. Normation – CC-BY-SA normation.com Group the systems Extract common rules ● Based on documented procedures, available know-how, expectations ● List them in the spreadsheet, with ● Detailed Description ● Groups they should apply to ● Status in Rudder: implemented and compliant
  • 12. Normation – CC-BY-SA normation.com Audit the rules Configure the Rules and Directives in Rudder ● Use same names in Spreadsheet and in Rudder ● Rules and Directives in Audit mode ● Get compliance result ● Extract data using the API
  • 15. Normation – CC-BY-SA normation.com Non compliance For every non-compliance listed ● Is it expected? ● Should it be remediated? ● Yes, and it's straightforward – switch from Audit mode to Enforce ● May need to split in two Rules: one in Audit mode, one in Enforce, and switch nodes from one Rule to another during each maintenance windows ● Yes, but need to be done manually – correct manually on the node during maintenance windows ● Yes, but risky: assess the expected risk/benefits ● Maybe some exceptions will be implemented
  • 16. Normation – CC-BY-SA normation.com Validation Validate your rules ● Spawn new systems (at least one per group) ● Check they become fully functional ● Detect rogue “live” parameters (like sysctl modified by hand) ● Ensure repeatability
  • 17. Normation – CC-BY-SA normation.com Time estimate Rough time estimates ● Identify systems: several hours per team members ● You may need to interview all teams members. ● Hidden benefit: explain to all of them the goal, and boost acceptation of configuration management ● Agents install: 10 minutes to 1 hour per batch ● Deploy repository for each site, remote install, get inventories ● Role validation: minutes to days per role ● Review procedures, check what is on systems ● Logical system grouping: ● Depends on number of roles, exceptions, generations.
  • 18. Normation – CC-BY-SA normation.com Time estimate Rough time estimates ● Create spreadsheet: 4h to several days ● Depends on your skill, and amount of data to store there ● Rule creation: ● Couple of minutes to hours depending on complexity ● Measure compliance: 5 minutes – hours per rule ● Check what is not compliant, and document it ● Remediation plan: ● Very fast to “rewrite a procedure from scratch” ● Expect surprise ● Discover forgotten systems ● Discover major compliance issues
  • 19. Normation – CC-BY-SA normation.com Time estimate There will be delays ● Deal with maintenance windows ● Deal with freeze (August in France, December) ● Decisions on non-compliance remediation are not always easy ● Need to involve stakeholders
  • 20. Normation – CC-BY-SA normation.com What are the benefits? Standard configuration management benefits ● Awarness on the IT ● Improved reliability ● Improved productivity
  • 21. Normation – CC-BY-SA normation.com What are the benefits? More specific to this case ● Less outages due to stale errors ● Less outages thanks to uniformity ● Improved RTO ● Reduced surface of vulnerability ● A base to evolve your IT
  • 22. Normation – CC-BY-SA normation.com Questions ? Nicolas CHARLES nch@normation.com @nico_charles